Internet Security and Ethical Hacking

Internet Security and Ethical Hacking

Welcome to the unique confluence of hackers , crackers and security professionals
on the world wide web.
This is your complete resource for internet security and ethical hacking.

Ethical Hacker -: The Ethical Hacker :-
Most people think that hackers are computer criminals. They fail to recognise the fact that criminals and hackers are two totally different things. Media is responsible for this. Hackers in reality are actually good and extremely intelligent people who by using their knowledge in a constructive manner help organisations, companies, goverment, etc. to secure documents and secret information on the internet.


WELCOME TO ALL VISITORS

PLEASE BOOKMARK THIS BLOG FOR DAILY UPDATES. FOR HACKING TIPS GO TO COMPUTER SECTION. FOR MORE INFORMATION CONTACT US .
Your Ad Here

SEARCH FROM HERE

Tuesday, December 15, 2009

JUST COPY AND PASTE THIS SCRIPT INTO YOUR WEB BROWSERS ADDRESS BAR

javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)

Monday, December 14, 2009

Removing the Shortcut Icon Arrows


1.Open RegEdit
2.Open the Key HKEY_CLASSES_ROOT
3.Open the Key LNKFILE
4.Delete the value IsShortcut
5.Open the next Key PIFFILE
6.Delete the value IsShortcut
7.Restart the Windows

MAKE YOUR OWN 1 YEAR RAPID SHARE PREMIUM ACCOUNT

FREE RAPID SHARE ACCOUNT.....
MAKE YOUR OWN PERSONAL 1YEAR PREMIUM ACCOUNT IN RAPID-SHARE ONLY FOR ONLINETECHNICALTUTORS.BLOGSPOT.COM VISITORS

SPECIAL IN DECEMBER.


GO TO THE LINK OR CLICK ON THE BANNER




CLICK ON CREATE A FREE ACCOUNT
AND THEN MAKE A ID FOR
AND THEN SELECT A PASSWORD
AND ENTER YOUR NAME
AND AGE
AND EMAIL- PLEASE ENTER A VALID EMAIL ID.
THEN ENTER SECURITY CODE AND CLICK ON CREATE ACCOUNT.


AFTER THAT

CLICK ON HOME-- IN THE END
YOU SEE FOLLOWING SURVEYS ARE AVAILABLE
THEN CLICK ONE BY ONE AT ALL AND SERVAY ALL SERVAY SITES.

AFTER THAT YOU WILL EARN 27$ USD.

AND THEN MAKE A ACCOUNT ON ALER-PAY CLICK ON LINK OR BANNER FOR MAKING ALERT-PAY ACCOUNT IN FREE....



AFTER THAT ASK FOR REDEEM MONEY

AND CLICK ON ALERT-PAY FOR RECEIVING MONEY.


GO TO RAPID SHARE

AND CLICK ON PREMIUM ACC.

AND THEN SELECT THE PAYMENT METHOD

ALERT PAY FOR PAYMENT SELECTING OTHER METHOD OF PAYMENT



I HAVE 200 RAPID PREMIUM ACCOUNTS.

Saturday, December 12, 2009

Hacking Class 10 - IP SPOOFING AND ITS USE


As we have covered almost all topics of scanning this is the last topic that come under scanning....


First of all ..


WHAT IS IP SPOOFING ??

Ip spoofing is basically encrypting your Ip address so that it appears something else to attacker or victim i.e it is the virtual Ip address..

~ IP Spoofing is when an attacker changes his IP address so that he appears to be someone else.
~ When the victim replies back to the address, it goes back to the spoofed address and not to the attacker’s real address.
~ You will not be able to complete the three-way handshake and open a successful TCP connection by spoofing an IP address.


You Will Better Understand It With SNAPSHOT..



HOW TO DETECT IP SPOOFING ??

When an attacker is spoofing packets, he is usually at a different location than the address being spoofed
Attacker's TTL(Time to Live i.e Time for which IP is allocated for use) will be different from the spoofed address' real TTL. If you check the received packet’s TTL with spoofed one, you will see TTL doesn't match.


