Recent Articles
Home » Archives for April 2013
Friday, April 12, 2013
Friday, April 12, 2013
- 0 Comments
Get all the passwords on LAN
Here is a great tutorial of how to know the passwords on LAN ..... This trick is very efficient . You can know all the passwords on the lan using this . The software CAIN AND ABEL is necessary for that.
Download from this link : download CAIN AND ABEL
-=Step One=-
You want to activate "Sniffer" by activating the button next to the "Open" icon. You will also want to turn on APR which stands for APR Poison Routing. (Don't take POISON literally, It will not actually harm the computer you are piggybacking on)
-=Step Two=-
Switch your active/current tab to "Sniffer," after doing so right click in the middle of the blank fields and click on "Scan MAC Addresses" and make sure "All hosts in my subnet" is clicked with a dot in the circle. You should see several hosts pop up, if they did then you are doing everything correctly so far.
-=Step Three=-
At the bottom of Cain and Abel, you will see a tab called "APR," make that your active/current tab you are viewing under the "Sniffer" tab. Now click on the top white blank box in the "APR" subtab, and go up top and click on the "Add" button. Click on what ever you Routers IP is. Then click the IP of the target computer or whatever you want to piggyback on. Then press OK.
You want to activate "Sniffer" by activating the button next to the "Open" icon. You will also want to turn on APR which stands for APR Poison Routing. (Don't take POISON literally, It will not actually harm the computer you are piggybacking on)
-=Step Two=-
Switch your active/current tab to "Sniffer," after doing so right click in the middle of the blank fields and click on "Scan MAC Addresses" and make sure "All hosts in my subnet" is clicked with a dot in the circle. You should see several hosts pop up, if they did then you are doing everything correctly so far.
-=Step Three=-
At the bottom of Cain and Abel, you will see a tab called "APR," make that your active/current tab you are viewing under the "Sniffer" tab. Now click on the top white blank box in the "APR" subtab, and go up top and click on the "Add" button. Click on what ever you Routers IP is. Then click the IP of the target computer or whatever you want to piggyback on. Then press OK.
-=Step Four=-
After pressing OK you should see a line in the top box and it will either say IDLE or POISONING. If it says IDLE just give it a couple of seconds for it to start the poisoning. If it is POISONING go down to the bottom again and find "Passwords," make that your current/active subtab. Now passwords and usernames should be popping up under any of the select categories, mine are usually HTTP passwords but, yours might be different.
After pressing OK you should see a line in the top box and it will either say IDLE or POISONING. If it says IDLE just give it a couple of seconds for it to start the poisoning. If it is POISONING go down to the bottom again and find "Passwords," make that your current/active subtab. Now passwords and usernames should be popping up under any of the select categories, mine are usually HTTP passwords but, yours might be different.
_________________________________________________________________________________________________
How to detect and block an ARP spoofing
attack on a LAN
ARP poisoning attacks are the most dangerous MITM attacks when working on a LAN. The most hazardous thing about this attack is that they go unnoticed for a very long time or in some cases they would never be detected if not checked for. No naive internet user is gonna check if he is being poisoned. This would go undetected in a trusted environment like an office or at college. Well then it is the responsibility of the admins to protect their clients from attack.
Detecting an ARP Spoofing attack
Well detecting an ARP attack is fairly easy assuming that the malware responds to standard ARP requests. Here's how you go about detecting a possible attack.
1. Start a network capture using a tool such as tcpdump or Wireshark.
2. Generate some traffic on your machine and then stop the capture.
3. Now analyze the traffic. You don't have to be an expert to do this. Check if you are getting ARP requests or responses from multiple addresses.
If you are getting ARP traffic from sources other than your default gateway there is possibly an eavesdropper. This eavesdropper could also modify what you recieve. A very good application of MITM is 'login credentials stealing', especially from SSL secured websites. Tools such as Ettercap and Cain & Abel can make this possible even for a script kiddie.
