Sunday, June 30, 2013

Ninja Hacking Unconventional Penetration Testing Tactics and Techniques

Ninja Hacking, the new book by Thomas Wilhelm and Jason Andress, is not a typical book about hacking and penetration testing. Experienced penetration testers who want to learn cutting-edge penetration techniques will find few references to little-known penetration tools or techniques presented in bland technical format. The book doesn’t rely on pun-filled humor, either.

Ninja Hacking is targeted at individuals who have an interest in the warriors of feudal Japan and want a serious philosophical exploration on how those warrior’s techniques map into modern cyber-warfare. For penetration testers who want to know how to be Ninjas, Ninja Hacking creates a framework for becoming a feudal Japanese warrior in cyberspace. Each chapter discusses a new piece of the puzzle, and, while you won’t achieve mastery from this book alone, the building blocks are laid that should allow an inspired reader to know what additional areas need to be researched.

DOWNLOAD LINK: http://adf.ly/RL5Uw

Easy method to hack website

(Only For N00bs not for advance users)
++++++++++++++++++++++++++
Method :- IIS Exploit.
Things Needed :- 1. IIS Vulnerable Sites.
2. Windows Operating System. (Windows XP, Windows 7, Windows
++++++++++++++++++++++++++
First of all you have to find a vulnerable IIS website. (Some will be provided for practice)
and just you have to follow my steps to perform this attack.

_______________________________________________
Sites For Practice :-
1 .www.advanceautomation.co.in
2. www.hljyhdc.com
3. www.268au.com
4. www.jsdtsx.com
5. www.lsmdly.com
6. www.itixiang.com
7. www.lvshi163.com
8. www.songspk.pk
9. www.infanziasantonio.com
10.www.msc-waldkappel-breitau.de
________________________________________________
******************************************
This technique is for Educational Purpose only and I am not responsible any harm done by you.
******************************************
________________________________________________
1. For Windows XP Users :-

STEP 1: Click on Start button and open “RUN”.

STEP 2: Now Type this in RUN
%WINDIR%EXPLORER.EXE ,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}::{BDEADF00-C265-11d0-BCED-00A0C90AB50F}
Now A Folder named “Web Folders” will open.

STEP 3: Now “Right-Click” in the folder and Goto “New” and then “Web Folder“.

STEP 4: Now type the name of the Vulnerable site in this. e.g.” http://autoqingdao.com/” and click “Next“.

STEP 5: Now Click on “Finish“

STEP 6: Now the folder will appear. You can open it and put any deface page or anything.

STEP 7: I put text file in that folder. Named “securityalert.txt” (you can put a shell or HTML file also). If the file appear in the folder then the Hack is successful but if it don’t then the site is not Vulnerable.

Now to view the uploaded site i will go to “http://autoqingdao.com/securityalert.txt
In your case it will be ” www.[sitename].com/[file name that you uploaded] “

_______________________________________________
For Windows 7 Users :-
1. Open My Computer.
2. Right Click in the white space and select "Add a network location"
3. A Window will pop up
3. Click Next
4. Double Click "Choose A custom Network"
5. Add the vulnerable IIS website !
in my case i am using
http://admats.concerts.com/
6. Click Next! Then wait a little second !
7. Then a Web Folder will open
8. Upload your Deface page or Shell

Finish!

__________________________________________
For Windows 8 Steps are same as Windows 7... Enjoy.... xD

Enable Right Click on Disabled websites/blogs


 

Some times we experience a situation at which we are strictly not allowed to "right click" we may encounter an error saying "right-click functionality has been disabled" on a particular webpage and alas! we feel really annoyed and the only thing we may be able to is snap shooting it.In this article we are about to learn how to enable right click on restricted sites and bypass the particular restriction.In the process we are going to learn a few tips and tricks



    Most websites who disable right click functionality use Java script to disable right click ,protect content like images and other scripts. Java script is a basic language through which many websites attain good user interface , smoothness in browsing also some get better security and masking capabilities.

HOW Does JAVA script work?


    Java script is basically a set of commands defined by the user.When ever web browsers such as Google Chrome, Firefox,Opera which all supports Java script , abides by the rules defined by the specific website which they open and follows the instructions given by it.So we can simply say our own web browsers work against us (not really ).The most basic and simple solution is to disable the support for java script in our browsers.



How to disable Java script :

    We have a step by step process on disabling Java script on your web browsers.

