Sunday 28 July 2013

No cyber war between INDIA and PAKISTAN on Independence day

No cyber war between INDIA and PAKISTAN


In these days many news are spreading very vigorously on different blogs / cyber news portals. These news are about an cyber attack which will we shooted by  PCE[Pak Cyber Eaglez] and other Pakistani hackers group on Indian Cyber Space at Independence Day and special target IndiShell , Indian Cyber Pyrates, Indian Cyber Army etc.


But to clarify such all fake news Chief Member of PCE -- Pakhtun Haxor & Sizzling Soul  contacted us and told that there will be no involvement of any PCE members in such shitty cyber attacks  and they want just peace between both Countries.

And in order to more clarify it a chief member of Pakistan Cyber Army also said there will be no cyber attack on INDIA and such fake news are being spread by a noobs who want to be famous in cyber world.

Everybody wants Peace from both countries.
So donot respond to such fake cyber war news between India and Pakistan 

Team Hack4friends

For more latest news about Cyber World Subscribe our RSS feed and Hit a like to our facebook fan page E-hackers

Sunday 7 July 2013

New amazing Google Terminal --- mirror of google

New amazing Google Terminal --- mirror of google




A mirror of google websites is created by some developers must have a look on these all links..

                                            Google Terminal
                                                  Click here

                                           Google Pac-man
                                                 Click here

                                           Google Underwater
                                                  Click here

                                           Google Gravity
                                                   Click here

                                            Google Snake
                                                    Click here

                                             Google Guitar
                                                     Click here

                                                IP Geolocation
                                                     Click here

                                                   Bing Mirror
                                                      Click here

Why are you silent ?? Just comment here whatever in yourmind........

Wednesday 3 July 2013

Linux v3.10 Released

Linux v3.10 Released


Web Hosting

Linus Torvalds released version 3.10 just nine weeks after Linux 3.9 was released, making this development cycle about one week shorter than many previous cycles. This speed is particularly impressive considering more changes were integrated into the latest kernel version than ever before, at least if you go by the number of commits in the source code management system – the number of lines changed is about the same as for previous versions.


This release adds support for bcache, which allows to use SSD devices to cache data from other block devices; a Btrfs format improvement that makes the tree dedicated to store extent information 30-35% smaller; support for XFS metadata checksums and self-describing metadata, timer free multitasking for applications running alone in a CPU, SysV IPC and rwlock scalability improvements, the TCP Tail loss probe algorithm that reduces tail latency of short transactions, KVM virtualization support in the MIPS architecture, many new drivers and small improvements.

Download linux 3.10 kerel from here

North Korea grants asylum for Snowden

North Korea grants asylum for Snowden

At last hacker's beloved person Edward Snowden found a home
SEOUL, Republic of Korea – In response to a formal application for asylum on behalf of Edward Snowden, Kim Jong-un issued a statement offering the whistleblower not just asylum, but full North Korean citizenship. Snowden and his entourage, staffed mostly by WikiLeaks employees, were ecstatic at the news of a safe haven after 14 other countries had denied their applications.



“The Democratic People’s Republic of Korea promises to allow Edward Snowden to continue to leak anything he wants. We will provide him with many of the best top-secret hacking tools available in North Korea,” said a representative from the North Korean military.

“We are just so relieved that Snowden has finally found friendly shores,” said Glen Greenwild, the reporter who famously interviewed Edward Snowden in a Hong Kong hotel.

Snowden issued a statement written in Spanish, thanking North Korea for their commitment to freedom.

Source: Article published at http://www.chronicle.su/news/north-korea-grants-asylum-for-snowden/ at Jul.02,2013

Tuesday 2 July 2013

Download free ebook on backtrack 5 wireless penetration

Download free ebook on backtrack 5 wireless penetration


Content of ebook..

Chapter 1: Wireless Lab Setup

Hardware requirements
Software requirements
Installing BackTrack
Time for action – installing BackTrack
Setting up the access point
Time for action – configuring the access point
Setting up the wireless card
Time for action – configuring your wireless card
Connecting to the access point
Time for action – configuring your wireless card

Chapter 2: WLAN and Its Inherent

Insecurities
Revisiting WLAN frames
Time for action – creating a monitor mode interface
Time for action – sniffing wireless packets
Time for action – viewing Management,
Control, and Data frames
Time for action – sniffing data packets for our network
Time for action – packet injection
Important note on WLAN sniffing and injection
Time for action – experimenting with your Alfa card
Role of regulatory domains in wireless
Time for action – experimenting with your Alfa card

Chapter 3: Bypassing WLAN

Authentication
Hidden SSIDs
Time for action – uncovering hidden
SSIDs
MAC filters
Time for action – beating MAC filters
Open Authentication
Time for action – bypassing Open
Authentication
Shared Key Authentication
Time for action – bypassing Shared
Authentication

