Showing posts with label Cyber Security (info). Show all posts
Showing posts with label Cyber Security (info). Show all posts

Feb 25, 2012

Rise of the Hacktivist [Infographic]

Rise of the Hacktivist [Infographic]
Source : Wikibon

Sep 4, 2011

Latest Android Mobile tricks | secret codes for Android Mobile


Latest Android Mobile tricks 2011:
Cell Battery, WiFi Usage etc Info *#*#4636#*#*
Restore Factory Settings
*#*#7780#*#*
Format Phone
*2767*3855#
Launch service mode *#*#197328640#*#*
Test WiFi
*#*#232339#*#* or
*#*#526#*#* or
*#*#528#*#*




Display WiFi MAC address *#*#232338#*#*
GPS test
*#*#1472365#*#*
Other GPS test
*#*#1575#*#*
Bluetooth test *#*#232331#*#*
Display Bluetooth physic address
*#*#232337#*#
Start Gtalk monitoring
*#*#8255#*#*
PDA, Phone, H/W, RFCallDate *#*#4986*2650468#*#*
PDA and Phone
*#*#1234#*#*
FTA SW version
*#*#1111#*#*
FTA HW version *#*#2222#*#*
PDA, Phone, csc,
*#*#44336#*#*
Packet Loopback
*#*#0283#*#*
LCD test *#*#0*#*#*
Melody test
*#*#0673#*#*
or
*#*#0289#*#*
Device test such as vibration and lightness
*#*#0842#*#*
Display touchscreen version
*#*#2663#*#*
Touchscreen test
*#*#2664#*#* Distance sensor test *#*#0588#*#*
Display memory version
*#*#3264#*#*


by :: -- H3M@L MODI

Sep 1, 2011

How to unlock Idea netsetter E-1550

Idea NetSetter is a 3G HSDPA USB Device with the model number as Huawei E1550. The device has the maximum speed of 3.6 Mbps which means 330 KB/Sec of download speed.
Here i post for how to unlock Idea netsettar E-1550.

here are step by step tutorial on unlocking idea netsetter.

Here is the Step by step Solution:



First Download Following Softwere which gone we use:

1. modem firmware and Install it (Download from here ).
2. Mobile Partner’s 11.302.09.01.539 Voice USSD and install it > Click here to download.
3.download Video MMS Dashboard. Click here to Download it.
4.E-1550 Netsetter Unlock-er.Click here to Download it From Here.

Now follow the following Step:

1.Run the setup file which is downloaded in 1st step.
> i accept it and click next.
>then it will serch ur device.
>then it diplay the update setting.
>click next it show warnning.
>then it will ask u to input password
u have to Enter the Flash code which will we now generate in next step.
2. open unloacker dowloaded 4th and Put Ur IMEI number in it
>click unlock and it will generate Flash Code
>put Flash code into 1st step.
3.after putting flash code in 1st step click next.
>Update succefully.

4. Now, you are one step closer to unlocking of the NetSetter device. Start the setup file of HUAWEI_UTPS11.302.09.06.209 software and follow the steps. Again, ensure that the 3G device is not being used by any other software so that the application could find it easily.
>process as above step and it would download softwere in ur device.

5. This step involves installing the Huawei Original Unbranded Mobile Partner software on your computer to manage the 3G device. It is the same software that comes with NetSetter but it is just that it is unbranded and has no logo for any telecom company. But it is recommended to install to complete the unlocking procedure. It is like a normal software installation and does not require any specific guidelines.

Then put flash code on Flash code box and You are done with resetting your Idea netsetter modem E1550 SUCCESSFULLY!!!

NOW You can use the device for making voice calls right from your computer using the computer’s mic and speakers.





Enjoy with new Firmware in ur Device. any problem ask in comment-box,

thanx to my buddy ::H4(K3R4U

by::hemal modi

Share files between pc to pc without uploading anywhere : Browser to Browser File Sharing



            Browser to Browser File Sharing Technology 



# Steps:
Step 1 : Go to http://www.filesovermiles.com Click “Browse” and select the file to transfer.

Step 2 : As soon as you select the file, the site will generate an unique URL which you have to share with the user to want to send the file to.

