Pages

Friday 11 May 2012

Hacking Autorun.inf virus attack|Is autorun.inf virus?

When i  was studing in  7th class, my friends told that autorun.inf is virus.  I thought so.  Because my antivirus blocks autorun.inf files.   In class 10th when i search about autorun.inf file on net, i realize about the auto run file.

 Today i bring some files from my frend's system.  When i insert the pen drive in my system, there are lot of exe files.They are viruses.  I delete all of them.  Finally i opened the autorun.inf file in notepad and saw the instructions.  Then only i remembered that i forget to post about autorun file.  This article will give you complete details about the autorun.inf file.
This is the instructions that saved in the infected(call virus programs) autorun.inf file:




[Autorun]
Open=RECYCLER\QqFvXcB.exe
Explore=RECYCLER\QqFvXcB.exe
AutoPlay=RECYCLER\QqFvXcB.exe
shell\Open\Command=RECYCLER\QqFvXcB.exe
shell\Open\Default=1
shell\Explore\command=RECYCLER\QqFvXcB.exe
shell\Autoplay\Command=RECYCLER\QqFvXcB.exe



is autorun.inf virus file?  no.
Then why antivirus block the autorun.inf files?  Go ahead to know the full details about auto run file.

Introduction to Autorun.inf File:
Auto run is file that triggers other programs,documents ,other files to be opened when the cd or pen drives are inserted.  Simpy triggers.

When cd or pen drives are inserted, windows will search for the autorun.inf file and follow the instructions of autorun.inf file(instructions have written inside the autorun.inf file).

How to create Autorun file?
Open notepad
type this command:
[Autorun]
save the file as "autorun.inf" (select all files, not text )

Complete Syntax and instructions inside the Autorun file:
Basic syntax must be inside  the autorun.inf file is :
[Autorun]
This will be used to identify the the file as autorun.

OPEN=
This will specify which application should be opened when the cd or pen drive is opened

Example:
open=virus.exe
This will launch the virus.exe file when cd or pen drive is opened.  The file should be in root directory.
if the file is in any other sub directories ,then we have to specify it.
Open=RECYCLER\Virus.exe
Explore=
Nothing big difference. if you right click and select explore option in cd or pen drive.  This command will be run.

AutoPlay=
Same as the above , but it will launch the the program when auto played.


SHELL\VERB =

The SHELL\VERB command adds a custom command to the drive's shortcut menu. This custom command can for example be used to launch an application on the CD/DVD.

Example:

shell\Open\Command=RECYCLER\QqFvXcB.exe
shell\Open\Default=1
shell\Explore\command=RECYCLER\QqFvXcB.exe
shell\Autoplay\Command=RECYCLER\QqFvXcB.exe



Use a series of shell commands to specify one or more entries in the pop-up menu that appears when the user right-clicks on the CD icon. (The shell entries supplement the open command.)

Icon=
Change the icon of your pen drive or cd.  you can use .ico,.bmp images(also .exe,.dll)

Example:
icon=breakthesecurity.ico
Label=

Specifies a text label to displayed for this CD in Explorer
Note that using the LABEL option can lead to problems displaying the selected ICON under Windows XP.

Example:
Label=Ethical hacking


Why Antivirus Block Autorun.inf file?
From above ,you come to know that autorun.inf file is not virus.  But why antivirus blocks it?  Because as i told autorun file call or launch any application or exe files.  It will lead to virus attack.  If the autorun.inf is blocked,then there is no way to launch the virus code.

Autorun is not virus but it can call virus files.

How to Use Ravan for Password Cracking?





Requriments:
Lot of Friends :
Ravan is Distributed password cracking method. So you will need lot of friends who have Pc with Internet connection. The speed of cracking will increase based on the number of pc contribute in the cracking.

How to use Ravan?

Step1:
  • Go to http://www.andlabs.org/tools/ravan.html
  • Enter the value of the hash that must be cracked
  • Enter the value of the salt, if it is not a salted hash then leave it blank
  • Enter the charset. Only these characters will be use in the brute force attack
  • Select the hashing algorithm (MD5, SHA1, SHA256, SHA512)
  • Select the position of the salt. (clear-text+salt or salt+clear-text)
  • Hit ‘Submit Hash’
Step 2:
 If hash is successfully submitted, it would return a URL.  Now you just need to send this URL to all your friends and ask them to click the start button.

    The main page manages the cracking so it must not be closed or the cracking would fail.

That is it. Once your friends click start they would be doing pieces of the work and submitting results back.


The main page would constantly monitor the progress of the cracking process and manage it across all the workers. You would be able to see the stats throughout the process, once the hash is cracked the clear-text value is displayed.

Download Hash Code Verifier v1.0 : A tool to verify the File Integrity


Hello BTS Readers,
we are happy to announce that we have released our second security tool 'Hash Code Verifier'.  Hash Code Verifier is a Cross-platform application to verify the Integrity of your download files. Hash Code verifier can be very useful if you want to check if a downloaded file is original and not corrupted or modified by hackers.

In order prevent users from such problem, websites often publish MD5 or SHA hash of the file so that users can ensue that a file has not been modified by checking the file's hash value . Hash Code verifier can generate hash for a file and allow user to check with the provided hash value.


