Friday 27 December 2013

Researchers report security flaw in Samsung's Galaxy S4

Researchers report security flaw in Samsung's Galaxy S4

 Here's some Grinchy news for those of you who put Samsung's Galaxy S4 on your holiday wish list: Israeli researchers have identified a vulnerability in the smartphone that allegedly allows a hacker to easily intercept secure data.

We did not immediately hear back from Samsung with a response to the reported flaw, but the company has told The Wall Street Journal and other news outlets that it's looking into the issues and thus far doesn't believe the problem is as serious as the researchers present in their findings.

The report comes not only as many Galaxy S4 phones sit wrapped up under Christmas trees, but also as Samsung pitches its new Knox security platform, used in the device, to federal agencies like the Department of Defense.
 The Knox software offers high-level encryption, a VPN feature, and a way to separate personal data from work data. It also enables IT administrators to manage a mobile device through specific policies, and Samsung hopes it will appeal to security-sensitive clients as a replacement for BlackBerry devices. Knox-enabled devices have already been approved by the Pentagon for government use.

The alleged vulnerability was discovered earlier this month by researchers at Ben-Gurion University's Cyber Security Labs. Specifically, they say while the Knox is the most advanced security-driven infrastructure for mobile phones, the alleged flaw enables malicious software to track e-mails and record data communications. The flaw was uncovered by Ph.D. student Mordechai Guri during an unrelated research task.

"Knox has been widely adopted by many organizations and government agencies and this weakness has to be addressed immediately before it falls into the wrong hands," he said. "We are also contacting Samsung in order to provide them with the full technical details of the breach so it can be fixed immediately." 

via Online Sources
Team- Hack4friends

Wickr 2.0 makes self-destructing SMS -- Care about Privacy

Wickr 2.0 makes self-destructing SMS -- Care about Privacy


Wickr 2.0's debut on Friday makes it much easier to invite friends to use the app, thanks to a new address-book scanning feature that prevents Wickr from learning who you're inviting. That's a big difference from just about every other service out there, which accesses your address book -- usually with your permission -- and then holds on to that data like the digital gold that it is.
Nico Sell, co-founder of Wickr, said that it was important to the company to avoid holding any sensitive information about its customers on its servers
 "Unlike other apps, Wickr does not upload your contact book to our servers; your contacts never leave your device," she said. "We create a cryptographic representation of your contacts that we store on our servers to match with your friends."

Available now on iOS and on Android in the next few days, the Wickr update still uses some of the toughest standards for major encryption protocol available. It uses
ECDH-512 encryption to protect your data; ECDH-512 for the security key exchange; RSA-4096 both as a backup and in legacy versions of the app; and SHA-256 for Transport Later Security and hashing. Once it encrypts a message, the keys are used only once then destroyed by the sender's phone. Since Wickr's servers don't have the decryption keys, there's no way for Wickr to access your messages.

Whit Diffie, co-inventor of the ECDH standard, is a Wickr adviser. The company boasts a veritable who's who roster of privacy bona fides on its advisory board, including Cory Doctorow, Paul Kocher, and Brian Behlendorf.

On top of all that, the service deletes attachment metadata to ensure that the company knows even less about you.

Sell thinks that her free app is at the forefront of a new movement to protect people from government intrusion, no small effort in the wake of the NSA leaks by Edward Snowden.

 "I believe this is the first bacterial growth app ever invented," she said, explaining "bacterial" as being "beneficial to society."

"We plan to license this piece of tech to all the messaging apps in trouble with regulators for abusing users' contact books," Sell said of Wickr's business model.

Wickr 2.0 ditches the mostly-red interface for a streamlined white one with red accents. While the interface makes the app easier to use, the company has invested in other usability features to compete more directly with its competition.

You can now finally reset your password without it being as big a hassle as before; customize your avatar, contact names, and group names; invite multiple friends at once; and send insecure e-mail or SMS from Wickr. For the last one, it warns you when you're about to send a message to a non-Wickr recipient.

Wickr still may not be for everyone, but for people who value sending private messages privately that are authentically difficult -- if not impossible -- to be read by anyone but the intended recipient -- then Wickr is one of the best messaging apps around. 


