Monday, July 18, 2011

Hacker group launches online Social Network ??

 A screenshot of anonplus.com - DC

Infamous hacker group Anonymous has launched its own social network after being rejected by Google's freshly-launched online community.
"Today we welcome you to begin anew," the hacker alliance said at the website anonplus.com, which it described as a platform to distribute information.
"Welcome to the Revolution - a new social network where there is no fear...of censorship...of blackout...nor of holding back."
The drive to build a social network came after the Anonymous account was suspended at the Google+ online community, which was launched last month by the Internet giant as a challenge to Facebook.
A message on the anonplus.com website promised that the Anonymous social network would be for everyone and listed online monikers of developers taking part in the project.
Anonymous, which rose to infamy last year with cyber attacks in support of controversial whistle-blower website WikiLeaks, posted the suspension notice from Google on its blog at Tumblr.
The group has been linked to attacks on Visa, Mastercard and Paypal, which blocked donations to WikiLeaks after it published thousands of US diplomatic cables.
Early this year, Anonymous took credit for breaking into the website of HBGary Federal because the firm was working with federal agents to expose the hackers' identities.
Anonymous last week released a trove of military email addresses and passwords it claimed to have plundered from the network of US defense consulting firm Booz Allen Hamilton

Investigative Innovation: Anonymous and Presstorm Present – Anon+

As some of you know [YourAnonNews] got banned from Google+  due to some of their content. What they didn’t know at the time is that they were just one of a handfull of Anonymous accounts that were silenced. This is the sad fact that happens across the internet when you march to a different beat of the drum. We’ve all heard the stories of activists being banned from FaceBook, Twitter, and Governments blocking their people from these sites as well through organized black outs. That day has came to an end. Not only did a few people organized an Operation against Google+, but we have started to build our own Social Network.
This is one social network that will not tolerate being shut down, censored, or oppressed – even in the face of blackout.
We the people have had enough…enough of governments and corporations saying what’s best for us – what’s safe for our minds.
The sheep era is over.  The interwebz are no longer your prison. 

Welcome to Anon+

Thursday, July 14, 2011

ClubHack Mag is 1st Indian "HACKING" Magazine

According to NULL Community:
    All, after a slight delay, here we are with issue18 of ClubHack Mag for the month of July2011. Like most of the times, this issue is also theme based and the theme for issue18 is Metasploit.We have some good news for our readers. CHMag is now partners with Hakin9 and PenTestMag. Also starting from June 2011, CHMag is available in ePUB format also for eBook readers like Kindle & iPad.This issue covers following articles:-0x00 Tech Gyan - Using Metasploit with Nessus Bridge on Ubuntu0x01 Tool Gyan - Armitage – The Ultimate Attack Platform for Metasploit0x02 Mom's Guide - Penetration Testing with Metasploit Framework0x03 Legal Gyan - Trademark Law and Cyberspace0x04 Matriux Vibhag - The Exploitation Ka Baap MSFCheck http://chmag.in for articles.PDF version can be download from:- http://chmag.in/issue/jul2011.pdfHope you'll enjoy the magazine. Please send your suggestions, feedback toinfo@chmag.inClubHack Mag is also seeking submissions for next issue, Issue19-August 2011. Topics of interest include, but not limited to:-
    Mobile (Cellular), VOIP Exploitation and SecurityFirewall Evasion techniquesMalware AttacksSniffingForensicsProtocol Security and Exploitation
According to official website chmag.in:

Coming back to this issue, this time the theme is Metasploit.
Yes, the "ultimate tool" in every hacker's arsenal! This issue covers the topics such as basics of Metasploit in Mom's guide, the Metasploit GUI - Armitage in Tools Gyan, How to run nessus from within Metasploit in Tech Gyan, exploiting a machine using Metasploit in Matriux Vibhag and Trademark Law and Cyberspace in Legal Gyan.
Starting with June 2011 issue, CHMag will be available in ePUB format which readers can download on their kindle/ipad/other ebook readers. Thanks to our new online friend Jason Barnett for volunteering for this initiative. To download epub check chmag.in Do let us know what topics you would like us to cover. We are also open to criticism, it helps us to improve :) And of course you can send your articles also to info@chmag.in We love to publish ;)
ALL ISSUES

Saturday, July 9, 2011

How To Make Money With Facebook Hacks, Tips & Tricks ??

Cyber Crime Expands: Hackers can rent Botnets ??

