Saturday 1 June 2013

FREE DOMAIN NAMES

FREE DOMAIN NAMES



If you want a domain name for your website/blog/forum but dont want to spend money for buying a domain name then you are at good place. Here are some free short domain websites:-

WWW.CO.TV
WWW.CO.CC
WWW.CZ.CC
WWW.DOT.TK
WWW.UNI.CC
WWW.EU.TV
WWW.CO.NR
WWW.WE.BS
WWW.EU.PN

SIM CLONING TUTORIAL

SIM CLONING TUTORIAL


SIM CLONING IS THE PROCESS IN WHICH A LEGITIMATE SIM CARD IS DUPLICATED. WHEN SIM CLONING IS COMPLETED, THE CLONED SIM CARD'S IDENTIFYING INFORMATION IS TRANSFERRED ONTO A SEPARATE, SECONDARY SIM CARD. THE SECONDARY CARD CAN THEN BE USED IN A DIFFERENT PHONE WHILE HAVING ALL CALLS AND ASSOCIATED CHARGES ATTRIBUTED TO THE ORIGINAL SIM CARD. THE PHRASE SIM CLONE IS OFTEN USED TO REFER TO THE SIM CARD THAT HAS BEEN SUCCESSFULLY DUPLICATED.



A SUCCESSFUL DUPLICATION HINGES ON THE A USER'S ABILITY TO EXTRACT THE SIM CARD'S IMSI (INTERNATIONAL MOBILE SUBSCRIBER IDENTIFIER) AND AUTHENTICATION KEY (KI). WHILE A IMSI IS RELATIVELY EASY TO IDENTIFY, FINDING THE KI CAN PROVE TO BE MUCH MORE DIFFICULT FOR THE NOVICE USER. SEPARATE DEVICES AND SOFTWARE PROGRAMS MAY HAVE TO BE USED TO DECRYPT THE KI.

HOW TO HACK CREDIT CARDS - DORKS+EXPLOIT+USING+EASY EXPLAIN

This summary is not available. Please click here to view the post.

HACKER(tools pack)

THE 7TH SAGE'S PHOENIX HACK PACK



Keylogger,Stealers and Freezers:
- 007 Keylogger
- Ardamax 2.8 and 3.0
- Silent Keylogger
- Msn Fake Messenger
- Msn Freezer
- Facebook Freezer
- Istealer 5.0
- Pesca Stealer

Binders and Crypters:
- HotFusion Binder
- Shock Labs Binder
- Easy Binder
- File Injector
- Japabrz's Crypter
- nBinder

Rats:
- Beast v2.07
- BitFrost v1.2
- Cerberus
- Dark Moon v4.11
- Lost Door v2.2 Stable public edition
- MiniMo v0.7 public beta
- Nuclear RAT v2.1.0
- Optix v1.33
- PaiN RAT 0.1 beta 9
- Poison Ivy v2.3.2
- Shark 3
- Spy-Net v.2.6
- Y3 RAT v2.5 RC 10

Others:
- Proxy Switcher Pro
- SkAV Killer All Versions
- Shell Labs Icon Changer
- Ardamax Keylogger Remover
- Youtube Infinity Cracker ( Doesn't work according to some people)
- Email Bomber as html page.
- SandBoxie (So that you guys test it before using)


WHONIX ALPHA IS AN ANONYMOUS OPERATING SYSTEM

WHONIX ALPHA IS AN ANONYMOUS OPERATING SYSTEM





Whonix (called TorBOX or aos in past) is an anonymous general purpose operating system based on Virtual Box, Debian GNU/Linux and Tor.

By Whonix design, IP and DNS leaks are impossible. Not even malware with root rights can find out the user's real IP/location.



This is because Whonix consists of two (virtual) machines. One machine solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other machine, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible.




Whonix is produced independently from the Tor (r) anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else. Due to trademark issues the project was renamed to Whonix.