Team-Hack4friends

Target data stolen in hack showing up on black market --

Target data stolen in hack showing up on black market

As if the Target hack ordeal couldn't get any worse -- data from the retail chain's massive security breach stolen between November 27 and December 15 is popping up in huge quantities on the black market, The New York Times reported Friday.

After Target conceded Thursday that its in-store point-of-sale systems were indeed hacked, compromising as many as 40 million debit and credit card accounts, fraud industry experts are seeing the information flood online card-selling markets to the tune of a "ten- to twentyfold increase" in high-value cards.

The hack, which affected only shoppers who made purchases physically at Target stores and not online customers, was a sophisticated operation. It allowed the hackers to glean customer names, credit and debit card numbers, expiration dates, and three-digit security codes from customers, data that can then be burned onto counterfeit cards and sold on the black market typically for $20 to $45 apiece.

However, Brian Krebs, the security blogger who broke the story of the breach, reported Friday that batches of up to 1 million cards were selling for anywhere from $20 to as high as $100 per card.


 Target CEO Gregg Steinhafel released a statement assuring customers that no one will be held responsible for fraudulent charges and that only a few instances of fraud had since been reported. That echoes a sentiment by Visa yesterday in a statement to CNET in which a company spokesperson said, "Because of advanced fraud-monitoring capabilities, the incidence of fraud involving compromised accounts is actually rare, and Visa fraud rates remain near historic lows."

Steinhafel also said that no PINs had been compromised, a grave concern for those potentially affected as compromised PINs would allow one in possession of a counterfeit card to withdraw cash from an ATM. He added that Target had no reason to believe that customers' Social Security numbers or dates of birth were scooped up in the hack.

Target expects to have notified all 40 million of those affected via e-mail by the end of the weekend. In an attempt to save itself for what will inevitably be a disastrous hit to its holiday sales, Steinhafel also announced a promotion: 


Team-Hack4friends

Snowden's Christmas message about Privacy of ordinary person

 Snowden's Christmas message about Privacy of ordinary person

Edward Snowden, the National Security Agency whistleblower, delivered a video message on Christmas Day via UK's Channel 4 with a simple theme: "privacy matters."

"A child born today will grow up with no conception of privacy at all. They'll never know what it means to have a private moment to themselves -- an unrecorded, unanalyzed thought," Snowden said in the 1-minute, 43-second message. "And that's a problem because privacy matters. Privacy is what allows us to determine who we are and who we want to be."


          Must watch this video if you care about your privacy


Snowden referenced George Orwell's "1984" and noted the book's dystopian visions of microphones, video cameras, and televisions that watch people "are nothing compared to what we have available today. We have sensors in our pockets that track us everywhere we go." 


 He also used the message as an appeal to people everywhere to rally against widespread surveillance.

"The conversation occurring today will determine the amount of trust we can place both in the technology that surrounds us and the government that regulates it. Together, we can find a better balance," he said. "End mass surveillance. And remind the government that if it really wants to know how we feel, asking is always cheaper than spying."

UK's Channel 4 chose Snowden for its annual alternative message and response to Queen Elizabeth's annual Christmas address.

Snowden has temporary asylum in Russia following his leaks earlier this year about the National Security Agency's extensive electronic surveillance programs. The US Justice Department's charges against him include violations of the Espionage Act. 


Team- Hack4friends

Tuesday 24 December 2013

MacBook Webcams can be used to covertly spy on people -- With proof

MacBook Webcams can be used to covertly spy on people -- With proof

Imagine going about your daily life and then one day receiving photos of yourself from inside your home. Sound spooky? Well, this really happened to a woman named Cassidy Wolf, according to the Washington Post. And, to make matters worse, she was nude in the photos.

How did this happen?
Apparently, there's a way for hackers to spy on people via their iSight Webcams in older Apple MacBooks. Typically, when the camera is on a little light is also set off. But, in a newly discovered workaround, this light can be deactivated -- meaning unsuspecting victims have no clue they're being watched.
The Washington Post revealed this new research by Johns Hopkins computer scientist Stephen Checkoway, which shows how people can be spied on with MacBooks and iMacs released before 2008. Using proof-of-concept software, called Remote Administration Tool or RAT, Checkoway was able to reprogram the iSight camera's micro-controller chip so that the light doesn't turn on.