Features:

  • Verify the Hash of a file
  • Calculate hash for multiple files
  • Compare Two files
  • Simply Drag and drop files from computer into the application for generating hash.
  • Supports MD5,SHA1,SHA256,SHA512 and CRC32 hash codes.
  • Save the generated hash list in a text/HTML format
  • Automatically generate hash when you browse or drop the files.
  • Yes, it is Cross-platform(You can use this application in any Operating system)

System Requirements:
Operating System: All OS(windows xp,7, Linux,Mac,....)
Java Runtime Environment: JRE 1.6 or higher version is required.(you can get it from oracle.com)

Download:
http://projects.breakthesecurity.com/Download.html

Screenshots:


List of Best Ethical Hacking / Penetration Testing Tools


Here is list of useful and Best Software tools that helpful in Ethical Hacking and Penetration Testing, Forensics ...

MetaSploit :

Metsploit is a very Powerful PenTesting Tool . Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. The Metasploit Project is also well known for anti-forensic and evasion tools, some of which are built into the Metasploit Framework. Very useful tool for Information Gathering, Vulnerability Scanning, Exploit Development, Client side exploits,...
Official site: http://www.metasploit.com/

WireShark:
WireShark is a free and best Network Packet Analyzer tool for UNIX and Windows.  It is used for networking troubleshooting, Malware analysis and education.

Homepage: http://www.wireshark.org

NMAP
Nmap("Network Mapper") Free Security Scanner For Network Exploration & Hacking.It is used to scan a network and gathers information about the target network including open ports,Services running in the host, OS information,packet filters/firewalls details, and  more.

Official site: http://nmap.org/

John The Ripper:
JTR is free and  fast password cracker.  Its primary purpose is to detect weak Unix password.
Official site: www.openwall.com/john/

Acunetix Web Security Scanner
Audit your website security and web applications for SQL injection, Cross site scripting and other web vulnerabilities with Acunetix Web Security Scanner.
This tools is not free one ;(
Official Site: www.acunetix.com

Maltego;

Maltego is an open source intelligence and forensics application. It will offer you timous mining and gathering of information as well as the representation of this information in a easy to understand format.
Official site: www.paterva.com/

IronWASP:
IronWASP (Iron Web application Advanced Security testing Platform) is an open source system for web application vulnerability testing. It is designed to be customizable to the extent where users can create their own custom security scanners using it. Though an advanced user with Python/Ruby scripting expertise would be able to make full use of the platform, a lot of the tool's features are simple enough to be used by absolute beginners.

Official site: http://ironwasp.org

HconSTF
HconSTF is very useful PenTesting tool. It is used for Information gathering,Enumeration & Reconnaissance,Vulnerability assessment, Exploitation,Privilege escalation,Reporting.

Official site: http://www.hcon.in

Ettercap
Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.
Official site: http://ettercap.sourceforge.net/


If you think i left some tools, you can help me to add it.

Great Facebook Tricks and Hacks

1. Hide Your Online Status From Selected Friends:

So you want to use Facebook chat but don’t want some people to see your online status? Simply open up the Facebook Chat and click on Friends List. Start creating a new list called BlockList.

Once the list is created, add those friends to the list that you want to appear offline to. When the list is complete, hover your mouse to the little green icon adjacent to the list and click Go Offline. Bingo! You will now appear offline to everybody in the BlockList.

2. View a Friend’s Profile Without Messy Applications:

If you are like me, you often get annoyed by the dozens of silly applications that people have added to their profile. Here’s a Grease Monkey script that allows you to view any profile without all those applications. Remember: the Mozilla Firefox web browser is a prerequisite for running Greasemonkey.

3. Display Your Facebook Status On Your WordPress Blog:

Want to display your Facebook status updates on your WordPress blog? There is a plugin that does exactly that. StatusPress lets you display your status updates to a widget on your WordPress blog.

4. Access Facebook Chat Through Your Desktop:

No need to go to Facebook.com if all you want to do is use Facebook chat. You can do it right from your desktop using clients like social.im , Adium or ChitChat.



5. Update Facebook Status From Firefox:

If you are a firefox addict you don’t need to use any other software to update your Facebook status. Simply install the FireStatus add-on and update your status right from your browser. You can also use the Facebook Toolbar to completely manage Facebook from your Firefox browser.

6. Create A Photo Collage From Pictures Of Your Facebook Friends:

Easily create a photo collage from profile pictures of all your Facebook friends using a simple Facebook app called Photo Collage.

7. Add A New friend But Hide It From Your Status Update:

A great tutorial by Tim Watson walks you through the process of hiding specific actions from your status updates.

8. Schedule Facebook Messages To Be Send Later:

If you want to schedule your Facebook messages to be send sometime in the future, Sendible is a great tool to do that. You can also use Sendible to schedule your status updates.

9. How To Share Flickr Photos On Facebook:

My Flickr is a Facebook application that lets you display your Flickr photos and photo sets on Facebook so your friends can view and comment on them without leaving Facebook.

10. How To Download Facebook Photo Albums:

Ever felt the need to download complete photo albums from Facebook. You can easily do it with either a Windows desktop application named FotoBounce or a great Firefox add-on FacePad.


11. Upload Photos On Facebook From Your Phone:

All the smart phones like iPhone and Blackberry make it simple to upload photos to your Facebook account but how would you do it if you have a regular phone? Here is a great tutorial to walk you through that.

12. Magic Circles On Facebook:

You might have heard about the Konami code that makes red blurry circles on your Facebook page. This might be one of the most popular Facebook hidden tricks. Here’s how to do it:
Press Up, Up, Down, Down, Left, Right, Left, Right, B, A, Enter key then press up & down & Magic circles will appear!
To stop them simply reload your page.