If the unlimited virus concerns are troubling you, then there's more. Now, botnets are available on rent for as cheap as $67 for 24 hours or $9 for an hour. This empowers anyone to launch distributed denial of service (DDoS) attacks, sell fake antivirus software and relay spam to unsuspecting email users via millions of compromised PCs.

The cyberpunks are unanimously, hawking their wares via online forums and banner advertising. This readily reduces the barriers to entry for criminals who can't code, empowering relatively unskilled cyber criminals to inflict major damage and financial loss. "Organizations need to be wary of the fact that their critical online applications or services could be taken down in under a day by a criminal renting services from bot herders," said Rick Howard, director of intelligence at iDefense, a VeriSign's security intelligence service. It was an iDefense report that highlighted the entire botnet selling picture.

The business impact is witnessed when it's revealed that Zeus, a botnet which is around 3.6 million compromised PCs in the U.S. alone, is sold in the criminal underground as a kit for around $3,000-4,000. In June 2009, security company Prevx discovered that Zeus had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster, ABC, Oracle, Cisco, Amazon, and BusinessWeek The full-fledged botnet comes with different add-ons and price tags for, instance an upgrade for attacking Windows 7 or Vista is priced at $2,000 or for Jabber IM broadcasting to receive stolen data in real time it costs $500. So, soon any whiz kid, who wants to opt for easy money can ease his appetite with a little cash, at the cost of financial security of others. 

How To Make Money With Facebook Hacks, Tips & Tricks

Who else wants to learn how the big boys make upwards of $300 a day on Facebook?

- Learn why 99% of people fail putting CPA offers on Facebook.
- Learn how to not get caught by the "Facebook police" - it's not what you think.
- Learn how you could be making a full time income off Facebook - in just a few days!

$300/day Method Revealed!

WHAT YOU NEED:

• A Facebook Account
• A Freelancer Account
• An Account on any CPA network

6 STEP METHOD:

1. Login to your CPA network (for example CPALead.com). Browse through all of the offers with “first page submit” short forms where you get paid per lead. The reason for this is because people are most likely to fill out a short first page form than a long 3 page submit. These offers usually payout between $2 to $5. Find offers that have good looking landing pages that are trustworthy and easy to fill out. The less personal information the user has to submit the more likely they are to fill out your offer.

2. Login to your Facebook account and create a fan page. The name of your fan page should attract the type of people who are likely to fill out your CPA offer. This is one of the most cost effective ways to target people on Facebook. REMEMBER: the name of your page is what attracts your target market. Then go to Google images and select an appropriate image for your group. Make sure to find an image that is professional looking (think stock image quality). Save this image to your desktop. Choose the appropriate category for your page, publish it, upload your image to the profile picture, and fill out the information on your “Info” tab.

3. Login to your Freelancer account and post a project for someone to “add fans” to your Facebook fan page. You’re essentially hiring a promoter or someone to do the work for you. Your title should read something like: “I need someone to add 100,000 fans to my Facebook page.” The description does not need to be too long, just copy your title and tell them to PM you if they have questions. Wait about a day or two to let the bids build up before selecting a winner. When you select the winning bidder it takes you to a screen where you can “check” the box next to each bidders name. This is a sneaky way to hire multiple people if you want to. Once the winning bidder has accepted your job, email them the link to your Facebook page along with a more in depth job description.

4. Once your page reaches 10,000+ people, Facebook will make you verify that you are the owner of the page. If you do not verify it they will block your publishing rights to the page, making this whole process a big waste of time. Here’s how to verify: Get an account at blogger.com. Post some BS blog entries. Use this new blogger domain as your official URL. Go to your Facebook page and click “Edit Page.” Under “Promote Your Page” click “Promote with a fan box” and click the Blogger icon. You will then log into your blogger account and the Facebook fan box will be present on your blog. Now your page is verified and set to go!  
DO NOT POST ANY CPA OFFERS BEFORE YOUR PAGE IS VERIFIED!

5. Now that you have more than 10k fans in your fan page and have verified it, you can start promoting your CPA offer. You can do this by updating the status of your group or sending out a mass message to all members. To update your status, put the text portion of your ad into the text field and copy and paste the link into the link box in the tool bar below the text field. Once your link is attached and your message is crafted, press submit. This status update will be sent to all of your fans’ mini feeds and will be available for new fans to see. Don’t forget to mix your CPA posts with normal posts that fit in with the flow of your page. You want the fans to think it’s a legit page (which it is) not a spam page. Do the same for messages.