Step 3 (2nd User) : The PC on the receiving end of this file transfer must go this unique url which will show a download option from the file to be transferred PC to PC.


# Note : The transfer file will continue to be available for download until the web page on 1st user’s browser is closed.This way you can securely transfer files of any size through one pc to another from your browser. No need to upload anywhere.so no privacy issue..... :)

by::-- hemal08ce094

AnDOSid for your android phone::Simulate a DOS/DDOS attack on web server


A new product released by SCOTT HERBERT for Android mobile phones,Its AnDOSid - the DOS tool for Android Phones. The rise of groups like Anonymous and LuzSec, as well as constant India / Pakistan cyberwar has raised the issue of cyber-security high(er) in the minds of web owners.

Pentesting tools exist to simulate such attacks and help website security people defend against them, however for the most part they currently only exist for desktop computers. Mobile phones have, over the last few years, grown from simple devices that send and receive calls to mobile computing platforms which can be purchased for less than $100 a device.

AnDOSid fills that gap, allowing security professionals to simulate a DOS attack (An http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones. AnDOSid is actively being developed and I welcome feedback from the security community as to how you would like the application to evolve.




What's in this version:

  • Requires Internet access to send the http post data
  • Requires phone state to access the IMEI (one of the two identifiers sent with each post)


AnDOSid can be downloaded from the Android Market place and costs just £1 or Rs.74.58/-Only.




by :: Hemal modi

Aug 10, 2011

Hacker Group Anonymous Aims to Destroy Facebook on Nov. 5 fact or romour !!!


Hackivist group Anonymous vows to "kill Facebook" on November 5, citing users' lack of choice in privacy as its reason for attack.

The group of hackers has claimed participation in just about every recent notable hacking attack of this year and successfully broke into 70 law enforcement websites and took down the Syrian Ministry of Defense website this week alone.

This recent interest in Facebook, despite a slew of privacy concerns raised against the social network since its founding, may be a result of Anonymous's recent announcement that it plans to create its own social network, called AnonPlus. After the group's Google+ account, called "Your Anon News," was banned, it began fleshing out AnonPlus.com, "a new social network where there is no fear...of censorship...of blackout...nor of holding back."

Below is a video and statement released by Anonymous explaining the reason for its upcoming battle with the world's largest social network. Let us know your thoughts on the group's statement in the comments below.




Anonymous Statement

Attention citizens of the world,

We wish to get your attention, hoping you heed the warnings as follows:
Your medium of communication you all so dearly adore will be destroyed. If you are a willing hacktivist or a guy who just wants to protect the freedom of information then join the cause and kill facebook for the sake of your own privacy.

Facebook has been selling information to government agencies and giving clandestine access to information security firms so that they can spy on people from all around the world. Some of these so-called whitehat infosec firms are working for authoritarian governments, such as those of Egypt and Syria.

Everything you do on Facebook stays on Facebook regardless of your "privacy" settings, and deleting your account is impossible, even if you "delete" your account, all your personal info stays on Facebook and can be recovered at any time. Changing the privacy settings to make your Facebook account more "private" is also a delusion. Facebook knows more about you than your family.

http://www.physorg.com/news170614271.html
http://itgrunts.com/2010/10/07/facebook-steals-numbers-and-data-from-your-iphone/

You cannot hide from the reality in which you, the people of the internet, live in. Facebook is the opposite of the Antisec cause. You are not safe from them nor from any government. One day you will look back on this and realise what we have done here is right, you will thank the rulers of the internet, we are not harming you but saving you.

The riots are underway. It is not a battle over the future of privacy and publicity. It is a battle for choice and informed consent. It's unfolding because people are being raped, tickled, molested, and confused into doing things where they don't understand the consequences. Facebook keeps saying that it gives users choices, but that is completely false. It gives users the illusion of and hides the details away from them "for their own good" while they then make millions off of you. When a service is "free," it really means they're making money off of you and your information.

