Text Widget

Followers

Archives

Blogger Tutorials

Featured Articles

Technology

All Stories
Showing posts with label iNTERNET HACKING. Show all posts
Showing posts with label iNTERNET HACKING. Show all posts

Friday, September 11, 2009

Download the best password recovery tools to recover your passwords
Download here:
1. Messenger passwords
2.Email password
2.Internet explorer password
4.Protected password of IE and Mail
5.Dailup password
6.Asterisk Logger
7. Asterwin
8.Network password
9.VNC password

Enjoy :)
please pass your comments

Friday, September 4, 2009

Hey guys today i will show to do a funny hacking trick that can be done to edit any web pages's appearence.

For that jou just need simple java code that i will surely giving it to you all.
For example i will try it to my adsense earnings reports.

                                             Before



                                          After
Follow the steps given below:
1.Open the page that you want to hack.
2.Copy this code " javascript:document.body.contentEditable='true'; document.designMode='on'; void 0 " and paste it on the adress bar of that page.
3.Edit what ever you want.
4.Copy this code "javascript:document.body.contentEditable='false'; document.designMode='off'; void 0" and paste it on the adress bar.This will deactivate the “modify” function and the adsense report page will function like normal. To remove all traces of all tweaking done, click on the URL location box and hit the [Esc] key. Next, click anywhere on the screen.

Now you are done!!
Enjoy :)

Wednesday, July 29, 2009

This tutorial will tell you how to hack yahoo messenger while you are engaged in chatting with some person.While you are chatting through yahoo messenger, Yahoo will hide the IP addresses of all the computers that are connected through the yahoo messenger application to the chat room.So it is not possible to directly find out the IP of the person you want to hack.Then how to get the IP address? Yes it is still possible to hack the IP address during the Yahoo messenger chat.The procedure to Hack Yahoo messenger is discussed in detail below.

While you are chatting via yahoo messenger the communication between you and the person you want to hack, takes place indirectly via Yahoo server and not directly.It is not possible to hack Yahoo messenger directly to get the IP address.So to hack his IP, you must establish a direct communication with him.So,how to do this? It’s easy.Just start chatting with some one via Yahoo messenger.During the process of chatting send him a big file.Now the file transfer takes place directly between your computer and the victim’s computer(via yahoo messenger application).So now, you are ready to go. Here’s the step-by-step process to hack Yahoo messenger and get the IP address of the person .



Goto the COMMAND PROMPT (START, RUN&Type CMD).

Here Type “netstat -n” (without quotes).


The pic given below shows netstat results of my computer.I was not chatting when i took this pic and hence it looks modified.



*Here local address is your own IP and the foreign address is the IP address of the recipient with whom you are connected via yahoo messenger (There may be multiple recipients and hence multiple foreign addresses).

*Now send him the file.

*Check the output by typing the command “netstat -n” (without quotes).

*Assume the output is something like this.


TCP 127.0.0.10:5101 124.55.23.11:1246 ESTABLISHED




Here 124.55.23.11 is the IP address of the person with whom you are chatting and 1246 is the port number where connection is established.That’s It! You have now hacked Yahoo messenger to get his IP address.


Once you hack Yahoo messenger and get his IP address you can use any of the Remote Administration tools.


NOTE: Some times there are chances where in the file transfer gets encrypted (takes place via yahoo server itself).So in this case the above hack may fail to work.






TCP 127.0.0.10:5101 124.55.23.11:1246 ESTABLISHED



Here 124.55.23.11 is the IP address of the person with whom you are chatting and 1246 is the port number where connection is established.That’s It! You have now hacked Yahoo messenger to get his IP address.



Once you hack Yahoo messenger and get his IP address you can use any of the Remote Administration tools or perform NETBIOS HACKING.Refer this tutorial on Netbios Hacking.



NOTE: Some times there are chances where in the file transfer gets encrypted (takes place via yahoo server itself).So in this case the above hack may fail to work

Gohacking

Sunday, July 26, 2009

Locating a wireless network is the first step in trying to exploit it. There are two tools that are commonly used in this regard:
Network Stumbler a.k.a NetStumbler – This Windows based tool easily finds wireless signals being broadcast within range – A must have. It also has ability to determine Signal/Noise info that can be used for site surveys. I actually know of one highly known public wireless hotspot provider that uses this utility for their site surveys.
(NetStumbler Screenshot) 
Kismet – One of the key functional elements missing from NetStumbler is the ability to display Wireless Networks that are not broadcasting their SSID. As a potential wireless security expert, you should realize that Access Points are routinely broadcasting this info; it just isn’t being read/deciphered. Kismet will detect and display SSIDs that are not being broadcast which is very critical in finding wireless networks.

(Kismet Screenshot) 

Attaching to the Found Wireless Network

Once you’ve found a wireless network, the next step is to try to connect to it. If the network isn’t using any type of authentication or encryption security, you can simply connect to the SSID. If the SSID isn’t being broadcast, you can create a profile with the name of the SSID that is not being broadcast. Of course you found the non-broadcast SSID with Kismet, right? If the wireless network is using authentication and/or encryption, you may need one of the following tools.
Airsnort – This is a very easy to use tool that can be used to sniff and crack WEP keys.  While many people bash the use of WEP, it is certainly better than using nothing at all.  Something you’ll find in using this tool is that it takes a lot of sniffed packets to crack the WEP key. There are additional tools and strategies that can be used to force the generation of traffic on the wireless network to shorten the amount of time needed to crack the key, but this feature is not included in Airsnort.

