Monday, April 26, 2010

Aliens exist ?? But don't talk to them ?? Says Stephen Hawking ?



British theoretical physicist Stephen Hawking has warned of the dangers of attempting to contact extra-terrestrial life. One of the world's leading scientists, he says that aliens almost certainly exist but mankind should be doing everything they can to avoid contact.
"To my mathematical brain, the numbers alone make thinking about aliens perfectly rational," he said. "The real challenge is to work out what aliens might actually be like."

His views are expressed in a new documentary made for the Discovery Channel. In it he points out that the universe has more than 100 billion galaxies, each containing hundreds of millions of stars. In such circumstances, Earth is unlikely to be the only planet where life has evolved, Hawking claims.

While many forms of life may be little more than microbes, Hawking says a few life forms could be intelligent and pose a threat to the human race. Aliens might simply raid Earth for its resources and then move on.

"We only have to look at ourselves to see how intelligent life might develop into something we wouldn’t want to meet. I imagine they might exist in massive ships, having used up all the resources from their home planet. Such advanced aliens would perhaps become nomads, looking to conquer and colonise whatever planets they can reach," Hawking says.

"If aliens ever visit us, I think the outcome would be much as when Christopher Columbus first landed in America, which didn’t turn out very well for the Native Americans," the scientist says. While there may be benign aliens out there, Hawkings says trying to make contact is "a little too risky".

It took three years to complete the documentary which was a major challenge as well as a triumph for 68 year old Hawking who is paralysed by motor neurone disease and has very limited powers of communication.

John Smithson, executive producer for Discovery, said, "He wanted to make a programme that was entertaining for a general audience as well as scientific and that’s a tough job, given the complexity of the ideas involved." 'Into The Universe with Stephen Hawking' started on the Discovery Channel yesterday [Sunday April 25]. The broadcaster has described the programme as a new kind of cosmology series.

"It takes the world's most famous scientific mind and sets it free, powered by the limitless possibilities of computer animation. Hawking gives us the ultimate guide to the universe, a ripping yarn based on real science, spanning the whole of space and time -- from the nature of the universe itself, to the chances of alien life, and the real possibility of time travel."

Aliens exist ?? But don't talk to them ?? Says Stephen Hawking ?



British theoretical physicist Stephen Hawking has warned of the dangers of attempting to contact extra-terrestrial life. One of the world's leading scientists, he says that aliens almost certainly exist but mankind should be doing everything they can to avoid contact.
"To my mathematical brain, the numbers alone make thinking about aliens perfectly rational," he said. "The real challenge is to work out what aliens might actually be like."

His views are expressed in a new documentary made for the Discovery Channel. In it he points out that the universe has more than 100 billion galaxies, each containing hundreds of millions of stars. In such circumstances, Earth is unlikely to be the only planet where life has evolved, Hawking claims.

While many forms of life may be little more than microbes, Hawking says a few life forms could be intelligent and pose a threat to the human race. Aliens might simply raid Earth for its resources and then move on.

"We only have to look at ourselves to see how intelligent life might develop into something we wouldn’t want to meet. I imagine they might exist in massive ships, having used up all the resources from their home planet. Such advanced aliens would perhaps become nomads, looking to conquer and colonise whatever planets they can reach," Hawking says.

"If aliens ever visit us, I think the outcome would be much as when Christopher Columbus first landed in America, which didn’t turn out very well for the Native Americans," the scientist says. While there may be benign aliens out there, Hawkings says trying to make contact is "a little too risky".

It took three years to complete the documentary which was a major challenge as well as a triumph for 68 year old Hawking who is paralysed by motor neurone disease and has very limited powers of communication.

John Smithson, executive producer for Discovery, said, "He wanted to make a programme that was entertaining for a general audience as well as scientific and that’s a tough job, given the complexity of the ideas involved." 'Into The Universe with Stephen Hawking' started on the Discovery Channel yesterday [Sunday April 25]. The broadcaster has described the programme as a new kind of cosmology series.

"It takes the world's most famous scientific mind and sets it free, powered by the limitless possibilities of computer animation. Hawking gives us the ultimate guide to the universe, a ripping yarn based on real science, spanning the whole of space and time -- from the nature of the universe itself, to the chances of alien life, and the real possibility of time travel."

Thursday, April 22, 2010

How to access Google for hackers


Google For Hackers! - The funniest videos clips are here

Kipkay shows you the secret Google H4x0r, or Google for hackers. 
On this page, everything is 
written in l33t (leet). 
The url is 
www.google.com/intl/xx-hacker/ 

How to hack, access, and control any online security camera

Believe it or not, there are security cameras and webcams that stream directly to the web, and are accessible for the world to see. How do you find them? It's as simple as doing a quick and easy Google search.
Type this into the 
Google search: inurl:/view/index.shtml or 
go straight to the security cam search.
It's as easy as that. Browse the online collections of security cameras around the world through Google. Once you've accessed all of these security systems, you can even hack and control some of them. Move them around to your choosing. This is great fun for anyone online, bored out of their minds. These webcams need to be seen! See if you can find the hilarious moments that sporadically pop up, or spy on your friends if you can. 