Google Chrome:

  1. Click the Google Chrome “menu” button and click onTools.
  2. Then click on "Settings" and then go to "advanced settings".
  3. We have the Privacy button and under it, click on the button Content settings.
  4. Then at the Java script menu you can see an option saying “Do not allow any site to run JavaScript” select it and click on “Done”.

Voila! now your web browser allows you to right click on forbidden sites.


Firefox:

If you are a Firefox user the steps to disable java-scrip are as follows though its literally simple

  1. From the menu bar, click on Tools -> Options.
  2. From the Options window, switch to Content tab, un check the option which says “Enable JavaScript” and click on “OK”.

Following these simple steps by disabling Java script functionality on your web browsers now you can right click on any right click disabled site.

How to create a new partition without formatting the hard disk ?

           In this post lets see how to create a new partition without losing data. Many of us will willl format complete hard disk to create a new partitions... Actually this kind of situation's appear when we forget to divide the space on hard disk into different drives. But its not at all a major issue.  You can even create any no of drives with this simple process without formatting or losing data or without using any software. This process can be followed on any version of windows like windows 7 or Windows 8 or xp

 

Just follow the below steps


  • Now right click on my computer then a pop up window appear, then just click on manage. After you click a new window opens which is "Computer Management:" window.
  • In that window you can see all the detail's of Hard disk and other storage devices. In that select disk drive to make a new partition.
  • Right click on the disk drive there you will find a option as shrink, click on that. Once you complete this you will be able to see the empty space available in that selected drive.


  • After that just enter the amount of space of the drive you want to create then click on shrink. Once you complete this process with in fews secs you can see the new partition 
  • But still you cannot open the drive. So, now Right click on the Unallocated space on a hard drive and select New Simple Volume.
  • Then click on the next, once you click on next you have to enter the space for which you want to allocate for your new drive from the unallocated space on hard disk or you can use complete available memory for your new drive.

  • Now select the drive letter ( as you contain already c - drive now you need to select d,e,f etc it depends on the number of drive you have already created before)
  • After creating a new drive now you need to format the newly created drive so select on format settings below this you need to select few more, like for file system select it as NTFS (New Technology File System). Then keep allocation unit size as default and the name of the new drive can be changed as you wish.

  • For quick format check the perform quick format option. 
  • That's it you are done a new partition is created

Saturday, June 29, 2013

Java in 60 Minutes A Day

Unlike other books like Java in 21 days, this is an excellent book that I found when I was a beginner in java. He tells it so easily and also he covers in depth.This is simple the best java beginner books I have ever seen.This is not only for beginners but also for those who want to know in depth.
    1. Shows readers how to use Java to harness the power of object-oriented programming
    2. Includes thirty one-hour lessons that recreate a typical week-long introductory seminar
    3. Focuses on the Java 2 Platform, Enterprise Edition (J2EE)
    4. Helps readers to develop skills that are critical to many Web services scenarios
    5. The author was one of the first Sun Certified Instructors and has since taught Java to thousands of developers
    6. Companion Web site features an online presentation by the author that follows along with each chapter and includes an audio-only option for readers with dial-up Internet connection
Chapters:

Chapter 1: Getting Started with Java.

Chapter 2: Java Fundamentals.

Chapter 3: Control Structures.

Chapter 4: Classes and Objects.

Chapter 5: Methods.

Chapter 6: Understanding Inheritance.

Chapter 7: Advanced Java Language Concepts.

Chapter 8: Polymorphism and Abstraction.

Chapter 9: Collections.

Chapter 10: Interfaces.

Chapter 11: Exception Handling.

Chapter 12: An Introduction to GUI Programming.

Chapter 13: GUI Components and Event Handling.

Chapter 14: Applets.

Chapter 15: Threads.

Chapter 16: Input and Output.

Chapter 17: Network Programming.

Chapter 18: Database Programming.

Chapter 19: JavaBeans.

DOWNLOAD LINK: http://adf.ly/RJWA1

How to Make Your Wireless Network Invisible

Wireless networks have a unique name called the SSID, most routers broadcast this thus allowing crackers to access your network. This article will show you how to hide this. 

I do recommend to ALWAYS make a note of your networks SSID before doing this. If you don't then it can be a pain in the arse trying to find it.

1. Access the routers control panel (refer to the manual if unsure).

2. Choose "Home Network" from the menu. (Name may be a variant of this depending on router).

3. Select 'WLAN' or similar option and click on 'configure' or similar.

4. Untick 'broadcast network name' or similar.

5. Click "Apply" or "Save" or whatever your router users.

Close control panel and you're done.