This was about detecting an MITM, but there is no manual way to block an MITM, other than bashing up the intruder sitting at the poisoning host machine.
Blocking an ARP Spoofing Attack:
ArpON (Arp handler inspectiON) is a portable handler daemon that make Arp secure in order to avoid Arp Spoofing/Poisoning & co.
This is possible using two kinds of anti Arp Poisoning techniques, the first is based on SARPI or "Static Arp Inspection", the second on DARPI or "Dynamic Arp Inspection" approach.
Keep in mind other common tools fighting ARP poisoning usually limit their activity only to point out the problem instead of blocking it, ArpON does it using SARPI and DARPI policies. Finally you can use ArpON to pentest some switched/hubbed LAN with/without DHCP protocol, in fact you can disable the daemon in order to use the tools to poison the ARP Cache.
Well detecting an ARP attack is fairly easy assuming that the malware responds to standard ARP requests. Here's how you go about detecting a possible attack.
1. Start a network capture using a tool such as tcpdump or Wireshark.
2. Generate some traffic on your machine and then stop the capture.
3. Now analyze the traffic. You don't have to be an expert to do this. Check if you are getting ARP requests or responses from multiple addresses.
If you are getting ARP traffic from sources other than your default gateway there is possibly an eavesdropper. This eavesdropper could also modify what you recieve. A very good application of MITM is 'login credentials stealing', especially from SSL secured websites. Tools such as Ettercap and Cain & Abel can make this possible even for a script kiddie.
This was about detecting an MITM, but there is no manual way to block an MITM, other than bashing up the intruder sitting at the poisoning host machine.
Blocking an ARP Spoofing Attack:
ArpON (Arp handler inspectiON) is a portable handler daemon that make Arp secure in order to avoid Arp Spoofing/Poisoning & co.
This is possible using two kinds of anti Arp Poisoning techniques, the first is based on SARPI or "Static Arp Inspection", the second on DARPI or "Dynamic Arp Inspection" approach.
Keep in mind other common tools fighting ARP poisoning usually limit their activity only to point out the problem instead of blocking it, ArpON does it using SARPI and DARPI policies. Finally you can use ArpON to pentest some switched/hubbed LAN with/without DHCP protocol, in fact you can disable the daemon in order to use the tools to poison the ARP Cache.
Download link: ARP handler inspection
Update status via iPhone 5
Now you can use the latest iPhone 5 for your facebook status without having it....Enjoy it. :)
iPhone 5 is the most costly product from apple after iPads. Every person has a desire to us it once.The iPhone is having all updated apps from app store and moreover it supports 5G network too.The 5th generation phone is really the top mark for young generations.It is still launched in some countries even.This phone is having iMessage in order to compete with blackberry messenger..
OPEN BELOW LINK TO UPDATE VIA IPHONE 5:
Update via iphone 5
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
Update status via Xperia Z
A sharp full HD display , magnificently bright, crisp and colorful, so lifelike it becomes real and extremely extraordinary. The 5” screen of Sony Xperia Z brings you with the real time experience and the millions of colors make it a reality.The chasis of this smartphone is 7.8 mm only with dust and water resistance shield.The trndy glassy chasis, unlike iPhone 5, makes the Xperia Z more handy and nice to hold. Beside this, Xperia Z is embedded with the an microSD slot so giving you an option to expand the memory.You can watch movies on phone and it`s easy to link it with the BRAVIA TVs.Unlike the Xperia P, Sony Xperia Z is becoming a trending topic.
OPEN BELOW LINK TO UPDATE VIA XPERIA Z:
Update via Xperia Z
OPEN BELOW LINK TO UPDATE VIA XPERIA Z:
Update via Xperia Z
________________________________________________________________________
Update status via Samsung Galaxy S4
There is lot going in phone industry and in this long run, Samsung has come up with a new smartphone, being the most powerful phone . Though, Samsung Galaxy S4 has the touch screen but it is beyond the simple touch smartphones. The phone is lighter but faster than any other phone in market.
