CHMag Issue 14th, March 2011 Download !
Sunday, April 3, 2011
ClubHack : CHMag Issue 14th, March 2011 Download !
Description:
14th issue of ClubHACK magazine is out.
Contents of this issue:
Tech Gyan - Remote Thread Execution in System Process
Tool Gyan - JS Recon: Java Script Network Reconnaissance Tool
Mom's Guide - Choosing Right Secure Mobile
Legal Gyan - Law Related Unauthorized Access
Command Line Gyan - Backup & Bulk Copy
Maruix Vibhag - Introduction Part 1
PDF download link: http://chmag.in/issue/mar2011.pdf
News Source : Abhijeet Patil
URL: http://chmag.in
Description:
14th issue of ClubHACK magazine is out.
Contents of this issue:
Tech Gyan - Remote Thread Execution in System Process
Tool Gyan - JS Recon: Java Script Network Reconnaissance Tool
Mom's Guide - Choosing Right Secure Mobile
Legal Gyan - Law Related Unauthorized Access
Command Line Gyan - Backup & Bulk Copy
Maruix Vibhag - Introduction Part 1
PDF download link: http://chmag.in/issue/mar2011.pdf
News Source : Abhijeet Patil
URL: http://chmag.in
Labels:
Ebooks downolad
CAT – Web Application Security Test & Assessment Tool
CAT is designed to facilitate manual web application penetration testing for more complex, demanding application testing tasks. It removes some of the more repetitive elements of the testing process, allowing the tester to focus on individual applications, thus enabling them to conduct a much more thorough test. Conceptually it is similar to other proxies available both commercially and open source, but CAT provides a richer feature set and greater performance, combined with a more intuitive user interface.
There are a number of differences between CAT and currently available web proxies. They include:
Download CAT Beta 4
There are a number of differences between CAT and currently available web proxies. They include:
- CAT uses Internet Explorer’s rendering engine for accurate HTML representation
- It supports many different types of text conversions including: URL, Base64, Hex, Unicode, HTML/XML, SQL and JavaScript no quotes
- It offers integrated SQL Injection and XSS Detection
- Synchronized Proxies for Authentication and Authorisation checking
- Faster performance due to HTTP connection caching
- SSL Version and Cipher checker using OpenSSL
- Greater flexibility for importing/exporting logs and saving projects
- Tabbed Interface allows for multiple tools at once e.g. multiple repeaters & different logs
- The ability to repeat and modify a sequence of requests (particularly useful in SSO testing)
- It’s free!
- Do bear in mind that this is a free tool, but it is NOT Open Source. Also take a good look at the EULA before using it (especially Section 6).
Download CAT Beta 4
Labels:
Tools download
Forensic Tools for System administrators
Hello ..I have collected a number of useful tools for keeping a network secure. Note that this list is in no way exhaustive. Some of the tools are difficult to find, so you can download them right of this page. Please do not send any email asking support for these tools. For questions, please use the forums. PLEASE NOTE, I am NOT RESPONSIBLE FOR WHAT YOU DO WITH THESE FILES...

I will update this page regularly for new cool tools. If you have a cool utility you want me to review, email me. I have divided the security utilties in the following categories:
* Forensic Tools
* Security Tools
* Admin Tools
* Monitoring Tools

I will update this page regularly for new cool tools. If you have a cool utility you want me to review, email me. I have divided the security utilties in the following categories:
* Forensic Tools
* Security Tools
* Admin Tools
* Monitoring Tools
Labels:
Tools
Basic XSS Cross Site Scripting Demo [Video]
Friday, April 1, 2011
Posted by Team : Evilhackerz Thursday, December 31, 2009
Labels:
Ethical Hacking,
Hacking Ebooks,
Security,
Tools,
Tricks and Tips
Hacking With Nmap – The Network Mapping Tool
Nmap is most widely used port scanning & network mapping tool used widely by network administrators & security administrators to scan their ports for potential vulnerabilities. If you are not aware of Nmap & you don’t have it then you can download it here for both Linux & Windows.

1. Open Closed
2. Filtered Unfiltered
3 .Open / filtered Closed/unfiltered
Scanning through Nmap gives you list of ports that are opened or filtered. Most of closed ports are not disclosed as there are almost 65000 ports in a computer for communication.
(Filtered packet : It means the data packets that are sent or received are filtered by firewall to secure it.)
Ok, So ready to hack with Nmap,
There are three types of basic scans you can perform on ports which is as follows :
SYN Scan : It is the most simple & common scan that is used to scan for ports. The scan results are very faster compared to other types , but it gives generalized results.
FIN Scan : FIN scan can detect if any kind of filtered packets or weak firewalls, and warns attacker to create stealth for attacking the victim network.
ACK Scan : Filtered and unfiltered ports can be scanned with this type of port scan. It is the most advanced scanning done with nmap.
SYN scan :
For scanning www.sampledomain.com
Type in your terminal of linux:
#nmap -sS -T4 www.sampledomain.com (replace domain or IP you wish to scan at sampledomain.com)
Result will be having three tables :
Port State Service
This will give you port number its state open?filtered like that & services will give you what is service running on that ports.
FIN Scan :
#nmap -sF -T4 www.sampledomain.com (replace domain or IP you wish to scan at sampledomain.com)
Live host & filtered ports are found out with this method
ACK Scan :
#nmap -sA -T4 www.sampledomain.com (replace domain or IP you wish to scan at sampledomain.com)
All closed ports are eliminated with this ACK scan. And you’ll only see ports that are up for attack.
So this was a basic Nmap hacking or port scanning tutorial. You can also find OS running, web server & mail server scanning & this data can be used as Passive attack gathering stage which we have discussed in pre attack stages.
We will discuss web server hacking in upcoming posts. Please post your queries regarding nmap by commenting here. So that we can help you the most.