The Evolution of Hacking [Infographic]

You know that now a days hacking has taken a lot of part of web. You can find the effect of hacking at everywhere. Generally, hacking means high quality programming and technique. Most of the famous blogs, official websites has been hacked by some famous hackers organizations. A few days ago, the official website of BSNL got hacked by anonymous India. There are also so many hackers those are from China. They are really great in their own field.
  • Evolution of Web Hosting
  • Amazing Life Hacks
On other hand, hacking is a bad thing for them who have built a website or blog with his /her full life dedication. One of our blogs was also hacked by someone after 1month of starting of our journey.

However, let’s check the evolution of hacking through this infographic:-

The Evolution of Hacking [Infographic]
Source:- Online MBA

Harry Potter And The Goblet Of Fire Pc Game Full Version Free Download 2013



Harry Potter And The Goblet Of Fire Pc Game Cover | Harry Potter And The Goblet Of Fire Pc Game Poster

Harry Potter And The Goblet Of Fire - System Requirement

Harry Potter And The Goblet Of Fire: Windows 2000/XP/7
Harry Potter And The Goblet Of Fire: 1.2GHz Processor
Harry Potter And The Goblet Of Fire: 256MB RAM
Harry Potter And The Goblet Of Fire: 8X CD-ROM Drive
Harry Potter And The Goblet Of Fire: 1.2GB Hard Disk Space
Harry Potter And The Goblet Of Fire: 32MB ATi Radeon 7500 or nVidia GeForce Class Video Card
Harry Potter And The Goblet Of Fire: DirectX compatible Sound Card
Harry Potter And The Goblet Of Fire: DirectX 9.0c

Game ScreenShot:

Harry Potter And The Goblet Of Fire Pc Game ScreenShot
Harry Potter And The Goblet Of Fire Pc Game ScreenShot
Harry Potter And The Goblet Of Fire Pc Game ScreenShot
Harry Potter And The Goblet Of Fire Pc Game ScreenShot

Information:

Harry Potter and the Goblet of Fire is a 2005 computer and video game that was released right before the film release of Harry Potter and the Goblet of Fire. Both the game and the movie are based on J. K. Rowling's Harry Potter and the Goblet of Fire, the fourth novel in the Harry Potter series.
The game follows the three main characters of the film — namely Harry Potter, Hermione Granger, and Ron Weasley — and there is an entirely new spell-casting system that allows for collaborative spells. The characters themselves more closely resemble their film counterparts than in previous games. It also has higher-quality graphics than the previous Harry Potter video games. However, the game play in the fourth video game is much more action-oriented, which is a change from the previous games.
In addition, players can play the game with friends, and can combine their magic and spells to make them more powerful. Players can also capture moving beans using Accio and increase their power with collectors, creature, and character, cards.
There is no RPG iteration of the game, unlike with previous titles. In addition, it was pointed out that unlike the previous installments, there was not much room to "run around" such as in the previous games where you were allowed to move freely within the castle and on the grounds.
The game is divided into several non-consecutive levels, some of which are locked at the beginning of the game until the player collects enough Triwizard Shields to unlock it.
It is noted as the last Harry Potter game released on GameCube and Xbox, its also the first Harry Potter Game to get an E10+ Rating in North America.
Information From: Wikipedia

Harry Potter And The Goblet Of Fire PC Full Version Game Free Download

File Size: 145MB
Password removed: Now Open and Install this game without Password

How To Dowload and Install Game?
  1. Click on Blink word "Click Here To Downlaod" And download Game
  2. Extract the file using Winrar (Download Winrar)
  3. Open "Harry Potter And The Goblet Of Fire" Folder and Double click on HP-GOF and Install.
  4. After installation Double click on gof_f.exe to play the Game. Enjoy! 

BACKTRACK COMPLETE GUIDE |Hack Wifi For Free|

Download your latest Backtrack Copy from this link here .


1. Install Bactrack to Hard Disk

BackTrack Clean Hard Drive Install

This method of installation is the simplest available.
The assumption is that the whole hard drive is going to be used for BackTrack.

--Boot BackTrack on the machine to be installed. Once booted, type in “startx” to get to the KDE graphical interface.
--Double click the “install.sh” script on the desktop, or run the command “ubiquity” in console.




--Select your geographical location and click “forward”.  Same for the Keyboard layout.
--The next screen allows you to configure the partitioning layout. 
The assumption is that we are deleting the whole drive and installing BackTrack on it.