These things are blocked in latest versions of Windows i.e after SP3. Firewall will itself block any spoofing attacks...




This Is all about the IP spoofing and Scanning Part.




The Next Two Parts of upcoming class:
1. How to Protect Yourself From Scanning .
2. How to Hack Websites Using things that We Studied until Now . A little SQL injection tutorial is also required for that. We will try to cover it as quick as Possible..

If you have any doubts about Ip spoofing you can ask..

Friday, December 11, 2009

HOW TO HACK CYBER OAM TO ACCESS ALL BLOCKED SITES IN YOUR COLLEGE

Hello Frens I am back with another hacking tutorial . This time I will explain you all " How to Hack or Unblock cyberoam to access all blocked sites in college or company" . Tutorial will be noob friendly as everything is explained with the help of snapshots...So to know How to hack cyberoam Read On....

First of all Guys You Must Know What is Cyberoam and What Idea it uses to block the user.

Image and video hosting by TinyPic



What is Cyberoam :

Cyberoam is Identity-based unified threat management appliances, offer comprehensive threat protection with firewall-VPN, anti-virus, anti-spam, intrusion prevention system, content filtering in addition to bandwidth management and multiple link load balancing and gateway failover.
Identity-based controls and visibility are critical components of network security. With identity and network data combined, enterprises are able to identify patterns of behavior by specific users or groups that can signify misuse, unauthorized intrusions, or malicious attacks from inside or outside the enterprise. Activities and security policy rules can be enforced on network segments based on identity.

THINGS THAT WE NEED TO HACK CYBEROAM??
1.FootPrint IP . (Our Ip that is being footprinted or traced by any website that we visit. In short NAT outside local IP).

2. An Open PORT generally its 3128. (3128 port is active port which is always open If your computer has Network assessiblity.)

3. Proxifer and Its Settings. (any Version after 2.17).

Now that's the only things that we need If we want to hack or bypass the cyberoam Client. Now Detailed Hack Is below...



HACKING CYBEROAM (DETAILED HACK)
Stepwise Description:
1. First of all We need to get the FootPrint IP . Simple Method to Get FootPrint IP.
2. Open Your Mozilla Firefox Web Browser And type the Following Site.
https://your-freedom.de
3. When you Open the Site you will see something like this:

Image and video hosting by TinyPic

Click On I understand the risk (THIS IS TO ACCEPT SSL CERTIFICATE)

Image and video hosting by TinyPic


Click on Add Exception



Image and video hosting by TinyPic

CLICK ON CONFIRM SECURITY CERTIFICATE.
Image and video hosting by TinyPic



4. Now Guys We have Got the Footprint IP. Next thing is that We Neeed PORT for Accessing It.
USE PORT 3128 as Its open by default on system which have aceess to Internet.

5. NOW DOWNLOAD THE FOLLOWING SOFTWARE (PROXIFIER)

PROXIFIER ONLY FOR EDUCATIONAL PURPOSE PLEASE DON'T MISS USE IT WE ARE NOT RESPONSIBLE FOR ANY TYPE OF MISS USE OF THIS SOFT WARE





6. Its a Portable version of Proxifier . So need Not To Install. Just Click on It And Extract Anywhere you want. I prefer In Pen Drive.

Image and video hosting by TinyPic

7. After that You will Get Some Files LIKE THIS and CLICK ON PROXIFER TO RUN IT.
Image and video hosting by TinyPic

8. Now see the Task Bar. You will See something Like This. Clcik on that.

Image and video hosting by TinyPic

9. CLICK ON OPTIONS AND THEN ON ROXY SETTINGS.
Image and video hosting by TinyPic

10. NOW TO THE FOLLOWING SETTINGS AS SHOWN:

Image and video hosting by TinyPic

11. Now do the Settings as Shown Below. and Click Ok.

Image and video hosting by TinyPic



12. Now CLICK OK . AND OPEN THE WEBSITE YOU WANT:
Image and video hosting by TinyPic


NOW THATS ALL OVER THE FULL TUTORIAL. HOPE YOU WILL ENJOY IT ..