Nmap Hacking Theory
Following are the states that ports are available in1. Open Closed
2. Filtered Unfiltered
3 .Open / filtered Closed/unfiltered
Scanning through Nmap gives you list of ports that are opened or filtered. Most of closed ports are not disclosed as there are almost 65000 ports in a computer for communication.
(Filtered packet : It means the data packets that are sent or received are filtered by firewall to secure it.)
Ok, So ready to hack with Nmap,
There are three types of basic scans you can perform on ports which is as follows :
SYN Scan : It is the most simple & common scan that is used to scan for ports. The scan results are very faster compared to other types , but it gives generalized results.
FIN Scan : FIN scan can detect if any kind of filtered packets or weak firewalls, and warns attacker to create stealth for attacking the victim network.
ACK Scan : Filtered and unfiltered ports can be scanned with this type of port scan. It is the most advanced scanning done with nmap.
Hacking With Nmap
So let us start with commands of Nmap operation in Linux:SYN scan :
For scanning www.sampledomain.com
Type in your terminal of linux:
#nmap -sS -T4 www.sampledomain.com (replace domain or IP you wish to scan at sampledomain.com)
Result will be having three tables :
Port State Service
This will give you port number its state open?filtered like that & services will give you what is service running on that ports.
FIN Scan :
#nmap -sF -T4 www.sampledomain.com (replace domain or IP you wish to scan at sampledomain.com)
Live host & filtered ports are found out with this method
ACK Scan :
#nmap -sA -T4 www.sampledomain.com (replace domain or IP you wish to scan at sampledomain.com)
All closed ports are eliminated with this ACK scan. And you’ll only see ports that are up for attack.
So this was a basic Nmap hacking or port scanning tutorial. You can also find OS running, web server & mail server scanning & this data can be used as Passive attack gathering stage which we have discussed in pre attack stages.
We will discuss web server hacking in upcoming posts. Please post your queries regarding nmap by commenting here. So that we can help you the most.
Labels:
Ethical Hacking,
Tricks and Tips
How To Crash Small Websites (NOOB FRIENDLY)
Ok so your friend or your enemy has made a little shitty website for whatever maybe a private server or anything.. And your feeling devious and want to crash it .
TOOLS:
>>Port Scanner<<
>>rDos<<
>>HotSpotSheild Proxy!<<
Step One: First we need to find the websites IP Adress. This is very easy todo.
Ok so say they URL is http://www.yoursite.com ok now that you have your URL open Up Cmd todo this press Start>Run>cmd Once you have CMD open you type ping http://www.yoursite.com press enter and you will get the ip of the website. (YOU MUST REMOVE HTTP:// AND ANY /'s)
EXAMPLE:
![[Image: 2w68nys.jpg]](http://i25.tinypic.com/2w68nys.jpg)
Step Two: Now we must test to see if port 80 is open (it usually is).
This is very easy todo to Ok open up the port scanner you downloaded.
Once in the port scanner type in your Victims ip that you got from step 1.
It will ask you todo a range scan or a full scan (SELECT REANGE SCAN!) It will ask for conformaition you have to use a capital Y or a capital N! Now enter 79 for lowest port and 81 for highest hit enter than hit cap Y.
[X] = Closed
[X] Vulnerable = Open
EXAMPLE:
Step Three ALMOST DONE:
The final and easiest step (IF PORT 80 IS CLOSED PICK A NEW SITE!)
If port 80 is open your on your way to crashing!!
Ok open Up rDos that you download.
Enter your victims ip that we got from step 1.
It will ask you for the port to attack use port 80 that is why we scaned to make sure 80 was open! If it is closed it will not work.
Hit enter.. *=Flooding -=Crashed Or didn't connect!
EXAMPLE:
![[Image: bhzlp0.jpg]](http://i28.tinypic.com/bhzlp0.jpg)
Thanks for reading i hope this helps :)
TOOLS:
>>Port Scanner<<
>>rDos<<
>>HotSpotSheild Proxy!<<
Step One: First we need to find the websites IP Adress. This is very easy todo.
Ok so say they URL is http://www.yoursite.com ok now that you have your URL open Up Cmd todo this press Start>Run>cmd Once you have CMD open you type ping http://www.yoursite.com press enter and you will get the ip of the website. (YOU MUST REMOVE HTTP:// AND ANY /'s)
EXAMPLE:
![[Image: 2w68nys.jpg]](http://i25.tinypic.com/2w68nys.jpg)
Step Two: Now we must test to see if port 80 is open (it usually is).
This is very easy todo to Ok open up the port scanner you downloaded.
Once in the port scanner type in your Victims ip that you got from step 1.
It will ask you todo a range scan or a full scan (SELECT REANGE SCAN!) It will ask for conformaition you have to use a capital Y or a capital N! Now enter 79 for lowest port and 81 for highest hit enter than hit cap Y.
[X] = Closed
[X] Vulnerable = Open
EXAMPLE:
Step Three ALMOST DONE:
The final and easiest step (IF PORT 80 IS CLOSED PICK A NEW SITE!)
If port 80 is open your on your way to crashing!!
Ok open Up rDos that you download.
Enter your victims ip that we got from step 1.
It will ask you for the port to attack use port 80 that is why we scaned to make sure 80 was open! If it is closed it will not work.
Hit enter.. *=Flooding -=Crashed Or didn't connect!
EXAMPLE:
![[Image: bhzlp0.jpg]](http://i28.tinypic.com/bhzlp0.jpg)
Thanks for reading i hope this helps :)
Labels:
Ethical Hacking,
Tools,
Tricks and Tips
Tutorial: How to hack with a ip address
So say somehow somewhere we ended up choosing a target to start wreaking havoc upon. All we need is an IP Address. Theres plenty of papers out there that go into how to obtain an IP Address from the preferred mark of your choice. So I'm not going to go into that subject. Alright so say we got the targets IP Address finally. What do we do with this IP Address. Well first ping the IP Address to make sure that its alive. In otherwords online. Now at the bottom of this document ill include some links where you can obtain some key tools that may help on your journey through the electronic jungle. So we need to find places to get inside of the computer so we can start trying to find a way to "hack" the box. Port Scanners are used to identify the open ports on a machine thats running on a network, whether its a router, or a desktop computer, they will all have ports. Protocols use these ports to communicate with other services and resources on the network.
1) Blues Port Scanner - This program will scan the IP address that you chose and identify open ports that are on the target box.
Example 1:
Idlescan using Zombie(192.150.13.111:80); Class: Incremental
Interesting ports on 208.225.90.120:
(The 65522 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
25/tcp open smtp
80/tcp open http
111/tcp open sunrpc
135/tcp open loc-srv
443/tcp open https 1027/tcp open IIS
1030/tcp open iad1
2306/tcp open unknown
5631/tcp open pcanywheredata
7937/tcp open unknown
7938/tcp open unknown
36890/tcp open unknown
In example 1 now we see that there are a variety of ports open on this box. Take note of all the ports that you see listed before you. Most of them will be paired up with the type of protocol that uses that port (IE. 80-HTTP 25-SMTP Etc Etc...) Simply take all that information and paste it into notepad or the editor of your choice. This is the beginning of your targets record. So now we know what ports are open. These are all theoretical points of entry where we could wiggle into the computer system. But we all know its not that easy. Alright so we dont even know what type of software or what operating system that this system is running.
2) NMAP - Port Scanner - Has unique OS fingerprinting methods so when the program sees a certain series of ports open it uses its best judgement to guess what operating system its running. Generally correct with my experiences.
