Wednesday, November 30, 2011

Menambah atau mengecilkan ukuran Partisi Harddisk

Partisi (Bahasa Inggris: Partition), dalam sistem berkas dan manajemen media penyimpanan adalah sebuah bagian dari memori atau media penyimpanan yang terpisah secara logis yang berfungsi seolah-olah bagian tersebut terpisah secara fisik. Media penyimpanan yang dapat dipartisi adalah memori (baik itu memori fisik ataupun memori maya oleh manajer memori sistem operasi), hard disk, magneto-optical disk (MO Disk), dan beberapa flash memory. Meskipun demikian, istilah partisi saat ini digunakan untuk merujuk pada bagian dari hard disk.

Partisi dibuat ketika pengguna membuatnya dengan menggunakan utilitas partisi (seperti halnya utilitas DOS/Linux fdisk, fips, Disk Druid, utilitas Windows diskpart, atau produk komersial Symantec Norton Partition Magic) dan memformatnya dengan memberinya sebuah sistem berkas tertentu.

Seringkali kita akan membuat sebuah partisi baru di satu harddisk yang mempunyai kapasitas besar (500Gb misalnya) menjadi Dua partisi atau lebih, untuk keperluan penginstallan operating sistem lain seperti ubuntu ataupun windows 7, berikut kami akan menunjukkan cara membuat partisi baru diharddisk, atau cara memperbesar dan mengecilkan ukuran partisi di harddisk menggunakan operating sistem Windows 7 atau windows Vista.

Windows 7 dan vista sudah tersedia utilitas partisi, jadi kita tidak akan menggunakan utilitas pihak ketiga seperti norton partion magic dll, buka Control panel dan ketikkan “partisi” di kotak pencarian, buka ajah link yang muncul “Create and format harddisk partitions”

Friday, November 25, 2011

Menginstall Windows 7 melalui USB Flashdisk

 Selama ini saya telah mencoba mencari informasi bagaimana caranya menginstall Windows Xp melalui Flashdisk, dan akhirnya berhasil jinstall-windows-7-from-usbuga, walaupun prosesnya berjalan agak lambat dan kupikir ngga bakalan juga nih bisa menginstall lewat USB flashdisk, baru2 ini telah banyak artikel yang membahas tentang cara2 menginstall windows melalui USB flashdisk, dan saya pikir gak ada salahnya mencoba trik yang lain, siapa tau ada peningkatan dalam hal kecepatan penginstallannya.

Menginstall Windows melalui USB flashdisk ini ternyata banyak keuntungannya dibanding melalui CD atau DVD disk, Kita tidak perlu khawatir akan CD atau DVD yang ngga kebaca sama CD/DVD-ROM, CD atau DVD yang tergores, kadang menyulitkan dalam proses penginstallan windows, sedangkan melalui Flashdisk itu sendiri, hal yang demikian ngga lah perlu terjadi lagi.

Tuesday, November 22, 2011

Langkah2 Cara Menginstall windows 7

 Bagi yang belum pernah menginstall windows 7 ke komputer atau laptop. berikut cara menginstall windows 7 lengkap dengan gambar gambarnya. Langkah2 ini baik dengan menggunakan media DVD ataupun media lain seperti memakai flashdisk adalah sama, baik itu untuk versi 32bit maupun versi 64bit, bagi yang belum punya instalasi windows7 menggunakan media flashdisk silahkan dilihat cara menginstall windows 7 menggunakan flashdisk disini.

Yuk kita mulai!.

Masukkan DVD windows 7 atau colokkan flashdisk windows 7 kita, dan kemudian booting lah memakai media yang telah kita pilih, lalu proses loading file akan dimulai.

Monday, November 21, 2011

Download Windows 7

Kebanyakan tidak semua perangkat lunak dijual secara online di mana pengguna dapat membayar menggunakan kartu kredit atau paypal dan ketika transaksi selesai, mereka akan dapat men-download versi lengkap atau disertakan dengan lisensi kunci ( serial number ) untuk mengubah versi percobaan ( versi trial ) menjadi aktif versi lengkap ( versi full). Adapun sistem operasi Windows 7, Microsoft tidak menjual secara online dan satu-satunya alasan mengapa ada yang asli dan resmi Windows 7 instalasi ISO yang dapat didownload di Internet adalah karena beberapa etalase online berbasis web dan pengecer seperti “Digital River” menjual lisensi Windows 7.

