Thursday, 28 November 2013

Best Android Apps Free Download

Many People are using the Android mobiles only due to its unique and attractive features than other mobile devices at a Reasonable price.The main thing that attracted the Mobile customers are the Apps which was really in thousands for the users of Android.

So we are interested to give some Top rated Android Apps for free to you, i given about 6 apps here, Please download and enjoy

1) Facebook Messenger


 Facebook is regarding the king of Social networking, even for the kids also Facebook is an Mouth-watering word.So people are trying to get always in touch with the Facebook,Regarding their Needs we are giving the Facebook Messenger which has this unique features




  • Get Started Quick with your friends , just log in with single app
  • Instant chat and Receive Messages
  • Tell your Location that where you are
  • Group chat and Send voice messages
Please download this app from here
 
 
2) SMS , GPS , and CALL Tracker

Yes the name says it all, The app will track the users SMS and Call details Remotely for the Android Phones, It is Absolutely free of Cost, the features are
  • The Call logging includes Missed calls, Received Calls and Phone Number all details 
  • GPS tracking of their Location update for every 30 Minutes
  • SMS Tracking like Their inbox, Outbox and their Phone Numbers
  • It is very useful when your Mobile Phone was lost or Theft
  • Install the app on your mobile using an Email and Password,then log into the site Mobitrack
Note- It is illegal to Install this software on the Phone that you don't own it, So use the software on the Phone which you have all the Rights
You can Download this app from here
 
3) Gmail

The Biggest Email Service Provider was Gmail, So all of them are in very much of need in the Mail Checking regularly, the Gmail app will satisfy all your Needs and it has some cool Features
  • One Touch Checking of Mails
  • Save the attachments 
  • Managing the Multiple Accounts
You can download this app from here
 
4) Dictionary
 
The Dictionary is very useful for the people who are willing to Speak the English Fluently, and it will be Helpful for the Phrases you need when in need for the check, Some features are given below
  • More than 2.5 Lakhs words, Phrases
  • More than 50,000 usage examples
  • The Intelligent Word entry will correct eh Spelling Mistakes as you type if any error was found
  • Search results which filters in categories like Noun, verb etc
  • Good Spelling Suggestions
Please download this app from here
5) Galaxy S4 Live Wallpaper
 
The Wallpapers are very cool and attractive if it suits our phone, so i am presenting an Awesome Live wallpaper for your Android phone , the features are
  • Water Drop ripple Effect type with the Light particles in Floating
  • Tested on Lot of Devices, it works fine
If the wallpaper came to reset after reboot mode, change your live wallpaper location from phone to SD card, If the app does not work on your phone feel free to contact me
Please download this app from here
6) Battery Left Widget
The Battery is soul of the Phone, so there is a more care on the battery of the phones, for this the app called Battery Left widget is presented, it is an Notification app having Features
  • Estimated battery of the Phone
  • Top Status Bar icon shows the battery remaining
  • Temperature 
  • Clock time of the Battery that when it will die
.Please download this app from here
 

How to: Play Android Games on Computer/PC/laptop [software]

 It is not very tough to Run Android games on your Computer, but not that much easy too, The Android is releasing several applications day by day, it is very difficult to test each and everyone in your mobile. It costs lot of battery and time.





There is a Solution for this, you can test your applications in your Computer by following my tips, the windows environment was user friendly to the Android platform

It is not easy regarding all application testing as each app differs in their usage, some needs Camera, some Needs Bluetooth and some WiFi, i am giving this mainly for the apps that is available on the Outside of Android Market

Let us know how to play android games on your Computer

1) BlueStacks

The best user friendly software that runs your android games on your computer is BlueStacks, which is yet Beta version.

Download the Bluestacks officially from here

Features


  • You can download any game in your market by single click
  • View all the apps and games in full HD Screen
  • Option for installing external .apk android files directly and testing in bluestacks
  • Very user friendly for the beginners in android testing 
2) Android SDK
The SDK refer to the Software Development kit which says it is an tool for the Android Developers, Users also use this for Testing their apps and games, but set up is not easy, and there are lot of to do for running this app on this kit
Download this Android SDK software here
3) Android live
The android live is similar to the first one mentioned above, it is for X86 Windows based systems.
For downloading Android live click here

Sunday, 24 November 2013

How to Hide files inside a picture using Command Prompt - video



How to Hide files inside a picture using Command Prompt in windows easy way to hide files inside an image file (without any software)

First create a new folder in C:\ drive and name it anything i'm gonna name it "Hide"

Now move the files you want to hide and the picture in which you want to hide to the folder.