So we have to figure out what type of software this box is running if we are gonna start hacking the thing right? Many of you have used TELNET for your MUDS and MOOS and weird multiplayer text dungeons and many of you havent even heard of it before period. TELNET is used to open a remote connection to an IP Address through a Port. So what that means is we are accessing their computer from across the internet, all we need is their IP Address and a port number. With that record you are starting to compile, open a TELNET connection to the IP Address and enter one of the OPEN ports that you found on the target.
So say we typed 'TELNET -o xxx.xxx.xxx.xxx 25' This command will open up a connection through port 25 to the IP xxx.xxx.xxx.xxx. Now you may see some text at the very top of the screen. You may think, well what the hell, how is that little string of text going to help me. Well get that list you are starting to write, and copy the banners into your compilation of the information youve gathered on your target. Banners/Headers are what you get when you TELNET to the open ports. Heres an example of a banner from port 25.
220 jesus.gha.chartermi.net ESMTP Sendmail 8.12.8/8.12.8; Fri, 7 Oct 2005 01:22:29 -0400
Now this is a very important part in the enumeration process. You notice it says 'Sendmail 8.12.8/8.12.8' Well what do ya know, we now have discovered a version number. This is where we can start identifying the programs running on the machine. There are some instances in which companies will try and falsify their headers/banners so hackers are unable to find out what programs are truly installed. Now just copy all the banners from all the open ports *Some Ports May Have No Bannners* and organize them in the little record we have of the target. Now we have all the open ports, and a list of the programs running and their version numbers. This is some of the most sensitive information you can come across in the networking world. Other points of interest may be the DNS server, that contains lots of information and if you are able to manipulate it than you can pretend to hotmail, and steal a bunch of peoples email. Well now back to the task at handu. Apart from actual company secrets and secret configurations of the network hardware, you got some good juicy info. http://www.securityfocus.com is a very good resource for looking up software vulnerabilities. If you cant find any vulnerabilities there, search on google. There are many, many, many other sites that post vulnerabilities that their groups find and their affiliates.
At SecurityFocus you can search through vendor and whatnot to try and find your peice of software, or you can use the search box. When i searched SecurityFocus i found a paper on how Sendmail 8.12.8 had a buffer overflow. There was proof of concept code where they wrote the shellcode and everything, so if you ran the code with the right syntax, a command prompt would just spawn. You should notice a (#) on the line where your code is being typed. That pound symbol means that the command prompt window thats currently open was opened as root. The highest privilage on a UNIX/Linux Box. You have just successfully hacked a box. Now that you have a command shell in front of you, you can start doing whatever you want, delete everything if you want to be a fucking jerk, however I dont recommend that. Maybe leave a text file saying how you did it and that they should patch their system.....whoever they are. And many times the best thing you can do is just lay in the shadows, dont let anyone know what you did. More often than not this is the path you are going to want to take to avoid unwanted visits by the authorities.
There are many types of exploits out there, some are Denial of Service exploits, where you shut down a box, or render an application/process unusable. Called denial of service simply because you are denying a service on someones box to everyone trying to access it. Buffer Overflow exploits are involved when a variable inside some code doesnt have any input validation. Each letter you enter in for the string variable will be 1 byte long. Now where the variables are located at when they are in use by a program is called the buffer. Now what do you think overflowing the buffer means. We overflow the buffer so we can get to a totally different memory address. Then people write whats called shellcode in hex. This shellcode is what returns that command prompt when you run the exploit. That wasnt the best description of a buffer overflow, however all you need to remember is that garbage data fills up the data registers so then the buffer overflows and allows for remote execution of almost every command available. There are many, many other types of attacks that cannot all be described here, like man-in-the-middle attacks where you spoof who you are. Performed correctly, the victim will enter http://www.bank.com and his connection will be redirected to your site where you can make a username and password box, make the site look legit. And your poor mark will enter their credentials into your site, when they think its really http://www.bank.com. You need to have a small script set up so it will automatiically display like an error or something once they try and log in with their credentials. This makes it seem like the site is down and the victim doenst give it a second thought and will simply try again later.
__________________________________________________ _______o_________
So as a summary of how to 0Wn a box when you only have an IP Address
Method Works On BOTH *Nix and Windoze
****You can do the same with domain names (IE google.com) than what you can with IP Addresses. Run a WHOIS Lookup or something along those lines. Or check up on InterNIC you should be able to resolve the domain name to an IP address.****
- Port Scan The Address And Record Open Ports
- Telnet To Open Ports To Identify Software Running On Ports
3) netcat - Network swiss army knife. Like TELNET only better and with a lot more functionality. Both can be used when you are trying to fingerprint software on open ports
- Record Banners And Take Note Of The Application Running and The Version Number
- Take A Gander Online At SecurityFocus.com or Eeye.com. If you cant find any vulnerabilities then search google.
- Make a copy of some Proof-Of-Concept code for the vulnerability.
*Read the documentation if there is any, for the proof-of-concept code you will be using for your exploit*
- Run The Exploit Against The Victim.
- Reap The Cheap-Sh0t Ownage
__________________________________________________ _______________
**This document does not go into covering your tracks. If you dare try any of this stuff on a box you dont have consent to hack on, They will simply look at the logs and see your IP Address and then go straight to your ISP. Once you get more 1337 you get to learn how to get away with the nasty deeds. This is what the majority of kode-kiddies do when they perform attacks. The key is to enumerate all the info you can from the machine, the more info you have on the system the better. User accounts can also be enumerated. Once you have a list of account names, you may then proceed to brute-force or perform a cryptanalysis attack to gain control of the account. Then you must work on privilage escalation. Users are not Admins/Root**
1) Blues Port Scanner - This program will scan the IP address that you chose and identify open ports that are on the target box.
Example 1:
Idlescan using Zombie
Interesting ports on 208.225.90.120:
(The 65522 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
25/tcp open smtp
80/tcp open http
111/tcp open sunrpc
135/tcp open loc-srv
443/tcp open https 1027/tcp open IIS
1030/tcp open iad1
2306/tcp open unknown
5631/tcp open pcanywheredata
7937/tcp open unknown
7938/tcp open unknown
36890/tcp open unknown
