Internet Security and Ethical Hacking
Internet Security and Ethical Hacking |
Welcome to the unique confluence of hackers , crackers and security professionals on the world wide web. This is your complete resource for internet security and ethical hacking. -: The Ethical Hacker :- Most people think that hackers are computer criminals. They fail to recognise the fact that criminals and hackers are two totally different things. Media is responsible for this. Hackers in reality are actually good and extremely intelligent people who by using their knowledge in a constructive manner help organisations, companies, goverment, etc. to secure documents and secret information on the internet. |
WELCOME TO ALL VISITORS
SEARCH FROM HERE
Tuesday, December 15, 2009
JUST COPY AND PASTE THIS SCRIPT INTO YOUR WEB BROWSERS ADDRESS BAR
Monday, December 14, 2009
Removing the Shortcut Icon Arrows
2.Open the Key HKEY_CLASSES_ROOT
3.Open the Key LNKFILE
4.Delete the value IsShortcut
5.Open the next Key PIFFILE
6.Delete the value IsShortcut
7.Restart the Windows
MAKE YOUR OWN 1 YEAR RAPID SHARE PREMIUM ACCOUNT
Saturday, December 12, 2009
Hacking Class 10 - IP SPOOFING AND ITS USE
Friday, December 11, 2009
HOW TO HACK CYBER OAM TO ACCESS ALL BLOCKED SITES IN YOUR COLLEGE
HACKING BASIC----Trojan And Backdoors - A simple Introduction and Functioning
- It is a legitimate program that has been altered by theplacement of unauthorized
- code within it; this code performs functionsunknown (and probably unwanted) by the user.
- Any program that appears to perform a desirable and necessary function but that (because of unauthorized code within it that is unknown to the user) performs functions unknown (and definitely unwanted) by the user.
- Attacker gets access to the trojaned system as the system goes online
- By way of the access provided by the trojan attacker can stage attacks of different types.
- Remote Access Trojans
- Password Sending Trojans
- Keyloggers
- Destructive
- Denial Of Service (DoS) Attack Trojans
- Proxy/Wingate Trojans
- FTP Trojans
- Software Detection Killers
- Attachments
- Physical Access
- Browser And E-mail Software Bugs
- NetBIOS (File Sharing)
- Fake Programs
- Un-trusted Sites And Freeware Software
- Most commercial ant-virus products can automatically scan and detect backdoor programs before they can cause damage (Eg. before accessing a floppy, running exe or downloading mail)
- An inexpensive tool called Cleaner TROJAN REMOVER can identify and eradicate all types of backdoor programs and trojans.
- Educate your users not to install applications downloaded from the internet and e-mail attachments.
Tuesday, December 8, 2009
New Window XP Tricks(Set 1) - Boost Xp to Obtain Max Performance
Sunday, December 6, 2009
Hack Airtel GPRS: Airtel free GPRS trick/hack
I have written this article to inform you about airtel free GPRS trick/hack.
Airtel free GPRS hack:
1. Download Airtel free GPRS browser to hack airtel GPRS.
2. Unzip this file using winrar obtain Airtel free GPRS software.
3. Now, install this browser in your mobile. This Airtel free GPRS browser is same as Opera Mini browser, but this browser is modified to use proxy server to get Airtel free GPRS.
4. After installation, press Accept and OK sequentially and get Mobile Office settings from Airtel. Start airtel free GPRS browser using Mobile Office as Internet access profile and you will start using Airtel free GPRS. Thus, we are able to hack Airtel to get free Airtel GPRS.
Note: In some cases, you’re charged 30 paise after exiting from browser. You can surf as many sites as you can and then after exiting, you’ll be charged only 30 paise for that session. So, if you don’t wanna lose any money, simple logic is to not to exit from Airtel free GPRS browser. Just keep it minimized and running in background.
Also, you can avoid 30 paise cutting by maintaining balance below 30 paise.
You will require to have winrar to get Airtel free GPRS Browser software. Download Winzix here.
So friends, this Airtel hack to get free Airtel gprs will surely work for you. I have personally tried this out in Maharashtra and found it working to get Airtel free gprs. If you find this working, please mention “Your State” in comments so that other Airtel subscribers of your state may also be benefitted. If you have any problem in using this trick to hack Airtel for Airtel free gprs, please mention it in comments.
Enjoy n hack Airtel for Airtel free GPRS…
Saturday, December 5, 2009
Hacking Class 9- Removing Traces Continues
Tool to Bypass Government Censor : Psiphon Tool
~Psiphonis a censorship circumvention solution that allows users to access blocked sites in countries where the Internet is censored.
~Psiphonturns a regular home computer into a personal, encrypted server capable of retrieving and displaying web pages anywhere .