Thursday, October 20, 2011

Adobe Flash Bug | Spy On The Webcams of Your Website Visitors

A slight variation of a previously designed clickjacking attack that used a Adobe Flash vulnerability has once again made it possible for website administrators to surreptitiously spy on their visitors by turning on the user's computer webcam and microphone.
It works in all versions of Adobe Flash that the researcher have tested . He’ve confirmed that it works in the Firefox and Safari for Mac browsers. Use one of those if you check out the live demo. There’s a weird CSS opacity bug in most other browsers (Chrome for Mac and most browsers on Windows/Linux).
Clickjacking + Adobe Flash = Sad Times!
This attack works by using a neat variation of the normal clickjacking technique that spammers and other bad people are using in the wild right now. For the uninitiated:
Combine clickjacking with the Adobe Flash Player Setting Manager pageand you have a recipe for some sad times.

How the attack works ?

Instead of iframing the whole settings page (which contains the framebusting code), Just  iframe the settings SWF file. This  bypasses the framebusting JavaScript code, since we don’t load the whole page — just the remote .SWF file. I was really surprised to find out that this actually works!
 A bunch of clickjacking attacks in the wild,  never any attacks where the attacker iframes a SWF file from a remote domain to clickjack it — let alone a .SWF file as important as one that controls access to your webcam and mic!
The problem here is the Flash Player Setting Manager, this inheritance from Macromedia might be the Flash Player security Achilles heel.
This is a screenshot of what the Settings Manager .SWF file looks like:

Adobe Flash Settings Manager


| Source | 

Monday, October 17, 2011

WiFi Manager

WiFi Manager v5.6 - A must have for every network administrator

ManageEngine WiFi Manager is an integrated and centralized management
and security solution for wireless networks (WLANs) for enterprises.

It enhances the availability and security of your WLANs by continuously
monitoring the network as well as the airspace.

Features:
+ WiFi Manager offers wireless device monitoring, one-click configuration, access point firmware management, wireless security management and a variety of reports that remove the complexity of wireless network management.
+ WiFi Manager can detect almost all major wireless threats including rogue attacks, intrusions, sniffers, DoS attacks, and vulnerabilities.
+ With WiFi Manager you'll have complete control over your wireless devices as well as your airspace, and more time to focus on core IT operations.

Bonus tools: Air crack, hack wifi and wireless key, does support WAP, WAP2, WEP encryption.

Unlock With WiFi

Unlock With WiFi v2.1.1

Hate entering your password every time you turn on your phone?
When you’re at home, or work, you don’t need to worry about losing your
phone, so why should you have to enter your password?


Unlock your phone when you’re connected to your home
WiFi network. What does “unlock” mean? It means you don’t have to
enteryour password/pattern/PIN when you turn on your phone.

How does it work?
When you get home and connect to your WiFi network, your device will unlock. Then when you leave, and the WiFi disconnects, the device will lock again. You have to enter your password the first time after you connect to your WiFi network. This is so that if someone steals or finds your phone, they can’t just bring it to your house to unlock it.

After you enter your password once while connected to your WiFi network, you won’t have to enter it again until you leave/disconnect. This is great for SMS texting!

What else does it do?
You can also set a lock delay, for when you’re not at home. The default delay is set to 5 seconds (you can adjust it), so when you turn the screen off, the device won’t lock until 5 seconds have
passed. That way, if you remember something you forgot to do, you can turn it back on without entering your password. This feature is considered experimental at this time. It works on most devices, but isn’t guaranteed to work on all devices.

There are also battery saving options to:
+ Turn off WiFi when you leave home
+ Turn on GPS when you leave home
+ Turn off GPS when you get home
+ Turn on Bluetooth when you leave home
+ Turn off Bluetooth when you get home
+ Turn off Auto Sync when you leave home
+ Turn on Auto Sync when you get home
+ This feature is experimental, and not guaranteed to work on all devices. Works on tablets too!

Tuesday, October 11, 2011

Apache mod_proxy Proof of Concept (CVE-2011-3368)

A recent Apache vulnerability has been made public whereby an attacker could gain unauthorised access to content in the DMZ network:



Description
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.


SECFORCE has developed a proof of concept for this vulnerability .The script exploits the vulnerability and allows the user to retrieve arbitrary known files from the DMZ. The tool can also be used to perform a port scan of the web server using the Apache proxy functionality, and therefore bypassing any firewall. Click here to download the POC.