In example 1 now we see that there are a variety of ports open on this box. Take note of all the ports that you see listed before you. Most of them will be paired up with the type of protocol that uses that port (IE. 80-HTTP 25-SMTP Etc Etc...) Simply take all that information and paste it into notepad or the editor of your choice. This is the beginning of your targets record. So now we know what ports are open. These are all theoretical points of entry where we could wiggle into the computer system. But we all know its not that easy. Alright so we dont even know what type of software or what operating system that this system is running.
2) NMAP - Port Scanner - Has unique OS fingerprinting methods so when the program sees a certain series of ports open it uses its best judgement to guess what operating system its running. Generally correct with my experiences.
So we have to figure out what type of software this box is running if we are gonna start hacking the thing right? Many of you have used TELNET for your MUDS and MOOS and weird multiplayer text dungeons and many of you havent even heard of it before period. TELNET is used to open a remote connection to an IP Address through a Port. So what that means is we are accessing their computer from across the internet, all we need is their IP Address and a port number. With that record you are starting to compile, open a TELNET connection to the IP Address and enter one of the OPEN ports that you found on the target.
So say we typed 'TELNET -o xxx.xxx.xxx.xxx 25' This command will open up a connection through port 25 to the IP xxx.xxx.xxx.xxx. Now you may see some text at the very top of the screen. You may think, well what the hell, how is that little string of text going to help me. Well get that list you are starting to write, and copy the banners into your compilation of the information youve gathered on your target. Banners/Headers are what you get when you TELNET to the open ports. Heres an example of a banner from port 25.
220 jesus.gha.chartermi.net ESMTP Sendmail 8.12.8/8.12.8; Fri, 7 Oct 2005 01:22:29 -0400
Now this is a very important part in the enumeration process. You notice it says 'Sendmail 8.12.8/8.12.8' Well what do ya know, we now have discovered a version number. This is where we can start identifying the programs running on the machine. There are some instances in which companies will try and falsify their headers/banners so hackers are unable to find out what programs are truly installed. Now just copy all the banners from all the open ports *Some Ports May Have No Bannners* and organize them in the little record we have of the target. Now we have all the open ports, and a list of the programs running and their version numbers. This is some of the most sensitive information you can come across in the networking world. Other points of interest may be the DNS server, that contains lots of information and if you are able to manipulate it than you can pretend to hotmail, and steal a bunch of peoples email. Well now back to the task at handu. Apart from actual company secrets and secret configurations of the network hardware, you got some good juicy info. http://www.securityfocus.com is a very good resource for looking up software vulnerabilities. If you cant find any vulnerabilities there, search on google. There are many, many, many other sites that post vulnerabilities that their groups find and their affiliates.
At SecurityFocus you can search through vendor and whatnot to try and find your peice of software, or you can use the search box. When i searched SecurityFocus i found a paper on how Sendmail 8.12.8 had a buffer overflow. There was proof of concept code where they wrote the shellcode and everything, so if you ran the code with the right syntax, a command prompt would just spawn. You should notice a (#) on the line where your code is being typed. That pound symbol means that the command prompt window thats currently open was opened as root. The highest privilage on a UNIX/Linux Box. You have just successfully hacked a box. Now that you have a command shell in front of you, you can start doing whatever you want, delete everything if you want to be a fucking jerk, however I dont recommend that. Maybe leave a text file saying how you did it and that they should patch their system.....whoever they are. And many times the best thing you can do is just lay in the shadows, dont let anyone know what you did. More often than not this is the path you are going to want to take to avoid unwanted visits by the authorities.
There are many types of exploits out there, some are Denial of Service exploits, where you shut down a box, or render an application/process unusable. Called denial of service simply because you are denying a service on someones box to everyone trying to access it. Buffer Overflow exploits are involved when a variable inside some code doesnt have any input validation. Each letter you enter in for the string variable will be 1 byte long. Now where the variables are located at when they are in use by a program is called the buffer. Now what do you think overflowing the buffer means. We overflow the buffer so we can get to a totally different memory address. Then people write whats called shellcode in hex. This shellcode is what returns that command prompt when you run the exploit. That wasnt the best description of a buffer overflow, however all you need to remember is that garbage data fills up the data registers so then the buffer overflows and allows for remote execution of almost every command available. There are many, many other types of attacks that cannot all be described here, like man-in-the-middle attacks where you spoof who you are. Performed correctly, the victim will enter http://www.bank.com and his connection will be redirected to your site where you can make a username and password box, make the site look legit. And your poor mark will enter their credentials into your site, when they think its really http://www.bank.com. You need to have a small script set up so it will automatiically display like an error or something once they try and log in with their credentials. This makes it seem like the site is down and the victim doenst give it a second thought and will simply try again later.
__________________________________________________ _______o_________
So as a summary of how to 0Wn a box when you only have an IP Address
Method Works On BOTH *Nix and Windoze
****You can do the same with domain names (IE google.com) than what you can with IP Addresses. Run a WHOIS Lookup or something along those lines. Or check up on InterNIC you should be able to resolve the domain name to an IP address.****
- Port Scan The Address And Record Open Ports
- Telnet To Open Ports To Identify Software Running On Ports
3) netcat - Network swiss army knife. Like TELNET only better and with a lot more functionality. Both can be used when you are trying to fingerprint software on open ports
- Record Banners And Take Note Of The Application Running and The Version Number
- Take A Gander Online At SecurityFocus.com or Eeye.com. If you cant find any vulnerabilities then search google.
- Make a copy of some Proof-Of-Concept code for the vulnerability.
*Read the documentation if there is any, for the proof-of-concept code you will be using for your exploit*
- Run The Exploit Against The Victim.
- Reap The Cheap-Sh0t Ownage
__________________________________________________ _______________
**This document does not go into covering your tracks. If you dare try any of this stuff on a box you dont have consent to hack on, They will simply look at the logs and see your IP Address and then go straight to your ISP. Once you get more 1337 you get to learn how to get away with the nasty deeds. This is what the majority of kode-kiddies do when they perform attacks. The key is to enumerate all the info you can from the machine, the more info you have on the system the better. User accounts can also be enumerated. Once you have a list of account names, you may then proceed to brute-force or perform a cryptanalysis attack to gain control of the account. Then you must work on privilage escalation. Users are not Admins/Root**
Labels:
Ethical Hacking,
Tricks and Tips
How to do Netbios Hacking

THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER.NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.
STEP-BY-STEP NETBIOS HACKING PROCEDURE
1.Open command prompt
2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP-TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS.BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).
Example: C:\>net view \\219.64.55.112
The above is an example for operation using command prompt.”net view” is one of the netbios command to view the shared resources of the remote computer.Here “219.64.55.112″ is an IP address of remote computer that is to be hacked through Netbios.You have to substitute a vlaid IP address in it’s place.If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown.If not an error message is displayed. So repeat the procedure 2 with a different IP address.
3. After succeeding, use the “net use” command in the command prompt.The “net use” is another netbios command which makes it possible to hack remote drives or printers.
Example-1:
C:\>net use D: \\219.64.55.112\F
Example-2:
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3:
C:\>net use I: \\219.64.55.112\Myprint
NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk.
NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES,FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER.THAT IS IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT
F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer.These are displayed after giving “net use” command. “219.64.55.112″ is the IP address of remote computer that you want to hack.
4. After succeeding your computer will give a message that “The command completed successfully“. Once you get the above message you are only one step away from hacking the computer.
Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name.You can open it and access remote computer’s Hard-Drive.You can copy files,music,folders etc. from victim’s hard-drive.You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system.You can access files\folders quickly through “Command Prompt”.
NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios.That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed).So Repeat The Procedure 2,3 With Different IP Address.More Tricks and Hacks @ http://www.realhacks.com/
Labels:
Ethical Hacking
Nmap 5.00 Released
Nmap 5.00 Released
Insecure.Org announced the immediate, free availability of the Nmap Security Scanner version 5.00. This is the first stable release since 4.76 (last September), and the first major release since the 4.50 release in 2007. Dozens of development releases led up to this. Considering nearly 600 significant changes, this is the most important Nmap release since 1997.The release notes provide the top 5 improvements in Nmap 5 as well as example runs and screen shots. The change details section includes improvements to the Nmap Scripting Engine, Zenmap GUI and Results Viewer, the new Ncat tool, the new Ndiff scan comparison tool, performance improvements, the new Nmap book, and much more!
Screenshots:
1) Classic Command-Line Nmap