Select the files you want to hide and right click select "Add to archive..." and give the compressed file a name for example: Compressed.rar

Now open command prompt.
type cd\ to go to your root directory


Then type
copy /b yourimage.jpg+Compressed Files.rar xyz.jpg

your files will be hidden inside the image. To get your files back right click
on the image(xyz.jpg) and open it with Winrar you will see your files
you can extract the files anywhere you want on your computer.

Friday, 22 November 2013

SSH Tunneling Explained

Recently I wanted to set up a remote desktop sharing session from home pc to my laptop. While going through the set up guide I came across ssh tunneling. Even though there are many articles on the subject still it took me a considerable amount of googling, some experimenting and couple of Wireshark sessions to grasp what’s going under the hood. Most of the guides were incomplete in terms of explaining the concept which left me desiring for a good article on the subject with some explanatory illustrations. So I decided to write it my self. So here goes…

Introduction

A SSH tunnel consists of an encrypted tunnel created through a SSH protocol
connection. A SSH tunnel can be used to transfer unencrypted traffic over a
network through an encrypted channel. For example we can use a ssh tunnel to
securely transfer files between a FTP server and a client even though the FTP
protocol itself is not encrypted. SSH tunnels also provide a means to bypass firewalls that prohibits or filter certain internet services. For example an organization will block certain sites using their proxy filter. But users may not wish to have their web traffic
monitored or blocked by the organization proxy filter. If users can connect to
an external SSH server, they can create a SSH tunnel to forward a given port on
their local machine to port 80 on remote web-server via the external SSH
server. I will describe this scenario in detail in a little while.
To set up a SSH tunnel a given port of one machine needs to be forwarded (of
which I am going to talk about in a little while) to a port in the other
machine which will be the other end of the tunnel. Once the SSH tunnel has been
established, the user can connect to earlier specified port at first machine to
access the network service.

Port Forwarding

SSH tunnels can be created in several ways using different kinds of port forwarding
mechanisms. Ports can be forwarded in three ways.
  1. Local port forwarding
  2. Remote port forwarding
  3. Dynamic port forwarding
I didn’t explain what port forwarding is. I found Wikipedia’s definition more explanatory.
Port forwarding or port mapping is a name given to the combined technique of
  1. translating the address and/or port number of a packet to a new destination
  2. possibly accepting such packet(s) in a packet filter(firewall)
  3. forwarding the packet according to the routing table.
Here the first technique will be used in creating an SSH tunnel. When a client application connects to the local port (local endpoint) of the SSH tunnel and transfer data these data will be forwarded to the remote end by translating the host and port values to that of the remote end of the channel.
So with that let’s see how SSH tunnels can be created using forwarded ports with an examples.

Tunnelling with Local port forwarding

Let’s say that yahoo.com is being blocked using a proxy filter in the University.
(For the sake of this example. :d   . Cannot think any valid reason why yahoo would be blocked). A SSH tunnel can be used to bypass this restriction. Let’s name my machine at the university as ‘work’ and my home machine as ‘home’. ‘home’ needs to have a public IP for this to work. And I am running a SSH server on my home machine. Following diagram illustrates the scenario.



 
To create the SSH tunnel execute following from ‘work’ machine.

ssh -L 9001:yahoo.com:80 home
 
The ‘L’ switch indicates that a local port forward is need to be created. The switch syntax is as follows.

-L <local-port-to-listen>:<remote-host>:<remote-port>
 
Now the SSH client at ‘work’ will connect to SSH server running at ‘home’ (usually running at port 22) binding port 9001 of ‘work’ to listen for local requests thus creating a SSH tunnel between ‘home’ and ’work’. At the ‘home’ end it will create a connection to ‘yahoo.com’ at port 80. So ‘work’ doesn’t need to know how to connect to yahoo.com. Only ‘home’ needs to worry about that. The channel between ‘work’ and ‘home’ will be encrypted while the connection between ‘home’ and ‘yahoo.com’ will be unencrypted.

