Saturday, 23 February 2013

Israeli Server Owned Message Delivered by Hitcher, Muslim Liberation Army

Mass Attack by Pakistani hacker Hitcher from Team MLA(Muslim Liberation Army) hack More then 25 Israeli sites hacked and Message Delivered. Since the announcement by Israel that they are planning to disconnect the internet in Palestine, hackers around the world have gone into a full on rage against the Zionist state of Israel.

According to hacker "The hack is done against the protest against Gaza attack by Israelis they are killing innocent children and women".


Deface Page Say's:
"We are outraged at the Palestine present condition and the Illegal occupation of Palestanaian Land By the zionist Israelis 
This attack is in response to the Injustice against the Palestinian people
terrorist.
w Israel is a serious threat to Palestinian
Occupied Palestinian land under the guise of residential settlements are being increased 
Palestinians are deprived of their basic human rights 
International Aid workers are stopped from providing any humanitarian assistance to the people. 
The International community and media is not allowed to bring facts to world as due to strict restriction"


Hacked Sites:

http://www.soffer.sharonet.net/
http://infodata.sharonet.net/
http://contacts.sharonet.net/
http://sharida.sharonet.net/
http://www.sharida.sharonet.net/
http://soffer.sharonet.net/
http://www.roy.sharonet.net/
http://sharida.sharonet.net/
http://www.infodata.sharonet.net/
http://roy.sharonet.net/
http://sharonet.net/mla.html
http://infodata.sharonet.net/
http://www.sharonet.net/mla.html
http://sharonet.co.il/mla.html
http://www.sharonet.co.il/mla.html
http://www.contacts.sharonet.net/
http://contacts.sharonet.net/
http://d400670.sharonet160.sharonet-host.com/mla.html
http://d400748.sharonet160.sharonet-host.com/
http://d400772.sharonet160.sharonet-host.com/
http://d400820.sharonet160.sharonet-host.com/
http://d400870.sharonet160.sharonet-host.com/
http://d400966.sharonet160.sharonet-host.com/
http://d400748.sharonet160.sharonet-host.com/
http://d400772.sharonet160.sharonet-host.com/
http://d400966.sharonet160.sharonet-host.com/

Mirrors:
http://www.zone-h.org/mirror/id/19382276
http://www.zone-h.org/mirror/id/19382277
http://www.zone-h.org/mirror/id/19382278
http://www.zone-h.org/mirror/id/19382279
http://www.zone-h.org/mirror/id/19382280
http://www.zone-h.org/mirror/id/19382281
http://www.zone-h.org/mirror/id/19382282
http://www.zone-h.org/mirror/id/19382283
http://www.zone-h.org/mirror/id/19382284
http://www.zone-h.org/mirror/id/19382285
http://www.zone-h.org/mirror/id/19382211
http://www.zone-h.org/mirror/id/19381999

Friday, 22 February 2013

What is a crypter? how it work's

What is a crypter?
A Crypter is a software used to hide our viruses, keyloggers or any RAT tool
from antiviruses so that they are not detected and deleted by antiviruses.
Thus, a crypter is a program that allows users to crypt the source code of their program.
Generally, antivirus work by splitting source code of application and then search for
certain string within source code. If antivirus detects any certain malicious strings,
it either stops the scan or deletes the file as virus from system.
Thus a crypter basically makes an infected file FUD or UD by encrypting it.

What does UD and FUD mean?
UD means undetectable, so only a few antivirus programs detect it.
FUD is acronym for Fully UnDetectable, so no antivirus detect it. I reccomend to scan all the
files you crypt on  .Also make sure you check the box
"Do not distribute sample"

Also as a headsup please DO NOT scan your crypted servers on "Virus Total" as they
send over all the infected files to the antivirus companies,thus spelling doom for the
"FUDness" of your crypter.

What does a crypter really do?
A Crypter simply assigns hidden values to each individual code within source code. Thus,
the source code becomes hidden. Hence, our sent crypted trojan and virus bypass antivirus
detection and our purpose of hacking them is fulfilled without any AV (Anti Virus) hindrance.
Not only does this crypter hide source code, it will unpack the encryption once the program is
executed.

How does a crypter really work?
As some of you must be wondering,how does a crypter do the wonderful job of hiding your
infected servers,away from the preying eyes of the antiviruses?
Well, the basic working of a crypter is explained below.

The Crypter takes the original binary file of you exe and applies many encryptions on it
and stores on the end of file(EOF).So a new crypted executable file is created.

Original Exe Crypted Exe
(ORIGINAL)001————- (CRYPTED)010


The new exe is not detected by antiviruses because its code is scrambled by the crypter.
When executed the new .exe file decrypts the binary file into small data small pieces
at a time and injects them into another already existing process or a new empty one,
OR it drops the code into multiple chunks in alternative data streams(not scanned by most a/v)
then executes it as a .txt or .mp3 file.

Can I hide my crypted files in another program?
The simple answer to this is yes.For this we can make the use of file binders.Some crypters come
inbuilt with binders,some are not,but we can easily use a binder program to meet our purpose.
A file binder is very self explanatory.It binds,or puts two files together as one,hence when one
opens this "binded" file,two files will execute at once. A binder makes a server look even more stealthy,
than just a simply crypted file.

What are the parts of a crypter?
Generally a crypter has two parts

°A client,
°A stub.

The client is the interface where we may upload our file and use the options it brings,
according to the programmer that made the crypter and crypt our files.

The stub is an executable file(.exe) or a. Dll some times.
This file is used as a filter for files that are uploaded to the client crypter

What are the types of crypters?
Well crypters can be broadly classified into the following types:
Types of Crypter

° External Stub
° Internal Stub
° Runtime
° Scantime

External Stub : Well most of you have downloaded a public crypter by now and when you open the
folder you have seen 2 things:

1.Client.exe and 2.Stub.exe

These type of crypters are called External Crypter in which the functionality of the crypter pretty
much depends on the external stub.
You delete the stub and the crypter is useless.

Internal Stub : The crypters that contain only Client.exe fall under this category.
In this the stub is coded within the crypter.


