Saturday, 30 June 2012
Sunday, 24 June 2012
What is I.P Versions
What are IP's? What is IPv4?
IP's are assigned to every device connected to the internet (computers, smartphones, etc..). Since 1977, the internet has been using the IPv4 standard convention, where ip's are numbered in a 32-bit system, which follows the xxx.xxx.xxx.xxx pattern (ie: 192.168.0.1). With each of the 4 numbers ranging from 0 to 254, the total internet ip address pool is capable of generating up to 4.3 billion possible addresses. As more and more devices connect online, the IPv4 infrastructure came under stressed and in 2012 most providers have officially depleted their IPv4 reserves.
What is IPv6?
To address the impending limitations of IPv4, the IPv6 standard was released. IPv6 features 340 undecillion ip's (340 followed by 36 zero's: 340,000,000,000,000,000,000,000,000,000,000,000,000). Unfortunately, adaption has been very slow and most ISP's have yet to take advantage of IPv6. The catch is that a user with an IPv6 address is limited to accessing websites and services that also have an IPv6 address (and that user will not be able to see IPv4 address's or websites).
Why should I care about IPv6?
If you get assigned an IPv6 ip from your provider, you are going to be stuck only being able to see only certain sites on the internet that are IPv6 enabled. On the flip-side, if your site isn't IPv6 enabled, you are going to lose customers who will be unable to reach your site!
How do I switch?
The best solution is to run your server and websites on both IPv4 and IPv6 in dual-compatibility mode. Unfortunately most internet service providers have yet to offer this kind of support - leaving users who have been switched to IPv6 in the dark (and costing your website visitors from those users!). T35 Hosting is proud to be one of the few hosts to start offering dual IPv4 and IPv6 support across all of our hosting plans. We expect to complete our IPv6 rollout to all accounts by the end of June, 2012.
Monday, 18 June 2012
Virus Types
Virus Types
What is a Computer Virus ?A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.Virus - A program that when run, has the ability to self-replicate by infecting other programs and files on your computer. These programs can have many effects ranging from wiping your hard drive, displaying a joke in a small box, or doing nothing at all except to replicate itself. These types of infections tend to be localized to your computer and not have the ability to spread to another computer on their own. The word virus has incorrectly become a general term that encompasses trojans, worms, and viruses.
Types of viruses :-The different types of viruses are as follows-1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.
Examples of boot- sector viruses are Michelangelo and Stoned.
2) File or Program Viruses :-Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .
Some common file viruses are Sunday, Cascade.
3) Multipartite Viruses :-A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.
4) Stealth Viruses :-These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.
5) Polymorphic Viruses :-Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.
6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.If you use a computer, read the newspaper, or watch the news, you will know about computer viruses or other malware. These are those malicious programs that once they infect your machine will start causing havoc on your computer. What many people do not know is that there are many different types of infections that are categorized in the general category of Malware.
Malware - Malware is programming or files that are developed for the purpose of doing harm. Thus, malware includes computer viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware.This article will focus on those malware that are considered viruses, trojans, worms, and viruses, though this information can be used to remove the other types of malware as well. We will not go into specific details about any one particular infection, but rather provide a broad overview of how these infections can be removed. For the most part these instructions should allow you to remove a good deal of infections, but there are some that need special steps to be removed and these won't be covered under this tutorial.
Before we continue it is important to understand the generic malware terms that you will be reading about.
Backdoor- A program that allows a remote user to execute commands and tasks on your computer without your permission. These types of programs are typically used to launch attacks on other computers, distribute copyrighted software or media, or hack other computers.Hijackers- A program that attempts to hijack certain Internet functions like redirecting your start page to the hijacker's own start page, redirecting search queries to a undesired search engine, or replace search results from popular search engines with their own information.