While it could be feasible to do this trick on newer Apple computers or laptops by other brands, it hasn't yet been proven possible.
In the case of Wolf, who was Miss Teen USA, the person spying on her was her high school classmate Jared Abrahams. The FBI was able to nab Abrahams, who pleaded guilty to extortion in October.
In another report by the Washington Post, the former assistant director of the FBI's Operational Technology Division Marcus Thomas said the FBI has been activating computer cameras without turning on the warning lights for years.

This is not the first time someone has been remotely spied on with a Webcam, but it is the first known time that it's been done without the warning light being triggered.

Team Hack4friends

Sunday 1 December 2013

Google upgraded its web security certificate to 2048-bit encryption

Google upgraded its web security certificate to 2048-bit encryption

Never again are you going to get a Google Web site whose security certificate is protected with comparatively weak 1,024-bit encryption.
The Net giant has secured all its certificates with 2,048-bit RSA encryption keys or better, Google security engineer Dan Dulay said in a blog post Monday. Certificates are used to set up encrypted communications between a Web server and Web browser.
That means two things. First, traffic will be harder to decrypt since 1,024-bit keys aren't in use at Google anymore. Second, retiring the 1,024-bit keys means the computing industry can retire the technology altogether by declaring such keys untrustworthy.

Click to enlarge this image

Google has been aggressively moving to stronger encryption because of U.S. government surveillance by the National Security Agency. According to documents leaked by former NSA contractor Edward Snowden, the agency gathered bulk data off Internet taps, including unencrypted data sent between company data centers on its own network, and actively worked to undermine encryption.
Google said it beat its internal end-of-year deadline for the 2,048-bit move. It's also moved to encrypt its internal data transfer between data centers, a move that Yahoo also is making.
In other words, the Net's technology giants are working actively to make surveillance, authorized or not, significantly harder.
"Worry in Silicon Valley/Puget Sound: furor over NSA will cost billions cuz foreign customers fear US companies can't guarantee security," tweeted Strobe Talbott, president of analyst firm Brookings Institution, referring to the geographic regions where tech powers such as Google, Facebook, Yahoo, Microsoft, Twitter, Apple, LinkedIn, and Amazon are located.
There's a lot of work to be done yet, though.Google also supports a standard called "forward secrecy," which uses different keys for different sessions so that decrypting a single message doesn't mean previous messages can likewise be decrypted using the same key. But many other Net giants don't support forward secrecy -- though that's changing, too.
Source -Online media
Team Hack4friends
If you little like our posts/article then share them with your friends and other people to spread our voice throughout the world.

Thursday 28 November 2013

Optical fibres are under NSA snooping -- Privacy is going to smash down

Optical fibres are under NSA snooping -- Privacy is going to smash down

In October, a report surfaced that the US National Security Agency secretly accessed data from tech giants like Google and Yahoo, by way of intercepting the unencrypted traffic flowing between each company's data centers.


Specifically, it's believed the NSA tapped into the fiber-optic cables that connect those data centers. The New York Times reported Tuesday that these cables, which aren't owned by the Internet companies, are easy targets for interception. The largest such fiber-optic cable provider -- an under the radar Denver-based firm called Level 3 -- may have had something to do with the government's infiltration tactics. "Fingers have been pointed" at Level 3, reported the Times, citing three unnamed sources.
Level 3, which provides both Google and Yahoo with cables, was specifically mentioned in the Times report. Other companies that own fiber-optic cables include Verizon Communications, the BT Group, and the Vodafone Group.