Runtime Crypters : The crypters that crypts a server that remains Undetectable upon running in the
memory of a PC is called a runtime crypter.A Runtime crypter encrypts the specified file and when it
is executed,it is decrypted in the memory.This way the antiviruses are not

please use what i post for legal things  

Thursday, 21 February 2013

Indian BollyWood Site Hacked BY Sizzling Soul, Pak Cyber Eaglez!

Pakistani hacker Sizzling Soul from Pak Cyber Eaglez! hit cyber space again. This time hacker hit Indian Bollywood, director regional education of peru and Data Correction Department Of Thailand Hacked. All these sites are consider as high profile sites and well secured.

Deface Page Say's:

"Pak Cyber Eaglez Arrived,
We Are Pakistani's You Know Who Are Pakistani's?
Lets Introduce Our Self,
We Are That Nation Who Is Not Afraid Of Bombs Who Is Not Afraid Of Death Who Is Not Afraid Of Drone Attacks, We Are That Nation Who Defeated India Many Times In Wars, We Are That Nation Who Faced The Most Dangerous Earth Quack 2005, We Are That Nation Who Faced Dangerous Water Flood In 2010, We Are That Nation To Whom Every Body Calls Terrorists, We Are That Nation Who Lost Their Sisters Mothers & Brothers In Many Bomb Blasts, We Are That Nation Which Have No Electricity, We Are That Nation Who Have No Food For 2 Times, Want To Know More About Us Go And Ask From Your Elders Who Are Pakistani's ?
Inspite Of These Difficulties We Are Not Less Than Anyone, We Are Telanted Nation, With Less Electricity We Are Defacing You Bitches :D We Made Atom Bomb, We Got Many Oskar Awards, We Are The Most Brave Nation, We Have Strong Army America Want Our Army For Their Defence, Becuase They Have Timid And Coward Army Bitches lol
Ok Lets Come To The Main Point, You Just Got Hacked Patch Your Asses, Don't Know How To Secure Shitts And Making Sites lol, 
Huh ! Now Next Time Keep Eye On Your cPanel | Domain | Your Admin Panel Becuase We Can In Again, Take Care
Pakistan Zindabad"

Hacked Site:


http://whatbollywood.in/
http://drepasco.gob.pe/PCE.html (Director Regional Education Of Peru Hacked!!)
http://www.correct.go.th/aoptaku/default/administrator/index.htm

Mirror:

http://zone-h.org/mirror/id/19366743
Alexa Traffic Rank: 227,670

http://zone-h.org/mirror/id/19362966
http://zone-h.org/mirror/id/19341651

BEST TOOLS EVER [4]

PenProtect
You can put a password for your pendrive (USB flash) using this tool:
http://uploading.com/files/XG7SFN0A/PenProtect.rar.html

Craagle v3.0
Find all cracks and serials you want for your trial softwares
http://uploading.com/files/JKU1GYZL/Craa...0.exe.html

VBScript make your pc to speak
I know that this script was post 2 days in this forum but noticed that some people can't make it to work. This is a working VBScript. Try it from here:
http://uploading.com/files/EVSAJ1F1/Spea...t.rar.html
or
http://uploading.com/files/3A6TL3L2/spea...t.vbs.html

Advanced zip Password Recovery v4.00
This software will find passwords for protected zip files. Serial number included
http://uploading.com/files/cfmb4a92/Adva...v4.00.zip/

Advanced Archive Password Recovery pro v4.5
This This software will find passwords for protected rar files. Serial number included
http://uploading.com/files/HXA95YI2/Adva...5.zip.html

Process_Hacker
See everything that is connected from your pc to the web and vice versa. Very effective to catch hackers
http://uploading.com/files/39a12df2/Proc...acker.rar/

Brutus quick buttons
This is a very good software for lazy people who want everything to be done with the easiest and the simplest way. Use quick buttons to log in/out , restart , shutdown your system.
http://uploading.com/files/DUQUWYKA/brut...s.exe.html

Typing Master Pro
No more typing nightmares. Learn to type one your keyboard like a master. It is very easy to use and would promote you to a master in typing on the keyboard in few days.
http://uploading.com/files/9m64b2a7/Typi...erial.rar/

Html lock
Protect your web page with this uniquesoftware. This software will set a very strong password for your html pages. Actually it will encode all the page contents for the first time and will encode the already encode code another time. And you will be able to put a username and a password for your html page. Off course the username and the password is encoded as well.
http://uploading.com/files/52fd16ed/htmllock.zip/

7z
Save from 70-80% of your file required space using this archiver. 7z is the most powerful archiver ever made. No Winrar or winzip or winace can beat him in this domain. I don't think i need to explain it since he is the most archive software successful and the most reputated one in the world.
http://uploading.com/files/XKWOTFR5/7z.zip.html

Delayed Shutdown
This software will help you to time when you want your pc to turn off. Everything is automated. Just set the number of hours and the software will start the count down.
http://uploading.com/files/391C7AUT/Dela...n.zip.html

Blackhat Popup on Zone-h, "Sejeal", World 3rd Top All-time Most Active Notifier

Zone-h.org consider as Heaven of Hackers. Zone-h is most reliable source of hackers information. Few months ago a new hacker popup on zone-h with code name "Sejeal". We really have no idea where he/she come from but now according to zone-h Sejeal is in world 3rd number in Notifier statistics (all-time most active notifiers). A simple .jpg file is found on his deface page with burning Israel flag on it. This make sure that he/she is Muslim hacker. There was No name Sejeal few months ago but once it appear, it signal alert every where. Who ever Sejeal is, he become really big thread for Old rulers Blackhats.


Mirrors:
http://www.zone-h.org/archive/notifier=Sejeal

As you can see in Image that only iskorpitx, Turkish Hacker and Hmei7, Indonesian hacker remain in lead. By watching Sejeal hacking speed, we can easily concluded that Sejeal is no ordinary hacker. He/she know almost ever technique and exploiting methods. Who know what will happens in 2013.