How to find your external IP address

 In this tutorial, we learn how to find an external IP address on your PC using different websites. First, find a website that will let you find your IP address for free. Once you find this site, it will not only give you your IP address, it will show you where you are in the world. Not only will it tell you where you are in the United States, it will tell you your exact coordinates and pin point your location on a map. There are many sites available online that will do this, a great site is IP address location or What is my IP address.

 

 

Your external IP address is that one that's used to explore the Internet.

- You can find out what your IP address is by visiting free sites that provide that information.

- Visit www.find-ip-address.org. Note that the site also pinpoints your location, your host, your time zone and even latitude and longitude.

- You can also try www.whatismyipaddress.com

- You can also get your IP address at www.ipaddresslocation.org

- Your IP address can be hidden and we'll show that in another tutorial


How to disable Windows Genuine Advantage notification




In this how-to video, you will learn how to remove the Windows genuine advantage notification from your operating system. First, open my computer and go to the windows folder. Look for the system32 folder and open it. Search for WGAtray.exe. Select both wgatray.exe and wgalogin and delete. Next, go to the run command and type in regedit. Click okay to open the program. Now, back up the registry. Once this is done, it will be safe to edit the registry. Now, navigate to hkeylocalmachine, software, and scroll down to Microsoft. Go to windowsnt, currentversion, and go to winlogin. Lastly, go to notifywgalogin. Right click this folder and delete it. Restart your system to complete the task. This video shows you how to easily disable the notifications from your system. 

How to hack a TV into a computer monitor

 

 

 

Want to watch movies from your computer on a TV? What about just using your television as another monitor? Find out how to connect you TV to your computer and convert it into a monitor. 

How to access Google for hackers


Google For Hackers! - The funniest videos clips are here

Kipkay shows you the secret Google H4x0r, or Google for hackers. 
On this page, everything is 
written in l33t (leet). 
The url is 
www.google.com/intl/xx-hacker/ 

How to hack, access, and control any online security camera

Believe it or not, there are security cameras and webcams that stream directly to the web, and are accessible for the world to see. How do you find them? It's as simple as doing a quick and easy Google search.
Type this into the 
Google search: inurl:/view/index.shtml or 
go straight to the security cam search.
It's as easy as that. Browse the online collections of security cameras around the world through Google. Once you've accessed all of these security systems, you can even hack and control some of them. Move them around to your choosing. This is great fun for anyone online, bored out of their minds. These webcams need to be seen! See if you can find the hilarious moments that sporadically pop up, or spy on your friends if you can. 

How to find your external IP address

 In this tutorial, we learn how to find an external IP address on your PC using different websites. First, find a website that will let you find your IP address for free. Once you find this site, it will not only give you your IP address, it will show you where you are in the world. Not only will it tell you where you are in the United States, it will tell you your exact coordinates and pin point your location on a map. There are many sites available online that will do this, a great site is IP address location or What is my IP address.

 

 

Your external IP address is that one that's used to explore the Internet.

- You can find out what your IP address is by visiting free sites that provide that information.

- Visit www.find-ip-address.org. Note that the site also pinpoints your location, your host, your time zone and even latitude and longitude.

- You can also try www.whatismyipaddress.com

- You can also get your IP address at www.ipaddresslocation.org

- Your IP address can be hidden and we'll show that in another tutorial


How to disable Windows Genuine Advantage notification




In this how-to video, you will learn how to remove the Windows genuine advantage notification from your operating system. First, open my computer and go to the windows folder. Look for the system32 folder and open it. Search for WGAtray.exe. Select both wgatray.exe and wgalogin and delete. Next, go to the run command and type in regedit. Click okay to open the program. Now, back up the registry. Once this is done, it will be safe to edit the registry. Now, navigate to hkeylocalmachine, software, and scroll down to Microsoft. Go to windowsnt, currentversion, and go to winlogin. Lastly, go to notifywgalogin. Right click this folder and delete it. Restart your system to complete the task. This video shows you how to easily disable the notifications from your system. 

How to hack a TV into a computer monitor

 

 

 

Want to watch movies from your computer on a TV? What about just using your television as another monitor? Find out how to connect you TV to your computer and convert it into a monitor. 

Hack: Android Running on iPhone ???

David Wang of the iPhone Dev Team has achieved what is considered quite a jaw-dropping hacking feat. Yesterday Wang posted a video of Google's Android operating system up and running on an iPhone. 



"The Android-on-iPhone hack is a notable technical accomplishment, but it's not likely to transform the industry or alter what mainstream users do. It does indicate, though, that the hacking ethos is alive and well despite Apple's attempts to keep its mobile phone locked down.
Wang has been working since at least 2008 to boot Linux on the iPhone, according to his blog. The demonstration uses a first-generation iPhone, but newer models should be supported at some point.
'It should be pretty simple to port forward to the iPhone 3G. The 3GS will take more work,' Wang said on the blog. 'Hopefully with all this groundwork laid out, we can make Android a real alternative or supplement for iPhone users. Maybe we can finally get Flash. ;)'"

Hack: Android Running on iPhone ???

