Tuesday 13 August 2013

Hello, this little post will explain in rough details how you start hacking a specific target.

First. There are many different ways going about this, but this is one way.

Information gathering
The first thing you want to do when targeting a specific target is get as much information as possible before a front attack(if any, being quiet is much better)
Now this step can take ages if you really want a detailed level of knowledge. And if you are serious about hacking your target, you should be detailed here.
What sort of information do I look for you might ask yourself? Well, anything really. Anything surrounding the target and even things that surround things that surround your target. Here is a short list of things that might be useful;
IP(s), some machines/domains/systems or whatever have multiple domains
ISP(s), if small ISP(s), get owner details here as below
Owner. Email, name, location, family, hobby's, Facebook account, phone number
*Open ports. On ALL of the ips/servers if there are multiple
Service signatures, find out as much as possible about all the open ports, are they in use? What software are they running at the other end? Do the services reveal any other information about the system? OS? Internal IPS?
Hosters(In most cases there will be a hosting company)
Hosters information - Owner and all of that(If the company is small)
Hosters member system, how does the members login? Is there a login? Is there a forgot password function? Can you exploit the hoster instead?(might be easier in some cases)
DNS records(if any), subdomains? Hidden domains/info? DNS hosters? Same as above.
The physical server(s) location / datacenter
And the list goes on and on and on. Literally EVERYTHING about the company/system/server/target are relevant. The more info you got, the easier it will be attacking him/her/them/it.

You should decide if you want to target the system or the people of your target. That is, code/system flaws or human flaws(keyloggers, Trojans, social engineering, info gathering + password guessing, etc). This decision should depend on the information you find about your target. Both can be tried ofcourse, just make sure the target does not know you are trying to hack it, often one of the attempts will set off alerts.

This whole information gathering part might seem unnecessary, but really. Its neat, lets you put things in perspective so you can find the best point of entry.

The attack
Before an attack is lunched, there are a few things you need to think about. Here is a list of things you should think about;
Will this company/target rage crazy if I hack them? If so, check 3rd point.
Will police or other agencies be contacted if I hack them? If so, check 3rd point.
*Is my privacy good enough? Are you behind a proxy(s)? Should you? Do the proxy log?(It shouldn't)
Are they running any services at all? If not, you don't really have any virtual way in..
Are they running web applications? These are typically easier to hack than services. And have a higher percentage rate of flaws.
Do the target got a open router/switch/modem system? This often happens with home computers/networks.
Are your target running platforms with logins? These could be targeted.
Do you have enough time? Its a good practice to have time enough to do the entire attack in one go. Else you might fire off warnings for the target, and he can go into a bombshelter We don't want that now, do we?

Now there are tree ways of attacking in this guide.
- Service/software exploitation
- Web application exploitation
- Human factor exploitation

Service/software exploitation
Here you will exploit one or more services/programs running on the target system. In most cases, this will be called bufferoverflow. This can do everything from bypassing a login to give you instant shell access. In scenarios where the target is running services which is not a web server(can be tho) this might be the way to go.

Web application exploitation
This is without a doubt the most vulnerable field. Web applications are flawfull, 70% or so of all pages got some sort of web application flaw, this ofc may vary from an stupid XSS to a serious RFI. In scenarios where the target system are running a web server, this is the first thing to check. Do always check web applications before going on to service exploitation if you just want to get the target hacked.

Human factor exploitation
Now if all other things fail, there is ALWAYS a human factor. This can be social engineering the target to give you limited access, and you work your way up from there. Or simply tricking the target to trust you and in some strange way share his password, perhaps not for the system you are targeting, but for his email or an online account or whatever, stupid people tend to use the same password or the same password syntax everywhere. Keep in mind that the human factor doesn't necessarily have to be your targets owner, could be the hoster, the DNS hoster, the ISP, family.

Finale note
If you think its necessary, clear your tracks. If you ask me, if you can see that you have been there you didn't do it right. Take care, be safe.

Sunday 11 August 2013

Artyom Zorin has announced the release of Zorin OS 6.2 "Lite" edition, an updated release of the project's Ubuntu-based lightweight distribution (with LXDE) designed for new Linux users: "The Zorin OS team has released Zorin OS 6.2 Lite, the latest evolution of the Zorin OS Lite series of operating systems, designed specifically for Windows users using old or low-powered hardware. This release is based on Lubuntu 12.04.2 and uses the LXDE desktop environment to provide one of the fastest and most feature-packed interfaces for low-spec machines. This new release includes newly updated software out of the box. We also include our innovative Zorin Look Changer, Zorin Internet Browser Manager, Zorin OS Lite Extra Software and other programs from our earlier versions in Zorin OS 6.2 Lite." Here is the brief release announcement.
zorin lite

Zorin OS Lite 6.2 is built on the Linux architecture so it is completely open source and it's based on Ubuntu, one of the most used Linux operating system in the world.
This latest version of Zorin OS Lite is still based on Lubuntu 12.04.2 (Precise Pangolin), which was released only a couple of days ago, and it uses the LXDE desktop environment.
Zorin Look Changer, Zorin Internet Browser Manager, Zorin OS Lite Extra Software and other programs from earlier versions have been added to Zorin OS 6.2 Lite.

Download (MD5) from here: zorin-os-6.2-lite.iso (650MB)


Linux Lite is free, stable, light and simple fully functional out of the box with complete set of applications, it is based on Ubuntu LTS (Long Term Support) releases and this distribution support period is 5 years. So you don't need to worry about to install new version after 1 or 2 years but you only need to install just once every 5 years. During these 5 years Linux Lite current version will get security and software updates.
It is also recommended to those people who are new to Linux or for those who want really lightweight desktop environment. It is also great choice for old laptop or desktop you gave up on a few years back. Linux Lite is a showcase for just how easy it can be to use Linux. From familiar software like Firefox and Thunderbird, to simply named menu items, to one click updates and software installs.