~Psiphonacts as a "web proxy" for authenticated psiphonites, retrieving requested web pages and displaying them in a user's browser.
~Psiphonuses a secure, encrypted connection to receive web requests from the psiphoniteto the psiphonode who then transports the results back to the psiphonite.
DOWNLOAD:
http://rapidshare.com/files/316738656/psiphon.zip
For More Details About Tool Visit:
http://psiphon.ca/
How To Bypass Google Tracing and What's the Need??
First I will tell you the Need . Everything that We searches over the Net i.e through google , Google makes a log of us ... Log contains 4 basic fields :
1. IP address
2. Search Query
3. ISP from which search is made
4. Time ,date,year etc..
Did you know that Google stores a unique identifier in a cookie on your PC, which allows them to track the keywords you search for? They use this information to compile reports, track user habits, and test features. In the future, it is possible they could even sell this information or share it with others. Even worse, Google's cookie isn't set to expire until the year 2038, unless you delete it first.
Now If you do anything that doesn't pass google censorship then you will surely going to suffer.
TOOL TO BYPASS GOOGLE TRACING : G-Zapper
G-Zapper helps protect your identity and search history. G-Zapper will read the Google cookie installed on your PC, display the date it was installed, determine how long your searches have been tracked, and display your Google searches. G-Zapper allows you to automatically delete or entirely block the Google search cookie from future installation.
SAMPLE LOOK UP OF YOUR SEARCHES:
DOWNLOAD:
http://rapidshare.com/files/316741667/gzappersetup.rar
Sorry Guys Currently my version of this software has expired so you have to work with trial..
We Will Continue Discussion in evening...
If you have any Queries Ask me..
Hacking Class 8 - Hiding Yourself From being Traced
Hey guys as I have Already Mentioned above this is only for educational purpose so don't misuse it. I and onlinetechnicaltutors.blogspot.com is not responsible for any malpractice... Now you all thinking why I am saying this.. Itz pity simple because Its the most dangerous part i.e Hiding your identity from being traced by anyone i.e government,ISP,Raw...everything... So Read On...
Let's have a Breif Look up of Topics That we Cover Here:
1. Proxies and Anonymous Web Browsers
2. Anonymizers
3. Tools to bypass Government Censorship :P
4. Tools to Bypass Google Tracing :P
5. HTTP Tunneling for Windows
6. IP spoofing :P
Today we Will Cover First two Topics...
FIRST OF ALL ..
WHAT IS PROXY AND HOW IT WORKS???
Proxy is a network computer that can serve as an intermediate for connection with other computers .
They are usually used for the following purposes:
• As a firewall, a proxy protects thelocal network from outside access.
• As an IP addresses multiplexer, a proxy allows the connection of a number of computers to the Internet
when having only one IP address.
• Proxy servers can be used (to some extent) to anonymize web surfing.
• Specialized proxy servers can filter out unwanted content, such as ads or 'unsuitable' material.
• Proxy servers can afford some protection against hacking attacks. (For Our Purpose)
HOW AND WHY TO GET FREE PROXY SERVERS ??
~ Attacks using thousands of proxy servers around the world are difficult to trace.
~ Thousands of free proxy servers are available on the Internet .
~ Search for “free proxy servers” in Google .
~ Using proxy servers can mask your trace .
I will recommend two sites for getting the Free Proxy servers. As these sites Daily provides Fresh anonymous Proxies...
1. http://www.tech-faq.com/proxy.shtml (provides almost all type of Proxies)
2. http://proxy.org/ (check the Right Hand Side For Proxies)
BELOW SNAP SHOWING HOW PROXIES USED TO ATTACK..
ANONYMOUS WEB BROWSERS:-
Anonymous Web Browsers have inbuilt proxy finders they search for proxies by default and make our surfing anonymous... TWO BEST ANONYMOUS WEB BROWSERS ARE:
1. Invisible Browsing v7.0 DOWNLOAD :
http://rapidshare.com/files/316735067/InvisibleBrowsing7.rar
2. BrowZar 2.0
DOWNLOAD:
http://www.browzar.com/download/index.html
SNAPSHOT:
You can also find more by googling it but these two are just Best.. :P
ANONYMIZERS
Anonymizers are services that help to make web surfing anonymous. The first anonymizer developed was Anonymizer.com, created in 1997 by Lance Cottrel.
An anonymizer removes all the identifying information from a user’s computers while the user surfs the Internet, thereby ensuring the privacy of the user.
Why Use Anonymizer?
• Example: Google.com keeps track of all your web searches on their servers by placing a cookie on your machine.
• Every single search you entered at Google is logged.
SEVERAL ANONYMIZER TOOLS ARE:
1. Hide Platinum IP
2. Hide My IP
3.Hide My Ip Address
Note: I am not providing the Below Three Because Almost 99% of their cracked version contains viruses and Spywares which can cause damage to your system...
