Saturday, November 28, 2009

, ,

Norton And Kaspersky On Commercial Fight For Security Suit’s 2010

When there is Cyber crime there are antivirus and after that there is a fight in betweennorton-vs-kaspersky-antivirus them. You all be knowing about the two most popular antivirus securities in the world i.e. Norton And Kaspersky.

As You have seen both provides a master security suits with them just as they both have launched there Internet Security Suits for the availing 2010.


HOT : Norton Internet Security 2010 Vs Kaspersky Internet Security 2010

Now lets start with Norton suit’s -


Norton Internet Security 2010 Commercial

First lets look at the Norton’s Strategies. Norton starts and basically focus on the cyber crime that the people face scams, hacking etc but certainly built a long advertisement with the help of following points…

, ,

Httpry : Specialized Packet Sniffer And Logger

Httpry This is a specialized packet sniffer designed for displaying and logging HTTP traffic.
Its a C scripts that actually lets you powerfully organize and Log , sniff etc easily and


is really great in terms of Packet Sniffing.

This script is designed only to capture, parse, and log the traffic. It is not intended to perform analysis.

It can also run as a daemon, or in real time. Running in real time, all the logs will be dumped in the terminal.

When running as a daemon, all the traffic is logged into a separate file. Its good i must say.



Friday, November 27, 2009


Some Delights Of Yahoo! Open Hack Day – Indonesia 2009

Nearly a week ago Yahoo! Open hack day – south Asia took place in Indonesia. Unfortunately i wasn't there but still the hack days are awesome i am a fan of them since i got in this hacking stuff.
Well some of you actually might not be knowing what are Yahoo ! Open Hack days.So here is a quick guide -  

Yahoo! Open Hack day is day on which all the Hackers, Designers, programmers join together for a day or two to share some stuff and also to make some new “cool stuff”.

The open hack days are made by Yahoo ! actually and are maintained by the Yahoo in collaboration with BBC
, Lonely Planet etc.The hack day last till whole night in which programmers and other teams have to develop some given competition to them.

Now Back to Open Hack Day – Indonesia..

, ,

How To Create Autorun.inf For Your Pendrive – Autoplay Your Tools

When you plug-in your pen drive then its really useful to run an Autorun software it canist1_9116667-usb-flash-memory consist of anything from hacking software to any music player.


Its really useful as you can do your work in seconds and in hacking stuff it its really important to boot up fast so that you can do your work in seconds and no body catches you rather then first loading the pen drive then navigating to the folders and then doing it. isn't it

So its really worthwhile to take a look at the way the windows Xp looks at the pen drive auto run program rather then making a program that’s loading automatically written C.


Ok that's the image to notify you that you a need a pen drive and a windows Xp based computer with you so as you can perform this hack :D

So lets start…

Hacker Attacks Shaolin Temple – Kung Fu Hacking

The Hackers have defaced many websites in the world but certainly the website of Sholin Temple, founded in 477 AD, is hacked several time and hence its again hacked by a hacker.

The shoalin temple have been concerned, under the leadership of its current abbot,Shi Yongxin, is being treated as a commercial product.


The hacker left a fake letter to there website saying -

"I traded the monastery's tranquility and holy Buddhism for the fame of Shaolin and myself. […] I do not dare to pray for the Buddha's forgiveness, I only ask that I will not go farther and farther down the no-return path of commercialization and become a sinner of Shaolin Temple and Buddhism,”

These feelings are what led to the recent acts of Hacktivism on its website, mostly targeting Shi Yongxin and accusing him of leading a material life.

After Hacking the website hacker made a letter, posted to temple saying “Go and Die” in Chinese language.

, ,

Darren Kitchen On Hackers Vs Cyber Criminals [Video]

Darren Kitchen is Hacker and Host of a hackers show Hack5. He is well know hacker and is been in computer for a long time. well hack5 is video podcaster , which podcast video’s related to hacking. Its a really great channel for guys like us and the great thing is that there is always something new to learn there.Hak5

Now Lets talk about this Video in Darren Kitchen talks with the Discovery channel on the
way he thinks about the criminals and the Hackers.

He starts with saying that he is always been saying that “Hackers are not Cyber criminals”. – it touched my heart.…

Thursday, November 26, 2009

2009 Is The Year Of Biggest Data Breach's Ever Says Forbes

Tuesday, November 24, 2009

, ,

John Matherly Launches Shodan : A Computer Search Engine

John Matherly is a Serial webapp developer and entrepreneur and is great in developing cool and very useful programs whether its web based or its a platform based.