13. Use Your Facebook Like A Pirate:

Do you love talking like a pirate? You can set your Facebook to appear like a pirate page by going into Current Language Settings and setting it to English (Pirate).



14. How To Insert Cool Symbols In Your Status Updates:

Make your status updates interesting by inserting cool symbols. Simply copying them from this list and pasting in your status updates.


15. Automatically Poke Friends That Poke You:

Don’t have enough time to poke back friends who poke you on Facebook? Automate it with a Grease Monkey script called Facebook Autopoke.

16. Upload Photos From PicasaTo Facebook:

Upload photos to your Facebook account directly from Picasa using the Picasa app for Facebook. You can also upload the Picasa captions and resize your photos before uploading them to Facebook.

17. Search Facebook Like A Pro:

Not everybody knows how powerful Facebook search is. Similar to any large search engine, Facebook search has a lot of advanced options to help you search like a pro. For example if you are looking for a person named John Marsh and filter your results down to only people who are married, you can try name: John Marsh status:married. A complete list of search tips for Facebook can be found here.


18. How To Update Facebook Status From Gmail:

Facebook gadget for Gmail allows you to update your Facebook status right from your Gmail.


19. How To Access Gmail From Facebook:

If you seldom have to leave Facebook just to go check your Gmail inbox, check out Fmail. It is a great application that lets you check your Gmail from within your Facebook inbox.

20. See Facebook Twitter style:

If you love Twitter more than Facebook, you can view your Facebook just like you view your Twitter using this grease monkey script.

21. Import Facebook Friends To Twitter:

FB140 is a simple tool that lets you find all your Facebook friends that are using Twitter so you can easily follow them.

22. Access Facebook From Microsoft Outlook:

This is a great tip for people attending colleges or working in places that block Facebook, but allow you access to Microsoft Outlook. Simple install the FBlook plugin and access Facebook from Outlook.

23. Display Your Facebook Status Upside Down:

This is a cool and fun trick. To display upside down status updates, simply head over to FlipText and type in your status. Then simply click on Flip Text and copy-paste the upside down text into your Facebook status box.

24. Update Facebook Status Using Twitter:

Wouldn’t you love to update your status on both Facebook and Twitter at the same time. Just install the Twitter application for Facebook. Once synced, your tweets including the #fb tag would automatically be posted as status updates on your Facebook.

Tuesday 8 May 2012

Breaking Browsers: Hacking Auto-Complete (All Materials Available)

Breaking Browsers: Hacking Auto-Complete (All Materials Available)

BlackHat was one amazing ride. Over 5,000 people attended, a conference record. I got to see a ton of friends and colleagues and was fortunate enough to meet many new and interesting people. Of course a big highlight for me was my presentation, in which roughly 800 - 1,000 people showed up. A great turn out considering the talk was up against really solid and well-known presenters like Haroon Meer, Moxie Marlinspike, Christofer Hoff, and Ivan Ristic. Aside from some projector glitches and a failed cookie eviction demo everything went smoothly. From feedback in the hallway much of the audiences pin-drop silence was due to shock given how ridiculously simple yet effective these hacks were. :)

Essentially I described how a malicious website could steal their visitors names, job title, workplace, physical address, telephone number, email addresses, usernames, passwords, search terms, social security numbers, credit card numbers, and on and on by manipulating a Web browsers HTML form auto-complete / autofill functionality. For good measure I also showed show a Web page could evict all of a users cookies thereby automatically logging users out of all their current sessions, delete tracking cookies, and so on. Lastly, with only clever bits of of javascript, these attacks impact millions of Web users cheaply via online advertising networks. Yes, a lot of fun.

My complete “Breaking Browsers: Hacking Auto-Complete” slide deck is available. I’ve put up a series of blog posts describing each of the distinct Web hacking techniques complete with proof-of-concept code, screen shots, videos, and technical explanations. Enjoy!

Other closely related Auto-Complete / AutoFill bugs:
hacking material [Full DOWNLOAD]
FirstLoad.com, ext: .rar, date: 2012-05-08
hacking material [Full DOWNLOAD]
[Verified] hacking material
FirstLoad.com, ext: .rar, date: 2012-05-08
[Verified] hacking material
hacking material [100% Tested]
FirstLoad.com, ext: .rar, date: 2012-05-08
hacking material [100% Tested]
Sponsored results


Counter Strike Source Material Hack(VACPROOF 4EVER)
rapidgator.net   ext: .zip   1 MB  date: 2012-05-04
Counter Strike Source Material Hack(VACPROOF 4EVER)
Css Material Hack By Flagz0r! 710MB
depositfiles.com   ext: .zip   296 KB  date: 2012-05-04
Css Material Hack By Flagz0r! 710MB
Materi Workshop Wifi Hacking With Backtrack Unair Des 2009
scribd.com   ext: .pdf   1 KB  date: 2012-05-02
Materi Workshop Wifi Hacking With Backtrack Unair Des 2009
Video results for:hacking material
Free Download-Facebook Password Hacking Exploit 2011 - Free Download - {Updated Oct 22, 2011}
Free Download-Facebook Password Hacking Exploit...
FACEBOOK Hack FACEBOOK The BEST 2011 (NEW VERSION (More)
Hacking Democracy (3/9)
Hacking Democracy (3/9)
This documentary looks into the horrifying truth (More)