David Wang of the iPhone Dev Team has achieved what is considered quite a jaw-dropping hacking feat. Yesterday Wang posted a video of Google's Android operating system up and running on an iPhone. 



"The Android-on-iPhone hack is a notable technical accomplishment, but it's not likely to transform the industry or alter what mainstream users do. It does indicate, though, that the hacking ethos is alive and well despite Apple's attempts to keep its mobile phone locked down.
Wang has been working since at least 2008 to boot Linux on the iPhone, according to his blog. The demonstration uses a first-generation iPhone, but newer models should be supported at some point.
'It should be pretty simple to port forward to the iPhone 3G. The 3GS will take more work,' Wang said on the blog. 'Hopefully with all this groundwork laid out, we can make Android a real alternative or supplement for iPhone users. Maybe we can finally get Flash. ;)'"

McAfee antivirus program goes freezes computers ???


Computers in companies, hospitals and schools around the world got stuck repeatedly rebooting themselves Wednesday after an antivirus program identified a normal Windows file as a virus.

McAfee Inc. confirmed that a software update it posted at 9 a.m. Eastern time caused its antivirus program for corporate customers to misidentify a harmless file. It has posted a replacement update for download.

McAfee could not say how many computers were affected, but judging by online postings, the number was at least in the thousands and possibly in the hundreds of thousands.

McAfee said it did not appear that consumer versions of its software caused similar problems. It is investigating how the error happened "and will take measures" to prevent it from recurring, the company said in a statement.

The computer problem forced about a third of the hospitals in Rhode Island to postpone elective surgeries and stop treating patients without traumas in emergency rooms, said Nancy Jean, a spokeswoman for the Lifespan system of hospitals. The system includes Rhode Island Hospital, the state's largest, and Newport Hospital. Jean said patients who required treatment for gunshot wounds, car accidents, blunt trauma and other potentially fatal injuries were still being admitted to the emergency rooms.

In Kentucky, state police were told to shut down the computers in their patrol cars as technicians tried to fix the problem. The National Science Foundation headquarters in Arlington, Va., also lost computer access.

Intel Corp. appeared to be among the victims, according to employee posts on Twitter. Intel did not immediately return calls for comment.

Peter Juvinall, systems administrator at Illinois State University in Normal, said that when the first computer started rebooting it quickly became evident that it was a major problem, affecting dozens of computers at the College of Business alone.

"I originally thought it was a virus," he said. When the tech support people concluded McAfee's update was to blame, they stopped further downloads of the faulty software update and started shuttling from computer to computer to get the machines working again.

In many offices, personal attention to each PC from a technician appeared to be the only way to fix the problem because the computers weren't receptive to remote software updates when stuck in the reboot cycle. That slowed the recovery.

It's not uncommon for antivirus programs to misidentify legitimate files as viruses. Last month, antivirus software from Bitdefender locked up PCs running several different versions of Windows.

However, the scale of this outage was unusual, said Mike Rothman, president of computer security firm

"It looks to be a train wreck," Rothman said. Securosis.

McAfee antivirus program goes freezes computers ???


Computers in companies, hospitals and schools around the world got stuck repeatedly rebooting themselves Wednesday after an antivirus program identified a normal Windows file as a virus.

McAfee Inc. confirmed that a software update it posted at 9 a.m. Eastern time caused its antivirus program for corporate customers to misidentify a harmless file. It has posted a replacement update for download.

McAfee could not say how many computers were affected, but judging by online postings, the number was at least in the thousands and possibly in the hundreds of thousands.

McAfee said it did not appear that consumer versions of its software caused similar problems. It is investigating how the error happened "and will take measures" to prevent it from recurring, the company said in a statement.

The computer problem forced about a third of the hospitals in Rhode Island to postpone elective surgeries and stop treating patients without traumas in emergency rooms, said Nancy Jean, a spokeswoman for the Lifespan system of hospitals. The system includes Rhode Island Hospital, the state's largest, and Newport Hospital. Jean said patients who required treatment for gunshot wounds, car accidents, blunt trauma and other potentially fatal injuries were still being admitted to the emergency rooms.

In Kentucky, state police were told to shut down the computers in their patrol cars as technicians tried to fix the problem. The National Science Foundation headquarters in Arlington, Va., also lost computer access.

Intel Corp. appeared to be among the victims, according to employee posts on Twitter. Intel did not immediately return calls for comment.

Peter Juvinall, systems administrator at Illinois State University in Normal, said that when the first computer started rebooting it quickly became evident that it was a major problem, affecting dozens of computers at the College of Business alone.

"I originally thought it was a virus," he said. When the tech support people concluded McAfee's update was to blame, they stopped further downloads of the faulty software update and started shuttling from computer to computer to get the machines working again.

In many offices, personal attention to each PC from a technician appeared to be the only way to fix the problem because the computers weren't receptive to remote software updates when stuck in the reboot cycle. That slowed the recovery.

It's not uncommon for antivirus programs to misidentify legitimate files as viruses. Last month, antivirus software from Bitdefender locked up PCs running several different versions of Windows.

However, the scale of this outage was unusual, said Mike Rothman, president of computer security firm

"It looks to be a train wreck," Rothman said. Securosis.