Chapter 4: WLAN Encryption

Flaws
WLAN encryption
WEP encryption
Time for action – cracking WEP
WPA/WPA2
Time for action – cracking WPA-PSK weak passphrase
Speeding up WPA/WPA2 PSK cracking
Time for action – speeding up the cracking process
Decrypting WEP and WPA packets
Time for action – decrypting WEP and
WPA packets
Connecting to WEP and WPA networks
Time for action – connecting to a WEP network
Time for action – connecting to a WPA network

Chapter 5: Attacks on the WLAN

Infrastructure
Default accounts and credentials on the access point
Time for action – cracking default accounts on the access points
Denial of service attacks
Time for action – De-Authentication DoS attack
Evil twin and access point MAC spoofing
Time for action – evil twin with MAC spoofing
Rogue access point
Time for action – Rogue access point

Chapter 6: Attacking the Client

Honeypot and Mis-Association attacks
Time for action – orchestrating a Mis-
Association attack
Caffe Latte attack
Time for action – conducting the Caffe
Latte attack
De-Authentication and Dis-Association attacks
Time for action – De-Authenticating the client
Hirte attack
Time for action – cracking WEP with the
Hirte attack
AP-less WPA-Personal cracking
Time for action – AP-less WPA cracking
Summary

Chapter 7: Advanced WLAN

Attacks
Man-in-the-Middle attack
Time for action – Man-in-the-Middle attack
Wireless Eavesdropping using MITM
Time for action – wireless eavesdropping
Session Hijacking over wireless
Time for action – session hijacking over wireless
Finding security configurations on the client
Time for action – enumerating wireless security profiles
Summary

Chapter 8: Attacking WPA-Enterprise and RADIUS

Setting up FreeRadius-WPE
Time for action – setting up the AP with
FreeRadius-WPE
Attacking PEAP
Time for action – cracking PEAP
Attacking EAP-TTLS
Time for action – cracking EAP-TTLS
Security best practices for Enterprises
Summary

Chapter 9: WLAN Penetration

Testing Methodology
Wireless penetration testing
Planning
Discovery
Time for action – discovering wireless devices
Attack
Finding rogue access points
Finding unauthorized clients
Cracking the encryption
Compromising clients
Reporting
Summary 

Download it from here


    


Caution :: This article is only for educational purpose..

    

How to spoof (Change) MAC address without any software

How to spoof (Change)  MAC address without any software


Mac address Spoofing:::::::

I am posting this article considering the thing that you know very well about What is MAC address. Still if any guy dont know then comment below i will explain it via new article.

Lets see how easy to spoof MAC address in Windows OS ...

I have solely tried it and get success in it .. 
Just follow these steps..

Step 1.   Go to the icon of Computer/My Computer then left click on it and click on "manage" option.

Step 2. Then on the left side of "Computer Management" there is a option "Disk manager" click on it .
                           
                                                                                        Click to enlarge the image


Step 3. You will see along list of different options ..... now double click on option "Network Adapters" .........you will find a list of all network adapter of your pc.. so now double click on that network adapter option which is being used on your current internet connection. ........and now click on "Advanced" tab you will see a option of "Network address" click on value button and enter any new mac address whatever you want .. now click on "Ok" button and restart your network adapter connection.. 

 if in first time it doesnt work then try once more or after rebbot  it will work............ its a very perfect method for windows user.


Disclaimer: This article is only for educational purpose . We will not be responsible about how you use such tricks .Try at your own risk we will not be responsible if you get any type of damage with your system.



How to block ads on Youtube

How to block ads on Youtube

 Youtube is the most popular Video sharing website. Launched on Feb 14th 2005. And within such a short period it became the most popular Video sharing site. We often open youtube only to search for any video clipping,etc... but if any ad comes in between our video buffering it irritates us a lot. These Ads are put on by the Google AdSense.

There are two types of Ads which we come across:-

> Skip-able Video Ads

> Non-Skip-able Video Ads


> Skip-able Video Ads :- These Ads can be skipped of after 5 seconds. Google doesn't force the users to watch the complete 30 seconds video.

> Non-Skip-able Video Ads :- Well! these Video Ads is also of 30 seconds but cannot be skipped after 5 seconds. Google forces the users to see the whole video. And we often get irritated because of this. It makes us go crazy at times.


These Ads can be Blocked by using Extensions (Add-ons) to the Web Browser you are using.


> Mozilla-Firefox has the best one- Adblock Plus 2.1.1

This not only blocked the Ads in youtube but blocks away almost every Ads on internet you find usually.Just Download the Add-ons from the link above and then you can enjoy Ads-free Browsing :)


> For Google Chrome you can use - AdBlock+ 1.1.9.17

With this you will have a option to block anything you wish to and can also set block similar elements option.

You can also use - Telly

It is simple tool to skip Ads on youtube... and also is useful in sharing videos easily

Now ... Enjoy add free youtube videos

If our posts are little helpful then plz share with your friends and hit a like if you face any pronlem then comment here..


*****************************Thanks for Your kind Visit****************************

Receive All Free Updates Via Facebook.