Wednesday, 20 February 2013

BEST TOOLS EVER [1]

COMMENT FOR THE BROKEN LINK  

Facebooz
Many people were asking on how to hack facebook account. This tool is design to hack any facebook account you want with 2 simple steps. Specify the username and the pass list and let it work.
It will hack that account and give you the pass.
And for idiots who say that it doesn't work. Well it works but it need times between each attemd to login otherwise it will become a facebooz freezer

http://uploading.com/files/8b949bb8/facebooz.jar/


Brutus
This tool will hack for you any login page by trying all password possibilities. The reason i added here is because many people were finding troubles with there brutus and couldn't do any hack so this one should solve all there nightmares.
http://uploading.com/files/ba745666/Brutus.rar/


PassList Generator
Many days ago someone post here in the forum a pass list that is 2GB size. I know that some people cannot download such a file including me so i did some search and found this tool. This software should create the pass list that you need to your brute force. Very small size but very big efficiency.
http://uploading.com/files/f8f9769b/PLG.zip/


In Shadow Batch Virus Gen - 4.1.2
This tool is a virus creater. It will create very proffesional virus. Never test any virus on your PC. Very effective for bad hackers.
password with no quotes: "In shadow"

http://uploading.com/files/FZRK98VO/In%2...2.zip.html


Atomics Virus Creator V.65
This tool is a virus creater. It will create very professional virus. Never test any virus on your PC. Very effective for bad hackers
http://uploading.com/files/6CZZN22N/Atom...5.zip.html


Now I will post 3 tools that should be downloaded together for better results.
Exploitscanner
This tool will search for vulnarable websites. You only have to write the dock and it will search for potential website to hack. Always use inurl:"article.php?id=1" as a dork.
http://uploading.com/files/19217P2R/expl...r.zip.html


SQL I Helper V.2.7
After you find your potential website , use this tool to auto hack the website using SQL injection. This tool will do all the hard job by itself. Just select buttons to tell here what to do.
You might need to find the pass using the hash method

http://uploading.com/files/2a7acf21/SQLI...V.2.7.rar/


Admin finder
After you findthe passwords , use this tool to find the admin page login. Some people are heaving problems finding that page. This should solve this problem but remember that can't find all login pages. It use the most common extensions. You have the ability to add more extensions to the list to increase your search range
http://uploading.com/files/KCDVDDST/admi...r.rar.html


cain and abel
Crack PC passwords , hack network connections , sniff , brute , ....................... and all your dirty job.
I don't think i need to explain what does this tool do. Everyone know about and how neccesary it for hacking job.

http://uploading.com/files/m55616a9/cain%2526abel.rar/


w32 disassembler degguer
This tool will help you to disassemble any program you want. Very effective for programmers
http://uploading.com/files/CX9JY7UR/w32%...r.rar.html


72389 Email Bomber
This tool will help you to spam any email you want. This one is special because you have the ability to spam from different email at the same time. All credit go to Nathan72389
http://uploading.com/files/ZC2HM6E1/7238...r.rar.html


Simple Binder
Use this tool to bind any 2 files in a single file. You are not restricted to jpg or mp3 files but you can bind any type of file. It is very effective to hide virus and worms and all malwares type. All credits go Nathan72389
http://uploading.com/files/SEQDHH33/Simp...9.rar.html


Hotmail Hacker And Messenger Fun
This tool will help you to hack any Hotmail messenger you want. It simply work by making the person think he can hack email using it while in the reality he is the one to be hacked. All credit go to Nathan72389
http://uploading.com/files/9c8ae7f5/Hotm...2BFun.rar/


Gmail Hacker
This tool will help you to hack any Gmail you want. It simply work by making the person think he can hack email using it while in the reality he is the one to be hacked. All credit go to Nathan72389
http://uploading.com/files/d7f79mm9/Gmail%2Bhacker.rar/


Chat Spammer
Use this tool to spam any chat room. Write what phrase you want it to be spammed. I am still try to figure out the best way to use it. Very funny and worst to try it
http://uploading.com/files/D7YJGAI9/Chat...r.rar.html


1st Mass Mailer 4.2
This tool will help you to mass spam emails. Little bit compliacted but very very effective.
Serial: "18935379480889"
Thanks to 88power88 for the serial

http://uploading.com/files/17m9mc69/1stM...ler42.rar/


My lock box
Many people were asking for tools to hide files and folders. This tool will hide the files that you don't want anyone to see it by hiding it inside a box that the software create and to make it impossible to anyone to reach it. Very easy to use
http://uploading.com/files/O0PDO80I/mylo...p.exe.html


I lock
Same as the one before but this one is more proffessional. This tool will hide the files that you don't want anyone to see it by hiding it inside a box that the software create and to make it impossible to anyone to reach it.
http://uploading.com/files/9m8d4e29/ilockstp.rar/


Lock an exe
This tool will lock any ".exe" file by making it not working anymore. If you click on the new exe , it won't execute. Ability to share it between PCs safetly at a condition that these 2 pc have this tools to lock it and unlock it
http://uploading.com/files/XIG3N1MN/lockanexe.zip.html


Icon Changer v3.8
Some people were asking for tools that can change the icon for there files. Use this tool to change the icons of any thing you want on your PC. Customize anything that have a icon interference.
http://uploading.com/files/VJHMKK2V/Icon...8.zip.html

10 most audacious hacking attacks of all time

10 most audacious hacking attacks of all time

Members of Anonymous group in Los Angeles. Photo source: Wikipedia
We are in a golden age for the world of hackers. Everything is computerized or tied to a network, making the Internet a huge playground.
IMAGINED TO BE super-high-tech geeks deciphering ridiculous lines of code or pimple-covered glass-wearing nerds hiding in their moms’ basements, these hackers have been orchestrating damaging attacks on the networks of governments, corporations, and other large organizations while simultaneously helping with the development of the World Wide Web and the founding of major tech companies.
Here are 10 of the most audacious hacker attacks in the past years