Recently John Matherly launched a new service to his website named SHODAN , he says its a web app which lets you search Servers, Routers etc and even computers and other IP addresses and the great thing is it works on the web giving the user the so called portability to the hacker like us.


Its real usability comes with its use, its just like Google in our hacking world.
You can search a computer on a network.

This webapp uses a spider to crawl the WebPages or servers and have many capabilities this can be seen as when you search for any IP address or even server the search shows the crawled pages as the Headers , so you can easily make out this…

Monday, November 23, 2009


Angry IP Scanner : Best IP And Port Scanner For Hackers

Angry IP Scanner is the greatest tool ever released for Hackers. Well this tool is used by every hacker in the world for the startup it is the best software available as last in the IP and Port Scanner. 
Its the most powerful scanner i have ever used till yet and the most important iconthing is its really simple to use and comes in handy you can put it in your pen drive and take it anywhere which make a portable and more useful.

You might have heard of this tool many times in many hacking article.
I am personally a big fan of this Angry IP Scanner . Well you should always have it in your bag pack when ever you need to go and hack anything. 

What is Angry IP Scanner?

Angry IP Scanner (or simply ipscan) is an open-source and cross-platform network scanner designed to be fast and simple to use. It scans IP addresses and ports…


New BIOS Virus Which Can Make Your Anti-Virus Useless

Hackers Have once again launched a Root kit Virus which loads directly into the BIOS memory of the computer and makes it prone .

Well BIOS memory loads first then any of the software or even your OS, So the virus is loaded far more first then the antivirus loads. Hence it is a more harmful attack to the computer rather then an other. 
bios chi
Alfredo Ortego and Anibal Sacco of Core Security Technologies say that they have a 100 + line long python code in the memory which loads puts a Root kit in the memory so any antivirus can act on it.

"We tested the system on the most common types of Bios," said Ortega.

"There is the possibility that newer types of Extensible Firmware Interface Bios may be resistant to the attack, but more testing is needed."

The attack vector is also usable against virtual systems, the researchers said. The Bios in VMware is embedded as a module in main VMware executable, and thus could be altered.

"The best approach is preventing the virus from flashing onto the Bios," said Sacco.
"You need to prevent flashing of the bios, even if it means pulling out jumper on motherboard."

Saturday, November 21, 2009


Reversing JavaScript Shellcode: A Step By Step Tutorial By Paul Melson

Paul Melson is a well known computer security specialist, in this tutorial he talks about the reverse JavaScript shell code which is pretty hard to practice as well as hard to perform. 

He uses certain stuff for this like JavaScript debugger, perl codes and C codes also .

So remember these things when you are about the perform it and hence please also thank Paul Melson for this great tutorial. Try this.

Friday, November 20, 2009

Is Google Chrome OS Really Leaked

Yeah, You heard it right the new Google product or you can say the upcoming Stunning Product of Google the Google Chrome OS is leached or its working edition is out.

According to the (like "gadget" -- or g-d-g-t) they have got the new Google Chrome OS with them which they are saying is Working.
We don't know till yet is its real deal but we would be providing further information to you guys.These guys are promising the Download of the new Google Chrome OS with logins.

Test if you guys can get a Early Copy of the Google Chrome OS

Direct Link

google chrome


Office Mal Scanner : Scan All Your Documents From Malicious Codes

OfficeMalScanner v0.5 is a Ms Office forensic tool to scan for malicious traces, like shell code heuristics, PE-files or embedded OLE streams.

Found files are being extracted to disk. It supports disassembly and hexview as well as an easy brute force mode to detect encrypted files. Next to this, an office file is being scanned for VB-macro code and if found, it will be extracted for further analysis.

The "inflate" feature extracts Ms Office 2007 documents into a directory and marks potentially malicious files. Also included in this package is a tool called MalHost-Setup, some kind of MS Office runtime emulation environment to debug shell code in malicious documents in real time.

NOTE : IT Only Support MS Office Till Now



‘New Moon” Fans Beware Of Hackers

We are Getting Constant Rumors from many places that Hackers are going to target the the fans of the upcoming movie “New Moon”

The main form of attacks can be spam's , email hijack , twitter , facebook and many other forms of attacks which uses the Movie name “New Moon”.

Tuesday, November 17, 2009

Metasploit Framework 3.3 Released !

I am very excited to hear the immediate availability of version 3.3 of the Metasploit Framework. This release includes 446 exploits, 216 auxiliary modules, and hundreds of payloads, including an in-memory VNC service and the Meterpreter.