Certified Ethical Hacking Official Course Material [Exam 312 50]
4shared.com   ext: .rar   14 MB  date: 2010-08-09
Certified Ethical Hacking Official Course Material [Exam 312 50]
Hacking Galaxy by sujith
rapidshare.com   ext: .rar   2 MB  date: 2009-04-08
Source title: student's galaxy: full gre material tht i have
Hacking Galaxy by sujith
milka la mas dura, la material ft arcangel papi que bueno tu ta (chosen few urbano).mp3
4shared.com   ext: .mp3   1 MB  date: 2012-04-21
milka la mas dura, la material ft arcangel papi que bueno tu ta (chosen few urbano)
Materi Workshop Wifi Hacking With Backtrack
scribd.com   ext: .pdf   1 KB  date: 2012-04-28
Materi Workshop Wifi Hacking With Backtrack
CEHv6 Module 01 Introduction to Ethical Hacking
4shared.com   ext: .pdf   3 MB  date: 2012-03-15
CEHv6 Module 01 Introduction to Ethical Hacking
Css Material Hacks By dominic
rapidshare.com   ext: .rar   101 MB  date: 2009-07-16
Source title: youtube - counter strike source material wallhacks with downloads and explanation
Css Material Hacks By dominic
COMPOSITE MATERIALS AND STRUCTURES
rapidshare.com   ext: .doc   9 MB  date: 2010-10-13
COMPOSITE MATERIALS AND STRUCTURES

hacking material [FULL DOWNLOAD]
FirstLoad.com, ext: .rar, date: 2012-05-08
hacking material

Facebook hacking


Learn all "5 Hack Facebook Methods - Download Free Hacking Tools, Algorithms, Tips/Tricks" Top 10 Passwords used by 60% Facebook Users. Free Hacking Protection Guide


Hack Facebook for Free

There are so many software that aim to hack of fb passwords online. These function differently, and it is important that you understand the process so you can make the necessary actions that will ultimately keep you safe and protected. Learning about these software also gives you an idea how passwords are created, distributed and stored. The most popular free software facebook hacking tools are - Hydra, Ophcrack, Dsniff, Rainbow Crack and John the Ripper. We Provide their particular descriptions and mode of operation with Free Download Link (No Credit Card Required). Many of them are available in both Windows and Linux version along with 32 and 64 bit support. 


Disclaimer :- Users are advised to use these software responsibly. The main intention to share this information is to create awareness about various hacking methods so that Facebook users can protect them-self from Hacking.

Hydra

Hydra was developed by a group called THC or The Hacker's Choice. It is a software project that invests in dictionary attack to check for simple and weak passwords on a single or more remote hosts that function on different services. This was made as a proof-of-concept utility to show the convenience of hacking simple and poorly selected passwords. The project also supports different protocols and services, such as Firebird, AFP, HTTP, HTTPS, MS-SQL, RSH, RLOGIN, SNMP, POP3, IMAP, Cisco auth, Cisco AAA, SMBNT and HTTP-PROXY among others. THC ceased production of the software in 2007 in accordance with German laws that prohibit the availability of hacking instruments to the public.


Ophcrack cracks Windows passwords through LM hashes via rainbow tables. This is a free open source software which is GPL licensed that also includes that importation of hashes from different formats, including direct dumping from Windows SAM files. On several coputers, Ophcrack can crack several passwords in just a few minutes. Alphanumeric passwords via rainbow tables are given freely by developers. Ophcrack is usually grouped with tables that let it hack passwords that are no longer than 14 characters long. This is available for download in 2 Windows XP tables. Ophcrack can crack NTLM hashes.

Dsniff 
Download it free from here dsniff-2.3.tar.gz

Dsniff is a password sniffer created by Dug Song. It is a package of utilities that include code to parse several application protocols and acquire a variety of information. Dsniff is a set of traffic analysis tools designed for many testings. It can also crush the regular behavior of switched networks and trigger network traffic from other hosts belonging to the same network segment to be visible. It focuses on HTTP, POP, LDAP, Rlogin, NFS, Citrix ICA, NAI Sniffer, Microsoft SQL protocols, OSPF, RIP, Telnet and FTP among others.

Rainbow Crack


RainbowCrack is a computer software that produces rainbow tables that can be utilized in password cracking. It is different from other brute force crackers because it utilizes big pre-computed tables known as rainbow tables that minimize the duration required to crack the password. The program was created by Zhu Shuanglei and uses an ehnaced time-memory trade-off cryptanalysis attack that started in Ophcrack. The purpose is to create rainbow tables and not to crack passwords individually.

John the Ripper

Download it free from here

This is a free software that cracks passwords. It runs on 15 platforms and was first developed for the UNIX OS. It combines different password crackers into a single package and autodetects hash types. It also includes a customizable cracker. It can run against different encrypted password formats like crypt password hash types found in many flavors.

Precomputation and salting are two methods commonly used by hackers to hack facebook by get into your system to try and manipulate, as well as acquire personal data. You should know more about the processes and find out how these work so you can stay safe and make use of the necessary precautions to keep everything secure for a long period of time. Knowing the method and understanding how it works will keep hackers at bay and your system safe.