2) Zenmap’s new network topology graphing mode

Download: http://nmap.org/download.html
Release Notes: http://nmap.org/5/More Tricks and Hacks @ http://www.realhacks.com/
Labels:
Ethical Hacking,
Tools
devil Shell V 1.1 Released
Ug_devil A member Of Team NUTs has launched his first shell DEVIL SHELL V 1 Now His Shell's Latest Version DEVIL SHELL V 1.1 has been lauched ver good feedbacks has been came out wanna try check this
Nice to share next version of shell with all of you with new features
* DDoS
* Information area [server ip,server port,etc]
* Design new
* Download any File
* Remove some Bugs
Comming Soon in Next Version
* Mail Bomb
* SQL Query
You can Download at :Download Devil Shell v1.1
*Note: Only for testing purpose
awl are work properly but still will do more updates sooner
but enjoy this version secure fast and reliable
only for hacknuts members
Shell Username: ugdevil
Shell Password: 1234567
download link http://www.filefactory.com/file/b581cff/n/ugdevil.rar
Archie Password is : hacknuts
Nice to share next version of shell with all of you with new features
* DDoS
* Information area [server ip,server port,etc]
* Design new
* Download any File
* Remove some Bugs
Comming Soon in Next Version
* Mail Bomb
* SQL Query
You can Download at :Download Devil Shell v1.1
*Note: Only for testing purpose
awl are work properly but still will do more updates sooner
but enjoy this version secure fast and reliable
only for hacknuts members
Shell Username: ugdevil
Shell Password: 1234567
download link http://www.filefactory.com/file/b581cff/n/ugdevil.rar
Archie Password is : hacknuts
Labels:
Tools
Find other websites/domains hosted on same IP Address
How do you find out which other web sites or domains are hosted on a web server that hosts the site abc.com ?
In theory, all web servers (which are nothing but computers running software to serve web pages) are assigned unique IP addresses on the Internet. If a web server is hosting a website, the IP address of that site will be the same as that of the server. And if multiple domains are hosted on that web server, they will all have the same IP address which will again be same as that of the web server.
So here’s the trick – if you know the web address (or domain name), you first need to find the IP address of the web server that is hosting that site. Then use something called “Reverse IP” to find all the other websites that share that IP address.
Finds IP address of a Websites
To find the IP address of any website, open the command prompt on your computer (Start -> Run -> cmd) and type ping. The output will contain the IP address of that website – copy that number to your clipboard.

There are different websites,which provide this service to lookup all such domains,that are hosted on same ip address/server.
myIPneighbors
YouGetSignal

domainsbyip.com

linkvendor.com
5. atsameip
atsameip.com
6. find-ip-address
find-ip-address.org
domaintools.com
in the search box and there you have a big list of all .com, .net, .in and other domains that may be hosted on the same server that is hosting xyz.com. You should type the ip: keyword, followed by the IP address of the website and there are no spaces anywhere.

dd
d
bing.com
bing ip lookup For instance, the ping command suggests that the IP address of the web server hosting popurls.com is 92.51.132.180 and Bing shows a full list of sites that may be part of the popurls network.
onsamemachine.com
In theory, all web servers (which are nothing but computers running software to serve web pages) are assigned unique IP addresses on the Internet. If a web server is hosting a website, the IP address of that site will be the same as that of the server. And if multiple domains are hosted on that web server, they will all have the same IP address which will again be same as that of the web server.
So here’s the trick – if you know the web address (or domain name), you first need to find the IP address of the web server that is hosting that site. Then use something called “Reverse IP” to find all the other websites that share that IP address.
Finds IP address of a Websites
To find the IP address of any website, open the command prompt on your computer (Start -> Run -> cmd) and type ping

Find other websites hosted on same IP Address
When your blog or website is on shared hosting, you can find out how many websites are hosted on your server. You can either get the sites hosted on an IP or enter the URL of the site and get the number of sites hosted along with the website. A reverse IP domain check takes a domain name or IP address pointing to a web server and searches for other sites known to be hosted on that same web server.There are different websites,which provide this service to lookup all such domains,that are hosted on same ip address/server.
1. myIPneighbors



domainsbyip.com
4. linkvendor

linkvendor.com
5. atsameip

6. find-ip-address

7. Domain Tools Reverse IP
8. Bing Search Engine
go to bing.com, type ip:
dd
d
bing.com
bing ip lookup For instance, the ping command suggests that the IP address of the web server hosting popurls.com is 92.51.132.180 and Bing shows a full list of sites that may be part of the popurls network.