In addition, the Windows payloads now support NX, DEP, IPv6, and the Windows 7 platform. More than 180 bugs were fixed since last year’s release of version 3.2, making this one of the more well-tested releases yet…

How To Create A Invisible Account In Windows XP

Ok, A really Quick tutorial on for windows XP on How To Create A Invisible Account In Windows Xp. What we have do in this hack is really simple just create a DWORD value in the windows registry and hack the windows user accounts .

Ok so are you sure you want to learn this hack then read ahead,

Steps :-

1. Open Start menu then click on RUN.
2. Type in the Run Window Regedit

3. Windows Registry editor will open then navigate from the left panel :


4. Create a new DWORD, setting its name to the name of the account you wish to hide.

5. Then set its value to 0 to hide it.

6. Enjoy its Hidden !!

Monday, November 16, 2009


How To View Hidden Directories In A Website Using Robots.txt

Many a times in hacking you need to know the web directories. But its hard to find it out as a server might contain uncountable no. of Directories in it.
But a major hole in this security is the Robots.txt

What is Robots.txt

Robot.txt is the file in the [ wwwroot ]of a server to define the Bots the Functionality on the website.

There are many Bots on the internet like the most famous are Google Search Engine BOT aka Google Spider , Yahoo Search Engine Bot and many others.
What robots.txt do is that it gives orders to the Bot on how to spider on the website….


How To Manage Multiple Gmail Accounts In FireFox

Do you love Gmail, Don't know about you guys about but i am a big fan of Google Products. When i am online i need more than one email account for my ease and its really helpful because i don't have to worry about my accounts Security .

I know what you guys would say, “its pretty hard to remember my Accounts Username and passwords”

But again if i use multiple accounts and i remember each and everything. 
But that's not with you guys and that's why i have written this blog article.
Now i introduce you to my Tool which helps me a lot to run various Email Accounts together.

Tuesday, November 10, 2009

Official Indian Army Website –“Safe From Hackers”

The new website for the Indian army (IA) have been launched and the authorities are saying it is really safe from any Hackers Activity.
The new website is launched recently and many hackers out there are finding a way to attack the newly made Official Indian Army Website.



But the Engineers' at the Indian Army says its Built with a Solid Foundation of ASPX and they have worked in many manners after seeing and understanding all types of attacks out there, they have built a bulletproofed Website.

The website, which is developed on the state of the art technology, is claims to be safe from any hacking/defacing attempts. The portal is hosted on NIC server.

News @hackerthedude


Alun Jones On SSL MITM Attack –The HTTPS Attack’s

Ok Alun Jones is great and the best fact to explain this is that he works in the Windows Security MVP.MvpPhoto.aspx

He talks about the MITM attacks and the SSL attacks.
He not only explains the New attacks based on these vulnerabilities but also gave us all some tips regarding the new attacks and how he tackles these attacks. 

The first of Alun's MVP awards was made in 2003, as a Windows SDK (Networking) awardee. After several years of making a noise in the security field, Alun was given notice in 2004 that he would be a Windows Security MVP, and this woke him up to the fact that he really wanted to do Security as the main part of his job.

Re-awarded in Security in 2006 and 2007, then in Enterprise Security in 2008 and 2009, Alun's current job gives him all the security challenge he can eat.

He starts with :-

If you’re in the security world, you’ve probably heard a lot lately about new and deadly flaws in the SSL and TLS protocols – so-called “Man in the Middle” attacks (aka MITM)….

Well you can view his Name, Photo and Biography Abstract HERE.

Direct Link 

Monday, November 9, 2009


New iPhone Worm That Attacks Jail Broken iPhones Also

Well its again the iPhone which have come to the headlines again , But this time the apple is really pissed of with the kind of work the Hackers are doing against there most 107358_matterLovely Toy i.e. iPhone.

The iPhone is now under attack of Worm which also attacks Jail broken iPhone.

The first iPhone worm is said to be created by hacker called "ike_x".
Along with changing the lock background of iPhone with Rick Astely's photo, the worm also causes text stating 'ikee is never going to give you up' on the top of the wallpaper.

Apparently, the worm strikes the jail broken handsets with SSH (Secure Shell) installed through Cydia. Those iPhones with SSH installed having default password as "alpine" were mainly affected.

Let’s see…

Hacking News @hackerthedude

, ,

Peer Block : Safeguard Yourself From Harmful Server’s

peerblockHave you ever heard of a software called Peer Guardian . So do you know what it is actually well here is the guide for you guys.