--Accept the installation summary and client “Install”. Allow the installation to run and complete. Restart when done
--Log into BackTrack with the default username and password root / toor. Change root password.
--Fix the framebuffer splash by typing “fix-splash” ( or “fix-splash800? if you wish a 800×600 framebuffer), reboot.
BackTrack Dual Boot Installation (XP / Vista / Windows 7) :


2. BackTrack Dual Boot Install with Windows (Tested on Win 7)

This method of installation is the simplest available. The assumption is that the you have a Windows installation taking up all the space on your drive,
and you would like to resize and repartition your drive to allow a BackTrack install alongside your Windows.
BACK UP YOUR WINDOWS INSTALLATION FIRST.

--Boot BackTrack on the machine to be installed. Once booted, type in “startx” to get to the KDE graphical interface.
--Double click the “install.sh” script on the desktop, or run the command “ubiquity” in console.
--Select your geographical location and click “forward”. Same for the Keyboard layout.
--The next screen allows you to configure the partitioning layout. The assumption is that we are resizing the Windows 7 partition and installing BackTrack on the newly made space.
--Accept the installation summary and client “Install”. Allow the installation to run and complete. Restart when done.



--Grub should allow you to boot both into BackTrack and Windows.
--Log into BackTrack with the default username and password root / toor. Change root password.
--Fix the framebuffer splash by typing “fix-splash” ( or “fix-splash800? if you wish a 800×600 framebuffer), reboot.


3.Install BackTrack Live to USB (Unetbootin):



USB Live

Backtrack Live USB Install

This method of getting a live install to a USB drive is the simplest available using Unetbootin.
Note that we will format the USB drive and erase its contents.

--Plug in your USB Drive (Minimum USB Drive capacity 2 GB)
--Format the USB drive to FAT32
--Download Unetbootin from http://unetbootin.sourceforge.net/
--Start Unetbootin and select diskimage (use the backtrack-final ISO)
--Select your USB drive and click “OK” for creating a bootable BackTrack USB drive
--Log into BackTrack with the default username and password root / toor.

4. Bactrack 4 VM Install
Install Backtrack in VMware:
--Follow the basic install instructions here ( 1st step ) to get BackTrack installed in a VMware machine.
--Log into BackTrack. To install the VMWare drivers, the kernel source and headers need to be in place. 
By default in the BackTrack 4 final release, the kernel (denoted by {version} ) is configured and ready. 
However in some cases, you might need to make sure you have the latest kernel sources by typing in:
apt-get update apt-get install linux-source cd /usr/src tar jxpf linux-source-{version}.tar.bz2 ln -s linux-source-{version} linux cd linux zcat /proc/config.gz > .
config make scripts make prepare
--Now that your kernel sources and headers are in place, run the “Install VMWare tools” for the specific guest VM.
--Mount the VMWare tools virtual cd, copy over the VMWare tools package and run the installer:
mount /dev/cdrom3 /mnt/cdrom cp /mnt/cdrom/VMwareTools-{version}.tar.gz /tmp/ cd /tmp/ tar zxpf VMwareTools-{version}.tar.gz cd vmware-tools-distrib ./vmware-install.pl
--Complete the VMWare tools installation as required. Run “fix-splash” to reintroduce the green framebuffer console. Reboot.

5. Installing nVidia Video Cards:
Those of us using Nvidia Chipsets... After finishing the HDD install:
Start Networking and connect to the internet.
/etc/init.d/networking start
wicd && wicd-client &

Find your card:

lspci|grep nVidia
My lspci output
Now go to nVidia Driver Downloads. Select the card that you have (as highlighted on my lspci in the above linked image), and download the driver for 32-Bit Linux TO YOUR /root DIRECTORY.
Once it's downloaded, press <Ctrl>+<Alt>+<Backspace> to kill your X session.
Now type the following on the command line (Press the TAB key at <tab> for tab completion):
cd
sh NV<tab>
And hit the <Enter> key. Run through the installer.
Now run:
apt-get install nvidia-settings
startx
Now, when you're back in the BT GUI, click the KDE Menu (little dragon, bottom left-hand side of the screen) and you will find Nvidia X Server Settings under the System menu. @amol
You're done, and X is configured to like your card! :)




6. How to Start Networking in Backtrack:


This is always a huge topic and it seems simple to many of us but the fact of the matter is we have a lot of "new" people so we need to be clear about this sort of thing. (Note all commands should be run as root or with sudo)

1. To start networking in Backtrack 4 final issue the following command.

/etc/init.d/networking start

This will attempt to start all the interfaces in the /etc/network/interfaces file.

root@bt:~# cat /etc/network/interfaces
auto lo
iface lo inet loopback

auto eth0
iface eth0 inet dhcp

auto eth1
iface eth1 inet dhcp

auto eth2
iface eth2 inet dhcp

auto ath0
iface ath0 inet dhcp

auto wlan0
iface wlan0 inet dhcp

If you don't have or don't want some of these interfaces then simply remove the from this file and they will not start.