To be sure, it's not yet known if Level 3 was a willing participant. When asked if the company gave US or foreign government agencies access to Google and Yahoo's data, Level 3 gave the Times an indirect response: "It is our policy and our practice to comply with laws in every country where we operate, and to provide government agencies access to customer data only when we are compelled to do so by the laws in the country where the data is located."
Tapping fiber-optic cables is just a modern spin on an old spy game. As early as the days of the telegraph, spies have set up shop near communications companies. Since then, the government has tapped other kinds of traffic, from long-distance phone to satellite.
News broke of the NSA and British counterpart GCHQ's efforts at intercepting data center traffic when The Washington Post reported details of a project called MUSCULAR. Both Google andYahoo have taken steps to encrypt the information that moves between its data farms. The Post's was only the latest in over half a year of surveillance revelations, since former NSA contractor Edward Snowden first leaked details of the government agency's activity.
In the wake of those revelations, tech companies have been quick to maintain their innocence in the situation. Last week, in a blog post announcing Yahoo's attempt to catch up on encryption,Yahoo CEO Marissa Mayer said, "I want to reiterate what we have said in the past: Yahoo has never given access to our data centers to the NSA or to any other government agency. Ever."

If you little like our posts then please share them with your friends to spread our voice throughout the people world.
Your One Share can make better the life of people

Friday 15 November 2013

Security holes found in D-Link Routers - Security Researchers

A new spate of vulnerabilities have been found in a D-Link router, a security researcher said Monday.
The D-Link 2760N, also known as the D-Link DSL-2760U-BN, is susceptible to several cross-site scripting (XSS) bugs through its Web interface, reported ThreatPost. 

Liad Mizrachi, the researcher who discovered the bugs, said he notified D-Link about the bugs in August, September, and October, but D-Link did not respond.
The report follows a more serious backdoor bug found in the following D-Link routers: DIR-100, DIR-120, DI-524UP, DI-604S, DI-604UP, DI-604+, DI-624S, and the TM-G5240. D-Link told ThreatPost in October that it was working on a patch to the backdoor bug.
Jacob Holcomb, a security researcher who uncovered widespread vulnerabilities in popular routers earlier this year, told media that he wasn't surprised by the backdoor bug, and wished that manufacturers would do more to fix security problems when found in embedded devices such as cameras and routers.
"Code written for these devices continues to provide inadequate security for today's digital society, and manufacturers should be held accountable for the implementation of code that intentionally circumvents security," he said.
D-Link told media that the router is not sold in the US and that the company is working on a solution that will be published on their support site when it's ready. D-Link did not offer a timeline for when that might be, though. 

Source - Online Media 

Team- Hack4friends
  

Major Tech. Companies planning to fend off NSA hakcing

The National Security Agency (NSA) might soon have a harder time accessing user data.
Google, Yahoo, Microsoft, Apple, and a other prominent technology companies are investing heavily in stronger, 2048-bit encryption that some say, won't be easily overcome for more than a decade, due to computing power constraints.

Google is one of the leaders in the effort, announcing in July that it would encrypt its user data with 2048-bit encryption. According to Bloomberg, which spoke with several other companies that are investing in new encryption, Yahoo confirmed to the publication that it will add 2048-bit encryption to its Mail by January. Facebook also plans to move to 2048-bit encryption. Facebook confirmed to Bloomberg that it also plans to roll out "perfect forward secrecy," a feature that would prevent snoopers from accessing user data even if they can access the company's security codes.

Microsoft and Apple are also reportedly ramping up their data-security efforts.
The technology companies' renewed interest in data security and encryption comes after several reports have suggested that the NSA has been accessing their data and using it for spying purposes. Those firms have gone on the record saying they comply with legal requests where appropriate, but are doing everything they can to keep user data safe. The investment in 2048-bit encryption follows that.
Still, encryption is just one small piece of a broader puzzle the technology companies have yet to solve. The NSA has the ability to overcome a wide array of security protocols. Last month, in fact, James Clapper, the director of national intelligence, said that the US employs "every intelligence tool available" to cull data from national security threats. Whether those efforts are applied to technology company servers has been debated, though leaks from Edward Snowden and others have suggested they are.
Even so, the improved encryption efforts could lengthen the time at which it takes the NSA and other spying agencies around the world to access user information. And that's at least something.

 Source : cnet news

Monday 21 October 2013

How to hack (Brute Force) gmail account with backtrack 5

How to hack (Brute Force) gmail account with backtrack 5


Sorry for late posting on blog also on our facebook page infact i was very busy in my some projects but NOW I M BACK.

Today i am here posting a very good and old method to hack any email id {e.g: gmail,ymail,etc} as you know "OLD IS GOLD".
This method is known as Brute-Force Attack. I had added self explanatory images to use special tool of backtrack5 (any version) but i'm using BT5-R3 .

