Friday, 31 August 2012

ThE HaCkEr NeWs || MuKeSh JoOn

Joon Hospital | 10:09:00 am | 2 Comments so far
Read more ...

Saturday, 25 August 2012

Chat with Friends through Command Prompt

Joon Hospital | 3:50:00 pm | 1 Comment so far

Hello friends Now U Can Chat With Command Prompt THrough So Here IS A Trick.....


1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A


3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see something like this:



 
7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:
 


8) Now all you need to do is type your message and press Enter.
Start Chatting.......!

DONE....ENJOY.~!! :)

Read more ...

Computer Forensic Tools And Tricks

Joon Hospital | 3:48:00 pm | 1 Comment so far
To Find The USB Logs

Go to Run Then Enter Code _|
For window 7
-->
C:\Windows\inf\setupapi.dev.log

For window Xp
-->
C:\Windows\inf\setupapi.log
For Ram Analysis

Open Source Tools from ForensicZone

Download Link

Read more ...

Proxy Server

Joon Hospital | 3:39:00 pm | 3 Comments so far
Proxy servers:-

Its allow for you to configure your browser to route your browser traffic through that machine, which then makes a request for a page on your behalf, and then sends you the results. These are usually used at no cost to the user. Since they are accessible to the public these are often quite slow. Please see instructions for using a proxy server.

There are a variety of types of these proxy servers:

* Transparent Proxy - This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.) This type of proxy server does not hide your IP address.

* Anonymous Proxy - This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.

* Distorting Proxy - This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.

* High Anonymity Proxy - This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address.

 Proxy browser:-
A proxy server acts as a security barrier between your internal network and the Internet, keeping others on the Internet from being able to obtain access to information that is located on your internal network.........and your browser is become like invible........its hide your ip. like you use china country proxy den open google.com now google will open in china language form............!~

How to change proxy settings in Browsers

@ Mozilla Firefox

1. Open Mozilla Firefox.

2. Click on Tools then click on Options….

3. Click on the Advance tab, then click on the Network sub-tab and finally on the Settings… button.

4. Tick the Manual Proxy Configuration: radio button.

5. In the HTTP Proxy: box, type the IP address of the proxy server.

6. In the Port: box, type the in the port number that is used by the proxy server.

7. Click OK to close the Connection Settings window.

8. Click OK to close the Options window.

9. DONE

@ Internet Explorer
1. On the Tools menu in Internet Explorer, click Internet Options, click the Connections tab, and then click LAN Settings.
2. Under Proxy server, click to select the Use a proxy server for your LAN check box.
3. In the Address box, type the IP address of the proxy server.
4. In the Port box, type the port number that is used by the proxy server for client connections (by default, 8080).
5. You can click to select the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network (this may speed up performance).
6. Click OK to close the LAN Settings dialog box.
7. Click OK again to close the Internet Options dialog box.
@ proxy settings In Google Chrome.
* To change proxy settings: Click "Customize and control Google Chrome" icon right under the "window close" button.
* A popup menu will be dipslayed. Click "Options".
* Select the "Under the Hood" tab.
* Scroll down and Click "change proxy settings" button.
* A popup dialog will be display. Select the Connections tab on this dialg.
* If you are using LAN, click "LAN Settings" button. If you are using Dial-up or Virtual Private Network connection, select necessary connection and click "Settings" button.
* Make sure the "automatically detect proxy settings" and "use a proxy automatic configuration script" options are not checked.
* In the "Proxy Server" area, click the check box next to Use a proxy server for this connection.
* If nessesary, enable "bypass proxy server for local addresses".
* Click the "Advanced" button and set Proxy Server address (proxy IP), proxy server port.
* Click OK.

*done

@ proxy settings in Safari.
* To change proxy settings: Open Safari
* Click Safari on top of the screen.
* Click "Preferences".
* In the menu bar at the top of the window, Click "Advanced".
* Click on the "Change Settings" button next to the Proxies label
* Click on the check box button next to Web Proxy (HTTP)
* Enter proxy server and port information
* Select "Apply Now" to save settings.
* Done.

                                        Anti-Spam SMTP Proxy Server

The Anti-Spam SMTP Proxy (ASSP) Server project aims to create an open source platform-independent SMTP Proxy server which implements auto-whitelists, self learning Bayesian, Greylisting, DNSBL, DNSWL, URIBL, SPF, SRS, Backscatter, Virus scanning, attachment blocking, Senderbase and multiple other filter methods. Click 'Browse all files' to download the professional version 2.2.1 build 12221.
  • Multiple Weighted DNSBLs
  • Multiple Weighted URIBLs
  • Greylisting
  • Weighted Regular Expression Filtering
  • Bayesian
  • Penalty Box
  • SenderBase
  • SSL/TLS
  • SPF/SRS
  • Attachment Blocking
  • ClamAV and FileScan
  • Blocking Reporting
  • LDAP support
  • Backscatter Detection

Download


                                                       WEB PROXY SITES:


www.meebo.com/
 
www.freeproxyserver.ca/
 
www.ninjacloak.com/
 
www.anonymizer.ru/
 

www.kproxy.com/

www.iloveim.com/

www.the-cloak.com/

  

www.cantblock.me

www.mb35.info

www.cloaking.me

www.proxybrowsing.com

www.behidden.com

www.yourfreedom.net

www.hujiko.com

www.anonymizer.ru

www.schoolproxylists.cn/

www.xysurfing.com/

www.googlefaker.com/

www.internetoxy.com/Facebook Proxy


If Facebook are block in your offices, college and home then don't worry Click at below link

and access your FB Account.