If you need to set a static IP just set the variables in the /etc/network/interfaces file

auto eth0
iface eth0 inet static
address 192.168.0.100
netmask 255.255.255.0
network 192.168.0.0
broadcast 192.168.0.255
gateway 192.168.0.1

You will also need to make sure you set a nameserver in /etc/resolv.conf

root@bt:~# cat /etc/resolv.conf
nameserver 192.168.0.1

So for example if all you have is eth0 and wlan0 on your system and you want them both to get a adress via DHCP then remove every thing else for the file with the exception of the lo interface. Here is a example.

root@bt:~# cat /etc/network/interfaces
auto lo
iface lo inet loopback

auto eth0
iface eth0 inet dhcp

auto wlan0
iface wlan0 inet dhcp


Now if are lazy and want all this to start at boot you can simply issue this command as root

update-rc.d networking defaults

This will create all the proper sym-links

What about ssh?

So while I am on the subject I may as well go over ssh. In order to use ssh on backtrack 4 final you need to generate the keys first.

sshd-generate

after that you can start ssh like this:

/etc/init.d/ssh start

or you can add it to the boot sequence like this:

update-rc.d ssh defaults

Well thats enough to get up and running. I hope this was somewhat helpful to any one just getting started with backtrack.


for connections and GUI tools you could start "wicd Network Manager"
# /etc/init.d/wicd start
then use wicd-client to configure your wireless interface(s) look under the [Internet] menu.


7. Getting Broadcom Wireless card to work in BackTrack :



So you are new to BackTrack and your wireless doesn't work out of the box?

No problem!

There are several ways to solve this problem and I'll show you two ways!

All this ways requires that you have a ethernet connection ( a wired connection ).

BEFORE YOU TRY THESE, MAKE SURE YOU'VE RAN APT-GET INSTALL UPGRADE & APT-GET INSTALL UPDATE BEFORE IF YOU ARE RUNNING BACKTRACK 4 FINAL - IT'S ALWAYS GOOD TO UPGRADE.

Using jockey-gtk
This is the most simple one.

Log into BackTrack as root and run these commands:


CODE:
/etc/init.d/networking start
apt-get install jockey-gtk
jockey-gtk


Then follow the instructions on the program that starts.

Downloading drivers manually
Go to: Broadcom.com - 802.11 Linux STA driver
And download the tarball for your system (32 or 64).

Run the following in the terminal:

CODE:
/etc/init.d/networking start
tar xzf nameoffile.tar.gz
cd thefolderyouget
make clean
make

Now let's check if you have any conflicting drivers (you shouldn't, they doesn't come with BT.)

CODE:
lsmod  | grep "b43\|ssb\|wl"
If any of these are installed, remove them:
rmmod b43
rmmod ssb
rmmod wl

Then let's insmod the driver:

CODE:

modprobe lib80211
insmod wl.ko

Congratulations! You are up and running! :P @amol


Note: You maybe have to start network through the KDE "start menu" before you get the WICD manager up, then you should see networks.

If you can't connect to a wireless network, try changing WPA supplicant driver.

Don't forget to give us your feedback.

Hack Windows 8.1 to earn $100,000 bounty from microsoft

Microsoft offers $100,000 to hack Windows 8.1


As part of Microsoft’s bug bounty program, the Redmond based company offers at most $100,000 to security researches that can find flaw in Windows 8.1. The new operating system is expected to be available this June 26.
Currently, there are 3 bounty program by Microsoft:
  1. Mitigation Bypass Bounty. Microsoft will pay up to $100,000 USD for truly novel exploitation techniques against protections built into the latest version of our operating system (Windows 8.1 Preview). Learning about new exploitation techniques earlier helps Microsoft improve security by leaps, instead of capturing one vulnerability at a time as a traditional bug bounty alone would. TIMEFRAME: ONGOING
  2. BlueHat Bonus for Defense. Additionally, Microsoft will pay up to $50,000 USD for defensive ideas that accompany a qualifying Mitigation Bypass submission. Doing so highlights our continued support of defensive technologies and provides a way for the research community to help protect more than a billion computer systems worldwide.TIMEFRAME: ONGOING (in conjunction with the Mitigation Bypass Bounty).
  3. Internet Explorer 11 Preview Bug Bounty. Microsoft will pay up to $11,000 USD for critical vulnerabilities that affect Internet Explorer 11 Preview on the latest version of Windows (Windows 8.1 Preview). The entry period for this program will be the first 30 days of the Internet Explorer 11 beta period (June 26 to July 26, 2013). Learning about critical vulnerabilities in Internet Explorer as early as possible during the public preview will help Microsoft make the newest version of the browser more secure. TIMEFRAME: 30 DAYS
This bug bounty  by Microsoft is the highest of all the existing same programs as of now.