Sunday, April 11, 2010

UFOs and fighter jets hard at play down under, March 18th 2010

A UFO gave chase to a fighter jet in Australia on this mid day of March 18th.

 
  
The incident was reported to the Sacramento UFO Examiner via email by an individual  known by many enthusiast as  orgasmictomato.  "JIM"  is responsible for presenting UFOs in a different light and understanding of the phenomena, perhaps far beyond most people. Jim performed an analysis on our Sacramento Image and has now caught one of these objects giving chase to a fighter jet.
This would not be the first time we have seen something like this. Just the other day on March 15th we also captured a few UFO's buzzing a fighter jet out of Beale Air force Base as vaguely seen on our You Channel.  The following footage taken by the orgasmictomato is hard to match, check it out below.

Here is the statement that accompanied the video footage from this day of March 18th 2010

At just after 1 o'clock Thursday 18th march as editing at my computer a sound of a jet alerted me to grab my camera and video the following footage from my verandah. The RAAF jet heading westward toward Singleton, flying low over the river was caught on video for 13 seconds, as I looked up from loosing the jet from view to the trees I caught sight of the following entities traversing from north to south in the western sky. As videoing it I assume it sighted the RAAF jet and faded, then "blinked out" as seen on this video.
The units were not sighted again as searching the sky for the next 20 minutes failed to sight either of them again.

The DoD acknowledged aircraft in the location but would not comment as to their activity in regard to the UFO / Dimensional Entities sighting, radar detection or any other information I requested.

Since then a radio interview on Sydney 2sm station with Graeme Gilbert was carried out, the local Mercury Newspaper has the story coming out tomorrow and TV stations have preview stills and awaiting confirmation from them.
My night session after the interview was very busy as excitement was apparent with the entities aware of the possibility of acknowledgment and a dozen or more entities displayed for me, the video still to be run and sighted as yet. On one instance a entity posed in my laser beam for near half a minute and things were slightly erratic. More when the video is viewed. Thank you.

Thanks Jim and to all you enthusiasts out there who contribute to the exposure process.

Go here for missed articles:

UFOs and fighter jets hard at play down under, March 18th 2010

A UFO gave chase to a fighter jet in Australia on this mid day of March 18th.

 
  
The incident was reported to the Sacramento UFO Examiner via email by an individual  known by many enthusiast as  orgasmictomato.  "JIM"  is responsible for presenting UFOs in a different light and understanding of the phenomena, perhaps far beyond most people. Jim performed an analysis on our Sacramento Image and has now caught one of these objects giving chase to a fighter jet.
This would not be the first time we have seen something like this. Just the other day on March 15th we also captured a few UFO's buzzing a fighter jet out of Beale Air force Base as vaguely seen on our You Channel.  The following footage taken by the orgasmictomato is hard to match, check it out below.

Here is the statement that accompanied the video footage from this day of March 18th 2010

At just after 1 o'clock Thursday 18th march as editing at my computer a sound of a jet alerted me to grab my camera and video the following footage from my verandah. The RAAF jet heading westward toward Singleton, flying low over the river was caught on video for 13 seconds, as I looked up from loosing the jet from view to the trees I caught sight of the following entities traversing from north to south in the western sky. As videoing it I assume it sighted the RAAF jet and faded, then "blinked out" as seen on this video.
The units were not sighted again as searching the sky for the next 20 minutes failed to sight either of them again.

The DoD acknowledged aircraft in the location but would not comment as to their activity in regard to the UFO / Dimensional Entities sighting, radar detection or any other information I requested.

Since then a radio interview on Sydney 2sm station with Graeme Gilbert was carried out, the local Mercury Newspaper has the story coming out tomorrow and TV stations have preview stills and awaiting confirmation from them.
My night session after the interview was very busy as excitement was apparent with the entities aware of the possibility of acknowledgment and a dozen or more entities displayed for me, the video still to be run and sighted as yet. On one instance a entity posed in my laser beam for near half a minute and things were slightly erratic. More when the video is viewed. Thank you.

Thanks Jim and to all you enthusiasts out there who contribute to the exposure process.

Go here for missed articles:

Saturday, April 10, 2010

Hacking Tools for TRADE ???

Hacking Simplified - For Those Who Want to Learn Things From the Scratch

This is just some of the few

u may contribute too !!


The links here will take u directly to the related website
~cheers~


Tools of the trade


These are some tools that are extremely useful, But remember i am providing the knowledge and how you use them is up to you. Also if you don't know how to you these you should decently do some research, There is no tool that will just Hack for you, find exploits on your own is half the fun. these tools if not used properly can get you n a lot of trouble.

› Tools of the trade.


DeCSS 1.2b
is used as a cracking tool, is highly engineered software that has been designed in order to modify the other software with an intention to remove the usage restriction. A worth mentioning instance is a "patch generator", which replaces bytes at specific location of a file, giving it a licensed version. The DeCSS 1.2b was originated in the year 1999, October and requires storage of minimum 253 KB. Coldlife 4.0is another tool for website hacking that falls in the category of flooder. This is a program that has been designed to overload the connection by certain mechanisms like a fast pinging that causes a sudden DoS attack.