You need two thing here...
1. Backtrack 5 (preferable R3 version) with internet connectivity
2. Little piece of Mind

Now read carefully throughout this article at last you will find you as EMAIL PASS CRACKER.


I'm considering that you are little familiar with backtrack . so just make your own password list to attack on victim email and now save it as "pass.txt" or whatever you want to give name. 

                                                           Click on the image for enlarge view

Now follow the path shown in this image and now click on " hydra-gtk " option.


Click on the image for enlarge view

Now put the values as follow :
Single Target- smtp.gmail.com
Port - 816/whatever you want 
Protocol - smtp
Check the mark as shown in image


Click on the image for enlarge view

Username - username of victim email id
Password list - Write the path of your pass list


Click on the image for enlarge view

Now click on start button in the bottom of this window , it will start attack on email id.
if you are enough lucky then you will find password here.


Click on the image for enlarge view


I'm hoping you will like it ,i fyou little like this article please do share with your friends and if you face any problem then comment here.
Our facebook fan page ::  E-hackers
  Team-hack4friends



Saturday 31 August 2013

China is under Massive DDOS attack

China is under Massive DDOS attack

A huge portion of Chinese-based Internet was disrupted on Sunday courtesy of  a massive Distributed Denial of Service (DDoS) attack.  The government has said it was the biggest it had ever experienced, as the attack was designed to flood networking infrastructure at the China Internet Network Information Center, which manages the Chinese domain name system and the .cn top level domain.

DDoS ,hack4friends.blogspot.com
One such attack hit  on Sunday morning at 2am, with another more powerful DDoS arriving within the space of two hours.  It is thought a numbered of sites went down, whilst others experienced a slow or interrupted internet access.  The attack appeared to have been overcome by Monday and security experts have spotted lots of signals which are out of the ordinary, hinting at a significant DDoS in China.  Dan Holden, director of research at Arbor Networks, said “Arbor saw a significant increase in DDoS attacks targeting .cn on Sunday…The number of attacks more than doubled and ATLAS traffic statistics show a significant increase in attack size, indicating a serious attack was carried out.”

CEO Matthew Prince of content delivery network, CloudFlare told the Wall Street Journal  it had seen a 32 percent dip in traffic for Chinese sites sitting on its CDN when compared to the same period a day before.  “I don’t know how big the ‘pipes’ of .cn are, but it is not necessarily correct to infer that the attacker in this case had a significant amount of technical sophistication or resources,” adding that it could have been an individual rather than a group that carried out the attack.   There have been a number of significant DDoS attacks of late, with suggestions of political motivations as China is home to a lot of DDoS activity. Akamai recently claimed the country saw 34 percent of global DDoS traffic in fourth quarter of 2012.  Hosting provider GreenNet, which describes itself as an ethical host and ISP, with Fair Trade Africa and Privacy International amongst its customers, was knocked offline by significant DDoS strikes earlier this month.

via Online media sources

Team - hack4friends

Friday 2 August 2013

62 Pakistani websites hacked by r00tsect0r Team

62 pk websites hacked by r00tsect0r crew member spider64


Today, Indian well known defacer spider64 notified us [hack4friends Team] about a mass defacement of pakistani domains.
spider64
 The reason of such mass defacement "Stop defacing Indian Websites".