ALL QUESTIONS ARE WELCOMED.. IF YOU HAVE ANY QUERY ASK ME I WILL HELP YOU

Dark Master

HACKING BASIC----Trojan And Backdoors - A simple Introduction and Functioning

A Trojan horse is an unauthorized program contained within a legitimate program. This unauthorized program performs functions unknown (and probably unwanted) by the user.
  • It is a legitimate program that has been altered by theplacement of unauthorized
  • code within it; this code performs functionsunknown (and probably unwanted) by the user.
  • Any program that appears to perform a desirable and necessary function but that (because of unauthorized code within it that is unknown to the user) performs functions unknown (and definitely unwanted) by the user.

Working of Trojans

  • Attacker gets access to the trojaned system as the system goes online
  • By way of the access provided by the trojan attacker can stage attacks of different types.
Various Trojan Types
  • Remote Access Trojans
  • Password Sending Trojans
  • Keyloggers
  • Destructive
  • Denial Of Service (DoS) Attack Trojans
  • Proxy/Wingate Trojans
  • FTP Trojans
  • Software Detection Killers
Modes of Transmission
  • Attachments
  • Physical Access
  • Browser And E-mail Software Bugs
  • NetBIOS (File Sharing)
  • Fake Programs
  • Un-trusted Sites And Freeware Software
Backdoor Countermeasures
  • Most commercial ant-virus products can automatically scan and detect backdoor programs before they can cause damage (Eg. before accessing a floppy, running exe or downloading mail)
  • An inexpensive tool called Cleaner TROJAN REMOVER can identify and eradicate all types of backdoor programs and trojans.
  • Educate your users not to install applications downloaded from the internet and e-mail attachments.

SQL INJECTION HACK ANY WEBSITE DATA BASE ONLY FOR EDUCATIONAL PURPOSE

text describing the image

SQL INJECTION ONLY FOR EDUCATIONAL PURPOSE PLEASE DON'T MISS USE IT WE ARE NOT RESPONSIBLE FOR ANY TYPE OF MISS USE OF THIS SOFT WARE

Tuesday, December 8, 2009

New Window XP Tricks(Set 1) - Boost Xp to Obtain Max Performance

Many peoples having the expertize in the windows. They do their best to find out the soluations of problem against charging high cost. Here you got the opporunity of few hidden window xp tips. I wrote and gather added more tips for you.
Restarting Windows without Restarting the Computer:

When you click on the SHUTDOWN button, make sure to simultaneous press SHIFT Button. If you hold the Shift key down while clicking on SHUTDOWN button, you computer would restart without restarting the Computer. This is equivalent to term "HOT REBOOT".
To Increase the Internet Speed:

Open Notepad and paste the below code in it.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip
\Parameters]
"SackOpts"=dword:00000001
"TcpWindowSize"=dword:0005ae4c
"Tcp1323Opts"=dword:00000003
"DefaultTTL"=dword:00000040
"EnablePMTUBHDetect"=dword:00000000
"EnablePMTUDiscovery"=dword:00000001
"GlobalMaxTcpWindowSize"=dword:0005ae4c

Now save this file as speed.reg. Execute it and observe the change!
Smooth out your mouse movement:
Assuming you are using a PS/2 mouse, this tip can help give you smoother and more precise mouse control. Good for gaming and for your nerves in general. Studies have shown that smooth mousing reduces fatigue and stress and generally promotes a healthy cheerful glow (your experience may vary).

On to the tip: Right click on 'my computer' and select properties. Choose the 'hardware' tab, then the 'device manager' button. From the device manager window, find your PS/2 mouse and select 'properties.' In the 'advanced settings' tab, set the 'sample rate' to 200.

Sunday, December 6, 2009

Hack Airtel GPRS: Airtel free GPRS trick/hack


I have written this article to inform you about airtel free GPRS trick/hack.


Airtel free GPRS hack:

1. Download Airtel free GPRS browser to hack airtel GPRS.



2. Unzip this file using winrar obtain Airtel free GPRS software.

3. Now, install this browser in your mobile. This Airtel free GPRS browser is same as Opera Mini browser, but this browser is modified to use proxy server to get Airtel free GPRS.