6. Now that your page is big, create more Facebook pages and use your original page to drive traffic to those pages. Eventually you will have a large network of Facebook pages…a network that will eventually span more than 1 million people! You can now drive this traffic wherever you want! Make sure your users do not become immune to your page updates. If you’re constantly posting new updates they may get turned off. However, if one CPA offer is doing well, keep reposting it every other day (Just remove the original update from your page before you re-submit it). I recommend only a few NEW updates per week per page.

You don't Need Hacking skills to be a cyber criminal ??

Are you digitally challenged? Don’t know a byte from a bit? Have a limited command of Unix? Don’t worry: With a new generation of professionally packaged exploit kits, you, too, can become a successful cyber criminal.

New attack kits, which package proven exploits for vulnerabilities in popular software for easy installation and management, are bringing cyber crime to a new generation of criminals who have only limited technical skills, according to a new report from M86 Security.

The existence of exploit kits, which date back to at least 2006, is no secret. But they are becoming increasingly user-friendly, lowering the bar for entry to the cyber underground and creating a new source of revenue for the coders and hackers who devise them. One such kit, the Eleonore Exploit Pack, apparently was used in recent attacks on three Treasury Department sites.

“Cyber criminals find it easier, faster and more cost-effective to make money by buying exploits rather than taking the time to create exploits themselves,” states the report, titled “Web Exploits: There’s an App for That.”

Browser vulnerabilities usually are the most common targets for the kits. But M86 reported that exploits for vulnerabilities in Adobe Flash, Java and PDF are on the rise. The kits are designed for easy installation on a Web server and are linked to a database for logging and reporting.

Reporting can be critical because the kits can be used to distribute pay-per-install code, for which the kit owner is paid to install third-party malware on compromised computers. Rates range from a modest $50 per 1,000 installs on European and Australian computers to a healthy $170 per 1,000 U.S. computers.

The criminals can drive victim traffic to the exploit Web page with techniques such as spam that contains malicious links or by setting up a bogus Web site and using search engine optimization to popularize it. But the most common technique is to inject malicious iFrames into legitimate sites and redirect traffic to the exploit page. Some entrepreneurs will even sell redirected Web traffic at a reasonable rate.

But don’t get any ideas about reselling these exploit kits. These guys might be criminals, but they don’t tolerate piracy. “You are not allowed to resell/share, if we catch you doing this your license will be revoked,” the purveyors of Crimepack warn.