Oh ! finally all sites collected for my ICA frnds... Hope all of you will like this one....
Have a happy,Be safe ! and stay tuned to ICA.
Admin,ICA.
The Article is Taken From Indian Cyber Army (ICA) http://cyberarmy.in/
9. OnSameMachine
3. Domain By IP
2. YouGetSignal
Labels:
Ethical Hacking
Security Tools for System administrators
I have collected a number of useful tools for keeping a network secure. Note that this list is in no way exhaustive. Some of the tools are difficult to find, so you can download them right of this page. Please do not send any email asking support for these tools. For questions, please use the forums. PLEASE NOTE, I am NOT RESPONSIBLE FOR WHAT YOU DO WITH THESE FILES...

I will update this page regularly for new cool tools. If you have a cool utility you want me to review, email me. I have divided the security utilties in the following categories:
Note By Admin
[Taken From Indian Cyber Army ]

I will update this page regularly for new cool tools. If you have a cool utility you want me to review, email me. I have divided the security utilties in the following categories:
Note By Admin
[Taken From Indian Cyber Army ]
Labels:
Security
Online Admin Finder | Find Admin Pages Of Websites
Today as i was just using internet and was looking for something cool for my frnds to read on my site i got this for my hacker friends Thankxx To Mohit for this

[ Admin Finder ] Online Application Launched, Powered By "Indian Cyber Army". Developed By "Mohit Kumar". Check Out - http://adminfinder.cyberarmy.in/

Check Out - http://adminfinder.cyberarmy.in/
Labels:
Ethical Hacking
Linux Is More Secure Than Windows - Reasons !
Hello , one more interesting article for my friends, "Security through obscurity" may be a catchy phrase, but it's not the only thing that's catching among Windows users.The expression is intended to suggest that proprietary software is more secure by virtue of its closed nature. If hackers can't see the code, then it's harder for them to create exploits for it--or so the thinking goes.Unfortunately for Windows users, that's just not true--as evidenced by the never-ending parade of patches coming out of Redmond. In fact, one of Linux's many advantages over Windows is that it is more secure--much more. For small businesses and other organizations without a dedicated staff of security experts, that benefit can be particularly critical.

Five key factors underlie Linux's superior security: 1. Privileges
Linux systems are by no means infallible, but one of their key advantages lies in the way account privileges are assigned. In Windows, users are generally given administrator access by default, which means they pretty much have access to everything on the system, even its most crucial parts. So, then, do viruses. It's like giving terrorists high-level government positions.
With Linux, on the other hand, users do not usually have such "root" privileges; rather, they're typically given lower-level accounts. What that means is that even if a Linux system is compromised, the virus won't have the root access it would need to do damage systemwide; more likely, just the user's local files and programs would be affected. That can make the difference between a minor annoyance and a major catastrophe in any business setting.
2. Social Engineering
Viruses and worms often spread by convincing computer users to do something they shouldn't, like open attachments that carry viruses and worms. This is called social engineering, and it's all too easy on Windows systems. Just send out an e-mail with a malicious attachment and a subject line like, "Check out these adorable puppies!"--or the porn equivalent--and some proportion of users is bound to click without thinking. The result? An open door for the attached malware, with potentially disastrous consequences organizationwide.
Thanks to the fact that most Linux users don't have root access, however, it's much harder to accomplish any real damage on a Linux system by getting them to do something foolish. Before any real damage could occur, a Linux user would have to read the e-mail, save the attachment, give it executable permissions and then run the executable. Not very likely, in other words.
3. The Monoculture Effect
However you want to argue the exact numbers, there's no doubt that Microsoft Windows still dominates most of the computing world. In the realm of e-mail, so too do Outlook and Outlook Express. And therein lies a problem: It's essentially a monoculture, which is no better in technology than it is in the natural world. Just as genetic diversity is a good thing in the natural world because it minimizes the deleterious effects of a deadly virus, so a diversity of computing environments helps protect users.
Fortunately, a diversity of environments is yet another benefit that Linux offers. There's Ubuntu, there's Debian, there's Gentoo, and there are many other distributions. There are also many shells, many packaging systems, and many mail clients; Linux even runs on many architectures beyond just Intel. So, whereas a virus can be targeted squarely at Windows users, since they all use pretty much the same technology, reaching more than a small faction of Linux users is much more difficult. Who wouldn't want to give their company that extra layer of assurance?
4. Audience Size
Hand-in-hand with this monoculture effect comes the not particularly surprising fact that the majority of viruses target Windows, and the desktops in your organization are no exception. Millions of people all using the same software make an attractive target for malicious attacks.
5. How Many Eyeballs
"Linus' Law"--named for Linus Torvalds, the creator of Linux--holds that, "given enough eyeballs, all bugs are shallow." What that means is that the larger the group of developers and testers working on a set of code, the more likely any flaws will be caught and fixed quickly. This, in other words, is essentially the polar opposite of the "security through obscurity" argument.
With Windows, it's a limited set of paid developers who are trying to find problems in the code. They adhere to their own set timetables, and they don't generally tell anyone about the problems until they've already created a solution, leaving the door open to exploits until that happens. Not a very comforting thought for the businesses that depend on that technology.
In the Linux world, on the other hand, countless users can see the code at any time, making it more likely that someone will find a flaw sooner rather than later. Not only that, but users can even fix problems themselves. Microsoft may tout its large team of paid developers, but it's unlikely that team can compare with a global base of Linux user-developers around the globe. Security can only benefit through all those extra "eyeballs."
Once again, none of this is to say that Linux is impervious; no operating system is. And there are definitely steps Linux users should take to make their systems as secure as possible, such as enabling a firewall, minimizing the use of root privileges, and keeping the system up to date. For extra peace of mind there are also virus scanners available for Linux, including ClamAV. These are particularly good measures for small businesses, which likely have more at stake than individual users do.
It's also worth noting that security firm Secunia recently declared that Apple products have more security vulnerabilities than any others--including Microsoft's.Either way, however, when it comes to security, there's no doubt that Linux users have a lot less to worry about.
Hope now you will use Linux, rather than windows.