Spyware- A program that monitors your activity or information on your computer and sends that information to a remote computer without your Knowledge.Adware- A program that generates popups on your computer or displays advertisements. It is important to note that not all adware programs are necessarily considered malware.There are many legitimate programs that are given for free that display ads in their programs in order to generate revenue. As long as this information is provided up front then they are generally not considered malware.Dialler - A program that typically dials a premium rate number that has per minute charges over and above the typical call charge. These calls are with the intent of gaining access to pornographic material.Trojan- A program that has been designed to appear innocent but has been intentionally designed to cause some malicious activity or to provide a backdoor to your system.Worm- A program that when run, has the ability to spread to other computers on its own using either mass-mailing techniques to email addresses found on your computer or by using the Internet to infect a remote computer using known security holes.
Collection Of Web Hacking Tools
Collection Of Web Hacking Tools
Tool List:
Apache Hacking Tools Directory:
Apache Chunked Scanner
Apache Hacker Tool v 2.0
Apache H4x0r Script
Remote File Inclusion And Remote Command Execution Directory :
IIS 5 Dav Scanner & Exploiter
PHP Attacker
PHP Injection Scanner & Exploiter
XML-RPC Scanner & Exploiter
Databases & SQL Injection & XSS Tools Directory :
Casi 4.0
ForceSQL
Mssql BruteForce TooL
SQL Ping 2
SQL Recon
SQL Vuln Scanner
SQL & XSS TooL
PHP Shells :
rootshell v2.0
c99shell #16
Backdoor php v0.1
r57shell
ajan
casus15
cmd (asp)
CyberEye (asp)
CyberSpy5 (asp)
Indexer (asp)
Ntdaddy (asp)
News Remote PHP Shell Injection
PHP Shell
phpRemoteView
nstview php shell
Download
Wireless Hacking
Wireless Hacking
Wireless Hacking........
WIRELESS HACK
Screens(based on book with full instruction)
INFO
1) Unzip and install Commview, then paste the included "cv.exe" to the directory you installed it to (c:\program files\commviewwifi)
2) Open commview and install the commview drivers to a card. It should prompt you about your card and than automatically install the driver. It is important that you have 1 card that works with commview or else the rest of the tutorial will not work
3)now go to the "rules" tab and check "enable advanced rules"
4)type in the box labled formula "tods=1 and dmac=FF:FF:FF:FF:FF:FF" then type a name for your formula in the box labled name and than click add/edit.
5)it should now appear in the upper box. if it is not checked, check it.
6)now click settings>options>memory usage and turn maximum packets in buffer to 20000 (max). If it prompts you to restart it, do so. There are three funnel looking things on the main menu bar of commview. uncheck all but the first one (one labled "capture data packets")
7) now click the play button and scan for the network you want to crack.
8)once you have found it, drag the channel menu down to the desired channel and click capture.
9) now using your other adapter thats not capturing, connect to the password protected network. when it asks you for key, type in something random, i used 1234567890.
10) it should now say connected with limited connectivity. (same as being associated!!)
11)go back to your commview menu and click on the packets tab. you should see a couple of packets.
12) looking at the protocol column, you should see a couple labled IP/UDP, ARP REQ, and a couple of others. Right click on any packet labled "ARP REQ" and than click send packet, and selected. A mini menu should now appear.
13) on the mini menu, change packets per second to 2000, and rather than 1 time(s), click continuously, and Then click send.
14) now go back to the main commview window and go to the rules tab, and uncheck the rule you made.
15) You are now injecting and you should see the number of packets rising really fast.
16)to save the packets, you have to save every 20000 packets, click file, save and than in the save dialogue, remember where you saved it, and instead of saving it as an ncf file, save it as a "dump" .cap file.
17) Extract the Aircrack-NG folder.
18)open aircrack-ng-GUI that can be found in the map "bin" and select the files you saved, and than click launch.
19)Look at the list of IV's you have, and select the network you want to crack , there should be a list of alot of them, chose the one with the most ivsDOWNLOAD
http://rapidshare.com/files/17383177...om_WEP-HCK.rar
Subscribe to:
Posts (Atom)