Think for a while and prepare for a day that will go down in history. November 5 2011, #opfacebook . Engaged.

This is our world now. We exist without nationality, without religious bias. We have the right to not be surveilled, not be stalked, and not be used for profit. We have the right to not live as slaves.

We are anonymous
We are legion
We do not forgive
We do not forget
Expect us
source ::-mashable

Jun 20, 2011

BeEF - Browser Exploitation Framework

BeEF is pioneering techniques that provide the experienced penetration tester with practical client side attack vectors. BeEF focuses on leveraging browser vulnerabilities to assess the security posture of a target, BeEF hooks one or more web browsers as beachheads for the launching of directed command modules. The framework allows the penetration tester to select specific modules (in real-time) to target each browser.  


Me Myself Enjoy Playing with it all the time..I love Playing with it ♥


You Can Download It From Here


You Don't Know How to install it ?? Don't worry the developers are gud guys they have a flash presentation for you 


Check it out here http://www.bindshell.net/
They also have some more things for you :) http://www.bindshell.net/

Check a video also


http://www.youtube.com/

Jun 13, 2011

Turkey police arrests 32 Anonymous hackers for DDOS attack


Turkey have detained 32 more suspects that the authorities believe are linked to Anonymous. The Turkish state-run news agency reports that the suspect were taken into custody by police after raids in dozens of cities it’s not clear how the police linked the 32 people to the hacker group.




The arrests in Turkey came after the hacker group targeted the Turkish websites of the prime minister’s office and parliament in what the group called a protest against the plans of the Turkish government to place filters on the internet.

Anonymous also issued a statement that said, “Regardless of how many times you are told, you refuse to understand. There are no leaders of Anonymous. Anonymous is not based on personal distinction,” the group posted in a statement. “You have not detained three participants of Anonymous. We have no members and we are not a group of any kind. You have, however, detained three civilians expressing themselves.” The group claims that its DDOS attacks are the same sort of peaceful protest that sitting in front of a shop somewhere denying entry is in the real world.

Jun 10, 2011

Motorola (Croatia) Website hacked..now its motorola's turn after sony???

Motorola's Croatia domain here it is is vulnerable to hackers. Croatia officially the Republic of Croatia is a country in Central Europe.
The Website is hacked and defaced by various hackers 2-3 times yesterday.





First it was defaced by Cocain Underground hacking team and currently a hacker from Turkey named "TeRoRisTe_Mc" have his deface page on the site.

by- hemal :]

Jun 8, 2011

Epic Games Database Hacked by Contra

Epic Games epic Database Hacked by Contra (Hacker) , He hack whole database and Leak all database structure online athere .





The Site of Epic Games is currently showing Database connection error.




EPIC--
Established in 1991, Epic Games develops cutting-edge games and cross-platform game engine technology.The company has created multiple million-selling, award-winning titles in its Unreal series, including Unreal Tournament 3 for PC, PLAYSTATION®3 and Xbox 360®. Epic’s Gears of War won over 30 Game of the Year awards, and the sales of Gears of War and Gears of War 2 have eclipsed 12 million units. Epic’s Unreal Engine 3 is the four-time winner of and Hall of Fame inductee for Game Developer magazine’s Best Engine Front Line Award. Unreal Engine 3 has also been recognized as the number one game engine by Develop magazine. Gears of War 3, the most anticipated blockbuster of 2011, is expected to hit stores September 20.


by-hemal08ce094

Anonymous Started War Against India's corruption #OpIndia

Hacker group Anonymous has come out in support of a civil movement against corruption in India by hacking one of the websites of a government IT organization.

Until now a large number of the hacks of websites in India were part of an ongoing cyber war between Indian and Pakistani hacker groups.