Five key factors underlie Linux's superior security: 1. Privileges
Linux systems are by no means infallible, but one of their key advantages lies in the way account privileges are assigned. In Windows, users are generally given administrator access by default, which means they pretty much have access to everything on the system, even its most crucial parts. So, then, do viruses. It's like giving terrorists high-level government positions.
With Linux, on the other hand, users do not usually have such "root" privileges; rather, they're typically given lower-level accounts. What that means is that even if a Linux system is compromised, the virus won't have the root access it would need to do damage systemwide; more likely, just the user's local files and programs would be affected. That can make the difference between a minor annoyance and a major catastrophe in any business setting.
2. Social Engineering
Viruses and worms often spread by convincing computer users to do something they shouldn't, like open attachments that carry viruses and worms. This is called social engineering, and it's all too easy on Windows systems. Just send out an e-mail with a malicious attachment and a subject line like, "Check out these adorable puppies!"--or the porn equivalent--and some proportion of users is bound to click without thinking. The result? An open door for the attached malware, with potentially disastrous consequences organizationwide.
Thanks to the fact that most Linux users don't have root access, however, it's much harder to accomplish any real damage on a Linux system by getting them to do something foolish. Before any real damage could occur, a Linux user would have to read the e-mail, save the attachment, give it executable permissions and then run the executable. Not very likely, in other words.
3. The Monoculture Effect
However you want to argue the exact numbers, there's no doubt that Microsoft Windows still dominates most of the computing world. In the realm of e-mail, so too do Outlook and Outlook Express. And therein lies a problem: It's essentially a monoculture, which is no better in technology than it is in the natural world. Just as genetic diversity is a good thing in the natural world because it minimizes the deleterious effects of a deadly virus, so a diversity of computing environments helps protect users.
Fortunately, a diversity of environments is yet another benefit that Linux offers. There's Ubuntu, there's Debian, there's Gentoo, and there are many other distributions. There are also many shells, many packaging systems, and many mail clients; Linux even runs on many architectures beyond just Intel. So, whereas a virus can be targeted squarely at Windows users, since they all use pretty much the same technology, reaching more than a small faction of Linux users is much more difficult. Who wouldn't want to give their company that extra layer of assurance?
4. Audience Size
Hand-in-hand with this monoculture effect comes the not particularly surprising fact that the majority of viruses target Windows, and the desktops in your organization are no exception. Millions of people all using the same software make an attractive target for malicious attacks.
5. How Many Eyeballs
"Linus' Law"--named for Linus Torvalds, the creator of Linux--holds that, "given enough eyeballs, all bugs are shallow." What that means is that the larger the group of developers and testers working on a set of code, the more likely any flaws will be caught and fixed quickly. This, in other words, is essentially the polar opposite of the "security through obscurity" argument.
With Windows, it's a limited set of paid developers who are trying to find problems in the code. They adhere to their own set timetables, and they don't generally tell anyone about the problems until they've already created a solution, leaving the door open to exploits until that happens. Not a very comforting thought for the businesses that depend on that technology.
In the Linux world, on the other hand, countless users can see the code at any time, making it more likely that someone will find a flaw sooner rather than later. Not only that, but users can even fix problems themselves. Microsoft may tout its large team of paid developers, but it's unlikely that team can compare with a global base of Linux user-developers around the globe. Security can only benefit through all those extra "eyeballs."
Once again, none of this is to say that Linux is impervious; no operating system is. And there are definitely steps Linux users should take to make their systems as secure as possible, such as enabling a firewall, minimizing the use of root privileges, and keeping the system up to date. For extra peace of mind there are also virus scanners available for Linux, including ClamAV. These are particularly good measures for small businesses, which likely have more at stake than individual users do.
It's also worth noting that security firm Secunia recently declared that Apple products have more security vulnerabilities than any others--including Microsoft's.Either way, however, when it comes to security, there's no doubt that Linux users have a lot less to worry about.
Hope now you will use Linux, rather than windows.
Labels:
Knowledge
How To Connect With A FTP Website Using CMD
How to use command line FTP to upload to a website
Many software tools are available for FTP file transfer. However, you can also use the tools that are in Microsoft Windows.We assume that you know how to use Microsoft Windows. These instructions are an overview of what you need to do. Before you start, make sure that you know the FTP user name and the FTP password.
Notes
- Possibly, file names on an FTP site are case-sensitive. If you are not sure, ask your ISP. However, if you always make sure that the case is correct, errors cannot occur.
- These instructions are for the Windows operating system.
- Words
in this textare what you see in the Command Prompt. - Words in this text are what you type.
- <Enter> means press the Enter key (also known as the Return key).
- Replace text that is
<in angle brackets>with your particular text. - These instructions were confirmed using Windows 2000 and Windows XP. Possibly, they are correct for other versions of Windows, but possibly, there are small differences.
- Some FTP sites require that you connect using 'passive' mode. Passive mode is not supported in the Windows command line program (www.iss.net/security_center/advice/Services/FTP/PASV/default.htm). Therefore, you cannot use the method that is explained on this page.
- You can use Windows Explorer to transfer files by FTP. That is a much easier method than using FTP at the Command Prompt. Type the FTP address in the Address Bar and enter your user name and password. Then copy files in the usual manner.
To connect to your website using command line FTP
- Open the DOS Command Prompt (Start>Programs>Accessories>Command Prompt).
- Type: ftp <your website address> <Enter>
Example:C:\>ftp www.example.com - If a connection to the Internet is not open, the Dial-Up Networking dialog box appears. Click Dial to connect, and obey any instructions that appear.
- After the system establishes an Internet connection, the
Userprompt appears. Type your user name and press <Enter>. - Type your password and press <Enter>.
- Text appears. Here is an example:
C:\>ftp www.example.com
Connected to abc.def.net.
220 abc.def.net FTP server ready.
User (abc.def.net:(none)): joebloggs
331 Password required for joebloggs.
Password:
230 User joebloggs logged in.
ftp>
Theftpprompt on the last line shows that you can now upload, download, and delete files on the website.
To upload to your website
You can either navigate to the directory that contains the files that you want to upload, or you can specify the directory when you upload files. It is probably easiest to navigate to the applicable directory (this is the method that we show).- Set the transfer type:
- For ASCII files (such as HTML pages and CSS) type: ascii <Enter>
- For binary files (such as graphics, exe files) type: bin <Enter>
- Optional. Show the data transfer. Type: hash <Enter>
- Navigate to the local directory (that is, on your computer) that contains the files that you want to upload. Type: lcd <directory> <Enter>
Note: if there are spaces in the path name, put the path name in double quote marks. - Upload or delete files using FTP commands. The most useful are:
- To upload a single file use
put. Example:ftp>put myfile.pdf <Enter> - To upload multiple files use
mput. Example:ftp>mput *.htm <Enter> - To quit FTP use
quit
- To upload a single file use
- Close the Command Prompt.
List of FTP commands
The table lists the DOS-based FTP commands that you can use in the Windows Command Prompt (other FTP commands are available). Some of the explanations are quite cryptic. Sorry.| FTP command | Does this |
|---|---|
| ! | Escape to the shell |
| ? | Print local help information |
| append | Append to a file |
| ascii | Set ASCII transfer type. Use this to transfer text files, such as .htm files. See www.superior-host.com/webhosting-guide/linux-files.html for an excellent discussion of when to use ascii mode and when to use binary mode. |
| bell | Beep when command completed |
| binary | Set binary transfer type. Use this to transfer binary files such as .exe files and graphics (see also ascii). |
| bye | Terminate the FTP session and exit |
| cd | Change remote working directory ( use .. to go to parent) |
| close | Terminate FTP session |
| delete | Delete remote file |
| debug | Toggle debugging mode |
| dir | List the contents of the remote directory |
| disconnect | Terminate the FTP session |
| get | Receive file (see also mget) |
| glob | Toggle metacharacter expansion of local file names |
| hash | Toggle printing '#' for each buffer transferred |
| help | Prints list of commands |
| lcd | Change the local working directory |
| literal | Send an arbitrary FTP command |
| ls | List contents of remote directory |
| mdelete | Delete multiple files |
| mdir | List the contents of multiple remote directories |
| mget | Get multiple files (see also get) |
| mkdir | Make a directory on the remote machine |
| mls | List contents of multiple remote directories |
| mput | Send multiple files (see also put) |
| open | Connect to remote FTP |
| prompt | Force interactive prompting on multiple commands (this is a toggle) |
| put | Send one file (see also mput) |
| pwd | Print working directory on remote machine |
| quit | Terminate FTP session and exit |
| quote | Send an arbitrary FTP command. You can view a list of raw FTP commands on www.nsftools.com/tips/RawFTP.htm |
| recv | Receive file |
| remotehelp | Get help from remote server |
| rename | Rename a file |
| rmdir | Remove a directory on the remote machine |
| send | Send one file |
| status | Show current status |
| trace | Toggle packet tracing |
| type | Set file transfer type |
| user | Send new user information |
| verbose | Toggle verbose mode |
Labels:
Ethical Hacking
Beginners Hacking Guide
How to hack. It’s a very often asked question with around 1,000,000 Google searches each month. I know that anyone that runs a hacking related website get’s asked this question daily. The same questions get asked from me again and again eg.My girl friend is cheating me i need her password? or Some one is really abusing me i need her password?
Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in the same situation this is right place for you.
I am very happy to tell you that my book "A Beginners guide to Ethical Hacking" has just launched.I have been working on this book for past few months.I have dedicated this book completely to beginners who want to become hackers.
How will the information in the book affect me?
And Much more...
Reality about Password Hacking softwares
You might have heard about some paid password hacking softwares which claim to hack a password on entering the email account.But in reality all those softwares are fake.If you believe what they say then you are just wasting your time and money.These all softwares are fake.If there exists such a software, will there be any security on web. And all expert engineers at Google, Yahoo and other services are not mad. They are all engaged in ensuring security of their customers ie email account owners. So, no such software exists.
So stop wasting your time and money on these foolish softwares and services and learn real Ethical Hacking methods which hackers use to access email accounts.
For Download Link visit the following site
Ethical Hacking Book
Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in the same situation this is right place for you.
I am very happy to tell you that my book "A Beginners guide to Ethical Hacking" has just launched.I have been working on this book for past few months.I have dedicated this book completely to beginners who want to become hackers.
How will the information in the book affect me?
- You will learn All Ethical hacking techniques and also you will learn to apply them in real world situation
- You will start to think like hackers
- Secure your computer from trojans,worms, Adwares etc
- Amaze your friends with your newly learned tricks
- You will be able to protect your self from future hack attacks
And Much more...
Reality about Password Hacking softwares
You might have heard about some paid password hacking softwares which claim to hack a password on entering the email account.But in reality all those softwares are fake.If you believe what they say then you are just wasting your time and money.These all softwares are fake.If there exists such a software, will there be any security on web. And all expert engineers at Google, Yahoo and other services are not mad. They are all engaged in ensuring security of their customers ie email account owners. So, no such software exists.
So stop wasting your time and money on these foolish softwares and services and learn real Ethical Hacking methods which hackers use to access email accounts.
For Download Link visit the following site
Ethical Hacking Book
Labels:
Knowledge
Introduction To Keylogger
If you are one of our facebook fans than the chances you might have heard for several weeks that I will be launching my newset book very soon, So the wait is finally over, Today I have decided to launch my new book "An Introduction To Keyloggers, RATS And Malware", The book is completly dedicated to newbies who are looking forward to play with keyloggers, Rats and various other forms of malware or are curious to know how they can protect their PC's from getting infected with Trojan, worms and other forms of viruses.
The book takes you right from the beginning from basics to some advanced types of attacks too, In this book I have also reviewed various types of best keyloggers out there so you can find it easier to to choose the best one according to your needs.
My aim is to create awareness among the individual related to Ethical Hacking and Security, This is probably the reason why I am running this blog in the first place. Every single day thousands of people fall for these types of attacks and end up loosing their sensitive data such as their username and passwords and in the worse case some of them end up loosing their credit card numbers too.
By reading this e-book I am very confident that you will be able to protect your computer from most of these types of attacks.
You can download the book here
The book takes you right from the beginning from basics to some advanced types of attacks too, In this book I have also reviewed various types of best keyloggers out there so you can find it easier to to choose the best one according to your needs.
How Much Does it cost?
Well here is the best part , unlike my other products such as "A Beginners Guide To Ethical hacking" and "Facebook Hacking Course" i have decided to give this e-book for free, The reason why I am giving this e-book for free is because lots of people cannot afford the costs of my products, so I don't want any one to miss the chance of getting hands on it.My aim is to create awareness among the individual related to Ethical Hacking and Security, This is probably the reason why I am running this blog in the first place. Every single day thousands of people fall for these types of attacks and end up loosing their sensitive data such as their username and passwords and in the worse case some of them end up loosing their credit card numbers too.
By reading this e-book I am very confident that you will be able to protect your computer from most of these types of attacks.
You can download the book here
Labels:
Knowledge