Precomputation

Password cracking is also known as precomputation, which is the method of recovering passwords from information that has been saved or transmitted via a computer system. A very common method includes repetitively trying to guess the password. Hackers will make use of things that are related to you, such as your address, birth date or second name. The goal of the password cracking will help the user recover a lost or forgotten password, so that you can get unauthorized access to the system or for system administrators to verify for passwords that might easily be acquired and cracked. Even though putting a wholly different password is not a security risk, you still get system administration privileges. Password cracking is used to gain access to digital evidence in court cases.

Preventing Precomputation

The ideal method for preventing the cracking of password is to make sure that hackers do not access the encrypted password. For instance, encrypted passwords on the Unix operating system were first stored in a publicly accessible file. On newer systems, these are stored within the file, and are accessible only to programs that have enhanced privileges. However, several network protocols deliver passwords in cleartext or still use weak response and challenge schemes. You can stay protected by changing your password every now and then.

About Salting


Salt is made up of random bits used as one of the many inputs to a key derivation function. The other input is usually a pass phrase or password in cryptography. The output of the key derivation
function is saved as the password's encrypted version. The salt can also become a part of a key in a cipher or another algorithm. The function usually uses a hash function. Other times, a value generated earlier, called the initialization vector, is also used as the salt. Salt information tends to complicate the dictionary attacks that invest in pre-encryption of dictionary entries, wherein every bit of salt used will double the amount of computation and saving required. The salt value should be kept secret for security purposes. A number of protocols let the salt transmit as cleartext, together with the number of iterations used in producing the key to strengthen it.

More on Salting

Salt can also keep you protected from rainbow tables, which will extend the complexity and length of the password. If the rainbow tables do not get passwords that suit the length and complexity of the salted password, the password will stay secret. Once discovered, you will have to eliminate the salt from the password, before usage. 


Your password can be the very thing that allows hackers and other unscrupulous individuals into your system. It is important that you understand some of the complex algorithms to see how these work, just so you can make the necessary precautions and ensure that your facebook account and personal data stay safe for long. You should determine which one is most commonly used in your area, and try to invest in programs and methods that counter it.

Rule of Thumb for Facebook

Generally, if you pick a very easy password to remember, it will most likely be easier for the hacker to guess. Guessing or brute force attack will easily let the hacker into your computer, so the rule of thumb is to make passwords quite difficult to decipher. However, you should also refrain from choosing passwords that are very hard to remember, since these can minimize the safety of your computer and system. Users will need to electronically store the password or write it down for later use. Users might also have to use password resets all the time, if they forget and users will also re-use the password time and again. Users tend to subvert the system, by using very strict password strength requirements, such as mixing upper and lowercase letters, including digits and using words that are not readable.

Simple Password Transmission

Passwords are very prone to snooping or interception, while these are transmitted into the authenticating person or system. Once the password is brought as an electrical signal on an unsecured physical wiring between the central system that controls the database and the user access point, wiretapping can easily give out the facebook password. Any person who can watch the packets that have the logon data can easily snoop around without being caught.

Email is usually sent as cleartext, which makes it very easy to deliver to just any person curious enough to find out more. The email will be saved in 2 computers as cleartext, the recipient's and the sender's. Once it goes through intermediate systems during delivery, it will most likely be saved in one of the systems temporarily. Emailed passwords is a very unsafe way to distribute.

Via Encrypted Channels

If you use cryptographic protection, you reduce the snooping of passwords. The TLS or Transport Layer Security feature made into several internet browsers will let the user know of a SSL or TLS secure exchange with a serve by showing a closed lock image. There are also hash-based challenge-response methods. This requires the user to prove to the serve that the shared secret or password is already known. The stored form is then acquired by the server.

On Authentication

Remote authentication is also done by several systems. The attacker usually needs only the hash, instead of the original password so he can authenticate from a remote source. Zero-knowledge password proof can also be done, wherein knowledge of the password is proven without having to present it. There are also augmented systems like SRP-6 and AMP which can get rid of the limitation of hash-based methods. The hashed and unhashed password is used in this operation. 




Your email account is one of the most common platforms where unscrupulous individuals can take advantage and try to get into your personal data and financial status. Facebook is another medium that has a lot of hackers lurking at different corners, considering that there are more than 500 million registered users worldwide. You have to consider the past incidences and try to find more ways to get ahead so you stay safe and secure for long.

Sending You Emails

There are several companies that send you mail and make it seem like it's originating from Facebook to gain more credibility. However, you should be aware that most of these are only after your password, so they can hack into your account and manipulate your online activities. You might be wooed by lucrative and seemingly unbelievable offers, but be wary of these because you might be changing your password for the worse. For example, AT&T has been used by hackers to get into the emails of different registered users. The email will inform clients that they have to change and verify their password for security purposes. In reality, the hackers are only waiting for users to change into the new password so they can acquire this easily, thus easily getting into the user's email account and other sites where he is registered online.

Another Incident

There was also another incident wherein an employee of the Texas Power Company hacked into the system. The hacker logged into the VPN and sent emails to members of the engineering group that mans the nuclear reactor. The hacker was posing questions regarding the safety of the reactor, should the load be increased to the maximum. The energy forecast system of the company had to be closed down for a day, resulting to about $26,000 in losses.

Blackmails

You should also be wary of emails that seem to blackmail or force you to change items in your account. Usually, a pop-up window will appear and ask you to click on it so you can log on to Facebook or another landing page where you can change your password. The hacker created this window and page so he can view what you typed in. The blackmail usually comes in the form of a message indicating that you will lose your profile on Facebook or some data will be revealed to the general public if you do not comply.