The project homepage with a full project description, threat model and documentation, build instructions can be found here:

Whonix Web Site

Adobe Flash anonymously
browse the web anonymously
Anonymous IRC
Anonymous Publishing
Anonymous E-Mail with Mozilla Thunderbird and TorBirdy
Add a proxy behind Tor (Tor -> proxy)
Based on Debian GNU/Linux.
Based on the Tor anonymity network.
Based on Virtual Box.
Can torify almost any application.
Can torify any operating system
Can torify Windows.
Chat anonymously.
Circumvent Censorship.
DNSSEC over Tor
Encrypted DNS
Full IP/DNS protocol leak protection.
Hide the fact that you are using Tor/Whonix
Isolating Proxy
Java anonymously
Javascript anonymously
Location/IP hidden servers
Prevents anyone from learning your IP.
Prevents anyone from learning your physical location.
Private obfuscated bridges supported.
Protects your privacy.
Protocol-Leak-Protection and Fingerprinting-Protection
Secure And Distributed Time Synchronization Mechanism
Security by Isolation
Stream isolation to prevent identity correlation through circuit sharing
Virtual Machine Images
VPN/Tunnel Support
Whonix is produced independently from the Tor (r) anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else.
Transparent Proxy
Tunnel Freenet through Tor
Tunnel i2p through Tor
Tunnel JonDonym through Tor
Tunnel Proxy through Tor
Tunnel Retroshare through Tor
Tunnel SSH through Tor
Tunnel UDP over Tor
Tunnel VPN through Tor

download

ETHICAL HACKING: AN INTRODUCTION

ETHICAL HACKING: AN INTRODUCTION



Whenever term hacker comes before many people consider it as a guy sitting inside a room or garage with a bottle or beer and a Laptop or Desktop doing wonders on click of buttons. But the reality check is hacking is not that easy as portrayed in movies and television and term hacker doesn't mean a computer criminal.

So here first of all we'll clear all our misconceptions related to words hackers and hacking.

From Where This Word Came:

The word hacking has history in late 1960's, the time when computers were nothing but mighty pieces of machines and a computer just meant a machine that can compute. Electrical and Electronics geeks used to optimize circuits to make any system/circuit work faster, better and reliably. The job they used to do on circuits was known as hack. With time computer geeks also started finding way out to optimize their system to work better so in fact hacking was nothing but always a kind of reverse engineering. With time in professional world a word hacker got meaning, a person who is highly skilled in hardware, software and networking components. Then movies started portraying hackers do only dirty works and hence today the word hacker has a negative face according to people. No matter how the word met to a dreadful end a hacker always had all qualities that was first put forward in its definition may the be criminal or ethical. Criminal hackers are also known as Crackers.

Types Of Hackers:

White Hats: White hat hackers are good guys who use their hacking skills for defensive purposes. Organizations and industries pay them high salaries to protect their systems and networks from intrusion.

Black Hats: Black hats are actually bad guys in filed. Their main job is to breach security and make money. They make money by using their hacking skills for offensive purposes.

Grey Hats: Gray hats are hackers who work for offensive and defensive purposes depending on situations. They are hired by people to intrude and protect systems.

Hactivist: A hacktivist is kinda hacker who thinks hacking can bring out some social changes and hacks government and organizations to show his discomfort over some trivial issues.

Suicide Hackers: Suicide hackers are those who hack for some purpose and even don't bother to suffer long term jail due to their activities. They can be bad as well as good.

Script Kiddie: A script kiddie is a person who boasts breaking system using scripts and codes written by others though he hardly knows what the code does.

Phreak: It is a person who tries to intrude systems for fun or malicious personal activities. Mostly they are children of age 12-15 who don't even know wrong consequences of hacking.

Types Of Hacking:

Local Hacking: This type of hacking is done when a hacker has full access to the system to implant a virus, keylogger and RATs

Remote Hacking: Remote hacking is done on a remote system using Internet.

Social Engineering: Social Engineering is kinda interacting skill that a hacker uses to manipulate people giving out sensitive information. Its kinda trick done using good verbal, social skills and understanding.

Terminologies Used Under Hacking:

Threat: A threat is an environment or situation that could lead to a potential breach of security. Ethical hackers look for and prioritize threats when performing a security analysis.

An Exploit: An exploit is a piece of software that takes advantage of a bug, glitch, or vulnerability, leading to unauthorized access, privilege escalation, or denial of service on a computer system.
Vulnerability: A vulnerability is an existence of a software flaw, logic design, or implementation error that can lead to an unexpected and undesirable event executing bad or damaging instructions to the system. In easy word vulnerability is weakness in system.