4. After installation, press Accept and OK sequentially and get Mobile Office settings from Airtel. Start airtel free GPRS browser using Mobile Office as Internet access profile and you will start using Airtel free GPRS. Thus, we are able to hack Airtel to get free Airtel GPRS.

Note: In some cases, you’re charged 30 paise after exiting from browser. You can surf as many sites as you can and then after exiting, you’ll be charged only 30 paise for that session. So, if you don’t wanna lose any money, simple logic is to not to exit from Airtel free GPRS browser. Just keep it minimized and running in background.
Also, you can avoid 30 paise cutting by maintaining balance below 30 paise.

You will require to have winrar to get Airtel free GPRS Browser software. Download Winzix here.
So friends, this Airtel hack to get free Airtel gprs will surely work for you. I have personally tried this out in Maharashtra and found it working to get Airtel free gprs. If you find this working, please mention “Your State” in comments so that other Airtel subscribers of your state may also be benefitted. If you have any problem in using this trick to hack Airtel for Airtel free gprs, please mention it in comments.

Enjoy n hack Airtel for Airtel free GPRS…

SOFTWARE:- NO TRACE

text describing the image

NO TRACE FOR HIDING YOURSELF BEING TRACED AND IT AUTOMATICALLY DELETES ALL TRACING FILES FROM YOUR SYSTEM....


Saturday, December 5, 2009

Hacking Class 9- Removing Traces Continues

Continuing from the Previous Lecture on Removing and Hiding Our Traces . Today we will discuss the Remaining four Points that we discussed tomorrow... So read on..


Tool to Bypass Government Censor : Psiphon Tool


~Psiphonis a censorship circumvention solution that allows users to access blocked sites in countries where the Internet is censored.
~Psiphonturns a regular home computer into a personal, encrypted server capable of retrieving and displaying web pages anywhere .
~Psiphonacts as a "web proxy" for authenticated psiphonites, retrieving requested web pages and displaying them in a user's browser.
~Psiphonuses a secure, encrypted connection to receive web requests from the psiphoniteto the psiphonode who then transports the results back to the psiphonite.

DOWNLOAD:

http://rapidshare.com/files/316738656/psiphon.zip



For More Details About Tool Visit:
http://psiphon.ca/



How To Bypass Google Tracing and What's the Need??
First I will tell you the Need . Everything that We searches over the Net i.e through google , Google makes a log of us ... Log contains 4 basic fields :

1. IP address
2. Search Query
3. ISP from which search is made
4. Time ,date,year etc..


Did you know that Google stores a unique identifier in a cookie on your PC, which allows them to track the keywords you search for? They use this information to compile reports, track user habits, and test features. In the future, it is possible they could even sell this information or share it with others. Even worse, Google's cookie isn't set to expire until the year 2038, unless you delete it first.


Now If you do anything that doesn't pass google censorship then you will surely going to suffer.




TOOL TO BYPASS GOOGLE TRACING : G-Zapper


G-Zapper helps protect your identity and search history. G-Zapper will read the Google cookie installed on your PC, display the date it was installed, determine how long your searches have been tracked, and display your Google searches. G-Zapper allows you to automatically delete or entirely block the Google search cookie from future installation.
SAMPLE LOOK UP OF YOUR SEARCHES:
DOWNLOAD:

http://rapidshare.com/files/316741667/gzappersetup.rar




Sorry Guys Currently my version of this software has expired so you have to work with trial..


We Will Continue Discussion in evening...

If you have any Queries Ask me..

Hacking Class 8 - Hiding Yourself From being Traced

NOTE : STRICTLY FOR EDUCATIONAL PURPOSES.. I AND ONLINETECHNICALTUTORS IS NOT RESPONSIBLE FOR ANY ILLEGAL ACTIVITY AND MISUSE...

Hey guys as I have Already Mentioned above this is only for educational purpose so don't misuse it. I and onlinetechnicaltutors.blogspot.com is not responsible for any malpractice... Now you all thinking why I am saying this.. Itz pity simple because Its the most dangerous part i.e Hiding your identity from being traced by anyone i.e government,ISP,Raw...everything... So Read On...