The Facebook Password Change

This email attack has forced millions of people worldwide to comply and change their password. Some realized that information has been changed on their accounts, while others simply can no longer log into their account. Others report having their profiles used to sell or represent items they have no idea about. Identity theft is usually the result of the stolen passwords. Make sure you verify the source first and that it truly comes from Facebook, since a lot of hackers bank on the popularity of the website to gain people's trust online to Hack Facebook.

People take passwords for granted which might explain why too many also have their identities and other personal information stolen through the internet. You should be careful when picking passwords. Follow the right guidelines and make sure that you only visit websites that are reliable and also invest in their own security system and protection.

The Weak Point

Hackers will always try to find a weak point in the system to try and get through and retrieve your password. Once the system uses a poorly made password scheme in protecting stored passwords, the hacker can use the weak point and get even well-chosen ones. Microsoft Windows divides the characters of the password into two so that these are hashed separately. Thus, the hacker has to attack each one separately, which will require more time and effort, compared to just attacking a single password.

Making Your Facebook Password

People make the mistake of choosing passwords that are very obvious and easy to decipher. You might realize that you can spend months or weeks choosing the right name for your baby or your pet, but do not think twice when picking the right password. You have to understand that passwords should almost never relate to you. You have to also follow directions and suggestions by websites on how to write your password. Some of the best passwords are no less than 12 to 15 characters in length, use a combination of letters and numbers, use a combination of upper and lower case letters and use words that may not be readable or understandable.

Guessing by Hackers for How to Hack Facebook ?

Guessing involves linguistically deriving words until hackers get into the system. Dictionary attack is the most common and describes all attacks. Examples of passwords that can be guessed include not using any or just putting blank, using the words "admin" or "password", using the numbers "123" or "12345" and using "qwerty or asdf". You should never use your log in or user name. You should also refrain from using your middle or last name. Avoid using words or terms that relate to you, such as the name of your favorite pet or mother, your place of birth or your car license plate. Also, do not reverse the letters of your name or use your initials. Hackers can easily guess these.


Below is the Top 10 list of most commonly used facebook passwords:

1. password

2. 123456

3. qwerty

4. abc123

5. letmein

6. monkey

7. myspace 1

8. password 1


9. blink182



10. (your first name)
The Best Way to avoid being a target or identity theft, you should keep the hacker from reaching even your encrypted password. Encrypted passwords used to be saved in an accessible file. Now, these are kept within the file and can only be accessed by programs that have improved privileges. This will be very difficult for unscrupulous individuals to get during the initial stages. New Unix systems have changed traditional DES-based hashing of passwords with enhanced methods founded on Blowfish and MD5.

Other methods include changing your password every now and then. You can stay protected from brute forcing, wherein the hacker tries to get into your system within one shift. It is advisable that you change password every week or month.


Below is a quick stats to proof potential risk involved by using simple passwords.
How do you protect your account from hackers?

An unauthorized person who has access to your account can wreak havoc, even if it is just a social networking site like Facebook. For that you need to have a strong password, because a weak password can act as a key for hackers to hack their way into your account.
To secure your password:
Avoid using words, digits or names that are directly connected with you.
- Avoid default passwords, and change the given passwords as soon as you activate an account.
Have lengthy passwords.
Avoid using alphabets or numbers in a sequence.
Mix the upper and lower cases in your password, to make it complicated, taking care to remember your capitals.
Adding symbols can further secure your password.
Thus by providing maximum strength to your passwords, you can protect your Facebook and other personal as well as business accounts. Remember, safety should always be your first pre-requisite.
Posted by Aaraf


People using Zip to compress their files beside compression they are trying to lock their important data with password(s).
Now let suppose if you do this same thing with your important files and now you have forgotten password, now what to do now its time to crack it.
This article will teach you how to crack the password of Zip files.


By using a simple Linux terminal and command you can easily crack the Zip password, you can download FCrackZip from your software manager.

Use this command to get FCrackZip from terminal
$ sudo apt-get install fcrackzip

After installing this you have options to attack on your zip file, either choose brute force attack or dictionary attack.
Here is the simple usage example.
$ fcrackzip -v -b -p aaaaaa -u your_zip_file.zip





By looking the above picture you can easily see the brute force attack against a zip file that is password protected, it took around 30 minutes to find the password for this zip.


Posted by Aaraf


A virus is malicious software or a malicious program which hides in other program and execute when you open this program. A virus is inactive until you execute an infected program. If you want to know more about viruses or if you want to create your own virus than click
here.

Technology has been changed and changing rapidly, different viruses has an ability to destroy your anti-virus software so in this case a online virus scanner probably a good choice to use.

Here are the list of some more common anti-virus software vendors online scanner web link. If your anti-virus do not work properly or if you have any doubt that your computer has been infected by a virus so scan your computer online.
BitDefender

Bitdefender is going to be a popular anti-virus solution, BitDefender Online Scanner is an on-demand antivirus and antispyware tool that lets you see just how safe your PC is for yourself. It detects and remove any virus and spyware on your computer online. Click here to scan.

Kaspersky

Kaspersky is one of our favorite online virus scanner tool, it detect the virus and spyware using the same method as in the fully-functional anti-virus solution provides.It allows malware detection and to compare your result with the malware database for effective result. Click here to scan.