Now it is possible to browse yahoo.com by visiting http://localhost:9001 in the web browser at ‘work’ computer. The ‘home’ computer will act as a gateway which would accept requests from ‘work’ machine and fetch data and tunnelling it back. So the syntax of the full command would be as follows.

ssh -L <local-port-to-listen>:<remote-host>:<remote-port> <gateway>
 
The image below describes the scenario.






Here the ‘host’ to ‘yahoo.com’ connection is only made when browser makes the
request not at the tunnel setup time.

It is also possible to specify a port in the ‘home’ computer itself instead of
connecting to an external host. This is useful if I were to set up a VNC session
between ‘work’ and ‘home’. Then the command line would be as follows.

ssh -L 5900:localhost:5900 home (Executed from 'work')
 
So here what does localhost refer to? Is it the ‘work’ since the command line is executed from ‘work’? Turns out that it is not. As explained earlier is relative to the gateway (‘home’ in this case) , not the machine from where the tunnel is initiated. So this will make a connection to port 5900 of the ‘home’ computer where the VNC client would be listening in.

The created tunnel can be used to transfer all kinds of data not limited to web browsing sessions. We can also tunnel SSH sessions from this as well. Let’s assume there is another computer (‘banned’) to which we need to SSH from within University but the SSH access is being blocked. It is possible to tunnel a SSH session to this host using a local port forward. The setup would look like this.





As can be seen now the transferred data between ‘work’ and ‘banned’ are encrypted end to end. For this we need to create a local port forward as follows.

ssh -L 9001:banned:22 home
 
Now we need to create a SSH session to local port 9001 from where the session
will get tunneled to ‘banned’ via ‘home’ computer.

ssh -p 9001 localhost
 
With that let’s move on to next type of SSH tunnelling method, reverse tunnelling.

Reverse Tunnelling with remote port forwarding

Let’s say it is required to connect to an internal university website from home.
The university firewall is blocking all incoming traffic. How can we connect from ‘home’ to internal network so that we can browse the internal site? A VPN setup is a good candidate here. However for this example let’s assume we don’t have this facility. Enter SSH reverse tunnelling..

As in the earlier case we will initiate the tunnel from ‘work’ computer behind the firewall. This is possible since only incoming traffic is blocking and outgoing traffic is allowed. However instead of the earlier case the client will now be at the ‘home’ computer. Instead of -L option we now define -R which specifies
a reverse tunnel need to be created.

ssh -R 9001:intra-site.com:80 home (Executed from 'work')
 
Once executed the SSH client at ‘work’ will connect to SSH server running at home creating a SSH channel. Then the server will bind port 9001 on ‘home’ machine to listen for incoming requests which would subsequently be routed through the created SSH channel between ‘home’ and ‘work’. Now it’s possible to browse the internal site

by visiting http://localhost:9001 in ‘home’ web browser. The ‘work’ will then create a connection to intra-site and relay back the response to ‘home’ via the created SSH channel.




As nice all of these would be still you need to create another tunnel if you need to connect to another site in both cases. Wouldn’t it be nice if it is possible to proxy traffic to any site using the SSH channel created? That’s what dynamic port forwarding is all about.

Dynamic Port Forwarding

Dynamic port forwarding allows to configure one local port for tunnelling data to all remote destinations. However to utilize this the client application connecting to local port should send their traffic using the SOCKS protocol. At the client side of the tunnel a SOCKS proxy would be created and the application (eg. browser) uses the SOCKS protocol to specify where the traffic should be sent when it leaves the other end of the ssh tunnel.

ssh -D 9001 home (Executed from 'work')
 
Here SSH will create a SOCKS proxy listening in for connections at local port
9001 and upon receiving a request would route the traffic via SSH channel
created between ‘work’ and ‘home’. For this it is required to configure the
browser to point to the SOCKS proxy at port 9001 at localhost.



thats all hope you enjoy this tutorial   :>)   