EnjoY..!!


http://www.f1.proxymice.com/
http://www.f2.proxymice.com/
http://www.f3.proxymice.com/
 
standalone proxyserver
ultrasurf
DOWNLOAD
http://ultrasurf.us/download/u.zip
 
hotspotsecurityshild
 
super hide ip
 
VPN
Securitykiss VPN Tool

Secure your Internet connection with SecurityKISS Tunnel.
We are a leading VPN provider to protect privacy, ensure anonymity and bypass Internet restrictions.

 DOWNLOAD
http://www.securitykiss.com/resources/download/windows/ 
 
PROXPN
 DOWNLOAD
 http://www.proxypn.com

ULTRAVPN
 DOWNLOAD
http://www.ultravpnsoftonic.com
 
CYBER GHOST
DOWNLOAD
 http://www.cyberghostvpn.com/files/download.php
 
MACROVPN 
DOWNLOAD
http://www.macrovpn.com 


To Protect Your Privacy..!!
JonDo

JonDos publishes a new version of the JonDo-Software, an IP changer and IP anonymization program, that you can use for anonymous surfing in the Internet with high security anonymous proxy servers.

What is JonDo?

JonDo is an open source and free-of-charge program for Windows, Linux and MacOS X.
It hides the user's IP adress behind an anonymous IP address. In contrast to other anonymizers (VPNs, anonymous proxy servers), the user's anonymity stays protected even against the providers (operators) of the anonymous IP address.


PhotobucketDownload


TOR



Tor is very useful for online anonymity, its protect your privacy, defend against a form
 of network traffic analysis. Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic
allows others to track your behavior and interests.


Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create
new communication tools with built-in privacy features.


Tor to keep websites from tracking them and their family members, or to connect to
news sites, instant messaging services, or the like when these are blocked by their
local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site.


Video Tutorial:
http://youtu.be/azSaqhdQ7Uo

PhotobucketDownload
 
 

ProXPN helps to upgrades your internet connection with VPN encryption secures all types of connections from DSL and cable to 3G gives you 100% private access to the internet get an IP address in the USA, UK, or NL.
It Protects websites you visit, hijack your passwords, credit cards, or banking details intercept and spy on your email, IMs, calls, or anything else, record your web,history, run traces to find out where you live.

Video Tutorial:
http://youtu.be/Qh43CkVH9Qg

PhotobucketDownload

UltraVPN - A Free VPN

UltraVPN is a simple user interface to connect or disconnect to our VPN servers.

To use UltraVPN, you need to right click on a traybar icon (on the bottom right of your screen) that looks like a computer with a red screen. After right clicking on it, choose "connect".

It can be used by any individual who simply wants to protect his privacy, either on a LAN or a public hotspot.

Features:
You can connect or log in into MSN if it's blocked.
For use VoIP software like Skype if it's blocked.
UltraVPN protect your email and browsing privacy.

How can you download UltraVPN?
Download the software client and create account. You are now able to connect to the VPN.

Video Tutorial:
http://youtu.be/3_zXns8xbgU
 

Read more ...

Phising Attack

Joon Hospital | 2:54:00 pm | 1 Comment so far

Here we tells about PHISHING & How can we protect from it.~!



 WHAT IS PHISHING:-


The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surroundering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.

 



>>MOBILE PHISHING:

Phishing scams are not limited to the internet. Some phishers use the telephone to make requests for information. If you get a call from your banking institution asking for personal information, hang up and call your bank directly. Your bank will have your social security number and account information on file and should only ask you to verify a few digits.

like Iphone,Apple ,iTunes n more...By SMS

EXAMPLE:-

>>Congratulations! Your mobile phone has won US$ 10 Million prize money. To claim your money, call this number XXXXXXXX,give your permanent address,pin number,account number or credit card number...

The phisher can ask like it They want your personal Information.

 Some people do the reply to phisher then after he/she can be target of Phisher... so never be reply these type of Messages or Mail.

 



In a phishing attack, the attacker creates a situation wherein people believe that they are dealing with an authorized party, like their bank or another service provider. The attacker will ask the victim for sensitive information such as credit card information.



>>Phishing attacks generally target:

    * Bank information – e.g. VISA and PayPal accounts.
    * Username and password information.
    * Social Security numbers.
    * Information which can be used to retrieve forgotten or lost credentials.



>>Follow the tips below to protect yourself against these threats:

· Your bank will never ask you to divulge account information or passwords via email. Never give out this information, especially via email.