OPEN BELOW LINK TO UPDATE:
update via Galaxy S4
________________________________________________________________________
OPEN BELOW LINK TO UPDATE:
update via Galaxy S4
________________________________________________________________________
Update status via Apple MacBook Air
Apple MacBook Air is the most advanced Mac computer by apple so far.It is integrated with the most advanced processor and the key thing is that it`s not so costly as what it gives.Now You can update your status via apple macbook air just by using this blog.
OPEN BELOW LINK TO UPDATE VIA MACBOOK AIR :
Update via apple macbook air
OPEN BELOW LINK TO UPDATE VIA MACBOOK AIR :
Update via apple macbook air
________________________________________________________________________
Update status via BlackBerry Z10
Blackberry finally launched its new smartphone on the event Blackberry Jam in Amsterdam. Though not launched in many countries blackberry Z10 is gaining interest worldwide. So, as the blackberry market is seeing a downfall since this year, this new smartphone is going to revive them from all lost.Company is seeing a saviour, that actually can stimulate the sales.
This phone is having all the features that works in market i.e. entertainment and enterprise. Based on the style of ‘minimalism’, it is still be a choice of the youngsters. Business man liked the phone because this phone is very comfortable in palm ( made of the soft plastic) . But the outer side is given more protection by using a hard material.
Since this phone has not specifications that can make it ‘sexy’ but it has the invisible curves. The rectangular box with overwhelming silver coloured buttons adds a plus point for businessman.
Display and Graphics:
It has a bright display interference which makes it more subtle and viewing pictures and videos on this phone is really awesome. The resolution is 1280*768 in a 4.2”screen, packs the pixels in a very small scale. The outer section has a volume control on right hand side and HDMI and USB ports on the left hand side. The power and music jack is on the top with a notification light. Seems like an old Nokia phone though.
HOW FAST IT IS?
With the Blackberry10 Operating System (OS), phone works like a fluid spread on the glass. Yes, you can easily switch between the apps and can change course at any time. The Blackberry Z10 features a 1.5 Ghz dual cored processor with 2 GB of RAM
OPEN BELOW LINK TO UPDATE VIA BLACKBERRY Z10:
Update via BlackBerry Z10
This phone is having all the features that works in market i.e. entertainment and enterprise. Based on the style of ‘minimalism’, it is still be a choice of the youngsters. Business man liked the phone because this phone is very comfortable in palm ( made of the soft plastic) . But the outer side is given more protection by using a hard material.
Since this phone has not specifications that can make it ‘sexy’ but it has the invisible curves. The rectangular box with overwhelming silver coloured buttons adds a plus point for businessman.
Display and Graphics:
It has a bright display interference which makes it more subtle and viewing pictures and videos on this phone is really awesome. The resolution is 1280*768 in a 4.2”screen, packs the pixels in a very small scale. The outer section has a volume control on right hand side and HDMI and USB ports on the left hand side. The power and music jack is on the top with a notification light. Seems like an old Nokia phone though.
HOW FAST IT IS?
With the Blackberry10 Operating System (OS), phone works like a fluid spread on the glass. Yes, you can easily switch between the apps and can change course at any time. The Blackberry Z10 features a 1.5 Ghz dual cored processor with 2 GB of RAM
OPEN BELOW LINK TO UPDATE VIA BLACKBERRY Z10:
Update via BlackBerry Z10
_____________________________________________________________________________________________
Update status via Nokia Lumia 920
Nokia is a famous company and user love to buy a Nokia product because of it`s phone durability and reliability. Nokia is a Finnish company which have sets its feet in different parts of the world. Nokia is facing a steep downfall these days because of extensive pressure from it`s competitors and new products that are being launched by them in market.Nokia is now trying to get back in race. Lumia 920 is one of the Nokia`s product that have seen remarkable sale in this difficult period. Lumia 920 was first launched in USA and then brought in India.India users have also liked this product and it`s features are again attracting the viewers. Here are some features of the new Nokia Lumia 920.