DNS poisoning - EXPLANATION | hacking trick

DNS poisoning is a technique that tricks a DNS
server into believing that is has received authentic
inforamtion when, in reality, it has not. It results in
substitution of a false Ineternet provider address at
the domain name service level where web addresses
are converted into numeric internet provider
addresses. It allows attacker to replace IP address
DNS entries for a target site on a given DNS server
with IP addresses of the server he/she controls.
Attacker can create fake DNS entries for files with
same names as that of target server.
The DNS provides a way for computers to translate
the domain names we see to the physical IPs they
represent. When you load a webpage, your browser
will ask its DNS server for the IP of the host you
requested, and the server will respond. Your browser
will then request the webpage from the server with
the IP address that the DNS server supplied.
To launch a DNS poisoning attack, follow these
steps:

+ set up a fake website on your computer

+ Install treewalk and modify the file mentioned in
the readme.txt to your IP address. Treewalk will
make you the DNS server.
+ Modify the file dns-spoofing.bat and replace the IP
address with your IP address.

+ Trojanize the dns-spoofing.bat file and send it
+ When the host clicks the Trojanned file, it will
replace DNS-entry in her TCP/IP properties to that of
your machine.
+ You will become the DNS server and her DNS
requests will go through you
There are four types of DNS poisoning attacks using
which you can compromise the target system:
+ Intranet DNS spoofing (local network)
When an attacker performs DNS poisoning on a locl
area network (LAN), it is called intranet DNS
spoofing. An attacker can perform intranet DNS
spoofing attack with the help of the ARP poisoning
technique. THis is usually conducted on a swithced
LAN. To perform this attack, you must be connected
to the LAN and be able to sniff the traffic or packets.
Once the attacker succeds in sniffing the ID of the
DNS request from the intranet, he or she can send a
malicious reply to the sender before the actual DNS
server.
+ Internet DNS spoofing (remote network)
Internet DNS poisoning is also known as remote
DNS poisoning. This attack can be performed either
on asingle or multiple victims anywhere in the world.
In order to perform this attack, you need to set up a
rouge DNS server with a static IP address.
Internet DNS spoofing is performed when the
victim's system is connedted to the Internet. It is
done with the help of Trojans. It is one of the MITM
types of attacks, where the attacker changers the
primary DNS entries of the victim's computer. The
attacker replaces the victim's DNS IP address with
the fake IP address that refers t the attacker's
system; thus all traffic will be redirected to the
attacker's machine. Now the aatcker can easily sniff
the victim's confidential information.
+ Proxy server DNS poisoning
In the proxy server DNS posoning technique, tha
taattacker changes the proxy server setting of the
victim to that of the attacker. This is done with the
help of a Trojan. This redirects the victim's request
to the attacker's fake website where the attacker can
sniff the confidential information of the victim.
+ DNS cache poisoning
The DNS system uses cache memory to hold the
recently resolved domain names. It is populated
with recently used domain names and respective IP
address entries. When the user request comes, the
DNS resolver first checks the DNS cache; if the
domain name that the user requested is found in the
cache, then the resolver sends its respective IP
address quickly. Thus, it redueces the traffic and
time of DNS resolving.
Attacker target this DNS cache and make changes or
add entries to the DNS cache. The attacker replaces
the user-requested IP address with the fake IP
address. Then, after when user requests that domain
name, the DNS resolver checks the entry in the DNS
cache and picks the matched entry. Thus, the victim
is rediirected to the attacker's fake server instead of
the authorized server.

How to defend against DNS spoofing:
Resolve all DNS queries to local DNS servers
Block DNS requests from going to external severs
Implement DNSSEC
Configure the DNS resolver to use a new random
source prot from its available range for each
outgoing query
Configure the firewall to restrict external DNS lookup
Restrict the DNS recuring service, either full or
partial, to authorized users
Use DNS Non-Existent Domain rate limitng
Secure your internal machines
Implement IDS and deploy it correctly
Use static ARP and IP table
Use SSH encryption
Use sniffing detection tools
Do not open suspicious files
Always use trusted proxy sites
Audit your DNS server regularly to remove
vulnerabilities

Botnets - full Explanation

Botnets 


A botnet or robot network is a group of computers running a computer application controlled and manipulated only by the owner or the software source. The botnet may refer to a legitimate network of several computers that share program processing among them.