Linux Lite team just released 1.0.6 version for 32bit and 64bit with Xfce desktop environment, based on Ubuntu 12.04.
Linux Lite 1.0.6 new features include easier networking setup between Linux Lite and Windows or other Linux operating systems, a system report tool to help troubleshoot problems, support for scanners, Bluetooth and a brand-new login screen. The Help and Support Manual is our most comprehensive to date and is available both offline and online.

Changelog:
  • Firefox 21.0
  • Kernel 3.2.0.40 pae
  • Rewrote Help & Support Manual
  • Added Scanner support.
  • Added Bluetooth.
  • Added 'Drives' shortcut to home folder.
  • Added Show Desktop button.
  • Added support for iDevices.
  • Added right click 'Open as Administrator' to Thunar.
  • Added/Removed Install Additional Software scripts.
  • Added Enable/Disable automatic login to System menu.
  • Added Network Share Settings to System menu.
  • Added Create System Report to System menu.
  • Replaced Wicd with Network Manager.
  • New live boot menu.
  • New login screen.
  • New install slides.
  • Announcement of the Linux Lite Shop.
  • Fixed auto login if chosen during installation.
  • Bug fixes.
  • and So on...
Here is the brief release announcement.

Screenshots 
Boot Screen

Linux lite
Login Screen

Linux lite
Desktop

Linux lite
File Manager & Terminal

Linux lite
Additional Software & System Info Tool

Linux lite
Installed Applications & Application finder

Linux lite
Task Manager

Yahoo Messenger is one of the highly popular and most widely used instant messaging service in the world offering a wide variety of features to its users, all for free. This has made it the right choice for all those who are waiting to chat and communicate with their far away friends and relatives.
However, while some people use Yahoo Messenger only to chat with their friends and known ones, many others use it to have fun by joining the chat rooms and chatting with the strangers. If you’re a similar person who would like to have fun during the chat, this post if for you!
In this post, I will show you some really interesting Yahoo Messenger hacks using which it is possible to play pranks with your friends and strangers during the chat. Below is a list of some cool hacks that you’re sure to enjoy:

1. Chat with Multiple Names Simultaneously

How about chatting with your friend with two or more different names at a time? Well, do not think that this is impossible! This can easily be done with a simple workaround which enables you to chat with as many different names as you can with the same or different people.
For example, you may chat with Person-A using one name and with Person-B using the other. You can also chat with the same person using different names or any other combination. All of this goes really unnoticed by the user on the other side, while you are sure to have some real fun.
Here is a step-by-step procedure to implement this hack:
  1. Sign in to your Yahoo Messenger. From the top, click on Messenger -> My Account Info. You will be taken to a web page where you need to log in to your account.
  2. Now, you should be on the Profile Settings page. Scroll down to see the option Account Settings as shown below. From there, click on the link which says: “Manage your Yahoo! aliases”.
    Create Aliases in Yahoo
  3. From the Aliases page, click on: “Add an alias”. You can create as many aliases you want. Choose unique names for your alias and once you’re done, click on “close”.
  4. You need to sign out of Yahoo Messenger and sign in again to see the changes. Once you have done this, double-click on any name from your contact list or chat room to open a new chat window. You should now see a list of your aliases appearing in the chat window to choose from.
    Yahoo Chat with Multiple Names
  5. To chat with multiple names with a single person, just follow the steps below:
    • Double-click on the name of the person in the chat room or contact list.
    • Select any name from your “alias” list and ping the user with that name. Immediately close the chat window before you get a reply from that person.
    • Again double-click on the same person’s name and ping him/her with another name from your “alias” list. This time do not close the window.
    • Just wait a few seconds! When the person replies to both your pings, you will have two tabs in the same chat window from where you can chat with the same person using two different names. Enjoy!!!

How to Know if Someone Accessed My Computer When I am Away

 

Do you have a feeling that someone tried to access your computer when you stepped out for a lunch or quick coffee break? Perhaps your colleague or the person sitting in the next desk tried to log in or play something wicked on your computer while you were away for a quick session.
So, how do you know if someone tried to access your computer in your absence? Well, here is a way by which you get notified every time when such an attempt is made.
MouseLock
The website called MouseLock.co gives a solution here. All you have to do is visit the site’s homepage, sign in to your Gmail account and select your secret point (unlock code) from the screen. Once you do this, you will have to place your mouse cursor into the slot shown and click on it. This will activate the mouse lock feature on your computer screen.
MouseLockED
So, when an unauthorized person tries to move the mouse in your absence, he will be given just a few seconds to select the unlock code. Upon failure to do so, you will get an instant notification about the intrusion in your mailbox.
Email Notification from MouseLock
If you have a webcam attached to your computer, you can even get the photo of the person trying to intrude. This will make it easy for you to figure out who actually was the person.
As this is an easy to use web application, you can use it any time just by loading the MouseLock website without the need to install anything on your computer. Even though MouseLock does not manage to prevent the intrusion, it will give you an instant notification about it, so that you aware of what is happening at your desk when you are away.

How it Works?

MouseLock operates by using the “mouseLeaveEvent” from JQuery to track the mouse movements. On the other hand, it uses the “getUserMedia()” API that is supported by Chrome and Firefox to capture the webcam photographs.

 

Monday 5 August 2013


HOW TO USE GOOGLE TO FIND SERIAL KEY OF ANY SOFTWARE
1)open google

2)type the name of software u want to crack or serial key

3)press space and now type 94fbr

for example (quickheal 94fbr)