OPEN BELOW LINK TO UPDATE VIA LUMIA 920:
Update via LUMIA 920
Update status via Nokia 1100
Nokia 1100 is a very old phone which resemble the 1101..This phone is sold most when it was launched in year 2000.Since then it`s name is very popular.But with time this phone lost sale because the technology introduced many new phones and iPhones.So i must say that these phones are really helpful in their time.These phones have easy steps and easy way to use.No complex features make this phone best for old and illiterate people.Rest is your choice.There is no requirement of any review for this device because company has stopped it`s production in 2003.So enjoy this via which enables you to update your facebook status.
About This via:
This is funny via i must say because in this type of phone there is no facility of posting status on facebook.Not even having mobile browser.This via is having a mobile logo and it`s created on a user request.
About This via:
This is funny via i must say because in this type of phone there is no facility of posting status on facebook.Not even having mobile browser.This via is having a mobile logo and it`s created on a user request.
OPEN BELOW LINK TO UPDATE VIA LUMIA 920:
Facebook has recently made changes to its chat features. Now we can use profile images in chat.You can even type anything in colour using a simple trick. You just need to know how to get facebook profile id which you will learn by reading this article trick to find facebook profile id. Below are codes of A-Z and guide on how to use them in chat.
1. how to use facebook profile images in chat
-To use profile images in chat Enter this ==> [[username]
-In place of enter username of person whose image you want to show in chat.
-In place of enter username of person whose image you want to show in chat.
2. Codes of A-Z for facebook chat
-Below are codes of A-Z which you can use in facebook chat. You can create your on words with this codes. I will demonstrate how to do that .
[[107015582669715]] = A
[[116067591741123]] = B
[[115602405121532]] = C
[[112542438763744]] = D
[[115430438474268]] = E
[[109225112442557]] = F
[[111532845537326]] = G
[[111356865552629]] = H
[[109294689102123]] = I
[[126362660720793]] = J
[[116651741681944]] = K
[[115807951764667]] = L
[[106596672714242]] = M
[[108634132504932]] = N
[[116564658357124]] = O
[[111669128857397]] = P
[[107061805996548]] = Q
[[106699962703083]] = R
[[115927268419031]] = S
[[112669162092780]] = T
[[108983579135532]] = U
[[107023745999320]] = V
[[106678406038354]] = W
[[116740548336581]] = X
[[112416755444217]] = Y
[[165724910215]] = Z
You might be shocked by
reading this title that how can we make a 10 mb file from a large 1 gb file.
But it is possible by KGB Achiever software.
When a file is compressed with KGB Archiver it saves it with own extension and at the time of decompression it automatically recognizes the file format. The only limitation of KGB archiver is, decompressed file cannot be open or extract with other compression softwares. You can also choose any compression level (high, maximum, normal, low, very weak) to compress a file but the compression time will vary according to your selected compression level.
Due to high compression ratio of KGB archiver, you need to have a decent system hardware configuration:
When a file is compressed with KGB Archiver it saves it with own extension and at the time of decompression it automatically recognizes the file format. The only limitation of KGB archiver is, decompressed file cannot be open or extract with other compression softwares. You can also choose any compression level (high, maximum, normal, low, very weak) to compress a file but the compression time will vary according to your selected compression level.
Due to high compression ratio of KGB archiver, you need to have a decent system hardware configuration:
1. 256 MB RAM
1. 1.5 GHz Processor
Features of KGB Archiver:
1. Supports native .kgb files and .zip files
2. AES-256 Encryption
3. Able to create self-extracting archives.
4. Multilanguage supports like Arabic, German, Greek, Japanese,
Spanish many more.