Usually though, when people talk about botnets, they are talking about a group of computers infected with the malicious kind of robot software, the bots, which present a security threat to the computer owner. Once the robot software (also known as malicious software or malware) has been successfully installed in a computer, this computer becomes a zombie or a drone, unable to resist the commands of the bot commander.

A botnet may be small or large depending on the complexity and sophistication of the bots used. A large botnet may be composed of ten thousand individual zombies. A small botnet, on the other hand may be composed of only a thousand drones. Usually, the owners of the zombie computers do not know that their computers and their computers’ resources are being remotely controlled and exploited by an individual or a group of malware runners through Internet Relay Chat (IRC)

There are various types of malicious bots that have already infected and are continuing to infect the internet. Some bots have their own spreaders – the script that lets them infect other computers (this is the reason why some people dub botnets as computer viruses) – while some smaller types of bots do not have such capabilities.

Different Types of Bots

Here is a list of the most used bots in the internet today, their features and command set.

XtremBot, Agobot, Forbot, Phatbot

These are currently the best known bots with more than 500 versions in the internet today. The bot is written using C++ with cross platform capabilities as a compiler and GPL as the source code. These bots can range from the fairly simple to highly abstract module-based designs. Because of its modular approach, adding commands or scanners to increase its efficiency in taking advantage of vulnerabilities is fairly easy. It can use libpcap packet sniffing library, NTFS ADS and PCRE. Agobot is quite distinct in that it is the only bot that makes use of other control protocols besides IRC.

UrXBot, SDBot, UrBot and RBot

Like the previous type of bot, these bots are published under GPL, but unlike the above mentioned bots these bots are less abstract in design and written in rudimentary C compiler language. Although its implementation is less varied and its design less sohisticated, these type of bots are well known and widely used in the internet.

GT-Bots and mIRC based bots
These bots have many versions in the internet mainly because mIRC is one of the most used IRC client for windows. GT stands for global threat and is the common name for bots scripted using mIRC. GT-bots make use of the mIRC chat client to launch a set of binaries (mainly DLLs) and scripts; their scripts often have the file extensions .mrc.
Malicious Uses of Botnets

Types Of Botnet Attack

Denial of Service Attacks
A botnet can be used as a distributed denial of service weapon. A botnet attacks a network or a computer system for the purpose of disrupting service through the loss of connectivity or consumption of the victim network’s bandwidth and overloading of the resources of the victim’s computer system. Botnet attacks are also used to damage or take down a competitor’s website.

Fast flux is a DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies.
Any Internet service can be a target by botnets. This can be done through flooding the website with recursive HTTP or bulletin-board search queries. This mode of attack in which higher level protocols are utilized to increase the effects of an attack is also termed as spidering.

Spyware
Its a software which sends information to its creators about a user's activities – typically passwords, credit card numbers and other information that can be sold on the black market. Compromised machines that are located within a corporate network can be worth more to the bot herder, as they can often gain access to confidential information held within that company. There have been several targeted attacks on large corporations with the aim of stealing sensitive information, one such example is the Aurora botnet.

Adware
Its exists to advertise some commercial entity actively and without the user's permission or awareness, for example by replacing banner ads on web pages with those of another content provider.

Spamming and Traffic Monitoring
A botnet can also be used to take advantage of an infected computer’s TCP/IP’s SOCKS proxy protocol for networking appications. After compromising a computer, the botnet commander can use the infected unit (a zombie) in conjunction with other zombies in his botnet (robot network) to harvest email addresses or to send massive amounts of spam or phishing mails.

Moreover, a bot can also function as a packet sniffer to find and intercept sensitive data passing through an infected machine. Typical data that these bots look out for are usernames and passwords which the botnet commander can use for his personal gain. Data about a competitor botnet installed in the same unit is also mined so the botnet commander can hijack this other botnet.

Access number replacements are where the botnet operator replaces the access numbers of a group of dial-up bots to that of a victim's phone number. Given enough bots partake in this attack, the victim is consistently bombarded with phone calls attempting to connect to the internet. Having very little to defend against this attack, most are forced into changing their phone numbers (land line, cell phone, etc.).