here is the list of websites hacked by spider64


http://evita-me.com
http://tellcoms.com
http://inforesights.com
http://salsabeila.com
http://hitmas.com
http://www.funtimepass.com
http://federallimousineservice.com
https://arifnaushahi.com
http://rafiqenterprises.com.pk
http://shelozon.com
https://faisalasghar.com
https://binrahman.com
http://foundationstone.com.pk
http://medco.net.pk
http://articleteams.com
https://opaltradersltd.com
http://meeranjee.com
http://opalstudios.com
http://saudipak.com/admin
http://sprintarabia.com
http://sti.com.pk
https://muhammadattique.com
http://goldengympk.com
http://www.pricemycartons.com
http://bleeclothing.com
http://medco.net.pk
http://agoudelock.com
http://frontexgroup.com
http://w3.com.pk
http://ideasdnn.com
http://agoudelock.com
http://restoncoachbus.com/index.html
http://uhrs.com.pk
http://sscpakistan.com
http://manhattanpakistan.com
http://combnet.net
http://lg.gok.pk
http://dyaanscollection.com
http://yamtex.com
http://stlyonn.com
http://atlantaautismconsortium.org/index.html
http://wagexpress.com
http://thehewadgroup.com
http://mehakraza.net
http://issrahairways.net
http://bluetecharabia.com/index.html
https://atlantic-limo.com
http://inceptapharmapk.com
http://kalamrestaurant.fr
http://softpakistan.org
http://mugheestextiles.com
http://hbcontract.com
http://medley.com.pk
http://davosin.com
http://nmtech.com.pk
http://galalocations.com
http://decisions.com.pk
http://bahriatownspk.com

http://alibdaamovers.net
hotelgulbergpalace.com
http://mindworksmedia.org/

http://agp-pakistan.com/index.html


Stay updated with cyber news ,hit a like to our facebook fan page E-hackers

Sunday 28 July 2013

No cyber war between INDIA and PAKISTAN on Independence day

No cyber war between INDIA and PAKISTAN


In these days many news are spreading very vigorously on different blogs / cyber news portals. These news are about an cyber attack which will we shooted by  PCE[Pak Cyber Eaglez] and other Pakistani hackers group on Indian Cyber Space at Independence Day and special target IndiShell , Indian Cyber Pyrates, Indian Cyber Army etc.


But to clarify such all fake news Chief Member of PCE -- Pakhtun Haxor & Sizzling Soul  contacted us and told that there will be no involvement of any PCE members in such shitty cyber attacks  and they want just peace between both Countries.

And in order to more clarify it a chief member of Pakistan Cyber Army also said there will be no cyber attack on INDIA and such fake news are being spread by a noobs who want to be famous in cyber world.

Everybody wants Peace from both countries.
So donot respond to such fake cyber war news between India and Pakistan 

Team Hack4friends

For more latest news about Cyber World Subscribe our RSS feed and Hit a like to our facebook fan page E-hackers

Sunday 7 July 2013

New amazing Google Terminal --- mirror of google

New amazing Google Terminal --- mirror of google




A mirror of google websites is created by some developers must have a look on these all links..

                                            Google Terminal
                                                  Click here

                                           Google Pac-man
                                                 Click here

                                           Google Underwater
                                                  Click here

                                           Google Gravity
                                                   Click here

                                            Google Snake
                                                    Click here

                                             Google Guitar
                                                     Click here

                                                IP Geolocation
                                                     Click here

                                                   Bing Mirror
                                                      Click here

Why are you silent ?? Just comment here whatever in yourmind........

Wednesday 3 July 2013

Linux v3.10 Released

Linux v3.10 Released


Web Hosting

Linus Torvalds released version 3.10 just nine weeks after Linux 3.9 was released, making this development cycle about one week shorter than many previous cycles. This speed is particularly impressive considering more changes were integrated into the latest kernel version than ever before, at least if you go by the number of commits in the source code management system – the number of lines changed is about the same as for previous versions.


This release adds support for bcache, which allows to use SSD devices to cache data from other block devices; a Btrfs format improvement that makes the tree dedicated to store extent information 30-35% smaller; support for XFS metadata checksums and self-describing metadata, timer free multitasking for applications running alone in a CPU, SysV IPC and rwlock scalability improvements, the TCP Tail loss probe algorithm that reduces tail latency of short transactions, KVM virtualization support in the MIPS architecture, many new drivers and small improvements.

Download linux 3.10 kerel from here

North Korea grants asylum for Snowden

North Korea grants asylum for Snowden

At last hacker's beloved person Edward Snowden found a home
SEOUL, Republic of Korea – In response to a formal application for asylum on behalf of Edward Snowden, Kim Jong-un issued a statement offering the whistleblower not just asylum, but full North Korean citizenship. Snowden and his entourage, staffed mostly by WikiLeaks employees, were ecstatic at the news of a safe haven after 14 other countries had denied their applications.