Usage :- 
rmacros@laptop2: python apache_proxy_scanner.py
CVE-2011-3368 proof of concept by Rodrigo Marcos
http://www.secforce.co.uk
usage():
python apache_scan.py [options]
 [options]
-r: Remote Apache host
-p: Remote Apache port (default is 80)
-u: URL on the remote web server (default is /)
-d: Host in the DMZ (default is 127.0.0.1)
-e: Port in the DMZ (enables 'single port scan')
-g: GET request to the host in the DMZ (default is /)
-h: Help page
examples:
 - Port scan of the remote host
python apache_scan.py -r www.example.com -u /img/test.gif
 - Port scan of a host in the DMZ
python apache_scan.py -r www.example.com -u /img/test.gif
-d internalhost.local
- Retrieve a resource from a host in the DMZ
python apache_scan.py -r www.example.com -u /img/test.gif
-d internalhost.local -e 80 -g /accounts/index.html
The following screenshot shows the result of the command above:
| source | 

Monday, October 10, 2011

Optima DDOS 10a Botnet Download

Do

"Optima DDOS 10a Botnet" full version posted for all to download and use. Complete new version of the acclaimed DDoS bot Optima Darkness. In this new version 10a according to the author was raised in secrecy bot system and optimized grabber passwords. It cost about $ 600 worth.


Features of the bot :-

  • DDoS attacks of three types - http flood, icmp-flood, syn-flood.
  • Theft of stored passwords from some applications installed on the victim's system, details below.
  • Opening on the infected system proxy Socks5.
  • The possibility of cheating various counters on the websites (http-access the sites).
  • Hidden download and run the specified file to the affected systems.
  • Installed in the system as a service
  • Weight bot - 95.5 kb, written in Delphi.



Saturday, October 8, 2011

fuse.microsoft.com Defaced by Hmei7

Microsoft FUSE Labs Sub-domain defaced by Hmei7

fuse.microsoft.com The official sud-domain of Microsoft FUSE Labs was defaced by a hacker named "Hmei7". Mirror of hack at Zone-H can be found here.

Wednesday, October 5, 2011

steve jobs passed away

steve jobs passed away :(  may his soul rest in peace.One of the greatest visionary ever!
Steve Jobs, the mastermind behind Apple's iPhone, iPad, iPod, iMac and iTunes, has died in California. Jobs was 56.
His death was reported by The Associated Press, citing Apple.
Jobs co-founded Apple Computer in 1976 and, with his childhood friend Steve Wozniak, marketed what was considered the world's first personal computer, the Apple II.
Industry watchers called him a master innovator -- perhaps on a par with Thomas Edison -- changing the worlds of computing, recorded music and communications.
In 2004, he beat back an unusual form of pancreatic cancer, and in 2009 he was forced to get a liver transplant. After several years of failing health, Jobs announced on Aug. 24, 2011 that he was stepping down as Apple's chief executive.
"I have always said if there ever came a day when I could no longer meet my duties and expectations as Apple's CEO, I would be the first to let you know," Jobs wrote in his letter of resignation. "Unfortunately, that day has come."

One of the world's most famous CEOs, Jobs remained stubbornly private about his personal life, refusing interviews and shielding his wife and their children from public view.


A Collection of 60 Inspirational Steve Jobs Quotes About Life, Design and Apple“Sometimes when you innovate, you make mistakes. It is best to admit them quickly, and get on with improving your other innovations.”

“Being the richest man in the cemetery doesn’t matter to me … Going to bed at night saying we’ve done something wonderful… that’s what matters to me.”

“We’ve gone through the operating system and looked at everything and asked how can we simplify this and make it more powerful at the same time.”

“Be a yardstick of quality. Some people aren’t used to an environment where excellence is expected.”

“I want to put a ding in the universe.”

“I was worth over $1,000,000 when I was 23, and over $10,000,000 when I was 24, and over $100,000,000 when I was 25, and it wasn’t that important because I never did it for the money.”

“The Japanese have hit the shores like dead fish. They’re just like dead fish washing up on the shores.”

“Unfortunately, people are not rebelling against Microsoft. They don’t know any better.”

“Bill Gates‘d be a broader guy if he had dropped acid once or gone off to an ashram when he was younger.”

“The only problem with Microsoft is they just have no taste. They have absolutely no taste. And I don’t mean that in a small way, I mean that in a big way, in the sense that they don’t think of original ideas, and they don’t bring much culture into their products.”