Anonymous put up its logo and a message for the country's Prime Minister Manmohan Singh on the website of the National Informatics Center according to The Hacker News. The page could not be accessed by Tuesday, but a cache of it on Google Search confirmed that it had been defaced by Anonymous.


"There is no use securing. There is no use of spending on forensic. Get this message clear Mr. Prime Minister and others", the message read.

The NIC is responsible for promoting and implementing IT projects including e-governance projects in the country.





A large number of Indians have rallied behind social activist Anna Hazare and a yoga guru Baba Ramdev in a fight against corruption in India. Ramdev's fast in Delhi was broken up over the weekend by the police, and he and his supporters were evicted from the venue.





Anonymous said in a message on Twitter that the NIC site had been defaced because of violence against Ramdev by the central government. Earlier it extended an invitation through Twitter for users to join in an operation against corruption in India.

Anonymous has also set up an Operation India page on
Facebook
and an account on Twitter to carry on the fight against corruption in India.


India's Minister of State for Communications & Information Technology, Sachin Pilot, told Parliament in May that the Government has taken several measures to detect and prevent cyber attacks and espionage. By computer security guidelines issued by Government, no sensitive information is to be stored on systems that are connected to Internet, he said.

The government has also formulated a Crisis Management Plan for countering cyber attacks and cyber terrorism for implementation by all ministries and departments of the federal, and state governments and critical sectors, Pilot said. Ministries and departments have also been advised to audit their IT systems regularly. Most often these guidelines are not taken seriously and a large number of hacks could have been avoided, an analyst said on condition of anonymity.


here is the link of site
cache of this site


i am fully support this group,for there fight against corruption.i am hopping same thing from you..and sorry for late post .. am busy this days..and i will try to update news as soon as possible from my side

Hemal...

Jun 6, 2011

Lulzsec Leaks Source Code of Sony Computer Entertainment Developer Network !






Just Now ! BOOM ... By Lulzsec . They again hit SONY by releasing the complete source code of Sony Computer Entertainment Developer Network "scedev.net" Via there Twitter account. They provide a Mediafire file sharing link for download a 55.28 MB file :download

Massive Gmail phishing attack hits top U.S. officials

NEW YORK (CNNMoney) -- Hundreds of personal Gmail accounts, including those of some senior U.S. government officials, were hacked as a result of a massive phishing scheme originating from China, Google said Wednesday.






The account hijackings were a result of stolen passwords, likely by malware installed on victims' computers or through victims' responses to e-mails from malicious hackers posing as trusted sources. That type of hack is known as phishing. Gmail's security systems themselves were not compromised, Google said.


The company believes the phishing attack emanated from Jinan, China. In addition to the U.S. government personnel, other targets included South Korean government officials and federal workers of several other Asian countries, Chinese political activists, military personnel and journalists.

"The Department of Homeland Security is aware of Google's message to its customers," said Chris Ortman, a spokesman for the agency. "We are working with Google and our federal partners to review the matter, offer analysis of any malicious activity, and develop solutions to mitigate further risk."

Secretary of State Hillary Clinton addressed the issue Thursday morning.

"Google informed the State Department of this situation yesterday in advance of its public announcement," she said. "These allegations are very serious, we take them seriously, we're looking into them, and because this will be an ongoing investigation I would refer you to first Google for any details that they are able to share at this time, and to the FBI, which will be conducting the investigation."

Federal Bureau of Investigation spokesman Paul Bresson said the agency is working with Google and with U.S. government agencies "to review this matter further to identify the origin of this campaign and to see what information may have been compromised." He declined to comment further on the investigation.

The news comes a little more than a year after a separate hack originating from China affected Gmail accounts of Chinese human rights activists. In that case, attackers were able to break through Google's security systems, and two Gmail accounts were hacked.

That cyber attack set off a series of events that eventually led to Google ending its agreement with the Chinese government to censor certain search results, and the company physically moved its servers out of the country.

On Thursday, after the most recent cyber attack, a Chinese official insisted that his government takes the attacks seriously.