· Don’t open emails that come from untrusted sources.

· Don’t run files that you receive via email without making sure of their origin.

· Don’t click links in emails. If they come from a known source, type them on the browser’s address bar. If they come from an untrusted source, simply ignore them, as they could take you to a web designed to download malware onto your computer.

· Keep your computer protected. Install a security solution and keep it up-to-date.


>>Protect yourself from Phishing scams that could lead to identity theft. I cannot stress this enough. Phishing scams are a hot topic lately that have grown with the popularity of online banking and social networking sites like MySpace, Facebook and Friendster.



The term Phishing comes from the analogy to "fishing". The phisher uses a bait to lure victims into giving out personal information like passwords and credit card numbers. The bait is typically and urgent plea from one of the victims friends or trusted websites, asking for information to resolve some sort of problem with their account.


>>Anti-phishing software is a must for anyone that accesses the internet. Most of the internet service providers have some safety measures included as part of their online security software. Most web browsers also have add-ons that can detect most phishing scams. Unfortunately, these measures are not enough. Some of the more clever phishers have found ways to trick the anti-phishing software so you need to be cautious of suspicious emails and messages.
Read more ...

Social Engineering

Joon Hospital | 2:43:00 pm | Be the first to comment!

Social Engineering

Social Engineering:-  To Hack The Human Mind :)

This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn’t deal with the network security issues, vulnerabilities, exploits, etc. It just deals with simple psychological tricks that help to get the information we want. This really works!! But it requires a lot of patience.
We are all talking about network security and fixing the vulnerabilities in networks. But what happens if some internal person of a network accidentally gives out the passwords. After all we are all humans; we are also vulnerable and can be easily exploited and compromised than the computers.
Social Engineering attacks have become most common during the chat sessions. With the increase in use of Instant Messengers, any anonymous person may have a chat with another any where in the world. The most crucial part of this attack is to win the trust of the victim.
                                  
It may take a long time (may be in minutes, hours, days or months) for this to happen. But after you are being trusted by the victim he will say you every thing about him. Most of the times his person information will be useful to crack his web accounts like e-mail ids, etc. Even some people are so vulnerable to this attack that they even give their credit card numbers to the strangers (social engineers).
Some social engineers stepped one more forward and they send some keyloggers or Trojans to the victims claimed to be as screensavers or pics. These keyloggers when executed gets installed and send back information to the attacker. So be careful with such attacks.

Prevention:
1) Don’t believe everyone you meet on the net and tell them every  thing about you. Don’t even accidentally say answers to the questions like “What’s you pet’s name?”, “What is your mothermaiden’s name?”, etc. which are particularly used by your web account providers to remind your passwords.

2) Don’t give your credit card details to even your chating through instant messengers. Remember, it’s not a hard deal for an attacker to crack an e-mail id and chat with you like your friend. Also data through IMs can be easily sniffed.

3) Don’t accept executable files (like *.exe, *.bat, *.vbs, *.scr, etc.) from unknown persons you meet on the net. They might be viruses or Trojans.
Please act carefully, use security software and ask professionals for help.


Social Engineering Toolkits are as follows :

SET :-

Social Engineering
The Social-Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of pentesting. It’s main purpose is to augment and simulate social-engineering attacks and allow the tester to effectively
test how a targeted attack may succeed. Currently SET has two main methods of attack, one is utilizing Metasploit payloads and Java-based attacks by setting up a malicious website (which you can clone whatever one you want) that ultimately delivers your payload. The second method is through file-format bugs and e-mail phishing. The
second method supports your own open-mail relay, a customized sendmail open-
relay, or Gmail integration to deliver your payloads through e-mail. The goal of SET is
 to bring awareness to the often forgotten attack vector of social-engineering.


Download SET


Video Tutorial Of Social Engineering With SET:
MALTEGO :-


Maltego is a program that can be used to determine the relationships and real world links between:
People, Groups of people (social networks), Companies, Organizations, Web sites, Internet infrastructure such as:
Domains, DNS names, Netblocks, IP addresses, Phrases, Affiliations, Documents and files
These entities are linked using open source intelligence.
Maltego is easy and quick to install - it uses Java, so it runs on Windows, Mac and Linux.
Maltego provides you with a graphical interface that makes seeing these relationships instant and accurate - making it possible to see hidden connections.
Using the graphical user interface (GUI) you can see relationships easily - even if they are three or four degrees of separation away.
Maltego is unique because it uses a powerful, flexible framework that makes customizing possible. As such, Maltego can be adapted to your own, unique requirements.
Screenshot

Download Maltego


Video Tutorial Of Social Engineering With MALTEGO:
Read more ...
Twitter Delicious Facebook Digg Stumbleupon Favorites More

Search

Recent Post

Total Pageviews

Join us on Facebook

Blogging Tips via Email

Powered by Blogger.

Translate Your Language

Entri Populer

Twitter Page URL

Facebook Page URL

Blogroll

About