“My job is to not be easy on people. My job is to make them better.”

“We made the buttons on the screen look so good you’ll want to lick them.”

“Click. Boom. Amazing!”

“You can’t just ask customers what they want and then try to give that to them. By the time you get it built, they’ll want something new.”

“Design is not just what it looks like and feels like. Design is how it works.”

“Why join the navy if you can be a pirate?”

“A lot of companies have chosen to downsize, and maybe that was the right thing for them. We chose a different path. Our belief was that if we kept putting great products in front of customers, they would continue to open their wallets.”

“Innovation distinguishes between a leader and a follower.”

“Recruiting is hard. It’s just finding the needles in the haystack. You can’t know enough in a one-hour interview.
So, in the end, it’s ultimately based on your gut. How do I feel about this person? What are they like when they’re challenged? I ask everybody that: ‘Why are you here?’ The answers themselves are not what you’re looking for. It’s the meta-data.”

“We’ve had one of these before, when the dot-com bubble burst. What I told our company was that we were just going to invest our way through the downturn, that we weren’t going to lay off people, that we’d taken a tremendous amount of effort to get them into Apple in the first place – the last thing we were going to do is lay them off.”

“I mean, some people say, ‘Oh, God, if [Jobs] got run over by a bus, Apple would be in trouble.’ And, you know, I think it wouldn’t be a party, but there are really capable people at Apple.
My job is to make the whole executive team good enough to be successors, so that’s what I try to do.”

“It’s not about pop culture, and it’s not about fooling people, and it’s not about convincing people that they want something they don’t. We figure out what we want. And I think we’re pretty good at having the right discipline to think through whether a lot of other people are going to want it, too. That’s what we get paid to do.
We just want to make great products. (I think he means “insanely great products!“)”

“So when a good idea comes, you know, part of my job is to move it around, just see what different people think, get people talking about it, argue with people about it, get ideas moving among that group of 100 people, get different people together to explore different aspects of it quietly, and, you know – just explore things.”

“When I hire somebody really senior, competence is the ante. They have to be really smart. But the real issue for me is, Are they going to fall in love with Apple? Because if they fall in love with Apple, everything else will take care of itself.
They’ll want to do what’s best for Apple, not what’s best for them, what’s best for Steve, or anybody else. (this actually reiterates my oft-repeated mantra of “ubiquitous evangelism” in companies)”



“People think focus means saying yes to the thing you’ve got to focus on. But that’s not what it means at all. It means saying no to the hundred other good ideas that there are. You have to pick carefully.”

“Our DNA is as a consumer company – for that inpidual customer who’s voting thumbs up or thumbs down. That’s who we think about. And we think that our job is to take responsibility for the complete user experience. And if it’s not up to par, it’s our fault, plain and simply.”

“That happens more than you think, because this is not just engineering and science. There is art, too. Sometimes when you’re in the middle of one of these crises, you’re not sure you’re going to make it to the other end. But we’ve always made it, and so we have a certain degree of confidence, although sometimes you wonder.

I think the key thing is that we’re not all terrified at the same time. I mean, we do put our heart and soul into these things.”

“We don’t get a chance to do that many things, and every one should be really excellent. Because this is our life.

Life is brief, and then you die, you know?

And we’ve all chosen to do this with our lives. So it better be damn good. It better be worth it.”

“Almost everything–all external expectations, all pride, all fear of embarrassment or failure–these things just fall away in the face of death, leaving only what is truly important. Remembering that you are going to die is the best way I know to avoid the trap of thinking you have something to lose. You are already naked. There is no reason not to follow your heart.”

“Here’s to the crazy ones, the misfits, the rebels, the troublemakers, the round pegs in the square holes… the ones who see things differently — they’re not fond of rules… You can quote them, disagree with them, glorify or vilify them, but the only thing you can’t do is ignore them because they change things… they push the human race forward, and while some may see them as the crazy ones, we see genius, because the ones who are crazy enough to think that they can change the world, are the ones who do.”

“In most people’s vocabularies, design means veneer. It’s interior decorating. It’s the fabric of the curtains of the sofa. But to me, nothing could be further from the meaning of design. Design is the fundamental soul of a human-made creation that ends up expressing itself in successive outer layers of the product or service.”