Wednesday, July 6, 2011

Top 10 Windows Built-In Command Line Tools

For many Windows users, the thought of using the Command Prompt is either a scary experience or something that they will never need. But for some, the command prompt is a powerful tool that can be far more useful than many graphical tools available in Windows.
Being a System Administrator, I constantly use the command prompt, mostly because I access systems remotely and many tasks can be performed quickly with out the graphics over head (even though connecting via Terminal Server is very convenient).
So if you are an avid user of the command line, here are my top 10 built-in (non third party) command line tools for XP, Vista and WIndows server versions (remember these commands are not your typical tools, such as find, copy, move, dir, etc..).
1 - systeminfo - Have a need to display operating system configuration information for a local or remote machine, including service pack levels? Then systeminfo is the tool to use. When I need to connect to a system that I am not familiar with, this is the first tool I run. The output of this command gives me all the info I need including: host name, OS type, version, product ID, install date, boot time and hardware info (processor and memory). Also knowing what hot fixes are installed can be a big help when troubleshooting problems. This tool can be used to connect to a machine remotely using the following syntax: SYSTEMINFO /S system /U user
2 - ipconfig - This tool may be most useful tool for viewing and troubleshooting TCP/IP problems. It's capability includes release or renew an adapter IP Address, display and flush DNS cache, re-register the system name in DNS. WIth Vista and some server versions, ipconfig includes support for IPv6.
Some examples when usinging ipconfig.
  • To view all TCP/IP information, use: ipconfig /all
  • To view the local DNS cache, use: ipconfig /displaydns
  • To delete the contents in the local DNS cache, use: ipconfig /flushdns
3 - tasklist and taskkill - If you are used to Windows Task Manager, then you'll find tasklist very easy to use. This tool displays a list of currently running processes, including image name, PID (Process ID) and memory usage on local or remote machines. Using the /V switch displays more information in verbose mode that includes, CPU Time, user name, and modules. Tasklist includes a filter option to display a set of task based on the criteria specified. But the best use of the filter is using it to display programs running inside svchost.exe process.
Of course, there will be times when a process needs to be killed and taskkill can be used to terminate those trouble processes. A single or multiple processes can be killed using the PID (/PID ) or image name (/IM ). Here are two examples for doing just that:
TASKKILL /IM notepad.exe
TASKKILL /PID 1230 /PID 1241 /PID 1253 /T
Both tasklist and taskkill can connect to remote systems using the /S (system name) /U (user name) switches.
4 - netstat - Need to know who (or what) is making a connection to your computer? Then netstat is the tool you want to run. The output provides valuable information of all connections and listening ports, including the executable used in the connections. In additon to the above info, you can view Ethernet statistics, and resolve connecting host IP Addresses to a fully qualified domain name. I usually run the netstat command using the -a (displays all connection info), -n (sorts in numerical form) and -b (displays executable name) switches.
5 - type - A lesser known tool to those who don't work with the command prompt. For Administrators, the type command is the perfect tool for viewing text files. But what many people don't know about the type tool, is it's capability to read multiple files at once. For example to view multiple text files, just separate each file with a space:
type firstfile.txt secondfile.txt thirdfile.txt
For files that are large, you can control text scrolling using the more command.
6 - net command - Although this tool is more known as a command, the net command is really like a power drill with different bits and is used to update, fix, or view the network or network settings.
It is mostly used for viewing (only services that are started), stopping and starting services:
    • net stop server
    • net start server
    • net start (display running services)
and for connecting (mapping) and disconnecting with shared network drives:
    • net use m: \\myserver\sharename
    • net use m: \\myserver\sharename /delete
Other commands used with net command are, accounts (manage user accounts), net print (manage print jobs), and net share (manage shares).
Below are all the options that can be used with the net command.
[ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |HELPMSG | LOCALGROUP | PAUSE | PRINT | SESSION | SHARE | START |STATISTICS | STOP | TIME | USE | USER | VIEW ]
To display the complete syntax for each command, just type net help followed by the command - net help use .
7 - nslookup - With the Internet, DNS (Domain Name Service) is the key for allowing us to use friendly names when surfing the web instead of needing to remember IP Addresses. But when there are problems, nslookup can be a valuable tool for testing and troubleshooting DNS servers.
Nslookup can be run in two modes: interactive and noninteractive. Noninteractive mode is useful when only a single piece of data needs to be returned. For example, to resolve google.com:
To use the interactive mode, just type nslookup at the prompt. To see all available options, type help while in interactive mode.
Don't let the help results intimidate you. Nslookup is easy to use. Some of the options I use when troubleshooting are:
set ds (displays detailed debugging information of behind the scenes communication when resolving an host or IP Address).
set domain (sets the default domain to use when resolving, so you don't need to type the fully qualified name each time).
set type (sets the query record type that will be returned, such as A, MX, NS)
server NAME (allows you to point nslookup to use other DNS servers than what is configured on your computer)
To exit out of interactive mode, type exit .
8 - ping and tracert - These tools can be helpful with connectivity to other systems. Ping will test whether a particular host is reachable across an IP network, while tracert (traceroute) is used to determine the route taken by packets across an IP network.
To ping a system just type at the prompt: ping www.google.com. By default, ping will send three ICMP request to the host and listen for ICMP “echo response” replies. Ping also includes switches to control the number of echo requests to send (-n ), and to resolve IP addresses to hostname (-a ).
To use tracert, type at the prompt: tracert www.google.com. You can force tracert to not resolve address to hostnames by using the -d switch, or set the desired timeout (milliseconds) for each reply using -w switch.
9 - gpresult - Used mostly in environments that implement group poicies, gpresults (Group Policy Results) verifies all policy settings in effect for a specific user or computer. The command is simple to use, just enter gpresults at the prompt. It can also be used to connect to computers remotely using the /S and /U switches.
10 - netsh - Without a doubt the most powerful command line tool available in Windows. Netsh is like the swiss army knife for configuring and monitoring Windows computers from the command prompt. It capabilities include:
  • Configure interfaces
  • Configure routing protocols
  • Configure filters
  • Configure routes
  • Configure remote access behavior for Windows-based remote access routers that are running the Routing and Remote Access Server (RRAS) Service
  • Display the configuration of a currently running router on any computer
Some examples of what you can do with netsh:
  • Enable or disable Windows firewall:
netsh firewall set opmode disable
netsh firewall set opmode disable
  • Enable or disable ICMP Echo Request (for pinging) in Windows firewall:
netsh firewall set icmpsetting 8 enable
netsh firewall set icmpsetting 8 disable
  • Configure your NIC to automatically obtain an IP address from a DHCP server:
netsh interface ip set address "Local Area Connection" dhcp
(For the above command, if your NIC is named something else, use netsh interface ip show config and replace the name at Local Area Connection).
As you can see netsh can do alot. Instead of re-inventing the wheel, check out the following Microsoft article for more info on netsh.
The use of Windows command line tools can be a powerful alternative when only a command prompt is available. I'm sure there are plenty more commands that I have not mention.
Let us know what your favorite command line tool is and leave a comment below.