(Screenshot of Airsnort in Action) 
CowPatty – This tool is used as a brute force tool for cracking WPA-PSK, considered the “New WEP” for home Wireless Security. This program simply tries a bunch of different options from a dictionary file to see if one ends up matching what is defined as the Pre-Shared Key.

(Cowpatty Options Screenshot) 
ASLeap – If a network is using LEAP, this tool can be used to gather the authentication data that is being passed across the network, and these sniffed credentials can be cracked.  LEAP doesn’t protect the authentication like other “real” EAP types, which is the main reason why LEAP can be broken.

(Asleap Options  Screenshot) 

Sniffing Wireless Data

Whether you are directly connected to a wireless network or not, if there is wireless network in range, there is data flying through the air at any given moment. You will need a tool to be able to see this data.
Wireshark (formerly Ethereal) – While there has been much debate on the proper way to pronounce this utility, there is no question that it is an extremely valuable tool. Ethereal can scan wireless and Ethernet data and comes with some robust filtering capabilities. It can also be used to sniff-out 802.11 management beacons and probes and subsequently could be used as a tool to sniff-out non-broadcast SSIDs.

(Screenshot of Ethereal in Action) 
(Yahoo IM Session being sniffed in Ethereal) 
The aforementioned utilities, or similar ones, will be necessities in your own wireless security toolkit. The easiest way to become familiar with these tools is to simply use them in a controlled lab environment. And cost is no excuse as all of these tools are available freely on the Internet.

Saturday, July 25, 2009

INTERNET HACKIG
Netspionage Costing Billions

by Linda Lee, 18
Two years ago, a fifteen-year-old boy logged onto the Internet under the alias 'Comrade'. To some of us, our idea of hacking might include breaking into an email account or viewing confidential company information. However, no one expected that 'Comrade' would cause a three-week shutdown at NASA, steal government email passwords, intercept over 3000 emails and download close to $2 million worth of software used to operate the international space station. If that was not shocking enough, he had twice gained access to the computers used by the Pentagon to monitor threats of nuclear and biological warfare.

Computer hacking has been around for as long as we can remember - certainly as long as we have had a World Wide Web.
Occasionally, the news speaks of silly pranks which imply nothing more than a temporary shutdown of a website, although 'Comrades' hack forced a three-week shutdown for repairs and cost the U.S. government $41,000.
Recently, the case of the hackers tampering with the CIA's website, changing the title to 'Central Stupidity Agency' and filling it with obscenities was merely a nuisance for the agency. It posed no real threat because the CIA's files are inaccessible via that Internet site.
Undoubtedly, there are some who see humour in this - a civilian, probably not even a professional, outwitting an elite US agency.

Then there are more serious crimes, which are no laughing matter.In one case of corporate espionage, two 'heavy manufacturing' firms were bidding on a $900 million contract; one outbid the other by a fraction of a percent.
This was no co-incidence as the losing company later discovered that someone had broken into the company's computer network and accessed files that contained bidding strategy information.

In another case, authorities are chasing an individual who regularly hires U.S. teens to access confidential documents. One young hacker was paid $1,000 - and promised $10,000 more - for stealing design documents for kitchen appliances from U.S. firms.

Beyond selling the trade secrets to a company's competition, some hackers resort to extortion of the company. In Sweden, a 15 and 17 year old tried to extort $2 million from a cellular company to destroy information they had illegally downloaded.

Like most cases of extortion, the criminal's identity is especially difficult to trace and is magnified because of the nature of the Net.

When the Internet was gaining immense popularity, businesses were scrambling to secure domain names and using the technology to expand their market. Seeing e-commerce as an untapped goldmine, many were eagerly diving headfirst into a slew of problems, including security breaches.

Companies like eBay, Buy.com, Yahoo! Amazon and Excite were not prepared when 'Mafiaboy' decided to strike. The 16-year-old Montreal teen crippled their sites last year when he bombarded them with thousands of simultaneous messages, preventing legitimate users from gaining access. His five-day tirade caused an estimated $1.7 billion in damages.

These malicious and insidious attacks threaten security and cost companies and organizations billions of dollars. A survey of the Fortune 1000 companies in 1999 estimates a loss of $45 billion from information theft.

Of course, many organizations are taking extra security measures, including the usage of firewalls (a security mechanism that allows limited access to sites from the Internet).

Still, hackers will gain access. If a fifteen year old can shutdown NASA, what hope is there?

Recently, Ernst & Young, a major consulting and accounting firm, set up computer labs across North America which allow information security consultants to perform 'ethical hacks' to assess the strengths and weaknesses of a client's networks and systems.

By using existing hacker tools, they're fighting fire with fire.
'Ethical hackers' are being paid thousands of dollars to provide clients with clear evidence of how vulnerable their networks are to attacks that could compromise their most sensitive information.

This is proving an effective way of gauging the level of security within a system.

Hacking has become so prevalent that it is almost synonymous with the computer subculture. This "computer geek" culture is portrayed on television (X-files, the Lone Gunmen) and in movies (Hackers, Anti-Trust) as cynical and often self-righteous.

With that, there is a sense of rebellion against big business; the proverbial David struggling against a corporate Goliath.
In many of these crimes, people do them to defy corporations or the government; money is not always the motive. However, it is an act that is still unacceptable that victimizes all who use the Internet.

Viruses, shutdowns, crashes and email hacking will be the burden of the user, a company's money lost to theft will be the burden of its customers and a government's money spent on security will be the burden of its citizens.

Is there anyone not affected by Internet crime? Nope.

Recent news

Labels

Text Widget

PocketCents Local Online Advertising

Blogroll

Discussion