15 Best Ways To Increase Your Facebook Page Likes For Free








Top 15 ways to Increase your facebook page likes or fans. Actually One of the hottest things going in marketing right now is a Facebook Page and the first thing to do when you want to use Facebook as a marketing tool is to create a Facebook Fan Page of your product or business. After you are done with that, the second thing to do is to somehow bring fans there. The big question is ‘how to do that’??

Ways to Increase your Facebook Page Likes:

Tagging Pages in your Updates:

    This one is simple. Just tag your Fan page(by @ sign) whenever you are updating your Facebook Fan Page’s status or are posting something and are adding a description.

Put up a featured discussion in your LinkedIn group:

    If you don’t have a LinkedIn group for your industry, make one. It’s your way to demonstrate your expertise, thereby driving business to your company.
    This discussion can lead to opening the doors to a higher level of customer service that you might not have otherwise had.

Link to your Facebook page on your LinkedIn profile:

    One of the best places to promote your facebook page do that is in the description of your current position. When you describe your position and the company, put a hyperlink to the fan page at the bottom of the description.
    If you don’t have a LinkedIn profile, you should get one. Linkedin is one of the best ways to network on a global basis and draw business to your company.

Put your Facebook page on all printed (Outbound) Marketing:

    You wouldn’t send out marketing without your company name would you? So don’t forget a mention of your facebook page. All it takes is one line in a prominent location.

Put your Facebook page on all Social Media (Inbound) Marketing:

    The same reasons apply here as your Outbound Marketing. It’s a way of “covering all your bases” and making sure that you reach the widest group of people possible. A great way to do this is by sending a tweet out every so often on Twitter asking your followers to also become your fans.

Leverage Your Video Blog:

    Video blogs are also one of the hottest ways to connect with clients and prospects. YouTube allows you to annotate your video with links that you can use to link back to your facebook page. If your video starts to gain traction on YouTube this link can translate to significant inbound traffic to your fan page.

Mentioning Your Facebook Page on Your Personal Profile:

    You can put a link to your Facebook page on your own Personal Facebook profile, so that any friends of yours that are interested in the niche of your Facebook page can like it. You can put that link in the About Me section with a little description about it.
    And make sure to add http:// to your Facebook Page’s link, because the www’s are not clickable on Facebook!

Email Your Way There:

    Build awareness about your facebook page in your email signature by include a hyperlink to your fan page. When you do this every person you email will have a link to your facebook page, and over time you this will effect an increase your fan base.

Let Your Website Do the Talking:

    You’re already adding value to your company website by having a blog section, so up the ante and mention your fan page in directly within your content. Don’t be afraid to come right out and ask people to join your Facebook page.

Mentioning to Follow Me On Facebook Everywhere:

    This is one of the most effective and easy way of increasing the number of fans on Facebook page. Always include a clickable link at the end of your post, requesting the readers to become a Fan of your Blog/Website on Facebook.
    You should also add a ‘LIKE’ button either at the end or at the start of a post, as it will also make some readers become a fan. You should use this ‘Follow Me on Facebook’ on every other social networking website that you are on like StumbleUpon, Digg, Twitter, and even in your Email Signatures. Doing all these things will definitely increase your Facebook fans.

Regularly Creating and Posting Creative and Targeted Content:

    You must have read it everywhere and I am going to say it again — “Content is the king!”. Always try to create good and targeted content in order to make new fans and keep the existing ones. If you have good content on your website, the readers will obviously like it after reading it and doing this would post your post on their walls. This post would then be visible to their friends and so there is a good chance that they might become your Fan too. If your fans share your posts, those posts would appear on their walls with a ‘Via your-fan-page-name’ and seeing that, your fan’s friend might also become a fan of your page.

Like Exchanging with Admin of Other Pages:

    If you want you can also try doing like exchanging. Simply search Facebook Fan Pages in your niche which have a lot of fans and then contact their admins telling them that you will post a like of theirs on your Facebook Page and whether they would be willing to do the same for you. If you will like their page it will automatically appear on the left panel of your Facebook Fan page, in the ‘LIKES’ section. If they also like your Facebook Fan Page then yours would appear on those pages too.
    There may be some Fan Pages whose admins may not agree for a link exchange. So you can offer them money if you want and pay them through PayPal, or Western Union.