“The Democratic People’s Republic of Korea promises to allow Edward Snowden to continue to leak anything he wants. We will provide him with many of the best top-secret hacking tools available in North Korea,” said a representative from the North Korean military.

“We are just so relieved that Snowden has finally found friendly shores,” said Glen Greenwild, the reporter who famously interviewed Edward Snowden in a Hong Kong hotel.

Snowden issued a statement written in Spanish, thanking North Korea for their commitment to freedom.

Source: Article published at http://www.chronicle.su/news/north-korea-grants-asylum-for-snowden/ at Jul.02,2013

Tuesday 2 July 2013

Download free ebook on backtrack 5 wireless penetration

Download free ebook on backtrack 5 wireless penetration


Content of ebook..

Chapter 1: Wireless Lab Setup

Hardware requirements
Software requirements
Installing BackTrack
Time for action – installing BackTrack
Setting up the access point
Time for action – configuring the access point
Setting up the wireless card
Time for action – configuring your wireless card
Connecting to the access point
Time for action – configuring your wireless card

Chapter 2: WLAN and Its Inherent

Insecurities
Revisiting WLAN frames
Time for action – creating a monitor mode interface
Time for action – sniffing wireless packets
Time for action – viewing Management,
Control, and Data frames
Time for action – sniffing data packets for our network
Time for action – packet injection
Important note on WLAN sniffing and injection
Time for action – experimenting with your Alfa card
Role of regulatory domains in wireless
Time for action – experimenting with your Alfa card

Chapter 3: Bypassing WLAN

Authentication
Hidden SSIDs
Time for action – uncovering hidden
SSIDs
MAC filters
Time for action – beating MAC filters
Open Authentication
Time for action – bypassing Open
Authentication
Shared Key Authentication
Time for action – bypassing Shared
Authentication

Chapter 4: WLAN Encryption

Flaws
WLAN encryption
WEP encryption
Time for action – cracking WEP
WPA/WPA2
Time for action – cracking WPA-PSK weak passphrase
Speeding up WPA/WPA2 PSK cracking
Time for action – speeding up the cracking process
Decrypting WEP and WPA packets
Time for action – decrypting WEP and
WPA packets
Connecting to WEP and WPA networks
Time for action – connecting to a WEP network
Time for action – connecting to a WPA network

Chapter 5: Attacks on the WLAN

Infrastructure
Default accounts and credentials on the access point
Time for action – cracking default accounts on the access points
Denial of service attacks
Time for action – De-Authentication DoS attack
Evil twin and access point MAC spoofing
Time for action – evil twin with MAC spoofing
Rogue access point
Time for action – Rogue access point

Chapter 6: Attacking the Client

Honeypot and Mis-Association attacks
Time for action – orchestrating a Mis-
Association attack
Caffe Latte attack
Time for action – conducting the Caffe
Latte attack
De-Authentication and Dis-Association attacks
Time for action – De-Authenticating the client
Hirte attack
Time for action – cracking WEP with the
Hirte attack
AP-less WPA-Personal cracking
Time for action – AP-less WPA cracking
Summary

Chapter 7: Advanced WLAN

Attacks
Man-in-the-Middle attack
Time for action – Man-in-the-Middle attack
Wireless Eavesdropping using MITM
Time for action – wireless eavesdropping
Session Hijacking over wireless
Time for action – session hijacking over wireless
Finding security configurations on the client
Time for action – enumerating wireless security profiles
Summary

Chapter 8: Attacking WPA-Enterprise and RADIUS

Setting up FreeRadius-WPE
Time for action – setting up the AP with
FreeRadius-WPE
Attacking PEAP
Time for action – cracking PEAP
Attacking EAP-TTLS
Time for action – cracking EAP-TTLS
Security best practices for Enterprises
Summary

Chapter 9: WLAN Penetration

Testing Methodology
Wireless penetration testing
Planning
Discovery
Time for action – discovering wireless devices
Attack
Finding rogue access points
Finding unauthorized clients
Cracking the encryption
Compromising clients
Reporting
Summary 

Download it from here


    


Caution :: This article is only for educational purpose..

    

How to spoof (Change) MAC address without any software

How to spoof (Change)  MAC address without any software


Mac address Spoofing:::::::

I am posting this article considering the thing that you know very well about What is MAC address. Still if any guy dont know then comment below i will explain it via new article.