The Rest Four Topics About Hiding Our Traces We will discuss Tomorrow..
Hope that You all have Like This...
IF you have Any Queries ASK in FORM OF COMMENTS !
Thursday, December 3, 2009
Reader Queries: How to send,attach exe files with Gmail email | Bypass Google antivirus
I was asked by many readers via comments about how to send exe files as email attachments. I have told you many times to send exe files to victim in my Keylogger and trojan construction articles. So, I am writing this article to inform you how to send exe as email attachments.
Problems with email accounts:
Most email domains like Yahoo, Gmail, etc. have virus scanners that scan attached files and prevent sending of virus containing files. They also block exe files. So, it becomes difficult to send our created and binded keyloggers and trojan files.
How to send exe files as email attachments - Bypass Gmail antivirus scanner:
If you want to send exe files via emails, I recommend you to use Gmail email account. Gmail email account has virus scanner that scans email attachments and block them approapriately. Gmail email account also blocks exe files. So, you can’t send exe files via Gmail. There are 2 ways to bypass Gmail virus scanner:
1. Use WinRar software:
So, we have to compress our virus or keylogger files with WinRar. Why WinRar??? Because, when you compress your exe files with WinRar, your compressed files are converted to .rar extension. Currently, Gmail does not scan files with .rar extension. So, you can send these files easily via Gmail email account, with no fear of virus scanner.
Note: This Gmail hack is against Gmail policies and could lead to your Gmail account termination. Though, it is said, that this hack is against Gmail policies, I have not heard about Gmail terminating anyone’s account for sending .rar files as email attachments.
2. Upload files to File storage domains:
There are many file storage domains out on web which provide you free storage space. Rapidshare, Megaupload, Ziddu are some of the most used. I would recommend you Ziddu.com because, Ziddu.com has no wait times and pays you to upload file on Ziddu.com
You can upload your files to Ziddu.com by registering at ziddu.com.
So, after you’ve registered, simply upload file to Ziddu.com and Ziddu.com will provide you with a link for your file download.
Send this link to your victim alongwith email.. and tell him to download this file and install it on his computer.
Note: This second hack is safe and works for all available email account.
Thats it. These are two ways in which you can send or attach exe files with Gmail email account and thus bypass Google Gmail virus scanner. If you have any problem in using these two hacks to send exe files with Gmail email account and bypass Gmail virus scanner, please mention it in comments.
Enjoy Gmail hacks to send exe files and bypass Gmail virus scanner…
POST YOUR COMMENTS
Tuesday, December 1, 2009
Hacking Class 7 - Vulnerability Scanning And Tools
Now We move further in scanning phase and now we will scan the systems for vulnerabilities i.e finding the weakness in security ,OS,database and so on..
What is Vulnerability???
As I have Told in First class that Vulnerability is weakness in the network,system,database etc... We can call vulnerability as the Loophole i.e through which victim can be attacked.. We first analyze the loophole and then try to use it to best to Hack the System of victim or oraganisation or website...
TOOL THAT WE USE FOR VULNERABILITY SCANNING ARE :
1. Nessus
2. Retina
NESSUS The Nessus® vulnerability scanner, is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks.
Features:
~ Plug-in-architecture
~ NASL (Nessus Attack Scripting Language)
~ Can test unlimited number of hosts simultaneously
~ Smart service recognition
~ Client-server architecture
~ Smart plug-ins
~ Up-to-date security vulnerability database
SAMPLE SNAPSHOT:
DOWNLOAD NESSUS :
http://www.nessus.org/download/
RETINA
Retina Network Security Scanner, the industry and government standard for multi-platform vulnerability management, identifies known and zero day vulnerabilities plus provides security risk assessment, enabling security best practices, policy enforcement, and regulatory audits.
Features:
~ Retina network security scanner is a network vulnerability assessment scanner.
~ It can scan every machine on the target network, including a variety of operating system platforms, networking devices, databases, and third party or custom applications.
~ It has the most comprehensive and up-to-date vulnerability database and scanning technology.
SAMPLE SNAPSHOT:
DOWNLOAD RETINA:
http://www.eeye.com/html/products/retina/download/index.html
Now After Scanning the Systems for Vulnerabilites .. We will Now Going to attack the Systems but before this we should know the Risk . This risk can be reduced to great extent by using Proxies.. In Next Class We will Discuss what are Proxies and How they work and how they are going to Help us and some undetectable and untraceable Proxy servers...
So wait For Next Class.... And Keep Learning...
If you Have Any Queries You can Ask In form Of Comments!
Now December Starts Rock the world With Onlinetechnicaltutors.blogspot.com
become members
send request mails on coolinfo.gm@gmail.com