Using Facebook as a Fan Page:

    Changing your Facebook’s Personal Profile to your Facebook Page is also another effective option. You can do this from the option given on top-right side of your Facebook Page. When you click on ‘use Facebook as ‘your-fan-page-name”, you can start using Facebook as your Facebook Fan Page.This is a good way to bring in traffic to your fan page.
    After you have done that you can like other pages and can comment on their photos, links, statuses and videos. Make sure that those fan pages are in your niche but have a large number of Fans. Comment and communicate with the fans of that Facebook Page and always be sweet and friendly as this will bring them to your Facebook Page. This method is similar to getting traffic by commenting on other blogs.

Running Contests on your Blog/Website:

    Contests and giveaways are a great way to get more fans and traffic. Simply keep the requirement for entering the Contest or getting listed for the Giveaway, to be or become a Fan of your Facebook Page. Many websites/blogs use this method and it also proves to be very good way of increasing your number of Facebook Fans.

Connecting Facebook to Twitter:

    If you have a large following on Twitter, then connecting your Facebook fan page to Twitter is also a great way of converting your Twitter followers into your Facebook Fans. You can do this by using any of the many applications on Facebook that let you do it. After doing this your latest status updates, photos, links, notes or events on Facebook page will be tweeted out by your Twitter profile automatically to let your followers know what is going on, on your Facebook page.
    You can also put a link in your ‘About Me’ on Twitter as this might also make some new fans of your Facebook page. You can also create a background image for your Twitter profile, and then write something on the background image with a link to your Facebook page.
    Keep working hard. Good Luck!
     
    Do you like our post?If yes,plz like our Facebook page at Hack the Universe

The top 10 password breakers/crackers for Windows/Linux

 
This post helps you to unlock rar,iso files password for free.....
The best password crackers. The list made from all password brealkers from all over the globe including versions from unix and widnows as well.


1. Cain and Abel : 
The top password recovery tool for Windows

UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
 
download button
     

2. John the Ripper : 
A powerful, flexible, and fast multi-platform password hash cracker

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes

           
download button

3. THC Hydra : 
A Fast network authentication cracker which support many different services

When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more
download button

     

4. Aircrack : 
The fastest available WEP/WPA cracking tool

Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files)
 
download button


5. L0phtcrack : 
Windows password auditing and recovery application

L0phtCrack, also known as LC5, attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows NT/2000 workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). LC5 was discontinued by Symantec in 2006, but you can still find the LC5 installer floating around. The free trial only lasts 15 days, and Symantec won't sell you a key, so you'll either have to cease using it or find a key generator. Since it is no longer maintained, you are probably better off trying Cain and Abel, John the Ripper, or Ophcrack instead.
 
download button


6. Airsnort : 
802.11 WEP Encryption Cracking Tool

AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It was developed by the Shmoo Group and operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. You may also be interested in the similar Aircrack.
 
download button


7. SolarWinds : 
A plethora of network discovery/monitoring/attack tools

SolarWinds has created and sells dozens of special-purpose tools targeted at systems administrators. Security-related tools include many network discovery scanners, an SNMP brute-force cracker, router password decryption, a TCP connection reset program, one of the fastest and easiest router config download/upload applications available and more. 
 
download button


8. Pwdump : 
A window password recovery tool

Pwdump is able to extract NTLM and LanMan hashes from a Windows target, regardless of whether Syskey is enabled. It is also capable of displaying password histories if they are available. It outputs the data in L0phtcrack-compatible form, and can write to an output file.
 
download button


9. RainbowCrack : 
An Innovative Password Hash Cracker

The RainbowCrack tool is a hash cracker that makes use of a large-scale time-memory trade-off. A traditional brute force cracker tries all possible plaintexts one by one, which can be time consuming for complex passwords. RainbowCrack uses a time-memory trade-off to do all the cracking-time computation in advance and store the results in so-called "rainbow tables". It does take a long time to precompute the tables but RainbowCrack can be hundreds of times faster than a brute force cracker once the precomputation is finished.
 
download button


10. Brutus : 
A network brute-force authentication cracker

This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NTP, and more. No source code is available. UNIX users should take a look at THC Hydra.
 
download button
 
 
-------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------
If you have any difficulties,watch this video or comment here,
 

Friday, June 28, 2013

FBPwn Facebook Profile Dumper

FBPwn is used for facebook social engineering. It can send friend requests to a list of Facebook profiles, once the victim accepts the invitation, it dumps all their information, photos and friend list to a local folder. Extensible module interfaces and built-in modules for advanced social engineering tricks.