Payload: Payload is agent that helps in taking advantage of vulnerability in remote hacking.

Attack: An attack occurs when a system is compromised based on a vulnerability.


Types Of Attack:

1.Operating System Attack
2.Application level Attack
3.Shrink Wrap Code Attack
4.Misconfiguration Attack

Operating system attack is attack done on specific type of OS. Such attack is done using flaws in programs and services shipped with OS. Application level attack is done over faulty coding practices done over software during its development. Shrink Wrap Code attack are attacks done over UN-refined scripts used for making task simpler. Last is misconfiguration attack, it is kinda attack which is done over mis-configured system or a system with default settings.


Work Of An Ethical Hacker:
Job of an ethical hacker is to use all his skills and tools used by malicious hackers to find vulnerabilities in system and then provide it security against those vulnerabilities.

Conclusion: At last what I want to tell, nothing happens in clicks of buttons. A hacker is highly skilled person in field of computing who usually have ample knowledge about software, hardware, OS, networking and programming. A hacker may it be criminal or ethical has immense patience, determination, organization, discipline and persistence. An attacker may spend months of time planning, analyzing and executing an attack. This shows his level of dedication to achieve whatever goal he/she has set. A person can never become a good hacker unless he have all above qualities.

Note: Now onwards we will cover hacking as our main stream topic on this blog. Real hacking is never done over lamers who hardly knows about security, it is done over a person who is highly skilled as you are. You can never learn hacking until you do some practical and gain knowledge about field so now onwards I urge you to perform practicals that will be now posted on this blog on your own system. Next no tutorial will be taken as a lamer so they will be in possible higher details, so this may happen that you may not understand something. Rather than keeping yourself mum I plea you to please ask whenever you encounter a problem or get bothered by topic. Whenever I 'll post on hacking I 'll try to keep a theoretical and one practical tutorial, you are requested to read both and grasp matter completely.

BASIC LAB SETUP FOR HACKER

BASIC LAB SETUP FOR HACKER






In this tutorial we will discus how you can setup a lab for yourself to practice hacking on your system. At very basic level a hacker is in need of 2-3 systems with a Wired LAN or Wireless LAN. But if you are the one who has started just like me with just one laptop or computer then possibly there's no way you can match this setup. So following was my solution to start practicing with only one laptop or PC meeting above criteria of multiple computers connected in LAN. At most basic level following are your requirements.


Requirements:
A Computer:
First of all a computer which must have minimum following configuration.
A processor with 1.7GHz clock speed,
120GB + Hard disk
2GB RAM, Please note than your RAM must be above 1GB for practicing. If your RAM is less than 1GB or 1GB I 'll highly recommend you buy 512MB module extra or 1GB gigs for you.

A Virtual PC Emulator:
A virtual PC emulator is needed since I assumed you don't have multiple PC's to setup your lab, even if you have it I would prefer to advice you to use a Virtual PC Emulator. There are several options to pick from but our pick is “Oracle's Virtual Box”. Reason its open source means free, low on resources, supports all kind of network types, no problem to setupscreen options, it automatically setups resolution once you install guest installation and have nearly all that features that a professional virtual PC emulator may have. Following is download link to virtual box latest version.
http://www.virtualbox.org/wiki/Downloads

A professional choice is VM-Ware. You can purchase it from following link if you want to run it on Mac.
VMware Fusion 3


Though VM-Ware have several advantages over Virtual Box, virtual box is just good to go. Prefer it if you want to shed money.

An Online Synchronization Service:
If you think even that needs shedding money, then I want to assure there's again a free alternative available, its name is Drop Box. Go to www.dropbox.com and create your personal free account then download its setup file and install for synchronization.

A Static IP Address:
Now that will be problem to get a static IP address since a static IP Address may cost you nearly $100 I.e approximately Rs.5000. But don't worry about it we have a free alternative solution to counter problem of static IP. So when there'll be need I 'll clear how to tackle it else even if you have money to shed I will not recommend it.

A PC restore utility:
There are no free alternative to PC Restore Utilities so we will work out on evaluation version. Download Farconics Deep Freeze from following link
http://www.faronics.com/en/DownloadEvaluationEditions.aspx

IP Address Hiding Utility:
Proxy Servers, Anonymizors and VPS are some IP address hiding options. We will discuss them when their need will come in to play.