1. Kevin Poulsen
Known as “Dark Dante”, Poulsen gained recognition for hacking L.A. radio’s KIIS-FM by taking over all of the station’s phone lines and “winning” a Porsche during a contest.
He ultimately ended up pissing off the FBI after wiretapping a Hollywood actress and hacking into the US Army and FBI computers.
After months on the run, he was eventually ambushed in a supermarket, and sentenced to 51 months in prison, ordered to pay $56,000 to the radio stations, and banned from using a computer for three years.
Today, Kevin Poulsen is a senior editor for Wired.com News and has helped identify over 700 sex offenders with MySpace profiles.
2. Adrian Lamo
Dubbed the “homeless hacker,” Adrian Lamo used Internet connections at Kinko’s, coffee shops, and libraries to infiltrate major organizations like The New York Times and Microsoft.
His intrusions consisted mainly of penetration testing, finding flaws in security, exploiting them and then informing companies of their shortcomings. His targets include Yahoo!, Bank of America, Citigroup and Cingular.
Things started heating up when, in February 2002, he broke into the New York Times’ intranet, added his name to a list of Op-Ed contributors, and spent countless hours searching himself on Lexis-Nexis. The FBI claimed the Lexis-Nexis searches cost the Times $300,000 and Lamo faced 15 years in jail for the breach.
In the end, he was sentenced to two years probation and ordered to pay $65,000.
3. Michael Calce
While other teenagers his age were thinking about parties and girls, 15-year-old Canadian Michael Calce (also known as “Mafiaboy”) spent his afternoons on his computer and became famous for executing the first major distributed-denial of service attack (DDoS) responsible for crippling some of the Internet’s most popular websites.
He set out to make a name for himself in February 2000 when he took down the website of the no.1 search engine and second most popular website at the time: Yahoo!
As if that feat wasn’t enough, he went on and hammered the servers of CNN, eBay, Dell, and Amazon in a wave of highly-publicized attacks that were the first to show the world how easily one kid can knockout major websites.
Calce was ultimately picked up by the Canadian police and faced 3 years in jail, but was sentenced to eight months in a juvenile detention center and forced to donate $250 to charity.
4. Jonathan James
In 1999, Jonathan James broke into military computers and installed a backdoor into a Defense Threat Reduction Agency (DTRA) server, part of the Department of Defense, and collected sensitive emails and employee usernames and passwords.
Just for fun, he also hacked into NASA computers, stealing approximately $1.7 million worth of software that controlled the living environment on the International Space Station, forcing the agency to shut down its computer systems for three weeks, and costing thousands of dollars in security upgrades. James later explained that he downloaded the code to supplement his studies on programming, but claimed that “the code itself was crappy [...] certainly not worth $1.7 million”.
He was arrested and banned from recreational computer use and was sentenced to serve 6 months under house arrest with probation. However, he served 6 months in prison for violation of parole.
But unlike other hackers, his story has a tragic twist: He committed suicide in 2007. In his suicide note, he denied having anything to do with a hacker attack he was being investigated for. The last words were: “I lost control over this situation, and this is my only way to regain control.”
5. Robert Tappan Morris
"Morris Worm" source code. Photo source: Wikipedia
In 1988, while enrolled as a graduate student at Cornell University, Robert Tappan Morris created a monster: the Morris Worm.
He designed the first self-replicating computer worm and unleashed it in the world wide web to check how deep the internet hole goes.
He surely didn’t expect it to backfire, replicating itself beyond control as it infected thousands of computers, costing millions of dollars in damage, and inspiring the U.S. government to create a emergency response for computers known as the CERT.
Morris was eventually charged for his accidental crimes and ordered to pay $10,000 and do 400 hours of community service.
He is currently working as a professor at the MIT, and the worm’s source code is archived on a black 3.5-inch floppy disk on display at the Boston Museum of Science.
6. David Smith
In 1999, David L. Smith, pleased by a stripper’s performance in Florida, decided to immortalize her memory by creating a computer virus baring her name.
Using a stolen America Online account, Smith posted a Word document infected with “Melissa” to a discussion group on America Online, purporting it to be a list of usable log-in information to pornography sites.
Smith’s virus spread like wildfire through email, forwarding itself to fifty email accounts on every infected computer, and which, over time, overloaded email servers and forced companies such as Microsoft, Intel, Lockheed Martin, and Lucent Technologies to shut down their email networks.
In the end, more than one million PCs were infected, causing $80-million dollars in damage worldwide. For his idea of a virtual lapdance, Smith faced 10 years in jail, $5,000 in fines, but served just 20 months behind bars.
Lamo, Mitnick and Poulsen. Photo source: Wikipedia
7. Kevin Mitcnick
No hacker article is complete without mentioning Kevin Mitnick, one of the most notorious hackers in the last two decades. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests.
Described as “the most wanted computer criminal in United States history”, Mitcnick started out exploiting the Los Angeles bus punch card system to get free rides, then dabbled in phone hacking.
Mitnick’s mischief got serious when he went on a hacking spree targeting Motorola, NEC, Nokia, and Fujitsu Siemens systems, stealing corporate secrets, scrambling phone networks and infiltrating the national defense warning system.
He ultimately made his biggest mistake by breaking into fellow hacker Tsutomu Shimomura’s home computer, which led to his undoing.
After a well-publicized pursuit, the FBI arrested Mitnick on Valentine’s Day, 1995. He served five years in jail and about 8 months of it in solitary confinement thanks to law enforcement officials who claimed he could “start a nuclear war by whistling into a pay phone”.
Today, Mitnick is a computer security consultant, famous author and speaker.
His exploits were detailed in two movies: Freedom Downtime and Takedown.
8. Stuxnet
The most audacious hacker attack on this list was most likely committed by a nation, according to experts, which perpetrated against a very specific and sophisticated target.
Discovered in June 2010, the worm Stuxnet spread out, mainly in Iran, and shut down a fifth of the country’s nuclear centrifuges causing them to self-destruct by spinning wildly out of control.
Researchers all agree that the worm was built by a very sophisticated and capable attacker and designed to harm computers and networks that met specific configuration requirements. The worm also avoided being detected by creating “situation normal” messages on computers monitoring centrifuges while it was in fact busy destroying them. A real marksman’s job.
The source of the worm was never discovered.
9. Sony and the Playstation Network
One of the most recent hacker attacks that made the headlines this year, thanks to thousands of angry geeks unable to access their favorite games online, was perpetrated on Sony’s Playstation Network database.
More than 100 million Sony customers were affected last year when an unknown group of hackers breached into the network and scooped up data on their names, addresses, emails, login IDs, passwords, and credit-card numbers.
Nobody to date knows who was behind the massive attack, even though many pointed fingers at one of the biggest hacker groups in the last few years, which finally leads us to number 10.
The Anonymous group's flag. Photo source: Wikipedia
10. Anonymous group
I couldn’t end the article without mentioning the most famous and active group of hackers in recent times.
“Anonymous” is a nebulous collective of hackers who, for the past few years, have been engaged in various types of protests and civil disobedience and have been orchestrating campaigns against institutions and governments who seek to censor the web and hinder free expression.
They are famous for their attack against the Scientology church, the Westboro Baptist church, the HBGary Federal, and the Bay Area Rapid Transit shutdown, as well as their support to Wikileaks, the Iranian Green Revolution and The Arab Spring revolutions.
Their public statements are generally rife with mischief, often mocking their targets for their lack of security, but the bigger picture is that their actions are increasingly conscientious and pointed, supporting social movements and fighting for a bigger cause.
Will this new brand of cyber activism referred to as “hacktivism” help tip the balance in favor of Change around the world?

Tuesday, 19 February 2013

Hackers Attack US traced to Chinese military unit in Shanghai

Hackers Attack U.S traced to Chinese military unit in Shanghai.
Black-hat hacker cyber attacks on U.S resultant of stole massive amount of sensitive information from U.S military contractors  energy companies and some major industry in the U.S. The really strange came in track back of hackers. Trace stop at doorstep of Chinese Military announced by U.S security firm alleged on Tuesday  China totally rejected that report and consider it Groundless.


This is not 1st time that U.S accused China on Hacking. The report by Virginia-based Mandiant Corp. contains some of the most extensive and detailed accusations to date linking its military to a wave of cyberspying against U.S. and other foreign companies and government agencies.

News of the report spread Tuesday on the Chinese Internet, with many commentators calling it an excuse for the U.S. to impose greater restrictions to contain China's growing technological prowess.

Ref: Link

Yamaha Motors Hacked and Defaced by Darksnipper, Muslim Hacker

Yamaha Motors hacked and defaced by Pakistani hacker name as Darksnipper. Yamaha is one is World leading company of Motors. There was free Palestine message on deface page their hack but one thing for sure that this kind of hacks create lot of questions for security experts. Every years hacker are becoming more powerful than previous year. Impact of hack was still on site at the time of writing this news.


Deface Page Say's:

"Hi stupid !!!!!
This site has been hacked by Dark Snipper 
DON'T worry ... you are not alone in this server ... 
and we have been just changed your index ... 
Remember hacking is more than just a crime. It's a survival train ...
Don't think that hacking is wrong....
there is no right and no wrong ... 
for free Palestine 

Team : 
Soul Inj3ct0r - P4K-CoMManDeR - Error Haxor - Dream.Killer - X3o-1337 - SOG 
we will be back soon 
.................................Snipper..............................."

Hacked sites:

http://yamaha-motor.ba/snipper.html

http://yamaha-motor.hr/snipper.html
http://yamaha-motor.me/snipper.html
http://yamaha-motor.mk/snipper.html
http://yamaha-motor.si/snipper.html
http://yamaha-motors.rs/snipper.html

Mirrors:

http://www.mirror-ma.com/mirror/id/216516/
http://www.mirror-ma.com/mirror/id/216515/
http://www.mirror-ma.com/mirror/id/216514/
http://www.mirror-ma.com/mirror/id/216513/
http://www.mirror-ma.com/mirror/id/216512/
http://www.mirror-ma.com/mirror/id/216511/

Explanation of internet logs and VPN's/VPS's

Okay so there has been a LOT of misconceptions, half-truth's, and flat out lies concerning internet logs, VPN's, VPS's and YOUR anonymity.

What I plan on covering in this :

  • What exactly are logs?
  • What information is logged?
  • How does that information link to you?

The safety and details of (clearing all misconceptions):
  • Google
  • Websites
  • ISP
  • VPN'S
  • VPS's
  • Proxies
Other logs and risks.
Questions/Answers

Alright so lets get started :)

What exactly are logs?
Now this is a simple question with a very complicated answer.

What exactly are logs? Well they are obviously records, chances are they are on what you have been up to! (the simple answer).

Logs are created by a computer service or program to record "events". Events can be a rather large list of things : From you turning the computer on, to you typing and saving a text file, to someone connecting to your computer.

Lets make a text diagram shall we ?
a basic opening of an application.

(your input) --> (the system)-->(application)-->result

Input : You click it.
System: Gets the event's "mouse clicks here"->"Application is here"->"open application".
Application: gets the event's "Start loading code"->"Started code"->"Done loading check if loaded correctly"

Now for each of these events (except for perhaps the mouse click) there is a new log created.

an example of a log would look like
PHP Code:
date[20013, Jan 1] Time 21:02  :
Action :: Application Virginity was started by user $4EverAlone ;
  date[20013, Jan 1] Time 21:07  :
Action :: Application Virginity Loaded by user $4EverAlone ;
date[20013, Jan 1] Time 21:07  :
Action :: Application Virginity ran successfully by user $4EverAlone ; 

Remember this stuff, it will come up later.

What information is logged?

There are many different types of logs, it all depends on who's logging the information.
Generally though whats logged is the action done, the time, who did the action, and any information pertaining to the action.

Websites: who did what - when - what url - the user/ user info .

you sortah get the idea right?

Don't worry, I know this is a really short section. I plan on getting back to all of this in more details in the safety and details portion.

How does that information link to you?

ok so this is the important part: LISTEN UP.

1. Every computer that is logged in, has a user.
The user can be admin, system, anything. But they have a userID also.
This will link all local logs (logs that your computer stores) with the account.

2. MAC address (Media Access Control address). This was made to be able to uniquely identify any device that would be "networking". Your cellphone,Itouch,PDA,laptop,DSi. All of it.
Originally the MAC address was intended to be a permanent individual identifier, it is quite easy to spoof.

3. IP address . Well this everyone should be somewhat familiar with, right? just incase you missed out on this :
An IP is assigned to each individual device on a network, or the internet. It is used to identify(be used as a name) and locate(send packets to/from).

Now here is the fun thing, IP's are created by the IANA (internet assigned numbers authority...Yeah they had to put authority in there because saying "IM WITH THE IAN" left the ladies with the wrong impression).
The numbers are then distributed around the world to five different regional internet registries.
From they are given to ISP's (internet service providers). Then to you.
Just one look at your IP will tell them which area of the world you are in.

Then they go to the registrar who gives them the ISP's number, who gives them your number, who is already being dragged out the front door by two FED's in black jackets carrying a briefcase and a giant purple dildo.

4. Cookies. No not the ones Nana makes. These are baked in the depths of satans loins.
Its a piece of data stored from a website in your browser, and can be retrieved by the website.

Alright *few* Pinch all that typing is done. Now that you get the basics of whats going on, lets get down to what you really want to know. Oui

ARE YOU REALLY ANONYMOUS/SAFE ? Ohmy
You sure you want to know? Non

Google

Ah, our best friend (besides our right hand). Big brother google is always watching out for us, or better phrased is always watching us.

They log EVERY single search you make, and even more.
When you go to a website, they log your information. When you get an add from google, they log your information.
Google is your worst nightmare.

a "log" from google search archives:
PHP Code:
123.45.67.89-1/Jan/2013 10:11:32-http://www.google.com/search?q=do+feds+really+carry+around+dildo's-Chrome 2.0.0.7;WindowsNT 5.1-740674ce2123e969 

Now what this says is this
"123.45.67.89 " - IP adress (OH HEY . I KNOW WHO YOU ARE NOW )

"1/Jan/2013 10:11:32 - Time (Yes, we need to know the very second that you looked up porn )

"http://www.google.com/search?q=do+feds+really+carry+around+dildo's" - The search that you used (Incase your wondering. Yes, yes they do. )

"Chrome 2.0.0.7; Windows NT 5.1 " - Browser and operating system (Hey I bet if we all use IE that they will just think their systems messing up).

"740674ce2123a969" -The Cookie * <- evil. As google says "Like an IP address, a cookie doesn’t tell Google who a user actually is or where they live – it only identifies a computer" (Well shit, it wasn't me officer. The computer did it ).

Although google claims to anonymise the IP addresses after 9 months and alter the cookies after 18, it is still a VERY large risk.
They claim the ip address will look like "123.45.67.XXX" Unfortunately, this still will give the general location and your ISP provider.

Websites

The damnation of us all. Web logs.
These can be extremely annoying due to the extent of the information they gather.

When you connect to a website, its generally logged for two purposes. 1. Security. 2. "Statistics".
How do they log this/what do they log?
They can log MANY things. IP, MAC, and unfortunately they generally drop a few cookies into your browser.

(taken from the apache website) lets say you open a gif
here's the log
PHP Code:
127.0.0.1 - frank [10/Oct/2000:13:55:36 -0700] "GET /apache_pb.gif HTTP/1.0" 200 2326 
What do they have ?
"127.0.0.1" - IP
"frank" - your user if you are logged in, or they could use a cookie instead.
[10/Oct..etc] - Time and date
"Get /apache_pb.gif HTTP/1.0" - What you opened with what protocol.
the 200 and 2326 aren't important but summ'd up they say if it worked and how big it was.

They can also include where you were referred from, what bowser you were using, your OS system.

They get the same type of log when you open a link.
ESPECIALLY MISSING PAGES OR PAGES YOU HAVE ERRORS ON.

They will also use cookies, these can track your history of browsing. Where you went after. What you did, how long you were on. What you searched for.
and pretty much EVERYTHING about you.

Here's something the NSA did "he National Security Agency's Internet site has been placing files on visitors' computers that can track their Web surfing activity despite strict federal rules banning most of them.

These files, known as "cookies," disappeared after a privacy activist complained and The Associated Press made inquiries this week, and agency officials acknowledged Wednesday they had made a mistake.
Until Tuesday, the NSA site created two cookie files that do not expire until 2035 — likely beyond the life of any computer in use today.
"
(that's right NSA. We are onto you and your habit of watching our porn Nono).

ISP

Ok so I will put this pretty simple for everyone.
Your ISP practically is videotaping your every move.

Ok no not literally, but they have EVERYTHING.
Here is a list leaked in 2010 of some info

Spoiler 
[Image: bt-infringer-list.png]

Scared yet?
They have ALL your information, they record EVERYTHING.
Depending on where you live they are required to hold logs for a long time.

They know where you have been, what page exactly. How long you were on it, every download you make.
They even record your emails. Not the actual content (per-say) but they are recording who contacted who. (I would suspect google does this also).

How can they do this?
Easy IP. Not your IP address but: Internet Protocol.

Communication between two computers (websites are on servers which are "computers") is formed up of "packets" .
Imagine packets as a piece of paper, your computer hands the other a piece of paper saying "give me porn". The other computer replies by drawing you a picture, and giving it back.

Well your ISP keeps every little piece of paper.

Now your thinking "BUT I HAVE PROTECTION". Every girl can vouch for me as I say NEVER trust that there's any protection.

VPN'S
First lets just get what a VPN : Virtual Private Network.
Its an internet within the internet, right?

Ill spare you all the technical jargon and sum it up like this (then give you the technical jargon): Remember the paper analogy?
Well you give the VPN your paper, the VPN then hides it under its black trenchcoat until it reaches the website. The website takes the paper, gives it back to the VPN. Now the VPN returns to you.

It "masks" who's sending the data. It encrypts it so if someone grabs it, they can't read it.
Which is GREAT !

but still not exactly safe.

The VPN services may CLAIM to not hold logs. But their ISP will.

It will say "User gave VPN this paper". The reason VPN's are so safe is because it can be harder to narrow down which user the request came from, but its still VERY possible.

And your computer will say "I connected with VPN :D "
Their vpn computer will say "yeah, that dude connected to me -.-"
Everything has a log.

Honestly, ISP has the power to see everything. They just don't have the time.

VPS
Okay so lets not use a vpn...LETS USE A VPS ! (Virtual Private Server).
Its a computer, that you connect to and control. The same as VPS, their ISP will have logs.
But not only that, remember the computer logs I told you about earlier ?

When you log into a computer there is a log, when you remotely log into one it also holds what IP you connected from.
When, where from, how long , EVERYTHING is stored.

So when the feds see the VPS's IP doing something at 3:45 AM.
They go to the computer, they check "what ip was logged in at 3:45 AM" and BAM your IP address pops up.

Its the same as a VPS, you may be a bit more "anonymized" but its not anonymous.