"We firmly oppose computer hacking or any illegal activity that harms net security and will severely punish anyone engaging in such activity according to law," said foreign ministry spokesman Hong Lei. "Computer hacking is an international problem and China is also a victim. Any accusation linking China to such activity is baseless and with ulterior motives."

This time around, the hack appears larger in scope -- but Google itself was not attacked. A person with knowledge of the attack's details said there was no apparent correlation between last year's attack and this one.

A spokesman from Google declined to comment on how the company obtained the information about the most recent hack. Public information, user reports and a third-party hacking blog called Contagio was used to determine the scope, targets and source of the attack.

The hackers were attempting to monitor the victims' e-mails, and some users' forwarding settings were altered.

The company urged users to "please spend ten minutes today taking steps to improve your online security so that you can experience all that the Internet offers -- while also protecting your data."

Google provided several examples of how Gmail users can better protect themselves from phishing attacks on its blog, including enabling a setting that allows users to login to their accounts only after receiving a verification code on their phones. The company also suggested that users monitor their settings for suspicious forwarding settings.


By --David Goldman @CNNMoneyTech
-CNN's Carol Cratty contributed to this report


REFERENCE
CNN

Jun 5, 2011

The state government’s websites are under threat of being hacked



An ‘ethical’ hacker demonstrates how one can break into the civic corporation’s e-governance site and I P Gautam’s official domain to access confidential info.

The state government’s websites are under threat of being hacked. A BCA student, who calls himself an ‘Ethical’ hacker, demonstrated how it was possible to hack into the e-governance site of the Ahmedabad Municipal Corporation and civic chief I P Gautam’s official domain.

Falgun Rathod showed on his home PC how these websites are vulnerable to misuse, poking the bubble of the state government that prides itself in winning three National e-Governance Awards recently.

Rathod also demonstrated how one can access the balance sheet of all nagarpalikas in the state that use the double entry accounting system. He pointed out that one can easily update any file on the website or change the face of the websites by using defacer websites.

While checking the AMC website, the 20-year-old student came across the ‘Administration log-in’ page. Out of curiosity, he explored a bit more into it and tried to implement authentication bypass (input validation attack).you can learn about this attack here INPUT-validation attack

He put a string, which is a unique code in computer language, in the login form, that has user name and password. The moment the account opened he realised that he had hacked into Municipal Commissioner I P Gautam’s ID which said, ‘Welcome I P Gautam’.

This was a shock for Rathod who realised how confidential information that is meant only for administrative work and staff can be used for illegal or malafide purposes.

He found that information like updates on the projects, tenders, sending mobile messages to the AMC employees was possible through the ID.

“If a hacker wishes to spread false information among the employees using the municipal commissioner’s domain ID, it is very much possible,” Rathod told Mirror.

Rathod decided to alert the AMC about this loophole in their system. Rathod and this Mirror reporter contacted I P Gautam, who in turn directed them to deputy municipal commissioner Dilip Mahajan who looks after the Information Technology department.

Mahajan appreciated Rathod’s proactiveness in bringing the issue to the civic corporation’s notice. “We will look into the issue closely. If laxity is found in the security system we will try to secure it at the highest level and solve it at the earliest,” Mahajan said.

Source 
AM

May 25, 2011

Securing Your Wireless Network | A white paper from Hackersbay



Sorry Guys I was out from many days .. I am back with a new article about Securing Wireless Networks - A white paper from Hackersbay

Here are the few Terminologies, You should know About Wireless networked systems..!! if u don understand this underlyin concepts, it lll be a hard time for u to guarding yo Wireless network..

SSID: (Service Set Identifier) If u having a wireless router or modem the Hardware must have SSID(Like Namin a New born Baby, Yo can name ur Router How it wann be called ba others,But If u take any BSNL Connection Wi fi ASDL Modem Comes With SSID name May be second name of yo father)


Router has a 

Device Burned With MAC &SSID Found in the Picture(WANADOO-02DB)
functionality that it can broadcast or stealth broadcast Which means if u scan for wireless networks u often find networks in Broadcast mode (I.e Tikona 1800 204 3333)Like that…In stealth Broadcast we cant identify the wireless network.. MODEM Don have this fuckin option, so that’s y weneva u scan any, u find some home networks modem range..but u can proceed only after Given SSID in the prompt box..!! 