High Speed Internet Connection:
Of course when you want to learn hacking you need a high speed Internet connection. Opt for a USB dongle by BSNL, TATA, Reliance as mobile broadband and BSNL land-line broadband is just much better option. If you don't have high speed connection and you work on slower connection like GPRS and dial-ups its hard to learn hacks done over Internet.

Procedure:


Before you proceed create a separate partition for installation of Virtual system, the partition must be at least 15GB in size. First of all download latest version of Oracle's Virtual Box and install it on your system. While installation it'll ask several times about installing various components just press OK for all of them because you'll need them all.

Once installation is done virtual box will come up with several pop ups when you'll be using it, please read each pop up because they are your tutorials to master “Virtual System Environment”. Please please please, don't skip any of those pop ups. When your installation will be over you'll see virtual system isn't really working in full screen. To tackle it run virtuallyinstalled system click on devices and “Install Guest Additions”. From next time it will run in full screen.



Setting up virtual system is done, now jump up to the next part start your virtual system open web browser of virtual system and download Drop-Box application and sign in to it. Now onwards whenever you'll download any software for hacking paste it into Drop Box default folder, it'll synchronize it with your online storage. After installing and signing up Drop Box download Deep Freeze don't install it now. Shut down your Virtual System and copy virtual hard disk as backup in another folder, start system and install Deep Freeze, before installing it read its online manual so that you should not get problem using it. Now when your Deep Freeze evaluation time expires just delete older hard disk and copy the backup and start over again. This will keep your evaluation copy last forever. If you haven't yet understood what we actually did with virtual box then I should clear we just setup a Virtual LAN for our practice using just a single computer. So you can't now boast you don't have a LAN to practice or a remote host to practice. You can run two virtual systems simultaneously if you have at least 2GB RAM. This not only solves our problem of private LAN to practice but it indirectly also offers you remote host to attack on. Our personal say is don't install virtual system on Windows XP or Vista, get Windows 7 or Server 2008.

FOR THOSE WHO WANT TO BE A (HACKER)

CEH V7 INSTRUCTOR SLIDES



These slides are most probably made from screenshots of the official ones. notice that they have not the same size.


Description :

EC-Council releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and security researchers. CEH v7 is a revolutionary training program that combines class metrics, advance lab environment, cutting edge hacking techniques and excellent presentation materials. EC-Council has spent several years in developing this version.
The Certified Ethical Hacker courseware has undergone tremendous improvement from its predecessor. We have invested 4 times the regular investment in the research and development since the last release, and have given CEHv7 a complete makeover.

The new version is a breakaway from earlier releases with more emphasis on techniques and methodologies, which attackers may use to carry out possible attacks against system/networks.

Picture speaks thousand words and we at EC-Council have enforced the saying by practicing it. The instructor slides and student manuals in CEHv7 has it all. The new version empowers the instructor with flawless flow and outstanding diagrammatic representation of the hacking techniques, which makes it easier to teach and enables students to understand the concepts better.
CEHv7 provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed towards the content presented in the CEHv7 courseware. Latest tools and exploits uncovered from the underground community are featured in the new package. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community.

Modules :

CEHv7 Module 01 Introduction to Ethical Hacking.pdf
CEHv7 Module 02 Footprinting and Reconnaissance.pdf
CEHv7 Module 03 Scanning Networks.pdf
CEHv7 Module 04 Enumeration.pdf
CEHv7 Module 05 System Hacking.pdf
CEHv7 Module 06 Trojans and Backdoors.pdf
CEHv7 Module 07 Viruses and Worms.pdf
CEHv7 Module 08 Sniffers.pdf
CEHv7 Module 09 Social Engineering.pdf
CEHv7 Module 10 Denial of Service.pdf
CEHv7 Module 11 Session Hijacking.pdf
CEHv7 Module 12 Hacking Webservers.pdf
CEHv7 Module 13 Hacking Web Applications.pdf
CEHv7 Module 14 SQL Injection.pdf
CEHv7 Module 15 Hacking Wireless Networks.pdf
CEHv7 Module 16 Evading IDS, Firewalls, and Honeypots
CEHv7 Module 17 Buffer Overflow.pdf
CEHv7 Module 18 Cryptography.pdf
CEHv7 Module 19 Penetration Testing.pdf