  • Cain and Able The top password recovery tool for Windows UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.







  • Wireshark : Sniffing the glue that holds the Internet together
    Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. A tcpdump-like console version named tethereal is included. One word of caution is that Ethereal has suffered from dozens of remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or hostile networks (such as security conferences).








  • Aircrack : The fastest available WEP/WPA cracking tool
    Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).








  • Metasploit Framework : Hack the Planet
    Metasploit took the security world by storm when it was released in 2004. No other new tool even broke into the top 15 of this list, yet Metasploit comes in at #5, ahead of many well-loved tools that have been developed for more than a decade. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their online exploit building demo. This makes writing your own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality. Similar professional exploitation tools, such as Core Impact and Canvas already existed for wealthy users on all sides of the ethical spectrum. Metasploit simply brought this capability to the masses.








  • NMAP THIS IS PROBABLY THE MOST IMPORTANTOF ALL This is a Port scanner, a very good one, it will do too many things to list i suggest you check it out.





  • There are many tools around.

    let me give u some real direct links


    Tools


    These tools can be used for good and bad. They are all readily available on the Web. So,
    if you're one of the good guys : find out how long your passwords will resist a dictionary or brute force attack, see what information your computers would reveil when asked the right way, and check your network before the bad guys do ...
    network tools Password tools Get some practise
    Online DNS lookup, Whois, a.o. KLOTH Services
    WWW implementations of common network tools such as whois and nslookup / dig. Although they're in fact network troubleshooting tools, services / tools like these are often used to gather information about a 'target' or 'victim' (re. Hacking Exposed : a mini howto). Which goes to show that toold can be used for good and for bad ...
    nmap www.insecure.org
    simply the best port scanner, with some added functionality (e.g. remote OS guess)
    nessus www.nessus.org
    extremely complete vulnarability checker / security audit : scans a remote system for open ports (using nmap), then attempts to exploit the services listening at those ports and returns a detailed report. Open Source Quality.
    hping www.hping.org
    when ping and traceroute return timeouts because you can't trace 'behind' a router or firewall, hping might help.
    Same Spade www.samspade.org
    client for multiple protocols and integrated network query tool for Windows 95, 98, NT & Windows 2000
    Look@Lan www.lookatlan.com
    freeware network enumeration and monitoring tool
    NBTEnum, NetBIOS User Enumartion Tool, copy available at packetstorm.linuxsecurity.org
    nbtenum and other enumeration tools should be available at , but that site is apparently offline
    Hacking Exposed : the tools

    the tools discussed in the book "Hacking Exposed"
    Arne Vidstrom : The Toolbox - Freeware security tools for Windows www.ntsecurity.nu, Arne Vidstrom
    collection of freeware security tools, written by Arne Vidstrom, including a.o. a key logger, ping sweep, a tool to enumerate user accounts on a Windows system, a Microsoft SQL Server dictionary attack...
    Wireless Security software Hideaway.Net
    tools that can locate, audit, and even sniff wireless networks
    Unix Penetration Rootkits Packet Storm
    a collection of UNIX / Linux penetration rootkits
    Windows NT Penetration Tools Packet Storm
    a collection of Windows NT (2000, XP, etc.) penetration tools
    Astalavista Tool Box Astalavista Secutity Group
    An extensive collection of enumeration, sniffing cracking and exploiting tools.
    Oreilly Network tools

    Collection of network hack and crack tools, mainly tar archives
    www.insecure.org www.insecure.org
    www.insecure.org, of nmap fame, also caries extensive lists and (links to) forums on exploits, penetration testing, (exploitable) bugs, know security holes etc
    Brutus

    Password cracker for HTTP (Basic Authentication), HTTP (HTML Form/CGI), POP3, FTP, SMB, Telnet servers. Originally created to check routers for default passwords. Brute Force / Dictionary approach
    Hydra The Hacker's Choice
    THC-Hydra - login hacker for Samba, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support and is included in Nessus.
    l0phtcrack

    Once the best tool for Windows NT cracking, and freely available. Now commercialized by Symantec. You may want to try and get a copy from astalavista :-)
    John The Ripper

    The famous John The Ripper password cracker
    Cain and Able

    finds passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols
    TSCrack

    Password Cracker for Windows Terminal Server. TSCrack is said to use Artificial Intelligence / Artificial Neural Networks to be able to interprete de bitmaps sent by the terminal server and generate an appropriate response.
    "I forgot the Administrator password"

    'Linux on a floppy' boot disk that allows to blank out the administrator password and reset accounts on Windows NT systems
    SIW - System Information for Windows

    Not a password cracker per se, but a tool to collect system information on Windows systems. As it happens, this system information includes cached credentials, product keys and other 'secrets'
    Default Passwords

    Who says you need to crack anything ? Lot's of network devices are installed without any configuration, so they still have the user name / passwords that the vendor put there. And these passwords are very well known ...


    one of my favourite links for thr SQL injection

    Hacking Tools for TRADE ???

    Hacking Simplified - For Those Who Want to Learn Things From the Scratch

    This is just some of the few

    u may contribute too !!