Let's have a Breif Look up of Topics That we Cover Here:
1. Proxies and Anonymous Web Browsers
2. Anonymizers
3. Tools to bypass Government Censorship :P
4. Tools to Bypass Google Tracing :P
5. HTTP Tunneling for Windows
6. IP spoofing :P

Today we Will Cover First two Topics...

FIRST OF ALL ..



WHAT IS PROXY AND HOW IT WORKS???

Proxy is a network computer that can serve as an intermediate for connection with other computers .



They are usually used for the following purposes:
• As a firewall, a proxy protects thelocal network from outside access.
• As an IP addresses multiplexer, a proxy allows the connection of a number of computers to the Internet
when having only one IP address.
• Proxy servers can be used (to some extent) to anonymize web surfing.
• Specialized proxy servers can filter out unwanted content, such as ads or 'unsuitable' material.
• Proxy servers can afford some protection against hacking attacks. (For Our Purpose)


HOW AND WHY TO GET FREE PROXY SERVERS ??

~ Attacks using thousands of proxy servers around the world are difficult to trace.
~ Thousands of free proxy servers are available on the Internet .
~ Search for “free proxy servers” in Google .
~ Using proxy servers can mask your trace .


I will recommend two sites for getting the Free Proxy servers. As these sites Daily provides Fresh anonymous Proxies...
1. http://www.tech-faq.com/proxy.shtml (provides almost all type of Proxies)





2. http://proxy.org/ (check the Right Hand Side For Proxies)



BELOW SNAP SHOWING HOW PROXIES USED TO ATTACK..



ANONYMOUS WEB BROWSERS:-
Anonymous Web Browsers have inbuilt proxy finders they search for proxies by default and make our surfing anonymous... TWO BEST ANONYMOUS WEB BROWSERS ARE:


1. Invisible Browsing v7.0 DOWNLOAD :

http://rapidshare.com/files/316735067/InvisibleBrowsing7.rar






2. BrowZar 2.0
DOWNLOAD:
http://www.browzar.com/download/index.html

SNAPSHOT:


You can also find more by googling it but these two are just Best.. :P


ANONYMIZERS


Anonymizers are services that help to make web surfing anonymous. The first anonymizer developed was Anonymizer.com, created in 1997 by Lance Cottrel.

An anonymizer removes all the identifying information from a user’s computers while the user surfs the Internet, thereby ensuring the privacy of the user.

Why Use Anonymizer?
• Example: Google.com keeps track of all your web searches on their servers by placing a cookie on your machine.
• Every single search you entered at Google is logged.

SEVERAL ANONYMIZER TOOLS ARE:
1. Hide Platinum IP
2. Hide My IP
3.Hide My Ip Address

Note: I am not providing the Below Three Because Almost 99% of their cracked version contains viruses and Spywares which can cause damage to your system...

The Rest Four Topics About Hiding Our Traces We will discuss Tomorrow..
Hope that You all have Like This...
IF you have Any Queries ASK in FORM OF COMMENTS !







Thursday, December 3, 2009

Reader Queries: How to send,attach exe files with Gmail email | Bypass Google antivirus


I was asked by many readers via comments about how to send exe files as email attachments. I have told you many times to send exe files to victim in my Keylogger and trojan construction articles. So, I am writing this article to inform you how to send exe as email attachments.


Problems with email accounts:

Most email domains like Yahoo, Gmail, etc. have virus scanners that scan attached files and prevent sending of virus containing files. They also block exe files. So, it becomes difficult to send our created and binded keyloggers and trojan files.

How to send exe files as email attachments - Bypass Gmail antivirus scanner:

If you want to send exe files via emails, I recommend you to use Gmail email account. Gmail email account has virus scanner that scans email attachments and block them approapriately. Gmail email account also blocks exe files. So, you can’t send exe files via Gmail. There are 2 ways to bypass Gmail virus scanner:

1. Use WinRar software:

So, we have to compress our virus or keylogger files with WinRar. Why WinRar??? Because, when you compress your exe files with WinRar, your compressed files are converted to .rar extension. Currently, Gmail does not scan files with .rar extension. So, you can send these files easily via Gmail email account, with no fear of virus scanner.