Keylogging and Mass Identity Theft
An encryption software within the victims’ units can deter most bots from harvesting any real information. Unfortunately, some bots have adapted to this by installing a keylogger program in the infected machines. With a keylogger program, the bot owner can use a filtering program to gather only the key sequence typed before or after interesting keywords like PayPal or Yahoo mail. This is one of the reasons behind the massive PayPal accounts theft for the past several years.

Bots can also be used as agents for mass identity theft. It does this through phishing or pretending to be a legitimate company in order to convince the user to submit personal information and passwords. A link in these phishing mails can also lead to fake PayPal, eBay or other websites to trick the user into typing in the username and password.

Botnet Spread
Botnets can also be used to spread other botnets in the network. It does this by convincing the user to download after which the program is executed through FTP, HTTP or email.

Pay-Per-Click Systems Abuse
Botnets can be used for financial gain by automating clicks on a pay-per-click system. Compromised units can be used to click automatically on a site upon activation of a browser. For this reason, botnets are also used to earn money from Google’s Adsense and other affiliate programs by using zombies to artificially increase the click counter of an advertisement.

Thursday, 21 November 2013

DNS - FULL EXPLANATION

Enumerating DNS records with DNSenum Tool in Kali Linux

DNS stand for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they’re easier to remember.

The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address.

For example, the domain name www.way2h.blogspot.com might translate to 74.125.236.67 which is google DNS ip  this is my blog so the domain name was given by google and so this ip is google dns IP

One of the most important stages of an attack is information gathering. To be able to launch an attack, we need to gather basic information about our target. So, the more information we get, the higher is the probability of a successful attack.

Enumeration is a process that allows us to gather information from a network. We will examine DNS enumeration and SNMP enumeration techniques.

DNS enumeration is the process of locating all DNS servers and DNS entries for an organization. DNS enumeration will allow us to gather critical information about the organization such as usernames, computer names, IP addresses, and so on. To achieve this task, we will use DNSenum. For SNMP enumeration, we will use a tool called SnmpEnum. SnmpEnum is a powerful SNMP enumeration tool that allows users to analyze SNMP traffic on a network.

Navigate to Application > Kali Linux > Information Gathering > DNS Analysis > Open dnsenum

and enter the following command:

root@Kali:~# dnsenum – - enum example.com

It Will Show you Host address , Name Servers address , Mail (MX) Server and Zone Trabsfer Information.

If you want to More Powerful scan with Sub-domain, then use the following syntax.

root@Kali:~# dnsenum – - enum -f -r example.com

There are some additional options we can run using DNSenum:

- threads [number] allows you to set how many processes will run at once
-r allows you to enable recursive lookups
-d allows you to set the time delay in seconds between WHOIS requests
-o allows us to specify the output location
-w allows us to enable the WHOIS queries






Hope you enjoyed reading this tutorial! and remember this tut is only for educational purpose dont try to use again any restricted server  do it only if u awn the domain or u have rights to do so....   happy hacking hope u learn something if u have any question related to this then  do comment i will reply you :)  
  

Saturday, 16 November 2013

15 Indian Government and NIC Server Sites hacked by "H4x0r HuSsY", Pakistani Hacker

Pakistani Hacker name as "H4x0r HuSsY" hit 15 Indian Government sites including few sites on NIC Server. India.gov.in Main Goverment Portal's Subdomain also got Hacked by hacker. There is no specific reason mention in attack by hacker. Its seems like regular Pakistan India cyber war. Still these kind of attacks create many questions for security experts.


Deface page Say's:
"Hacked by H4x0r HuSsY


Pakistani LeeT InsiDe y0 b0x!"

Hacked Sites:
norka.kerala.gov.in
openschool.kerala.gov.in
ahdkerala.gov.in
ahd.kerala.gov.in
ngodemo.nic.in/ngo/b342350dd73...
ngoadmin.nic.in/ngo/b342350dd7...
policyholder.gov.in/1337.html
forums.netiq.com/sitemap/1337
tripurarti.nic.in/rti_print
iwmpmis.nic.in/
himswanshqvs01.hpsvacb.gov.in
www.himachaltourism.nic.in

hppwd.gov.in/1337.html

Mirrors:
http://www.zone-h.org/archive/notifier=h4x0r%20HuSsY/published=0

Friday, 15 November 2013

NASA 8 Sub Domains Hacked by M4ST£R 1T4L!4N H@CK£RS T£4M, Italian hackers

NASA 8 sub domain sites hacked by M4ST£R 1T4L!4N H@CK£RS T£4M.