    The links here will take u directly to the related website
    ~cheers~


    Tools of the trade


    These are some tools that are extremely useful, But remember i am providing the knowledge and how you use them is up to you. Also if you don't know how to you these you should decently do some research, There is no tool that will just Hack for you, find exploits on your own is half the fun. these tools if not used properly can get you n a lot of trouble.

    › Tools of the trade.


    DeCSS 1.2b
    is used as a cracking tool, is highly engineered software that has been designed in order to modify the other software with an intention to remove the usage restriction. A worth mentioning instance is a "patch generator", which replaces bytes at specific location of a file, giving it a licensed version. The DeCSS 1.2b was originated in the year 1999, October and requires storage of minimum 253 KB. Coldlife 4.0is another tool for website hacking that falls in the category of flooder. This is a program that has been designed to overload the connection by certain mechanisms like a fast pinging that causes a sudden DoS attack.



  • Cain and Able The top password recovery tool for Windows UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.







  • Wireshark : Sniffing the glue that holds the Internet together
    Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. A tcpdump-like console version named tethereal is included. One word of caution is that Ethereal has suffered from dozens of remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or hostile networks (such as security conferences).








  • Aircrack : The fastest available WEP/WPA cracking tool
    Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).








  • Metasploit Framework : Hack the Planet
    Metasploit took the security world by storm when it was released in 2004. No other new tool even broke into the top 15 of this list, yet Metasploit comes in at #5, ahead of many well-loved tools that have been developed for more than a decade. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their online exploit building demo. This makes writing your own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality. Similar professional exploitation tools, such as Core Impact and Canvas already existed for wealthy users on all sides of the ethical spectrum. Metasploit simply brought this capability to the masses.








  • NMAP THIS IS PROBABLY THE MOST IMPORTANTOF ALL This is a Port scanner, a very good one, it will do too many things to list i suggest you check it out.





  • There are many tools around.

    let me give u some real direct links


    Tools


    These tools can be used for good and bad. They are all readily available on the Web. So,
    if you're one of the good guys : find out how long your passwords will resist a dictionary or brute force attack, see what information your computers would reveil when asked the right way, and check your network before the bad guys do ...
    network tools Password tools Get some practise
    Online DNS lookup, Whois, a.o. KLOTH Services
    WWW implementations of common network tools such as whois and nslookup / dig. Although they're in fact network troubleshooting tools, services / tools like these are often used to gather information about a 'target' or 'victim' (re. Hacking Exposed : a mini howto). Which goes to show that toold can be used for good and for bad ...
    nmap www.insecure.org
    simply the best port scanner, with some added functionality (e.g. remote OS guess)
    nessus www.nessus.org
    extremely complete vulnarability checker / security audit : scans a remote system for open ports (using nmap), then attempts to exploit the services listening at those ports and returns a detailed report. Open Source Quality.
    hping www.hping.org
    when ping and traceroute return timeouts because you can't trace 'behind' a router or firewall, hping might help.
    Same Spade www.samspade.org
    client for multiple protocols and integrated network query tool for Windows 95, 98, NT & Windows 2000
    Look@Lan www.lookatlan.com
    freeware network enumeration and monitoring tool
    NBTEnum, NetBIOS User Enumartion Tool, copy available at packetstorm.linuxsecurity.org
    nbtenum and other enumeration tools should be available at , but that site is apparently offline
    Hacking Exposed : the tools

    the tools discussed in the book "Hacking Exposed"
    Arne Vidstrom : The Toolbox - Freeware security tools for Windows www.ntsecurity.nu, Arne Vidstrom
    collection of freeware security tools, written by Arne Vidstrom, including a.o. a key logger, ping sweep, a tool to enumerate user accounts on a Windows system, a Microsoft SQL Server dictionary attack...
    Wireless Security software Hideaway.Net
    tools that can locate, audit, and even sniff wireless networks
    Unix Penetration Rootkits Packet Storm
    a collection of UNIX / Linux penetration rootkits
    Windows NT Penetration Tools Packet Storm
    a collection of Windows NT (2000, XP, etc.) penetration tools
    Astalavista Tool Box Astalavista Secutity Group
    An extensive collection of enumeration, sniffing cracking and exploiting tools.
    Oreilly Network tools

    Collection of network hack and crack tools, mainly tar archives
    www.insecure.org www.insecure.org
    www.insecure.org, of nmap fame, also caries extensive lists and (links to) forums on exploits, penetration testing, (exploitable) bugs, know security holes etc
    Brutus

    Password cracker for HTTP (Basic Authentication), HTTP (HTML Form/CGI), POP3, FTP, SMB, Telnet servers. Originally created to check routers for default passwords. Brute Force / Dictionary approach
    Hydra The Hacker's Choice
    THC-Hydra - login hacker for Samba, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support and is included in Nessus.
    l0phtcrack

    Once the best tool for Windows NT cracking, and freely available. Now commercialized by Symantec. You may want to try and get a copy from astalavista :-)
    John The Ripper