Peer Guardian is Phoenix Labs’ premier IP blocker for Windows.
Peer Guardian integrates support for multiple lists, list editing, automatic updates, and blocking all of IPv4 (TCP, UDP, ICMP, etc), making it the safest and easiest way to protect your privacy on P2P.

Now that was about the old Peer Guardian; But after sometime the developers of this great software realized they could not take this software more, and after the Norton Antivirus Proved it a virus the developers closed the Peer Guardian. 

Now comes our newly born Peer Block . Now lets see what its developers say about it :-

PeerBlock lets you control who your computer "talks to" on the Internet.

By selecting appropriate lists of "known bad" computers, you can block communication with advertising or spyware oriented servers, computers monitoring your p2p activities, computers which have been "hacked", even entire countries!

They can't get in to your computer, and your computer won't try to send them anything either. And best of all, it's free!


Over 100,000 downloads served!

Now seeing that its seems to me a promising software…

Modern Warfare 2 Hacked By Hackers Now Up For Sale

Looks like our hackers mate out there have now come with some cool shit,
Its the New COD : MODERN WARFARE 2 which is the continuation of the first game Modern Warfare which was a Big Hit !

Game Modern Warfare 2, has gone gold, and is will be readily available for purchase from Hackers Internet Cafe` as of 7PM from today, 9th November. The game is priced at €49.95.

With the new game hackers also invited many people to try out the new Game for the first time in the world.They promised people for a non-stop 12hrs of Gaming in the local Internet cafe.

New all the eyes on the Hackers and Authorities.

Want to see its Video Trailer the click HERE for full post….

Wednesday, November 4, 2009


Zero Day DoS Attack on Multiple Browsers across all OS’s By Pietro Oliva

Its a Totally new script founded by Pietro Oliva , an IT Student studying department of IT (University of Milan in crema) something.
For Security Reasons he have not yet published the script used in this Zero Day DOS Attack.

But we all can at least learn something from it.
He has used a Video tutorial for us to know more about this Attack and have also Said That it can hit any browser out there from IE, Firefox, Safari, Konqueror, Galeon, Midori to Seamonkey.

There are two parts of this video tutorial 1st is on Ubuntu platform and the other is on Windows Platform…

Tuesday, November 3, 2009


Ophcrack Guide : Hack Any Password In Windows

There might be many times you have heard of Ophcrack, now what is actually it well is a popular to crack passwords in windows.
Many Hackers out there love this tool and you should also, Tools like this made hacking possible in this world of security’s.

What is ophcrack ?

is a free Windows password cracker based on rainbow tables.
It is a very efficient implementation of rainbow tables done by the inventors of the method.
It comes with a Graphical User Interface and runs on multiple platforms....

Monday, November 2, 2009

Advanced MySQL Exploitation

Now lets talk with pro hacking stuff i would like to introduce to you guys,
This is a really cool E-book writer by Muhaimin Dzulfakar on the Defcon Conference 2009.


Are you a fan of Defcon conferences like me. But we have to really wait a lot because these guys have no plans now about a conference in India.

I have been really bad in MySQL from the starting, But thats what we are going to cover in this story the art of MySQL Injection and other exploits.

But we are here to explain you some Advance Exploitations for MySQL.
So lets Start…


uTorrent 2 To Speed Downloading By Fixing ISP Throttling

There is a new buzz on the internet that BitTorrent to speed its downloading by fixing the ISP Throttling . The new version of uTorrent 2 will be optimized by the company in such a way that they are promising a new and rich downloading experience to its users. 

Years before Many ISP’s Have argued with the BitTorrent Inc. on the certain topic that with high number of BitTorrent connections are slowing down other applications and traffic, affecting its users download speed and their product quality. uTorrent_Logo

With this Argument the company Officials Answered,

ISPs have to invest in making their networks better and faster rather than stifling applications which consumers use and love,”

While encouraging users to switch to non throttling ISPs if possible, or complain to their ISP’s customer services.

Swedish Police Under Cyber Attack : DDos Hits

There have been several reporting of a Know DDos Attack on the major swedish websites , its not till yet clear what was the main aim of the attackers.

Swedish authorities still haven’t discovered who was behind a distributed denial-of-service (DDoS) attack which rendered a number of major Swedish websites, including the country’s police site, inaccessible yesterday.


“We’re the victims of an ongoing DDoS attack,”

The Local has spokesperson Linda Widmark saying, “shortly before the site,, became accessible again at around 5pm”.