 WEP: (Wired Equivalence privacy) this Protocol givea Base level security for all wi fi vendors and system Can benefit from OSI Standardization effort..Tha
fat ass option is one can Set in “ON” Or
“OFF”To use this…But Mostly all jerks n Geeks Forcibly set this “ON”

 WPA: (Wi Fi Protected Access) A security protocol tat was designed to secure Wireless Technology and To overcome the WEP Limitations..!! (WPA & WPA2 )

 TKIP: (Temporal Key Intergrity protocol) It’s a More secure version of WEP and it utilize the WPA For Network Security, It uses Some Diff kinda Algorithms than WEP, More trusted Encryption tunnels.(But trust me, most admin will not use this, But the Company Security policy wants to maintain diff security scheme for each heirerachy of the employes in the Org…Admins will deploy this feature)
 
MAC: (Media Access Control) Its used to get Multiple access in a Networked Environment,But MAC Address is a 12Digit Hexa decimal number that is associated with Network adapter, MAC Address is unique to each IP Address…(00-12-FA-WE-3R-TR) First 6 digits Says 00-12-FA Manufacturer Code Which say Network Adapter belongs to Whom, And next 6 digit Was assigned to unique Persons WE-3R-TR.

 DHCP : (Dynamic Host Configuration Protocol)  its one of the inbuilt features of Router..It services for the User who restarts the system, Generates the fresh IP address to them to frame the Device address in the network


Whether you are in Wired or wireless Environment..Yo are under Scan by some1 eye, TCP Monitor Or Any one Can use Sniffer tools like packetyzer to and can read your communication Coz all the transportations are not encrypted..

POSSIBLE ATTACKS: 

EAVESDROPPING (Installing Malicious tools and Make ur machine as a listener, And he hacker gets all packet information coz it was redirected by him to server)

DoS Attacks  Injecting Noise Or Interfrences in the wireless network Infinitely, Cause inturn Denial for particular service which tey Requested,Remember A Hacker Can Extract the SSID name of the network in Response to His ICMP Packets..This gives u a Glimpse of Dos Attacks

WEP Encryption “TURN ON
WEP Encrytion is the standard Encryption scheme for all OSI Network Complicance Products, It comes With Encryption, But doesn’t” TURNED ON” Automatically, Do it And Change all the defaults in the Newly purchased Router..So yo have changed SSID, And Turned On WEP…. I Assume.
 
DUMP THE DEFAULTS  Change all your defaults passwords.And keep this Security checklist With you…! Which also Includes Changing the Default Subnet that is 192.168.1.0 

 
Find the Original White Paper By h4ckfreak at Hackersbay

Apr 30, 2011

The Truth Behind Hacking Facebook Websites - Revealed

FACEBOOK HACKING GENUINE OR SCAM??

When you search the internet for HACKING FACEBOOK ACCOUNTS you come across many websites offering you to hack facebook accounts for 100$ or for a survey. Not only websites also there are lot's of free facebook hacking software available on the internet. They are completely fake and can also be backdoored.

http://hacking-facebook.com/
http://www.hackfacebook.org/

I found this two for a example to show you guys

Now the first sites hack you accounts for 100usd


"You can pay for our service right after Facebook account is hacked. " their websites tell this .. So how can they believe us that we will pay after a account being hacked ??

I can tell you that in any step if they will ask you some personal information's then it will be a very wise idea to close the website... instead of hacking the other's account you will lose your accounts .. this is called social engineering. Using this information they can take over your account.

Sometimes it also may happen they will tell to give your login details too .. as mentioned by h4ck0lic bro this method is called "TROLLING"


Ok now lets talk about the second link.. 