    The famous John The Ripper password cracker
    Cain and Able

    finds passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols
    TSCrack

    Password Cracker for Windows Terminal Server. TSCrack is said to use Artificial Intelligence / Artificial Neural Networks to be able to interprete de bitmaps sent by the terminal server and generate an appropriate response.
    "I forgot the Administrator password"

    'Linux on a floppy' boot disk that allows to blank out the administrator password and reset accounts on Windows NT systems
    SIW - System Information for Windows

    Not a password cracker per se, but a tool to collect system information on Windows systems. As it happens, this system information includes cached credentials, product keys and other 'secrets'
    Default Passwords

    Who says you need to crack anything ? Lot's of network devices are installed without any configuration, so they still have the user name / passwords that the vendor put there. And these passwords are very well known ...


    one of my favourite links for thr SQL injection

    Thursday, April 8, 2010

    GhostNet: China-based hacking targets India government

    GhostNet report by Information Warfare Monitor group
    A screenshot of the GhostNet report released by the Information Warfare Monitor group in Canada. (Suman Srinivasan/Epoch Times)

















    The people who uncovered GhostNet, an extensive cyber espionage network that targeted the Tibetan exile community, are back with a sequel. Starting with an infected machine that was found during that investigation, an international team of researchers has uncovered a completely separate network that primarily targeted the Indian government, and turned up some classified documents that had been obtained by the hackers. By reconstructing the network, the team was able to trace things back to the hacking community in Chengdu, China.
    The work involved a collaboration between the Information Warfare Monitor and the Shadowserver Foundation, but, over the course of its work, involved dozens of other security groups and experts. It also benefitted from extensive cooperation with the Office of His Holiness the Dalai Lama, which had previously approached the security researchers in response to security lapses that unearthed GhostNet. The researchers take what they term a "fusion methodology," which is basically a combination of fieldwork—studying infected systems in situ—with standard security approaches.
    The investigation grew out of GhostNet in two ways. As part of their efforts to help the Tibetan exile community secure its systems, the researchers were monitoring the network used by the OHHDL. As part of that monitoring, they uncovered an malware-infected machine that attempted to transfer documents to a control server.
    Separately, they found that most of the control servers identified through the GhostNet investigation were taken down after their report on it was released. As the domain registrations on these servers lapsed, the researchers grabbed them for themselves, and created what's termed a DNS sinkhole, in which requests from compromised machines were directed to one under the researchers' control, allowing a study of the command-and-control communications.
    Over time, the authors were able to trace communications back and develop a reasonable picture of a computer espionage network that was separate from, but partially overlapped with, the GhostNet. It turns out that, just as hackers count on regular users having moments of carelessness, they suffer from the same problem, which allowed the researchers to view the complete list of infected systems four times, and obtain documents stolen by the hackers twice.
    In general, machines were compromised using low-tech methods, primarily via malware that travelled as Microsoft Office or PDF files, and used relatively well-known exploits. Once on a machine, however, the malware would communicate with a specific Yahoo Mail account, which allowed it to receive more sophisticated software via attachments, and alert the network to its identity.
    The command-and-control network operated primarily through free webhosting services, many of them operating from within the US. As these systems came and went, various social networking services—Google and Baidu blogs, Twitter, etc.—were used to supply the infected systems with a list of alternate hosts. Fortunately for the researchers, at times when a lot of the free webhosts were taken out of action, the social networking updates revealed a core of servers that remained constant; these were exclusively hosted within China.
    The list of infected systems was pretty variable, and included US institutions like NYU and Honeywell, and at least one machine in China that the researchers think was used for testing the system. But the majority of infected machines were associated with India. Some of these were commercial, like the Times of India and the New Delhi rail station, but the list included Indian embassies and consulates.
    The documents retrieved by the researchers include everything from information on missile systems being developed by India to a list of visas issued by Indian embassies. That latter item may have implications for NATO's Afghanistan mission, since many of the officials from NATO countries travel via India. Several of these were marked classified or confidential, and some provided internal security evaluations in regions where India is dealing with armed insurgency.
    Aside from the fact that the core of the network resides in China, there is some circumstantial evidence linking the network to the hacking community that exists in Chengdu. A blog that follows Chinese hacking activity independently identified the e-mail address used to register one of the domains that turned up as part of the new espionage network. The address turned up in several popular Chinese hacking forums, but also showed up in association with advertisements for apartment rentals in Chengdu. Several of the command-and-control e-mails sent to the Yahoo account also originated from computers in the region.
    So, does that mean the Chinese government is behind the espionage? Chengdu is the site of an Army technical reconnaissance bureau, which would be consistent with direct involvement. But, it's quite near Chongquing, a city with thriving criminal syndicates, and several of the servers were also traced to that city.
    Complicating matters further, China is one of the governments that has been accused of hiring digital privateers, private citizens that engage in hacking while remaining independent of the central government. The report notes that private citizens might engage in these activities under the expectation that the documents, once obtained, could be sold to the government, even if the government didn't authorize the intrusions.
    In any case, the report's authors mentioned that the Chinese CERT organization was cooperating with attempts to shut down the network.
    In addition to providing an interesting window into the world of cyberespionage, the authors use the report to argue that the chaotic mix of private hackers and government interests highlights the need to develop some international norms that govern acceptable online behavior. In that sense, they seem to be on the same page as the authors of the National Academies of Science report on cyberdeterrance we covered over the weekend. 

    cyber security seriously ????