A typical hacking scenario starts with gathering information from a user’s FB profile. The plugins are just a series of normal operations on FB, automated to increase the chance of you getting the info.

First you create a new blank account for the purpose of the test. Then, the friending plugin works first, by adding all the friends of the victim (to have some common friends). Then the clonning plugin asks you to choose one of the victims friends. The cloning plugin clones only the display picture and the display name of the chosen friend of victim and set it to the authenticated account. Afterwards, a friend request is sent to the victim’s account. The dumper polls waiting for the friend to accept. As soon as the victim accepts the friend request, the dumper starts to save all accessable HTML pages (info, images, tags, …etc) for offline examining.

After a a few minutes, the victim will unfriend the fake account after he/she figures out it’s a fake, but it’s too late!

DOWNLOAD LINK:
http://adf.ly/REniC

Wednesday, June 26, 2013

BackTrack 5 Wireless Penetration Ebook [DIRECT LINK]


Chapter 1: Wireless Lab Setup

Hardware requirements
Software requirements
Installing BackTrack
Time for action – installing BackTrack
Setting up the access point
Time for action – configuring the access point
Setting up the wireless card
Time for action – configuring your wireless card
Connecting to the access point
Time for action – configuring your wireless card

Chapter 2: WLAN and Its Inherent

Insecurities
Revisiting WLAN frames
Time for action – creating a monitor mode interface
Time for action – sniffing wireless packets
Time for action – viewing Management,
Control, and Data frames
Time for action – sniffing data packets for our network
Time for action – packet injection
Important note on WLAN sniffing and injection
Time for action – experimenting with your Alfa card
Role of regulatory domains in wireless
Time for action – experimenting with your Alfa card

Chapter 3: Bypassing WLAN

Authentication
Hidden SSIDs
Time for action – uncovering hidden
SSIDs
MAC filters
Time for action – beating MAC filters
Open Authentication
Time for action – bypassing Open
Authentication
Shared Key Authentication
Time for action – bypassing Shared
Authentication

Chapter 4: WLAN Encryption

Flaws
WLAN encryption
WEP encryption
Time for action – cracking WEP
WPA/WPA2
Time for action – cracking WPA-PSK weak passphrase
Speeding up WPA/WPA2 PSK cracking
Time for action – speeding up the cracking process
Decrypting WEP and WPA packets
Time for action – decrypting WEP and
WPA packets
Connecting to WEP and WPA networks
Time for action – connecting to a WEP network
Time for action – connecting to a WPA network

Chapter 5: Attacks on the WLAN

Infrastructure
Default accounts and credentials on the access point
Time for action – cracking default accounts on the access points
Denial of service attacks
Time for action – De-Authentication DoS attack
Evil twin and access point MAC spoofing
Time for action – evil twin with MAC spoofing
Rogue access point
Time for action – Rogue access point

Chapter 6: Attacking the Client

Honeypot and Mis-Association attacks
Time for action – orchestrating a Mis-
Association attack
Caffe Latte attack
Time for action – conducting the Caffe
Latte attack
De-Authentication and Dis-Association attacks
Time for action – De-Authenticating the client
Hirte attack
Time for action – cracking WEP with the
Hirte attack
AP-less WPA-Personal cracking
Time for action – AP-less WPA cracking
Summary

Chapter 7: Advanced WLAN

Attacks
Man-in-the-Middle attack
Time for action – Man-in-the-Middle attack
Wireless Eavesdropping using MITM
Time for action – wireless eavesdropping
Session Hijacking over wireless
Time for action – session hijacking over wireless
Finding security configurations on the client
Time for action – enumerating wireless security profiles
Summary

Chapter 8: Attacking WPA-Enterprise and RADIUS

Setting up FreeRadius-WPE
Time for action – setting up the AP with
FreeRadius-WPE
Attacking PEAP
Time for action – cracking PEAP
Attacking EAP-TTLS
Time for action – cracking EAP-TTLS
Security best practices for Enterprises
Summary

Chapter 9: WLAN Penetration

Testing Methodology
Wireless penetration testing
Planning
Discovery
Time for action – discovering wireless devices
Attack
Finding rogue access points
Finding unauthorized clients
Cracking the encryption
Compromising clients
Reporting
Summary

DOWNLOAD LINK: