Tuesday, 29 October 2013

What is computer hacking? Introduction to Hacking

What is computer hacking? Introduction to Hacking ?

 

What is computer hacking?
In a cyber security world, the person who is able to discover weakness in a system and managed to exploit it to accomplish his goal referred as a Hacker , and the process is referred as Hacking.

Now a days,  People started think that hacking is only hijacking Facebook accounts or defacing websites.  Yes, it is also part of hacking field but it doesn't mean that it is the main part of hacking.

So what is exactly hacking, what should i do to become a hacker?!  Don't worry, you will learn it from Break The Security. The main thing you need to become a hacker is self-interest.  You should always ready to learn something and learn to create something new.


Now , let me explain about different kind of hackers in the cyber security world.

Script Kiddie

Script Kiddies are the persons who use tools , scripts, methods and programs created by real hackers.  In a simple word, the one who doesn't know how a system works but still able to exploit it with previously available tools.

White Hat Hacker:
White Hat hackers are good guys who does the hacking for defensing.  The main aim of a Whitehat hacker is to improve the security of a system by finding security flaws and fixing it.  They work for an organization or individually to make the cyber space more secure.

Break The Security only concentrates on white-hat hacking and help you to learn the Ethical Hacking world.

Black Hat Hacker:
BlackHat hackers are bad guys , cyber criminals , who have malicious intent.  The hackers who steal money, infect systems with malware ,etc are referred as BlackHat hackers.  They use their hacking skills for illegal purposes.

GreyHat hackers:


The hackers who may work offensively or defensively, depending on the situation. Hackers who don't have malicious intentions but still like to break into third-party system for fun or just for showing the existence of vulnerability.

Hacktivists
The hackers who use their hacking skills for protesting against injustice and attack a target system and websites to bring the justice.  One of the popular hacktivists is Anonymous.


 

Sunday, 27 October 2013

Install backtrack on your smart phone - mobile hacking

today we are going to see How to install backtrack  5 on Smartphones and tablets which run on android.For this we have certain Required. Ofcourse the main will be the Android smartphone with 2.1+. Though I recommend 4.0+.In my case ill be using Micromax a110 smartphone. 





Requirements:

1.Back | track 5 Arm architecture which can be downloaded from the official website of the Back | track Here.

2.A smartphone/tablet which needs to be rooted since it requires root permission to run certain scripts. (micromax a110 as example)
3.Following Android Apps:
BUSYBOX : It acts like a installer and uninstaller.it needs root permission to run.it has gpu cores and can  run linux kernals on android . Link
 
Superuser: This app just grants a superuser power to your phone just like “su” does for linux. Link
 
Terminal Emulator is app that runs a terminal console in android .Link
 
AndroidVNC is a tool for viewing VNC in Android. Link

Installation:

1.Extract the backtrack folder “BT5-GNOME-ARM” to folder named “BT5” on the root of sd.That’s the top level of the SD card. 
2.Open up the Terminal Emulator 
3.Type the command “cd sdcard/BT5”

4.Run this command and you will see root@localhost.
 su
sh bootbt
 

5. Now lets run Backtrack GUI with VNC viewer 

 startvnc
h

6. Open android vnc
Nickname : BT5
Password : toortoor
Address : 127.0.0.1
Port : 5901
 7.Click the connect Button and Boom here is your Pentest machine 
 
 
 
 
 

Saturday, 26 October 2013

Windows XP Highly Compressed 10 MB Full Free Download




Windows XP ISO Free Download -Ghsoftwares.

Windows XP ISO Highly Compressed is a good window in all the windows. Every person like this window because it had a great future. Windows 8 ISO Highly Compressed is very beautiful in a graphic and his other features. Now in these days every person wants to install Windows 8 ISO Highly Compressed on his PC. It had a platform for all installed softwares on single window button. Windows XP ISO Highly Compressed is not easy to learn.
New Futures in Windows XP ISO Free Download

No.1 New Windows music.

No.2 In Windows 8 ISO ORB Images.

No.3 Now Windows 8 ISO Highly Compressed More Stable and Reliable.

No.4 UAC Disabled (You should be able to run Metro Applications without any problem).

No.5Windows Smart Screen Filter Disabled.

No.6 New Look for Windows Media Player.

No.7 New Windows 8 ISO Evolution Theme (Default).

No.8 Show extensions for known file types.

No.9 Enabled Glass Effect (DWM) without a supported card.

No.10 Windows will tell you exactly what it is doing when it is shutting down or is booting.

No.11 Add command prompt to right click context menu.

No.12 Enabled addition Avalon effects.

No.13 Added “Explore from here” context menu while right clicking on folders.

No.14 Get rid of the Windows Mail splash screen.

No.15 Maximum Simultaneous Downloads for Internet Explorer to 20 (Default was 2 ).

No.16 Enabled DirectX Video Acceleration in Windows Media Player.

No.17 Disabled Auto Rip disc when inserted in Windows Media Player.

No.18 Highly customized shell.

No.19 Enabled Auto Eject disc when ripping is completed.

No.20 Disabled deleting files from computer when deleted in library in Windows Media Player.

No.21Disabled Auto Add Played Media files.

No.22 Enabled Advanced Option in Monitor Folders in Windows Media Player.

No.23 Disabled deleting contents from devices when deleting playlist in Windows Media Player.

No.24 Enabled ClearType Tuning.

No.25 Added ‘Copy to Folder’ to right click context.

No.26 Added ‘Move to Folder’ to right click context.

No.26 Enabled Search in system folders.

No.27 Improved reliability and improved performance for gaming.

No.28 Disabled the NTFS Last Access Time Stamp (speeds up viewing folders in ntfs).

No.29 Disabled kernel paging.

No.30 Disabled kernel paging.

No.31 Disabled 8.3 names on NTFS.

No.32 Disabled Low disk space checks.

No.33 Faster Shutdown.

No.34 Fully Automated Windows Setup.

No.35 Added ‘Open With Notepad’ to right click context.

No.36 Disabled StickyKeys Keyboard shortcut (Popups up when pressing SHIFT key five times).

No.37 Disabled FilterKeys Keyboard shortcut (Popups up when pressing SHIFT key eight seconds).

No.38 Disabled ToggleKeys Keyboard shortcut (Popups up when pressing NUM LOCK No.1 key five seconds).

No.39 Disabled Windows Media Player AutoUpdates.

No.40 Disabled IPv6.

Windows 8 ISO Highly Compressed is a great by his futures.


Quick Heal detects virus that demands ransom of $ 300



 Best antivirus OF all the time read here

NEW DELHI: Cyber security firm Quick Heal today said it has detected a new computer virus, CryptoLocker ransomware, which after encrypting files in a user's computer demands a ransom of $ 300 (around Rs 18,500) for decrypting them.
Ramsomware, a kind of malicious software, is designed to block access to a computer until a certain sum of money is paid.

Generally, it targets individuals.
"In early September 2013, Quick Heal Threat Research and Response lab received several incidents about a malware that once executed encrypts files in the victim's computer and demands a certain ransom for decryption," Quick Heal said in a statement.

This malware makes a demand of $ 300 through prepaid card services like UKash, Bitcoin or MoneyPak, it added.

This type of malware is spread using social engineering tricks especially via email such as fake FedEx or UPS tracking notifications with attachments. Once the victim opens such email attachments, CryptoLocker gets installed and starts scanning the hard disk for all kinds of documents, it said.

Documents include images, videos, documents, spreadsheets and presentations, Quick Heal said adding the virus encrypts the files and once the user starts operating his/her system, it pops a message demanding a sum of $ 300 to buy a private key to decrypt the files, Quick Heal added.

"The malware gives a deadline of 100 hours to pay the ransom and get the private key to decrypt the data. If the amount is not paid it destroys the private key and your encrypted data is locked forever with no way to recover it," the firm said.

Hackers behind this malware are able to avoid the trace back by using digital cash systems like Bitcoins and MoneyPack where the payments can be anonymous.

"Since last couple of weeks we have been seeing over 500 incidents per day of this malware. The incidents are being reported from all over India," Quick Heal Chief Technical Officer Sanjay Katkar said.

The firm also said that cyber criminals are employing similar tactics to fleece money from the victims.
"Another similar kind of ransomware that goes by the name of 'Anti-Child Porn Spam' was seen infecting few computers in last couple of days. This shows that the trend for ransomware is growing," Quick Heal added.

introduction To DDOS attack (HD) - how to hack server


Introduction To DDOS attack video tutorial   OR distributed denial-of-service attack (explanation with demo) this attack is almost undetectable over the web so recent news "Google announced it had built "Project Shield" to help small websites stay online during DDoS (distributed denial of service) strikes" so we need to know what this ddos do and how it work u will learn all in this tut. for more visitn 


Best antivirus for windows - 2010/2012/2013

 
best anti virus ever 2013 


 (click image to zoom)
one of the most asked question in computer section  

"which anti virus is best for windows?"
we so here is the image of antivirus with compression
between other antivirus compare and find your best one 
 

all paid anti virus  are good in his job 


according to way2hackintosh   "Quick Heal"  is the best
antivirus for your system  but yes  this anti virus

cause your PC run slow because of his run time scan  (RATING 4.5 STARS) 

1 > it provide all kind of security   

2 > boot time scan ( which is power full weapon again
virus"


3 >   quick heal  have ability to repair file  instead

spiking  ( try this download a strong virus and scan
with different antivirus u will find the difference)   


4 > quick heal  also posses power to delete system file 
even if its his awn fine 


5 > quick heal have one great thing  its made with a
algorithm that study your every day use of computer  and
if there is any change in computer  like (registry
change without installing anything)  then quick heal
Warn you about change 
that's all 


-image source wikipedia

Thursday, 24 October 2013

What it take to make graph search ? history facebook engieenring

Last week we added the ability to search posts using Graph Search, a feature that has been two years in the making. With one billion new posts added every day, the posts index contains more than one trillion total posts, comprising hundreds of terabytes of data. Indexing these posts and building a system to return real-time results has been a significant engineering challenge—and this is just beginning.

Collecting the Data
One of the biggest challenges we faced in building this product was that Facebook's underlying data schema reflects the needs of a rapidly iterated web service. New features often demand changes to data schemas, and our culture aims to make these changes easy for engineers. However, these variations makes it difficult to sort posts by time, location, and tags as wall posts, photos, and check-ins all store this information differently. We currently have 70 different kinds of data we sort and index on, many of them specific to certain types of posts. In addition, the data is contained in a production MySQL database. This means that harvesting this data puts a significant load on databases that are simultaneously serving production traffic, and the process must be carefully monitored.

Building the Index
We store our harvested data in an HBase cluster, from which we execute Hadoop map-reduce jobs to build our index in a highly parallel process. This index-building process converts the raw data into a search index that works with Unicorn, our search infrastructure. We separate the data into two parts - the document data and the inverted index. The document data for each post contains information that will later be used for ranking results. The inverted index contains what is traditionally considered to be a search index, and building the inverted index requires going through each post and determining which hypothetical search filters match.

Updating the Index
To update the index, we subscribe to changes in the MySQL databases using a technology called Wormhole. Whenever a new post is created, an existing post is modified, a post is deleted, or some connection to a post is edited, we schedule an update on the corresponding post. To avoid code duplication, we run these updates through the same logic mentioned in the "Collecting the Data" section above. However, there is one major distinction: when we originally collect the data, we intentionally bypass our caches, as we want to avoid sending them requests for old data that is likely missing from the cache. When processing an update to the index we hit those caches, as we expect the data to have been recently accessed and be present in the cache.

Serving the Index
The posts index is much larger than other search indexes that Facebook maintains. Before we started working on the ability to search through posts, all Facebook search indexes were served entirely from RAM. This was ideal for quick lookup and was a tenable setup given reasonably small search indexes. However, storing more than 700 terabytes in RAM imposes a large amount of overhead, as it involves maintaining an index that is spread across many racks of machines. The performance cost of having these machines coordinate with each other drove the Unicorn team to look into new solutions for serving the posts index. The solution we decided on involves storing the majority of the index on solid-state flash memory. We managed to preserve performance by carefully separating out the most frequently accessed data structures and placing those in RAM.

Ranking Results
With a trillion posts in the index, most queries return many more results than anyone could ever read.  This leads us to the results ranking step. To surface content that is valuable and relevant to the user, we use two primary techniques: query rewriting and dynamic result scoring. Query rewriting happens before the execution of the query, and involves tacking on optional clauses to search queries that bias the posts we retrieve towards results that we think will be more valuable to the user. Result scoring involves sorting and selecting documents based on a number of ranking "features," each of which is based on the information available in the document data. In total, we currently calculate well over a hundred distinct ranking features that are combined with a ranking model to find the best results. We will continue to work on refining these models as we roll out to more users and listen to feedback.

Project History
Like many other products at Facebook, the ability to search over posts was originally conceived as a Hackathon project. My second day as a Facebook intern coincided with a company-wide Hackathon, and I spent the night aiming to implement a way for my friends and me to find old posts we had written. I quickly discovered that the project was much more challenging than I had first anticipated. However, the engineering culture at Facebook meant that I was supported and encouraged to continue working on it, despite the scope of the project. The majority of the work--infrastructure, ranking, and product--has been accomplished in the past year by a few dozen engineers on the Graph Search team. We are very excited to share the results of our hard work with people using Facebook, and look forward to seeing how people use the new feature and improving it based on their feedback. We hope that being able to search for posts will enable a richer Facebook experience for everyone.

source - facebook engineering

Tuesday, 22 October 2013

Google technology 'uProxy' to provide uncensored internet for global activists (news)

Google technology 'uProxy' to provide uncensored internet for global activists m happy after hearing this news :D 







Google announced uProxy on Monday at the Google Ideas Summit in New York, but the tool is not exactly ready yet. Furthermore, the company doesn’t even want to speculate about when users will be able to use it yet, saying instead they want to try it out through a few trusted testers in order to improve it and build up its security


At its Ideas Summit in New York, Google revealed Uproxy: a service that aims to change the way people around the globe use the internet. A browser extension for Chrome and Firefox, uProxy can bypass restrictive firewalls that hinder users from accessing vital (and trivial) information online by creating peer-to-peer connections. If someone from a country with limited internet access installs uProxy, they can get a friend from the US to authorize them to surf the open web using their connection. The service has yet to launch, but its creators -- the University of Washington and Brave New Software -- have opened a restricted beta for select, technically adept users to make it as "secure, private, and robust" as possible. If you know anyone who could benefit from uProxy   

-source www.engadget.com 

Monday, 21 October 2013

New Phishing attack targets Italian Postal and Financial service again

 
 
 
 
A phishing attack is a complex combination of technology and psychology. There are numerous ways in which people are being made fools and they can be conned by hitting on unsecured website links.
Sophos experts detected this week an intriguing case of phishing against the Italian postal service Poste Italiane, the scheme attracted the researcher's attention due the reuse of an old social engineering trick.
 
here is the graph in percentage  of phishing 
 
 
also i use to hack some one  according to hacker phishing is the best way to hack someone because its easy to use no risk and victim dont get idea about phishing

read more stay tune have fun remember #hacking is not crime

Sunday, 20 October 2013

Android 4.4. KitKat: Features & Release Date News


android kitkat: with better UI  

While  apple trying to be like android almost not apple look like changing into android user interface as the user interface of android is better then jelly bean Google has turned Android into one of the best-looking operating systems available  


Android KitKat: Wider hardware support in mobile and computer 


One of Android's biggest issues is fragmentation thanks to the sheer number of devices available 

This problem is heal by large number of device available in mobile coumpines Google will apparently try to make amends with Android 4.4, which is rumored to have lower specification demands and can therefore be installed on older phones and tablets 

 

Android KitKat: Exclusive Cloud-based system

Cloud storage is old news – we already have the likes of Google Drive, Dropbox and Box, but Google may be looking to integrate this feature more tightly with Android. Perhaps in the same way that Apple uses iCloud for backups and the like? 

Android KitKat: Better battery life

ohh !! thankx god this is what i want  i mean everyone what a better battery life of course and it not only depend on hardware but also it depend on software you are using 

 Android 4.4 is supposed to make better use of multi-core CPUs and is apparently "lightweight" in terms of the demands it places on the hardware.

 Android KitKat: Smoother screen orientation changes

Android KitKat: Improved security and bug-squashing

security is the main issue for all kind of software  cyber crime is spreading like lightning speed and android is easy to modify and vulnerable and easy target for hacker to use android platform  and in recent news millions of android device hacked so this time google come up with all new security and bugs   

 

 Android Jelly Bean on the Nexus 4 is on the left and Android KitKat, as seen on the Nexus 5 leak, is on the right

 

  1. Notification bar is no longer black. Now transparent and icons are white
  2. Google's Roboto font appears to be narrower, similar to the HTC Sense 5 UI
  3. Bar above the app tray is gone. The only divider is a homescreen page indicator using translucent dots
  4. Camera icon is completely new
  5. App drawer icon no longer has an outer circle. Now a translucent circle and dots appear more rounded
  6. Phone icon is completely new. Darker blue, flatter and with less prominent gradient/highlights
  7. Like the notifications bar, the control bar is no longer black and is transparent with white icons for the navigation controls: Home, Back and Multitasking

 

Second official KitKat teaser emerges via Twitter - suggests October 28 launch

 

thats all about android kitkat thankx for reading stay connected and yeha subscribe us for more .....  your way2hackingtosh admin

Sunday, 13 October 2013

Google Costa Rica Hacked By Dr.Freak from Xploiters, Pakistani Hacker

Pakistani Hacker name as "Dr.Freak" from "Team Xploiters" hack Google Costa Rica. Ebay.co.cr, yahoo.co.cr, msn.co.cr, Flicker.co.cr and Amazon.co.cr  also hacked. This was not 1st time when Pakistani Hacker attack on Google just to show their skills. Just 2 day ago an other Pakistani hacker name 1337 hack Google Malaysia. Basically there are only 2 backhats team remain in Pakistani Cyber Space. "Team MadLeeTs" and "Team XpLoiTers". Both are trying their best to proof which of them are best.

Hacker was able to hack to attack DNS poisoning using registrar server. Now Google Costa Rica Local domain have hackers DNS address.  But one thing is for sure that this kind of cyber attack really create huge questions for security experts. Google.com.my was still defaced at the time of news published.


Deface Page Say's:
"~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THIS SITE HAS BEEN 0WN3D BY XPLOITERS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[#] Hacked by Xploiters! The Leaders Of Cyber World 

[#] We are: Dr.Freak | Xploiter | void{0} | g00n

[#] YOU MADLEETS F***TARDS CAN'T EVEN COME CLOSE TO OUR LEVEL!
[#] WHAT ARE YOU? SELF-PROCLAIMED 1337 (n00bs in reality)? WE ARE THE FU**IN' 1337 MAKERS!
[#] YOUR BIGGEST ACHIEVEMENT IS DEFACING SOME POPULAR DOMAINS VIA DNS?
[#] HERE WE ARE DEFACING THEM WITH OUR LEFT HAND's MIDDLE FINGER. (_^!^_)

Hacked By: Dr.Freak | g00n | void{0} | Xploiter

[#] Pakistan Zindabad
[#] Join us: www. Xploiter .net 
[#] All Rights Reserved 2013- Onward"

Hacked Sites:
google.cr
yahoo.cr
ebay.co.cr
youtube.co.cr
yahoo.co.cr
flickr.co.cr
amazon.co.cr
msn.co.cr

Mirrors:
http://zone-h.org/archive/notifier=Dr.Freak

Friday, 11 October 2013

Metasploit and Rapid7 Offical Sites Hacked by KDMS Team, Palestinian Hacker

Metasploit and Rapid7 Offical Sites Hacked by KDMS Team, Palestinian Hacker.

We can Officially say that today and yesterday was DNS hijacking day. Yesterday Avaria AVIRA, WhatsApp, AVG, Alexa was hacked by Palestinian Hacker by DNS hijacking. After that Google Malaysia was hijacked by Pakistani hackers. And Now one of most leading White hat hackers tools site hijacked by Palestinian Hackers. Let see what will happened tomorrow?

 These sites are consider as world most secure sites. By the way they are the one who create security for world. But Backhats again about to break their security by DNS hijacking.


We also found some Tweets about Hack. They confirm that their sites was Hijacked.
I can confirm that the DNS settings were changed for a few minutes and pointed to 74.53.46.114
— HD Moore (@hdmoore) October 11, 2013
They temporarily hijacked our domains by sending a spoofed DNS change request via Fax to http://t.co/W5BBC7jhvy
— HD Moore (@hdmoore) October 11, 2013
Yup, the whole thing was resolved in less than an hour, but DNS changes may be cached until the TTL expires
— HD Moore (@hdmoore) October 11, 2013
 Hacked Sites:
rapid7.net
www.metasploit.com

Mirrors:
http://zone-h.org/archive/notifier=KDMS

Thursday, 10 October 2013

Google Malaysia Hacked By 1337 from Madleets, Pakistani Hacker

Pakistani Hacker name as "1337" from "Team MadleeTs" hack Google Malaysia. This was not 1st time when Pakistani Hacker attack on Google just to show their skills. Just few month ago same hacker hack Google Kenya, Google BurundiGoogle Uzbekistan and Google Serbian.

Hacker was able to hack to attack DNS poisoning using registrar server. Now Google Malaysia Local domain have hackers DNS address. 

Their is not any specific reason mention behind this hack by hacker. But one thing is for sure that this kind of cyber attack really create huge questions for security experts. Google.com.my was still defaced at the time of news published.



Deface Page Say's:
"Google Malaysia STAMPED by PAKISTANI LEETS

We are TeaM MADLEETS

H4x0r HuSY - KhantastiC HaXor - H4x0rL1f3 - InvectuS - Shadow008 - r00x - Don - MindCracker - Dr.Z0mbie - phpBuGz - MaD GirL 
MaDCoDe - Sn!p3r_GS - DeXter - Neo Haxor - Darksnipper - Pain006 - b0x - R3DL0F - Sahrawi - 3thicaln00b - Hmei7 - MakMan - Sniffer - AL.MaX HaCkEr - Ch3rn0by1
=======================
www.MaDLeeTs.com
| LeeTHaXor@Y7mail.com |
=======================

Pakistan Zindabad"

Hacked Sites:
www.google.com.my
www.google.my

Mirrors:
http://www.zone-h.com/mirror/id/20957809
http://www.zone-h.com/mirror/id/20957806 

Tuesday, 8 October 2013

AVIRA, WhatsApp, AVG, Alexa & Alexasearch Offical Sites Hacked by KDMS Team, Palestinian Hacker

The Android lovers favorite app WhatsApp, World top anti-viruses companies AVG and AVIRA websites, world biggest sites for ranking other sites Alexa official sites are Hacked by Palestinian Hacker group name as KDMS Team.

Few weeks ago one more Palestinian Hacker group hack there local Google domain. These sites are consider as world most secure sites. But hackers are able to do DNS hijacking to change DNS of hacked sites to their deface page.

Last Year Avira was hacked by Hemi7, Indonesian hacker.


Deface Page Say's:
"Hello World
We Are Here To Deliver Tow Messages

First one:
we want to tell you that there is a land called Palestine on the earth
this land has been stolen by Zionist
do you know it ?
Palestinian people has the right to live in peace
Deserve to liberate their land and release all prisoners from israeli jails
we want peace
long live Palestine

Second Message:
There Is No Full Security
We Can Catch You !

----------------------------------------------------------------------------------
Hacked by KDMS team
Palestinian Hackers
----------------------------------------------------------------------------------


Hacked Sites:
alexasearch.com
alexa.net
avg.com
avira.com
avg-antimalware.com
avg.org
www.leaseweb.com

Mirrors:


10 Indian Government sites hacked by "H4x0r HuSsY", Pakistani Hacker

Pakistani Hacker name as "H4x0r HuSsY" hit 10 Indian Government sites including Public Works Department India. There is no specific reason mention in attack by hacker. Its seems like regular Pakistan India cyber war. Still these kind of attacks create many questions for security experts.


Deface Page Say's:
"H4x0r3D by H4x0r HuSsY

Shocked?
Too ManY Indian GOVS b0x3D?

=================================

Pakistani l33t H4x0r w4s h3r3

rm -rf /planet/world/earth/india 
echo "The world is a better place now!"

Hate me - Fear me - Despise me"

Hacked Sites:
pwdpunjab.gov.in/1337.html
pscst.gov.in/1337.html
http://jnvcalicut.gov.in/1337.html
pbforestdevcorp.gov.in/1337.html
prbdb.gov.in/1337.html
mcludhiana.gov.in/1337.html
esuwidha.mcludhiana.gov.in/upload
www.jnvmahe.gov.in/123
http://arogyasri.bbmp.gov.in/1337.html
www.tnschools.gov.in/RMSA

Mirrors:
http://www.zone-h.org/mirror/id/20896977
http://www.zone-h.org/mirror/id/20888936
http://www.zone-h.org/mirror/id/20888938
http://www.zone-h.org/mirror/id/20888937
http://www.zone-h.org/mirror/id/20888935
http://www.zone-h.org/mirror/id/20885932
http://www.zone-h.org/mirror/id/20885850
http://www.zone-h.org/mirror/id/20885463
http://www.zone-h.org/mirror/id/20880949

850+ Sites hacked by x0x0, Pakistani Hacker

850+ Sites hacked by x0x0, Pakistani Hacker. There appear a new hacker in Pakistan cyber space, who came up with some huge hack entry in Pakistan cyber space.

Argentina server is rooted by hacker and deface whole server. This kind of attacks create many questions for security experts. At the time of news publishing all sites was still defaced.


Defaced Page Say's:
"OMG What the h311 is this ? :O
x0x0 is here
Rooted by x0x0 ;)
Greets CFR ReaperGrim Ninjaa Kai Hitcher"

Hacked Sites:
http://pastebin.com/z4tGbW9N

Mirrors:
http://www.zone-h.com/archive/notifier=x0x0