5. Unicode is supported in both User Interface and File Systems.
6. An Explorer shell extension is available for the windows version.
7. Make Password protected compressed file.
Monday, April 1, 2013
Monday, April 1, 2013
- 0 Comments
In this article I provide the reviews of the best free domain name services and detailed descriptions of their main features. And thus we list the reviews of the top 5 free domain name providers according to the features and quality of the offered services and free domains:
- FreeDomain.co.nr (free .co.nr domain)
- Biz.nf (free .co.nf domain)
- Co.cc (free .co.cc domain)
- Dot.tk (free .tk domain)
- Biz.ly (free .biz.ly domain)
And see the detailed reviews of best free domains below:
Free Domains at .co.nr
FreeDomain.co.nr provides free domain registration service with a very short and easy to remember.co.nr extension. So that, their users get free domains like www.sitename.co.nr that can be used for any free web site, blog, forums, or other web page published on the web.
FreeDomain.co.nr service works in form of URL redirection, so that they support meta tags, URL masking, path forwarding, your very own Favicon, Google Webmaster Tools, etc. However, free .co.nr domains do not support DNS changes and thus they are recommended mainly for beginners.
FreeDomain.co.nr has been providing domain name free services since 2003, so you can probably rely on their service, and it seems they do not add forced ads to free web domains that they offer.
Free Domain at .co.nf
Biz.nf is a free web hosting provider that enables to register a free domain name with .co.nfextension (such as www.sitename.co.nf) and to host it at Biz.nf servers at absolutely no cost.
Biz.nf provides a full featured free domain hosting service that includes both features for advanced users such as PHP hosting, MySQL, CGI, FTP support as well as free website builder tools such as easily installed WordPress blog and Joomla website, and more.
Biz.nf has been in business since 2008, and they offer totally eco-friendlygreen hosting service that can help to save our planet ecology.
Free Domain Name at .co.cc
In addition to free website domain registration Co.cc also provides mapping of .co.cc domains to Blogger, Window Live, Google Apps and Amazon Associates. Co.cc does support DNS changes and thus CNAME, A, MX, NS, and TXT records.
Update: CO.CC is currently offline, and it seems they have completely closed down there services. If that’s the case, we’ll remove CO.CC soon.
Free Domain at .tk
Dot.tk is a Tokelau (small islands in Pacific Ocean) based company that provides free 2nd level domains with .TK extension, so that free free domain site looks like www.sitename.tk and that is the shortest free domain option available on the web.
Dot.tk enables to register free domains and either redirect them to a website (domain forwarding), or they enable to use ones own name servers, i.e. the DNS changes are allowed. One can also pay for .tk domain and thus obtain the legal registrant rights (free domains do not provide registrant rights and the free site must receive at least 25 visitors in any 90-day period).
Dot.tk guys have been providing free .tk domains since very 2001, however, we were reported their service/servers are a bit slow from time to time..
Free Domains at .biz.ly
Biz.ly free domain host provides a very short free domain with business meaning .biz.ly extension. Unlike the previous provider Biz.nf offers 3rd level free domains such as www.sitename.biz.lythat are registered and hosted at their servers at no additional cost.
Apart from free .biz.ly domains they also provide free hosting services as well as free site builder and blog builder, and many pre-installed tools such as photo album, guestbook, hits counter, webrings, form mailer, site copier, etc.
Biz.ly has been providing free domain names since 2002, and their service is quite simple and thus it is recommended for beginners.
Free Domain at .COM, .NET, .ORG, etc.
And in case you do not mind to pay few dollars to host your web site with reliable and customer focused web hosting provider, you can get a free domain name with .com, .net, .org, .biz, .info, or .us extension included with their website hosting plan. We’d suggest to check the following web hosts:
If you're of the mindset that what you do with your BitTorrent client is your business and not that of people snooping, sniffing, and prying at your packets along the way, then you'll need a VPN to keep your traffic encrypted and secure. Even so, which free VPN service is the best, and which offers the best combination of reliability, features, security, and affordability? We'll be looking at the top five free VPN service providers based on our test.