Hide Your Files In A JPEG



Add Your Gmail To Windows Live Mail


The cool thing with email these days is you can pretty much use any client you want and still be able to check most of your web based accounts. Most POP accounts such as hotmail or Gmail are able to be checked with any client. Here we will take a look at how to get your Gmail into Windows Live Mail. ** Note: This is for Windows Live...


Cool Javascript Trick

Its an old Orkut trick already which used to stumble upon at Orkut and various forums. you probably would have seen it but its a memorable one.Try this Go to http://www.google.com Click "images" Fill in "bikes, flowers, cars" or any other word. You will get a page with alot of images thumbnailed. Now delete the URL on the addressbar (example:http://images.google.com/images?hl=en&q=flowers&um=1&ie=UTF-8&sa=N&tab=wiCopy...


Dark Mailer- Fast Bulk Email Software

Dark Mailer is a super fast bulk email software that sends out at speeds greater than 50,000 emails per hour on a dedicated mailing server. Dark Mailer has the capability to use Proxies and Relays and also to send directly. Some of the features include: Anonymous Mailing using Proxies Message Randomization to bypass Spam Filters Speeds over 500K emails per hour on Turbo Mode Up to 1000 Threads The software taps...


Hacking the Logon Screen using Resource Hacker

This trick is very easy to do but it needs Resource Hacker and If you don't already have Resource Hacker go download it now . I have tried this on Windows XP..StepsBrowse to C:\windows\system32 and copy logonui.exe and paste it to C:\ Now, open C:\logonui.exe with Resource hacker. Click on Action and then on Replace bitmap. If you are good with graphics you can make your own logon screen, you should be able to scroll thru the...


COPY PASTE FROM COPY PASTE DISABLED BLOGS

COPY PASTE FROM COPY PASTE DISABLED BLOGS This is a small trick for those who are pissed with pages which say - “YOU CANT RIGHT CLICK HERE !!!” “SORRY..COPY PASTING IS DISABLED !!!” “RIGHT CLICK IS DISABLED !!11” Okay..You wanna that excellent content of that Blog/Website/Forum post and you cant just copy that because some stupid message box pops up everytime you right click that page..Worse,Some times even you cant...

Basics of Javascript Injection

JavaScript is a widely used technology within websites and web based applications. JavaScript can be used for all sorts of useful things and functions. But along with this comes some additional security issues that need to be thought of and tested for. JavaScript can be used not only for good purposes, but also for malicious purposes.JavaScript injection is a nifty little technique that allows you to alter a sites contents without...


Prank Codes and Programming in VB


Temporarily Disable "Restart Now" Dialog from XP's Automatic Updates


Automatic Updates is a great feature. Your computer stays protected from threats without worrying about it… but if it's 3am and I'm trying to play a video game, the last thing I want is for the automatic updates to pop up and remind me every 5 minutes that I need to reboot, interrupting my game… Drives me crazy! Dear Restart Dialog, I...
 Recovering Scratched CD's
Here's an easy home remedy, which might give you the desired results. Rub a small amount of toothpaste on the scratch and polish the CD with a soft cloth and any petroleum-based polishing solution (like clear shoe polish). Squirt a drop of Brasso and wipe it with a clean cloth.

Technology to the rescue: There are many softwares available on the net, which enable the recovery of the CD data. BadCopy Pro is one such software, which can be used to recover destroyed data and files from a range of media.

Just a few clicks is all it requires to recover the disc from almost all kind of damage situation; be it corrupted, lost data, unreadable or defective.

DiskDoctors is another popular company, which offers both software and solutions to recover data from a scratched CDs and DVDs

General Tips:
* Always wipe the CD from the center outward with straight spoke-like strokes. Wiping CDs in circles will create more scratches.

* Do not scratch the graphics layer as you cannot repair the disc.

HINT: Hold the disc up to a light with the graphics layer facing the light source. If you can see light thru the scratches at any point then the disc may be irreparable and or exhibit loading or playing errors.

* Clean your Disc players lens regularly with a suitable product to ensure optimal viewing pleasure.

* Make sure to use a soft, lint-free cloth to clean both sides of the disc. Wipe in a straight line from the centre of the disc to the outer edge.

* If wiping with a cloth does not remove a fingerprint or smudge, use a specialized DVD disc polishing spray to clean the disc.