Proxies
Proxies and proxy chains/services (such as tor) are the same as the previous, if not more vulnerable (Tor is a different story, which I am not going to delve into at this point. It is one of the most secure ways to "travel").

Its pretty much the mix between a VPS and VPN.
You connect to it, tell it to do something. It does it, and brings you the reply.

The only problem is, it doesn't encrypt your data (generally). And it doesn't hide that you are the one sending the message (to everyone who know's how proxies/vps/vpn's work in detail. Please forgive me for the really crude explanations. I am trying to get the overal concept across. ) .

It still hides YOU, but not that you are controlling it.

Hacking a wifi/ other people's wifi

Yes this can be REALLY good. And yet still bad.

When you connect to an internet router you leave logs of your MAC address, which yes you can spoof it. But even so, still a log.
Especially if you try to crack the password, then your leaving your fingerprints all over the place.

Public Wifi normally has security measures to record who you are, AVOID THEM AT ALL COSTS.

Find personal home's that have unprotected wifi in a public place. That will help you out.

I new a person who did something called "war dialing" .
Well the newer version anyway. He drove around and cracked a bunch of wifi passwords.

Well the fed's ended up tracking him down because he left a trail, literally.
Each cracked wifi was in a specific 'zone' and he lived in that zone.

Using his browsing habits from the hacked modems, they pieced together a lot.

all it takes is one cookie to say "oh hey im sending from this IP ** . Oh hey now im from This ip ** "
and you are DONE.

Monday, 18 February 2013

India Premier National Level Telecommunication Training Centre Hacked by Hitcher, Sensitive data leak

India Premier National Level Telecommunication Training Center (Bharat Ratna Bhim Rao Ambedkar Institute of Telecom Training India) Hacked by Hitcher along with Sensitive data leak as well.

BRBRAITT is one of the premier institutes of BSNL India, imparting training in arious fields like latest technologies in field of telecommunications, computer networking, accounting, management, providing competency and skills to meet the ever-changing needs of esteemed customers.


All their brbraitt_users ,Business Contacts and all Training Contact leaked also

Hacked sites link 

Mirrors:


Hacked Data:

The hacker provided 6 Spreadsheets :  brbraitt_users,     Business_contacts, Courses, Faculty_ Presentations, Training_Contact, projects. 'brbraitt_users.xlsx' file contains the email ids, passwords, name and addresses, ,mobile number. It includes the email id and passwords of Admin.

Leaked data by hacker can be downloaded form following link.
Here are some Screen Shorts of Data Base India Premier National Level Telecommunication Training Center.




About BRBRAITT

BRBRAITT is one of the premier institutes of BSNL India, imparting training in arious fields like latest technologies in field of telecommunications, computer networking, accounting, management, providing competancy and skills to meet the everchanging needs of esteemed customers.

Ubuntu password reset/login trick

Reset Your Forgotten Ubuntu Password in 2 Minutes or Less

If you’ve ever forgotten your password, you aren’t alone… it’s probably one of the most common tech support problems I’ve encountered over the years. Luckily if you are using Ubuntu they made it incredibly easy to reset your password.

note:- I AM SHOWING UBUNTU 10.11


1 Reboot your computer, and then as soon as you see the GRUB Loading screen, make sure to hit the ESC key so that you can get to the menu. 

its look like this 

  2 Then press 'e'


3 You’ll want to remove the “ro quiet splash” part with the backspace key, and then add this onto the end:
rw init=/bin/bash
 I highlighted here 

 4 Then you have to do is press f10 key wait until you something like this



5 Then simply type cd /home  then its says "root@(none):/home#"  


6 Now type "ls" and press enter  this will show you the user name of system like this


7 now u have to do is type passwd <username> example in here its like passwd way2h   then press enter now its tell us to enter new password  for given user  simply type two times and done :) 


NOTE:- after u done this type
reboot –f  
I found that the –f parameter was necessary to get the reboot command to work for some reason. You could always hardware reset instead, but make sure to use the sync command first.

ONLY FOR YOUR INFORMATION

BEST TOOLS EVER PART [3]

IN CASE IF U MISS OUR PART 1 AND PART 2

COMMENT FOR BROKEN LINK

Ares
Quickly find anything you want on the web and download it. No need to wait because you are using a free account and they want to force you to buy an account. Simply use this tool to search , check and download anything you want from the web.
http://uploading.com/files/GIXYQOXJ/ares...r.exe.html


Redtube downloader
Download any XXX video you want from "redtube(dot)com without having to buy a premium account. Simply put the url of your video and download it in seconds. redtube administration is trying very hard to make such tools disappear but they won't Tongue
http://uploading.com/files/O8RAPGBK/redt...p.exe.html


Trojan remover
Find all trojans on your pc and finish them in few minutes. This tool can detect anything looks suspicious in your PC. Use it very carefully and read each name this tool would find on your pc before acting.
http://uploading.com/files/5STPD35E/troj...r.exe.html


Windows Live Messenger 2009.exe
No need to explain about this. Everyone know what is WLM.
http://uploading.com/files/379c9m64

Total Commander 7.50 beta 4
Total Commander is a file manager for Windows similar to well-known DOS file manager.
Total Commander can handle archives as if they were subdirectories. It also has an internal ZIP-compatible packer. The search function allows you to search for files inside archives, even for text.

http://uploading.com/files/46UDAII8/Tota...4.exe.html


Sand boxie
Sandboxie runs your programs in an isolated space which prevents included viruses from making permanent changes to other programs and data in your computer.
http://uploading.com/files/AMMA97YT/Sand...l.zip.html


CCleaner 2.20.920
CCleaner is a freeware system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it's fast (normally taking less than a second to run)
http://uploading.com/files/67c1m966/ccleaner.rar/


Spyware Terminator 2.5.7.126 Beta
Spyware Terminator will scan your computer for known threats and report findings in a manner that is easy to read and interpret. Every entry is given a rating and a classification, which makes it very easy to decide if a detected item should be removed. Unlike some free software titles, Spyware Terminator will remove all threats for free.
http://uploading.com/files/UZKNRWSX/Spyw...r.exe.html


SmartyUninstaller
Have you ever suffered from softwares that refused to delete? Well in fact of them are infected with strong viruses. Use this software to force any stuborn software that refuse to delete to remove it from your pc. Very effective
http://uploading.com/files/1D277M3S/Smar...7.rar.html

Sunday, 17 February 2013

How to Use Backdoor

Before download this software make sure your antivirus is turn off 

Using the backdoor, hackers can remotely access your computer without any Authentication and do whatever the hacker wants. I will tell you some of the features of the rest of them you need to try and find out. The program:

  • Working as a key logger. 
  • Send any information from PC to PC Hacker's Victim. 
  • Running the program on the Victims PC.
  •  Display each image on the screen 
  • Violating the victim. 
  •  Open the CD drive of the PC victim. 
  • Open a Web page on the Victims Screen. 
  • Special keys or disable the whole keyboard.
  •  Shutdown PC victim. Songs start at PC.etc.etc Victims ... ... ... ... .
 The reverse of the best I have found is Back Orifice so I will discuss it.