Panda Active Scan

Panda ActiveScan is Panda Software’s online antivirus, that works directly over the Internet. With a simple click from your browser you can scan all your files and e-mail for viruses. Click here to scan.


ESET Online Scanner
ESET Online Scanner is a user friendly, free and powerful tool which you can use to remove malware from any PC utilizing only your web browser without having to install anti-virus software. ESET Online Scanner uses the same ThreatSense® technology and signatures as ESET Smart Security/ESET NOD32 Antivirus, and is always up-to-date. Click here to scan.

OneCare Online Scanner

Windows Live OneCare safety scanner is a free service designed to help ensure the health of your PC. Click here to scan.



Posted by Aaraf

There are different computer tips and tricks available to impress anyone, If you are looking for some tips and tricks than read this article.

Lock A Folder In XP Without Any Software
  • For doing create a folder in C drive, suppose folder name is xyz.
  • Now open command prompt from start menu.


  • Now in command prompt type "attrib +s +h C:\xyz" without quotes and press enter.
  • This command will make your folder invisible and it will never seen by anyone even in the hidden file and folder.
  • If you want to make it visible again type "attrib -s -h C:\xyz"
  • By doing this you can lock any folder of your choice.

Hide Your Drive
This is a small but cool trick to hide your drive/partition of your choice, if you have a personal data in on a partition and you dont want any other to see this data than you can hide this partition in on XP,Vista,7 and 2000 too.
  • Open registry editor by going on start than run and type regedit.
  • Find this
    HKEY_CURRENT_USER\Software\Mcft\Windows\CurrentVersion\Policies
  • Click on explorer
  • Click on "nodrives" key on the right column.
  • You will see something like this "0000 00 00 00 00"
  • After the four set of zero ("0000") you have to write your partition name
  • The first column is for drives A-H, the second for I-P, the third for Q-X, and the fourth for Y-Z.
  • The value(s) of drive as follow:
  • 1 - A I Q Y
    2 - B J R Z
    4 - C K S
    8 - D L T
    16 - E M U
    32 - F N V
    64 - G O W
    80 - H P X
  • So, let's say you want to hide drive D. In the first column you would put "08"

Make An Invisible Folder




  • Create a folder when you have to enter the name of the folder.
  • Press ALT + 0160 if you do this exactly than your folder has no name.
  • Right click on the folder > properties > Change Icon .go through the list of icons and then you'll see an invisible icon choose it and then click OK.
  • Now your folder will be invisible and it can see only when you select it.

Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription or become our Facebook fan! You will get all the latest updates at both the places.
Posted by Aaraf
Remote Administration tools also known as RAT are windows Trojans or in simple terms programs used by a Hacker to get administrative privileges on the victim’s computer. Using a RAT you can do a lot of cool things such as “Upload, delete or modify data” , “Edit registry”, “Capture victim’s screen shot”, “Take control of victim’s Computer”or “Execute a virus” just with a click of a button.
Throughout this article I will teach you how to use Lost Door, a Windows RAT, to control and monitor a victim’s computer remotely.
Disclaimer: Coder and related sites are not responsible for any abuse done using this software.
Follow the steps below to setup a server for Lost Door.
  • Download Lost Door from here . (Update: In case the given download link doesn’t work, use this secondary download link. The password to unzip this file is “ehacking.nethungry-hacker.com” without double quotes.)
  • On executing the download file, you will see the following screen. Accept it
  • After it is open, right click on the window and click on create server
  • Now enter your IP address and DNS here. Leave the rest of the field as it is.
  • Now click on the ‘Options’ tab and choose the options as you want. To activate an offline keylogger is a good practice.
  • Now go to ‘Advanced’ Tab. There will options related to spreading. This will be used in case you have more than 1 victim.
  • Now just go to the ‘Create’ tab and click on create server. Your server is ready for use now and now send it to the victim.
Sending the server file to your victim
This is the most important thing after you have created your server file. If you want to take control on a single computer than you have to send this server file to the desired victim but if you want to affect more and more people than you have to use some spreading techniques.
  • If you have physical access to the victim’s computer then take the server file in a pen drive and just double click on your server file once you have injected the pen drive into that computer.
  • For those who don’t have physical access can use social engineering in order to get the victim execute that file on his computer.
Using Spreading to affect multiple victims
If you have more than one victim, then you have an option of using spreading technique. You might think that by creating multiple server files you can control multiple users. But here is a secret about spreading. When you select the spreading option, the server file will act as a worm which will spread itself across different computers via Email or any other channel. So your burden will be only to get one victim to execute that file on his computer, the remaining job of getting other victims will be done on its own.
Posted by Aaraf
Hello Friends,
The popularity of Twitter has increased tremendously in past few years. As a result a lot of Twitter Desktop applications are available to the users for download these days. These applications allow you to receive and post Tweets from your desktop without visiting your Twitter.com page. To reduce your burden of finding the appropriate app for you from such a big pool of apps, we have compiled a list of Best Twitter Desktop apps available in the market. Earlier I had compiled a list of 20 Best Twitter Desktop Apps for Windows. Today I give you 9 Best Twitter Apps for Mac.
1. EventBox
This just-for-Mac app is a favorite of many because it supports Twitter, Facebook, Flickr integration, feed reading with Google Reader and internet trend watching with Reddit and Digg . Keyboard shortcuts, hotkeys, Instapaper integration, and photo uploads to Flickr and Facebook make EventBox pretty nifty. It’s also got a very slick interface with a navigation menu on the left-hand side.
2. Mac Lounge
This app is incredibly appealing for its dead simple, single column interface and respectable feature set. We, of course, love the multiple account support, but also appreciate saved searches, quick access to view followers and following, and tweet options to link to tweet, copy tweet, or copy tweet URL. There’s also an accompanying iPhone app, which syncs with the desktop version and greatly improves the app’s relevance.
3. Nambu
This really sophisticated Mac app should be more than enough for any and all of your Twitter needs. You’ve got access to your followers and friends, custom groups, search (integrated with FriendFeed and One Riot), trends, tr.im and pic.im integration, multiple accounts, Ping .fm integration, filters, and three view options for a one or many column view of tweets.
4. Sideline:
Sideline is just a search and trending topic app from Yahoo, but it does a darn good job at satisfying those specific needs. You can view current Twitter trends, select to see the three latest tweets or pop out as its own saved search, and create custom search groups as tabs.
5. Skimmer:
It’s hard not to love this app. Not only is it beautiful to look at it, but it also tracks your favorite social sites. Skimmer’s certainly not an application for the social media beginner, but power users of Facebook, Flickr, YouTube, Blogger, and Twitter, will appreciate the aggregation of content, filtering options, view types, and enhanced content viewing experience.
6. Tweetie
A full-featured Twitter client which is available in free ad supported and ad-free versions. This Desktop app lets you view not only the tweets but also the entire conversation history leading to that tweet. It provides you with an independent compose windows that stay out of your way until you need them. Tweetie for Mac also has search trends to let you find out the hottest trend in Twitter. Other features include threaded DMs, user details, torn off search, bookmarklet, and preferences.
7. Twibble Desktop
Twibble is a bit of a riddle. It’s not a bad app when it comes to feature set, but it’s also not the most intuitive. You can manage multiple accounts, but all tweets are merged together in one stream. You can reply, DM, fav, RT, and copy tweets, but you’ll have to hover over the tweet to even know those behaviors are possible. You can also use keyboard shortcuts, filter your tweets for keywords, or conduct searches that open up in new windows, but Twibble just doesn’t seem to flow as easily as we’d like it to.
8. Twitterific
Lets you both read and publish posts or “tweets” using a clean and concise user interface designed to take up a minimum of real estate on your Mac’s desktop. The app shows a scrolling list of the latest tweets from your friends, or public feeds. Its features include multiple Twitter account support, auto refreshing, inline display of replies and DMs, shows no. of unread tweets, quickly delete tweets, auto show/hide new tweets, single click access to user pages and more.
9. TwitterPod:
This app isn’t known for its sophistication or advanced Twitter functionality. TwitterPod is a basic single column Twitter app with an inline browser and the ability to filter for just tweets with links. Its heyday has long since passed, but original fan boys and girls may still be using this for their twittering.
Posted by Aaraf