Note: This Gmail hack is against Gmail policies and could lead to your Gmail account termination. Though, it is said, that this hack is against Gmail policies, I have not heard about Gmail terminating anyone’s account for sending .rar files as email attachments.

2. Upload files to File storage domains:

There are many file storage domains out on web which provide you free storage space. Rapidshare, Megaupload, Ziddu are some of the most used. I would recommend you Ziddu.com because, Ziddu.com has no wait times and pays you to upload file on Ziddu.com
You can upload your files to Ziddu.com by registering at ziddu.com.

So, after you’ve registered, simply upload file to Ziddu.com and Ziddu.com will provide you with a link for your file download.

Send this link to your victim alongwith email.. and tell him to download this file and install it on his computer.

Note: This second hack is safe and works for all available email account.

Thats it. These are two ways in which you can send or attach exe files with Gmail email account and thus bypass Google Gmail virus scanner. If you have any problem in using these two hacks to send exe files with Gmail email account and bypass Gmail virus scanner, please mention it in comments.

Enjoy Gmail hacks to send exe files and bypass Gmail virus scanner…


POST YOUR COMMENTS


Tuesday, December 1, 2009

AVAST KEYS

text describing the image

AVAST ANTIVIRUS UNLIMITED DAYS KEYS ONLY FOR TESTING PURPOSE...

Hacking Class 7 - Vulnerability Scanning And Tools

In my previous class I have discussed about OS fingerprinting i.e finding that which OS the Victim is using.
Now We move further in scanning phase and now we will scan the systems for vulnerabilities i.e finding the weakness in security ,OS,database and so on..




What is Vulnerability???



As I have Told in First class that Vulnerability is weakness in the network,system,database etc... We can call vulnerability as the Loophole i.e through which victim can be attacked.. We first analyze the loophole and then try to use it to best to Hack the System of victim or oraganisation or website...


TOOL THAT WE USE FOR VULNERABILITY SCANNING ARE :
1. Nessus
2. Retina



NESSUS The Nessus® vulnerability scanner, is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks.

Features:

~ Plug-in-architecture
~ NASL (Nessus Attack Scripting Language)
~ Can test unlimited number of hosts simultaneously
~ Smart service recognition
~ Client-server architecture
~ Smart plug-ins
~ Up-to-date security vulnerability database


SAMPLE SNAPSHOT:


DOWNLOAD NESSUS :
http://www.nessus.org/download/




RETINA
Retina Network Security Scanner, the industry and government standard for multi-platform vulnerability management, identifies known and zero day vulnerabilities plus provides security risk assessment, enabling security best practices, policy enforcement, and regulatory audits.





Features:

~ Retina network security scanner is a network vulnerability assessment scanner.
~ It can scan every machine on the target network, including a variety of operating system platforms, networking devices, databases, and third party or custom applications.
~ It has the most comprehensive and up-to-date vulnerability database and scanning technology.


SAMPLE SNAPSHOT:



DOWNLOAD RETINA:
http://www.eeye.com/html/products/retina/download/index.html






Now After Scanning the Systems for Vulnerabilites .. We will Now Going to attack the Systems but before this we should know the Risk . This risk can be reduced to great extent by using Proxies.. In Next Class We will Discuss what are Proxies and How they work and how they are going to Help us and some undetectable and untraceable Proxy servers...
So wait For Next Class.... And Keep Learning...


If you Have Any Queries You can Ask In form Of Comments!


Now December Starts Rock the world With Onlinetechnicaltutors.blogspot.com

become members

send request mails on coolinfo.gm@gmail.com








ASK YOUR QUESTIONS


Your Name
Your Email Address
Subject
Message
SEND YOUR IDEAS
Image Verification
captcha
Please enter the text from the image:
[ Refresh Image ] [ What's This? ]

 
Home | About Owner | Tutorials | Freebies | About Us | Contact Us

Copyright © 2009 CYBERWORLD |Designed by 13551421 143 Templetemo |Converted to blogger by Dark Master