Hacking accounts without the user knowledge is itself illegal so how you can say hacking using their method is legal ?


" * It is 100% FREE due to the massive demand and load on our servers we may soon need to charge a fee, so hurry while the offer lasts.
* It is 100% LEGAL Using this method you can be assured that there is NOTHING ILLEGAL, unlike all other software and methods, Hotmail Password Cracker users 100% legal methods of Hacking Facebook Account passwords
* It is SIMPLE access our gateway and see for yourself! "
^^ they say the above ..

I can say that is a scam to fool you guys he will get the money because of the CPA survey he have in his..

How i told this is a scam ???

There is a page present

http://www.hackfacebook.org/HackFacebookAccounts.html

For your sake I filled it and got empty results.

Then, I thought to go and see what is next .. then I came across a link

http://www.hackfacebook.org/ThankYou.html (CPA SURVEY HERE )

Now look at their strategy through which they fool us...

we open the main page which then redirects to the page

http://www.hackfacebook.org/HackFacebookAccounts.html

This the main thing which makes convince that this site is a pure legit site hack Facebook

Further Inspection told that the last page have a CPA survey in it and that site tell to complete the survey  in order to get access to their gateway (what ever ) ...  

What will happen then ?

The happening will make you sad you will complete the survey but surprisingly no links no gateways through which you can get passwords.


Better do not fall into these traps huh? 


WEBOPEDIA - The experts choice

Hacking and Security both the words are related to one thing THE COMPUTER.. Now the computer also have its own living style..

Some Words are there in the world of Computers which are difficult to understand... like SSID , OEM ,WI-FI , OSI , CPU , etc etc

It becomes damn difficult to know the meanings when you dont have a dictionary ( oxford doesn't gives meanings )

So Now I have a very good dictionary for you guys :)

WeBOpeDia The HacKerS ChoIce

Go here and see it yourself :)

do reply here


Apr 22, 2011

The Web Application Hackers Handbook



The Web Application
Hacker’s Handbook

===============================
Discovering and Exploiting Security Flaws



This E Book is one of my favorite ones

I am only Going to give a brief Intro about the book here..Rest you go and read


This E-book is a practical guide to discovering and exploiting security flaws in web applications. By “web application” we mean an application that is accessed by using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context in which these are employed by web applications. If you want to learn how to run port scans, attack firewalls, or break into servers in other ways, we suggest you look elsewhere. But if you want to know how to hack into a web application,  steal sensitive data, and perform unauthorized actions, then this is the book for you.

Overview of This Book

The focus of this book is highly practical. While we include sufficient background and theory for you to understand the vulnerabilities that web applications contain, our primary concern is with the tasks and techniques that you need to master in order to brea into them. Throughout the book, we spell out the specific steps that you need to take to detect each type of vulnerability, and how to exploit it to perform unauthorized actions. real-world examples, derived from the authors’ many years of experience, illustrating how different kinds of security flaw manifest themselves in today’s web applications. Security awareness is usually a two-edged sword. Just as application developers can benefit from understanding the methods used by attackers, hackers.

Download This E-Book From - HERE 
password for the file - saurav

Happy Hacking

Apr 20, 2011

JBoss Autopwn - JSP Hacking Tool

This JBoss script puts a JSP shell on the target JBoss AS server. Once deployed, the script uses its upload and command execution capability to provide an interactive session.
Features
  • Multiplatform support – tested on Windows, Linux and Mac targets
  • Support for bind and reverse bind shells
  • Meterpreter shells and VNC support for Windows targets
Installation

  • Netcat
  • Curl
  • Metasploit v3, installed in the current path as “framework3″
You can download JBoss Autopwn here:

Download From here





Apr 14, 2011

Web Fraud | Internet Scams | Email Scams



Now a days the internet Scams and Frauds are very popular.Every day every one is getting one email or sms from fraud peoples who are in a intention to loot the peoples they make a promise to give  a huge amount on money to give you for that they ask many money from you like "First you have to transfer a 100$ to our bank account to claim your money"

Here is a scam sms i got only yesterday.