1.SecurityKiss
SecurityKiss is a popular free VPN service available for use on PCs only. The paid version available for use on Mac, Linux, and smartphones.
The free package includes a 300MB daily limit, and an unspecified bandwidth speed cap of less than 12.5 Mbps, and basic packages start at about $6 per month.
Software installation is required.
The free package includes a 300MB daily limit, and an unspecified bandwidth speed cap of less than 12.5 Mbps, and basic packages start at about $6 per month.
Software installation is required.
2.Its Hidden
ItsHidden uses 128-bit encryption on the secure tunnel created between you and the ItsHidden servers. Based out of the Netherlands, ItsHidden takes advantage of the legal climate there and doesn't log any activity passed through its servers.
Available on Mac, PC, and Linux, and requires no software installation.
Available on Mac, PC, and Linux, and requires no software installation.
3.CyberGhost
CyberGhost is a free utility that encrypts, anonymizes, and offshores your internet use when you're using public Wi-Fi at an airport or coffee shop, or you're worried someone on your network is running a tool to gather credentials.
Cyber Ghost is limited to PCs only, and software installation is required.
Cyber Ghost is limited to PCs only, and software installation is required.
4.Hotspot Shield
Hotspot Shield is a free program that allows you to secure your connection while surfing WiFi hotspots and to access sites not normally available outside of the USA.
Everything is done in an extra tab open in your browser, so there's no need to configure anything. A green and red shield in your system tray indicates when Hotspot Shield is or is not connected. The VPN is encrypted with 128 bit SSL encryption so you can surf safely without worrying about others intercepting your data.
It works on Mac and PCs along with Android and iOS devices.
Everything is done in an extra tab open in your browser, so there's no need to configure anything. A green and red shield in your system tray indicates when Hotspot Shield is or is not connected. The VPN is encrypted with 128 bit SSL encryption so you can surf safely without worrying about others intercepting your data.
It works on Mac and PCs along with Android and iOS devices.
5.Your Freedom
Your Freedom services makes accessible what is unaccessible to you, and it hides your network address from those who don't need to know. just download the client application and install or just run it on your PC; it turns your own PC into an uncensored, anonymous web proxy and an uncensored, anonymous SOCKS proxy that your applications can use, and if that's not enough it can even get you connected to the Internet just as if you were using an unrestricted DSL or cable connection -- just like the firewall suddenly went boom! You can even make your PC accessible from the Internet if you like.
Google Drive has turned on a feature that lets the cloud storage service become a limited web host.
It's long been possible to allow others to access data stored in the service, which can produce a URL for files. The new tweak means it's possible to ask for a “Preview” of an HTML file stored in Google Drive. Doing so renders the page and produces a URL that, once copied and pasted, can be used by anyone to access the page.
It's long been possible to allow others to access data stored in the service, which can produce a URL for files. The new tweak means it's possible to ask for a “Preview” of an HTML file stored in Google Drive. Doing so renders the page and produces a URL that, once copied and pasted, can be used by anyone to access the page.
The feature is sophisticated enough that a quick bit of coding produced this page, with a lengthy JavaScript and graphics stored in the same Google Drive folder appearing just as the code intends. We've not tested the promised ability to handle CSS.
The Cloud Storage provider's have not said how far the service will scale, but it seems unlikely that will be much of a problem given this is hardly a heavyweight hosting platform. Google's not alone in offering a simple service: Amazon web services allows users of its simple storage service to serve static HTML from the “buckets” it uses to contain files.
Amazon charges for the privilege of doing so. Google does not, unless one uses paid versions of its Apps.
In these days of widget-populated free blogging platforms and Facebook t is hard to imagine a stampede towards this new service. Developers, however, may appreciate the extra collaborative opportunities it presents.
Subscribe to:
Posts (Atom)