 Back Orifice
 ========
Back Orifice backdoor program is one of the most common, and one of the most deadly. The name may seem like a joke, but surely, the threat is real. Back Orifice was established in Cult of the Dead Cow. Back Orifice is an Open Source program. The main threat of this software is that by making some changes to the code anyone can make it undetectable by anti virus program that runs on the victim computer. Apart from the odd title, the program usually gets port 31 337, a reference to the phenomenon of "Lit" is popular among hackers.
Basic Back Orifice consists of two major parts. "Client" and "server". The client is part of Bo2k that you use to control the other comp. By defult, it bo2kgui.exe Server is a file that you install on comp the other in order to control it. By defult, it bo2k.exe. Never run in the comp bo2k.exe yourself unless you know what you are doing. The other component is a plugin ipmortant. Simply put, the plugin addon for Bo2k. They increase the strength Bo2k. For a list of plugins for Bo2k, goto the official website Bo2k. To control the other comp, you must first send to the other party decides bo2k, and all other parties are running, you just start your bo2k client and using it you can assert your control.

How to use Back Orifice?
=================
How to use it?
 First, you must configure both the client and server.

  1. First let's configure the server.
  2. Download a copy of Bo2k and unzip.

  3. Then run bo2kcfg.exe file.
     
  4. A window will appear welcoming you to bo2k configuration wizard.
  5. Click on the following (For the experts, they do not use the wizard, they configure manually.But one thing at a time first.)
  6. Then the wizard will prompt you for a file server bo2k (which bo2k.exe). By defult you just need to click next. But if you change your name or keep it in a different folder, go browsing for it.
  7. Now it will ask if you want the connection or connections TCPIO UDPIO. I would recommand TCPIO.
  8. Now they will ask you what port you want to listen to. The more popular ones are 6666, 54 321, 33 137, 31 336 and 4444. Try to advoid this. Try putting a number that you can remember easily. Avoid 12345, 1080, 8808.
  9. Now they will ask you for your encryption type. Usually you only get to choose the option XOR. Do not choose 3DES if you're not in the U.S..
  10. Now they will ask you what you want to password use.Choose one and remember it.
  11. Then click finish. The setup wizard will automatically part for your client. Be patient you can use it immediately.
  12. Now send the server (bo2k.exe) to the other party and the other party when it runs, you will be able to connect to.

What to do when the victim clicks on the server?

  1. Start bo2kgui.exe.
  2. Click on the file, then the new server.
  3. Type in what ever name you want to call it.
  4. Now type in the ip address of the other party. If you do not know it, then you're in luck.
  5. If others in irc, just goto irc and type / dns and you will get the ip (plz dun include <> when typing / dns).
  6. Now click on connect.
  7. You will see a window that says "Please wait retriving server capabilities ..." However, if you see "Can not connect to remote server" which means that the other party did not run well Bo2k.exe or he is behind a firewall or maybe he has gone offline. Then you're in luck. :)
  8. One you have connnect, the right window, you should see some folders. I will explain the functions in the folders in the next post.

Download Back Orifice 2000
 ===================
Back Orifice 2000 can be downloaded at the following address: http://sourceforge.net /projects/bo2k/


 
How do I delete Back orifice 2000?
 ===================

Removing Back Orifice 2000 ?

may require that you modify the registry settings. To remove it at 7 simple steps, refer to the diagram below.
Click Start> Run, and type "regedit" (without the quotes) Follow the path below:
HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ RunServices " Now look in the right box: "The umgr32 = 'c: \ windows \ system \ umgr32.exe" Right click on the entry and click Delete. Now restart your computer. After restarting only open Windows Explorer. Make sure you can see all registered extensions. To do so, select "View Options and configure the appropriate settings. Go to the directory SYSTEM \ WINDOWS, and find "umgr32.exe" file. Once you find it, delete it. Exit Windows Explorer and reboot again.

NOTE:
=====
Just for educational purposes, and if I get a good response on that, I would furthur explain the function of the folders and also how to add plugins in it.So leave your comments if you like it!

1000+ Hacking Tutorials collection

5 things a Beginner Hacker should know

  1. At this stage, most of the students search for hacking tools and software. But Here i want to make this clear that no tool and software exists which can hack Gmail, Facebook, Yahoo, twitter or any aother website or email account in just few clicks. These types of posts on internet are just for attracting visits and spread spams. Most of this type of hacking tools are binded with trojans which leads your system at risk. The recent example it Anonymous LOIC tool which is used to hack members to use their system in criminal activities.

  2. Never use any premium keylogger which is available free on filehosting websites. Hackers always host this type of tool with Trojans. After installing this type of keyloggers you will be hacked.

  3. Never pay for hacking on the websites which are asking money in return of hacking. If you want to pay for any hacking book, tool or other kit, pay only on the trusted websites.

     
  4. Join any good hacking forum and learn new things from the experts. Never follow a person just for his claims. Always follow a person who has real knowledge. Adding hacker word is not going to make anyone hacker. There are many Javascript pranks and online websites are available which are used to create fake screenshot and defacing pages. These are used by many noobs to create some fake hacking screenshot to share on Facebook. And beginners follow them thinking as a hacker.

  5. Learn Programming languages and networking. These are must to be a hacker. Most of the hacking attacks such as SQL injection, PHP injection, XSS, Phising and many other needs the knowledge of programming.