"your Number have been selected and won 10000$ to claim it contact at clksk@hotmail.com with your details"

SEE A EXAMPLE OF A SCAM
=========================================================================
Mark <mark2010.2010@rediffmail.com>
to "INFOR@2010.COM" <INFOR@2010.com>
subject GO FOR YOUR WINNING CONTACT US TODAY AT:claim_uk_2010@hotmail.com


GO FOR YOUR WINNING CONTACT US TODAY AT:claim_uk_2010@hotmail.com



CONGRATULATION; YOUR EMAIL ADDRESS HAS WON THE SUM OF 500,000.00 UNITED

KINGDOM GREAT BRITISH POUNDS (GBP) IN THIS ON GOING AWARD WINNING PROMOTION

2010 IN UNITED KINGDOM – LONDON. FOR YOU TO CLAIM YOU’RE WINNING PRIZE

AMOUNT FUNDS SUM OF FIVE HOUNDED THOUSAND UNITED KINGDOM GREAT BRITISH

POUNDS YOU HAVE TO SEND YOU PERSONAL INFORMATION DETAILS BELOW SO THAT THE

YAHOO/MSN AWARD WINNING PROMOTION DEPARTMENT WILL SEND A DIPLOMATIC AGENT

DOWN TO YOUR COUNTRY TO DELIVER YOU WINNING PRIZE PERSON TO YOU AT YOUR

DOOR STEP.


FULL NAME:
COUNTRY:
STATE:
CITY:
ADDRESS:
s3x:
OCCUPATION:
MOBILE NUMBER:
TELEPHONE NUMBER:
A SCAN COPY OF ANY IDENTITY CARD OF YOURS:

PLEASE FILL THIS FORM AND SEND IT BACK TO US SO THAT WE CAN PROCEED FOR

YOUR WINNING PRIZE AMOUNT FUNDS DELIVERING OK ONCE AGAIN CONGRATULATION, WE AWAIT TO HEAR FROM YOU SOON
========================================================================

If you have a brain you will think WHY THEY WILL GIVE US SO MUCH OF MONEY ???

There are a number of SCAMS there .... see below the list

  • Credit Card Scam
  • Loan and Mortgage Scams
  • Job Scams 
  • SMS Scams
  • Lottery Scams 
  • PTC Scams


etc.....
I would suggest you to visit this website to see the scams in details


You can be safe and make other aware about these SCAMS you need to be alerted and never fall a prey in these scams..

The Fraud Guys use different places for sending different email so it becomes very difficult for the local police to catch them..Usually these guys work in a group more than 5 to 6 peoples 

PREVENTION METHODS 

  • checking the web address–even if one character is different, it can mean it's a different website.
         ALL INDIAN GOVT. SITES END WITH A DOMAIN gov.in ... ex -India.gov.in


  • Never enter your private information unless it is a secure site and you know who you are dealing with. Secure and trusted sites are locked with a padlock in the browser window or a secured URL at the beginning of the address (https://)
  • If you got a email Report it to the cyber crime  department.
     Indian Cyber Crime Phone Number : 1800 209 6789
    You can report with the Cyber Crime department if you have a case which is related to Cyber stalking, cyber harassment, Online harassment, unsolicited calls, pornographic MMS, online fraud, phishing, or even threat mails.


      Have a look at this link too http://www.consumerfraudreporting.org/

THINGS TO LOOK AT

-Email sent from gmail,yahoo,hotmail
-Unsolicited emails from strangers who are advertising a website–do not click on web links in these emails(May have a malware in it )
-unexpected emails requesting personal information or emails with generic greetings like ‘Dear Customer’ instead of your name
-Offers guaranteeing you for a job with a very high salary.

Earning on internet is interesting and joyful you have to just differentiate the genuine or the scam..If not you are

  THIS IS A BIG ISSUE RUNNING IN ALL THE COUNTRIES..PREVENTION IS THE ONLY WAY


Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More