    The Chinese have a history of unleashing their cyber spies on the rest of the world. In March 2009 its biggest ever spying operation - Ghostnet - was exposed, and was found to have infiltrated vital systems in 103 countries, including India. One of the targets of Ghostnet was the Tibetan leader, the Dalai Lama.

    Therefore, it is not surprising that a Canadian-led research team has uncovered another Chinese cyber spying ring based in Sichuan province that was doing exactly the same.
    This time around, the operation was even more damaging to Indian interests than Ghostnet, as it routinely gained access to key Indian government departments and embassies around the world and hacked several sensitive documents.
    What is surprising is that the Indian government, given the gravity of the situation created by Ghostnet, had not even been aware that such a spy ring existed and had not learned any lesson from China's previous incursions into our computer systems.
    In the 21st century and beyond, a war's theatre of operation will not be restricted to the physical battlefields. This is not an epiphany; but an obvious fact. Yet, it has to be reiterated that the government of India faces a greater challenge in securing its key documents and data that are stored in our now- shown- to- be vulnerable computer systems.
    Now that the spy ring's existence and its activity has been proven, it is up to the National Technical Research Organisation which reportedly has some of the best trained personnel, as well as the most effective equipment, to nullify any gains that would have accrued to the Chinese spy ring.
    It is also incumbent upon the Indian government as well as the defence ministry to ensure that no further damage is caused by securing all its locations and data. This time around, we had better learn our lessons well.

    GhostNet: Massive China-Based Internet Spy Network Unearthed

    NEW YORK—On March 29, a Canadian research group unveiled a chilling report confirming fears that Chinese dissident communities have harbored for years—the presence of a vast, unrivaled online spy network that is able to track highly specific data and send it back to control servers based in China.
    The research was conducted by the Information Warfare Monitor, a public-private research group that comprises researchers from two institutes in Canada: the SecDev Group, an operational think tank based in Ottawa, and the Citizen Lab at the Munk Center for International Studies, University of Toronto.
    Their 53-page report, titled “Tracking ‘GhostNet’: Investigating a Cyber Espionage Network,” documents their findings of a global online espionage network that relies on cleverly forged e-mails to infect target computers, control them, and then send reports back to control servers, most of which are based in China.
    The group reported that their work started when they began investigating computers in Tibetan exile centers in Dharmasala, India, for possible compromises. The work they did “led to the discovery of insecure, web-based interfaces to four control servers” which allowed attackers to control compromised machines.
    Scouting these control servers resulted in their finding a vast network of compromised computers across the world—the report counted “at least 1,295 infected computers in 103 countries.”
    Most interestingly, a large number of compromised computers were extremely high-profile targets: close to 30 percent of the compromised computers belonged to “ministries of foreign affairs of Iran, Bangladesh, Latvia, Indonesia, Philippines, Brunei, Barbados, and Bhutan; embassies of India, South Korea, Indonesia, Romania, Cyprus, Malta, Thailand, Taiwan, Portugal, Germany, and Pakistan; the ASEAN (Association of Southeast Asian Nations) Secretariat, SAARC (South Asian Association for Regional Cooperation), and the Asian Development Bank; news organizations; and an unclassified computer located at NATO headquarters.”

    Leveraging Social Means

    The researchers found that GhostNet spread by infecting computers with a trojan known as “gh0st RAT” that gave the attackers complete control over the infected system. They found that the Trojan was capable of “taking full control of infected computers, including searching and downloading specific files, and covertly operating attached devices, including microphones and web cameras.”
    Such complete takeovers would allow the attackers to even hear and see events happening on the compromised computers.
    The Trojans were obfuscated malware, resulting in their being difficult to detect in commercial anti-virus and anti-malware programs. “Only 11 of the 34 anti-virus programs provided by Virus Total recognized the malware embedded in the document. Attackers often use executable packers to obfuscate their malicious code in order to avoid detection by anti-virus software,” the report said.
    The attackers used “social means” to spread the Trojan. For instance, “contextually relevant emails are sent to specific targets” and these e-mails, once opened, installed the Trojan on the unsuspecting user’s computer.

    Targeting Chinese Dissidents?

    The unearthed global Trojan network is only the latest in a series of massive cyber-attacks that have been based out of Communist-ruled China. In 2003, the United States Department of Defense (DoD) and numerous defense companies came under heavy attack in an operation that the DoD called “Titan Rain,” and has been under attack ever since.
    Attacks originating from China have also targeted non-governmental groups and Chinese dissident groups. The report said that the attacks have targeted “organizations advocating on the conflict in the Darfur region of Sudan, Tibetan groups active in India, and the Falun Gong.”
    The Citizen Lab has previously been involved in other studies involved Chinese cyber espionage. In October 2008, they published a report called “Breaching Trust,” which focused on the behind-the-scenes surveillance of chat sessions by TOM-Skype in China. The lab is also behind “psiphon,” which allows uncensored Internet access in countries where the Internet is filtered.