Lets see how easy to spoof MAC address in Windows OS ...

I have solely tried it and get success in it .. 
Just follow these steps..

Step 1.   Go to the icon of Computer/My Computer then left click on it and click on "manage" option.

Step 2. Then on the left side of "Computer Management" there is a option "Disk manager" click on it .
                           
                                                                                        Click to enlarge the image


Step 3. You will see along list of different options ..... now double click on option "Network Adapters" .........you will find a list of all network adapter of your pc.. so now double click on that network adapter option which is being used on your current internet connection. ........and now click on "Advanced" tab you will see a option of "Network address" click on value button and enter any new mac address whatever you want .. now click on "Ok" button and restart your network adapter connection.. 

 if in first time it doesnt work then try once more or after rebbot  it will work............ its a very perfect method for windows user.


Disclaimer: This article is only for educational purpose . We will not be responsible about how you use such tricks .Try at your own risk we will not be responsible if you get any type of damage with your system.



How to block ads on Youtube

How to block ads on Youtube

 Youtube is the most popular Video sharing website. Launched on Feb 14th 2005. And within such a short period it became the most popular Video sharing site. We often open youtube only to search for any video clipping,etc... but if any ad comes in between our video buffering it irritates us a lot. These Ads are put on by the Google AdSense.

There are two types of Ads which we come across:-

> Skip-able Video Ads

> Non-Skip-able Video Ads


> Skip-able Video Ads :- These Ads can be skipped of after 5 seconds. Google doesn't force the users to watch the complete 30 seconds video.

> Non-Skip-able Video Ads :- Well! these Video Ads is also of 30 seconds but cannot be skipped after 5 seconds. Google forces the users to see the whole video. And we often get irritated because of this. It makes us go crazy at times.


These Ads can be Blocked by using Extensions (Add-ons) to the Web Browser you are using.


> Mozilla-Firefox has the best one- Adblock Plus 2.1.1

This not only blocked the Ads in youtube but blocks away almost every Ads on internet you find usually.Just Download the Add-ons from the link above and then you can enjoy Ads-free Browsing :)


> For Google Chrome you can use - AdBlock+ 1.1.9.17

With this you will have a option to block anything you wish to and can also set block similar elements option.

You can also use - Telly

It is simple tool to skip Ads on youtube... and also is useful in sharing videos easily

Now ... Enjoy add free youtube videos

If our posts are little helpful then plz share with your friends and hit a like if you face any pronlem then comment here..


Sunday 30 June 2013

Basic commands of Backtrack

Basic commands of Backtrack

                                                                              
                                                                              Click to enlarge image

Know about your System

uname            Print System Information
who               Show Who Is Logged On 
cal                 Displays Calculator
date               Print System Date And Time
df                   Report File System Disk Space Usage
du                  Estimate File Space Usage 
ps                  Displays Information Of Current Active Processes
kill                 Allows To Kills Process
clear              Clear The Terminal Screen 
cat /proc/cpuinfo      Cpuinfo Display CPU Information 
cat /proc/meminfo    Display Memory Information 



File operator

pwd              Print Name Of Current/Working Directory 
cd                 Changing The Working Directory 
cp                 Copy Files Or Directory 
rm                 Remove Files And Directory 
ls                   List Of Directory Contents 
mkdir             Make Directory 
cat                 Concatenate Files And Print On Standard Output mv                 Move Files 
chmod           Change Files Permissions

                       

Network

ifconfig          To Config Network Interface
ping               Check The Other System Are Reachable From The Host System
wget              Download Files From Network
ssh                Remote Login Program
ftp                 Download/Upload Files From/To Remote System
last                Displays List Of Last Logged In User
telnet             Used To Communicate With Another Host Using THe Telnet Protocol
                       

Compression

tar                To Store And Extract Files From An Archive File Known As Tar File
gzip              Compress Or Decompress Named Files

                       

Searching Files


grep              Search Files(s) For Specific Text
find               Search For Files In A Directory Hierarchy
locate            Find Files By Name

                       

*****************************Thanks for Your kind Visit****************************

Receive All Free Updates Via Facebook.