Facebook, the biggest social network with 500 million users, provides an interface to hit an unsuspecting crowd with malware and viruses. These viruses aren’t very difficult to detect if you are cautious enough. These Facebook viruses appear on your wall in forms of a bizarre or eye-catching stories and videos and once the user has clicked/liked the link, it is already late. The next step will be getting rid of your Facebook virus which is a time-consuming process. Its better to avoid spam messages and trojan viruses in the first place.
How to avoid it?
1. Think before you Act. Viruses on Facebook are sneaky. The hackers and cybercriminals who want your information know that Facebook users will often click on an interesting post without a moment’s thought. If a post sounds a bit over-the-top like a headline out of a tabloid, this is your first warning sign.
2. Try to avoid Links and videos with Catchy words like “funniest ever,” “most hilarious video on Facebook,” or “you’ve got to see this.” Do some keyword research to see if the post in question comes up in a search engine with information about a current virus or trojan.
3. Check the poster of the Suspicious content. If you receive a message from someone you do not know, this is an obvious red flag. Facebook video viruses also tend to pop up in your news feed or on your wall from friends you haven’t talked to in a while. Unfortunately, it’s likely this friend has already fallen victim to the latest virus on Facebook. After clicking on the story themselves, the message was sent out to all of their friends as well.
4 Avoid messages that have been posted by multiple users as the virus spreads among your friends who were not so cautious. If a link with title such as “Sexiest video ever” shows up all over your feed from all kinds of people (perhaps friends you would not expect to make such a post), this is another warning sign. Similar direct messages are a likely variant of the notorious Facebook Koobface virus which has used this approach in the past.
5. Do not fall for the “typical” money-transfer schemes. Chat messages from friends needing funds will usually sound suspicious. Everything can’t be screened before posting, so money transfer scams and hoax applications still find their way on to Facebook. You should also avoid applications that claim to do a full “Error check” or fix security problems related to your profile.
6. Update your anti-virus software frequently. If you do accidentally click on a post before realizing it is a hoax, do not click on any further links or downloads. If it’s too late and you have already been infected, the Facebook virus removal process may be effortless if you have a good anti-virus program to catch the virus, trojan or other malware early on.
What’s Next?
These were few important tips to safeguard your facebook account but your job isn’t done yet. Once you have detected that the link/post on your facebook wall is Malicious you should Mark it as SPAM so that the facebook support will stop it from spreading further and infecting other users.
If you have ever fallen victim of any such Malicious Scheme, please share your experience with all the users in form of comments so that others don’t fall victim of it.