NASA is consider as one of most secured server in world but this time again hackers are able to break into NASA server and deface 8 sub domains with there deface page. There is no specific reason mentioned on deface page about this hack by hackers. These kind of attacks raise many question for security experts that how hackers are still able to break into world most secured servers.


Deface Page Say's:
"Hacked
By
M4ST₤R 1T4L!4N H@CK₤RS T₤4M

#M1NDFR34KS #DR34M #SystemX #Dr.d3v1l

Contact: systemx_mih@yahoo.com"

Hacked Sites:
spaceshop.arc.nasa.gov
bt4lbleo.arc.nasa.gov
sphereswg.arc.nasa.gov
ppmovm.arc.nasa.gov
ppmo.arc.nasa.gov
ngss-trs.arc.nasa.gov
ngss.arc.nasa.gov
admms.arc.nasa.gov

Mirrors:
http://www.zone-h.org/archive/notifier=M4ST%25C2%25A3R%25201T4L%25214N%2520H%2540CK%25C2%25A3RS%2520T%25C2%25A34M

Sunday, 10 November 2013

150+ Israeli Sites Hacked and Defaced to protest against Israel, Turkey Cyber Army

150+ Israeli Sites Hacked and Defaced to protest against Israel, Turkey Cyber Army.

Turkish Hacker name as "3xroot" hack 150 plus Israeli sites to protest against Israel for Gaza Freedom For Palestine. According to Hacker "You realize that because you have exceeded his limits.! ISRAEL we're aware of Gaza Freedom For Palestine and free ..! ". Turkish hackers are considers as world top defacers and Israeli servers are considers as world most secure servers. But hackers again proof them self that how much level of hackers increase relative to security experts.


"Turkısh Message"

"Likud Partisi kacinizin curmu yeter ezanlari susturmaya? Vatanimiza,Dinimize Karsi
 Kotu Fikirlere Sahip Olan Tum Ulkelere Sanal Savas Acilacaktir..! Biz Turk
 Devletleri Olarak Hep Birlikteyiz Kimseden Korkmayiz Gerektigi Yerde Gereken 
Cevabi Veririz..! Zulme goz yuman veya zulumle hukum surmeye kalkan
 her ulkeye ziyaret borcumuz olsun!"

"English Message"

"How many of the Likud Party's call to prayer is enough to silence the criminal act?
 Vataniza, our religion Counter Having a bad idea Virtual War will be opened 
in all countries ..! We always are together as Youtube States Where it should not
 be afraid of anyone Will answer you need ..! Shield or condone the persecution
 persecution visit every country in debt to reign it! "

Since © 2008 Turkey Cyber Army Group

Atess = Ayazoglu = Hakn's = byN3sht3r = Oxsit = Death_K1nG = SonHamle = Cep_King =
 By3xRooT = Hacker_infazci = SonTuRK =TH3HQCKE4 = AsilTurk = The_Zey =
 All muslim Hackers
"Akıncılar ~ SpyHatz "

Hacked Sites List:

Mirrors:

Wednesday, 6 November 2013

FBI offer huge bounty on Top 5 Most Wanted Cyber Criminals

The Federal Bureau of Investigation is offering cash rewards of up to $100,000 for information leading to the arrest of five individuals who were added to the Cyber’s Most Wanted list.

Two of them are Pakistani, Farnhan Arshad and Noor Aziz Uddin are in FBI list. Both of them cause damage of over $50 Million after hacking into private Cell phone system in 2008 and 2012. Both of them are part of some underground cyber criminal network. FBI believes extends into Pakistan, philippines, Saudi Arabia, Italy, Spain, Singapore, Malaysia and Indonesia.

Alexsey Belan, Russian Hacker also in list who hack 3 US companies in 2008 and 2013.

Carlos Perez-Melara is also part of list who make software to hack into million of peoples and steal and sell peoples data in Cyber Black Market.