“So we went to Atari and said, ‘Hey, we’ve got this amazing thing, even built with some of your parts, and what do you think about funding us? Or we’ll give it to you. We just want to do it. Pay our salary, we’ll come work for you.’ And they said, ‘No.’ So then we went to Hewlett-Packard, and they said, ‘Hey, we don’t need you. You haven’t got through college yet.”

“The people who are doing the work are the moving force behind the Macintosh. My job is to create a space for them, to clear out the rest of the organization and keep it at bay.”

“Your time is limited, so don’t waste it living someone else’s life. Don’t be trapped by dogma – which is living with the results of other people’s thinking. Don’t let the noise of other’s opinions drown out your own inner voice. And most important, have the courage to follow your heart and intuition. They somehow already know what you truly want to become. Everything else is secondary.”

“I’m the only person I know that’s lost a quarter of a billion dollars in one year…. It’s very character-building.”

“I’m as proud of what we don’t do as I am of what we do.”

“Quality is more important than quantity. One home run is much better than two doubles.”

“I’ve always wanted to own and control the primary technology in everything we do.”

“It comes from saying no to 1,000 things to make sure we don’t get on the wrong track or try to do too much.”

“It’s really hard to design products by focus groups. A lot of times, people don’t know what they want until you show it to them.”

“Innovation has nothing to do with how many R&D dollars you have. When Apple came up with the Mac, IBM was spending at least 100 times more on R&D. It’s not about money. It’s about the people you have, how you’re led, and how much you get it.”

“Insanely Great!”

“I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.”

“It’s rare that you see an artist in his 30s or 40s able to really contribute something amazing.”



“I feel like somebody just punched me in the stomach and knocked all my wind out. I’m only 30 years old and I want to have a chance to continue creating things. I know I’ve got at least one more great computer in me. And Apple is not going to give me a chance to do that.”

“I didn’t see it then, but it turned out that getting fired from Apple was the best thing that could have ever happened to me. The heaviness of being successful was replaced by the lightness of being a beginner again, less sure about everything. It freed me to enter one of the most creative periods of my life.”

“Do you want to spend the rest of your life selling sugared water or do you want a chance to change the world?”

“The products suck! There’s no sex in them anymore!”

“The cure for Apple is not cost-cutting. The cure for Apple is to innovate its way out of its current predicament.”

“If I were running Apple, I would milk the Macintosh for all it’s worth — and get busy on the next great thing. The PC wars are over. Done. Microsoft won a long time ago.”

“You know, I’ve got a plan that could rescue Apple. I can’t say any more than that it’s the perfect product and the perfect strategy for Apple. But nobody there will listen to me.”

“Apple has some tremendous assets, but I believe without some attention, the company could, could, could — I’m searching for the right word — could, could die.”

Thank you Steve.
you will be missed steve :(

Sunday, October 2, 2011

Defcon 19 presentations with dvd

Finally the wait for Defcon 19 presentation is over. Dvd containing the hacker material is up on Defcon media. Defcon is a yearly hacker conference which was held at las vegas in august this year.

Here is the download link to defcon 19 dvd
.ISO of the DEF CON 19 Conference DVD - original and with updated slides
dc-19/defcon-19-dvd-original.iso (~1.6 GB)
dc-19/defcon-19-dvd-updated.iso (~1.7 GB)

Link for individual rss feeds of defcon slides
https://www.defcon.org/podcast/defcon-19-materials.rss

next update will be of defcon videos, music.


Subscribe to our mailing list so you don't miss any updates.

Monday, September 26, 2011

Mysql.com Hacked , Infected with JavaScript Malware



mysql.com is hacked and is currently serving malware to visitors , says the report by armorize .The company have detected the malware using their malware monitoring platform called HackAlert . The mysql.com website is injected with a script that generates an iFrame that redirects the visitors to   http://truruhfhqnviaosdpruejeslsuy.cx.cc/main.php , where the BlackHole exploit pack is hosted.    


How Does The Injection Works 


Step 1: http://www.mysql.com

Causes the visiting browser to load the following:


Step 2: http://mysql.com/common/js/s_code_remote.js?ver=20091011 ( Don't Visit Now ) 

This is the injection point. you can find the entire content of the .js file  here.


The Infection Section '



Step 3:  http://falosfax.in/info/in.cgi?5&ab_iframe=1&ab_badtraffic=1&antibot_hash=1255098964&ur=1&HTTP_REFERER=http://mysql.com/

Shows out a 302 redirect to Step 4.

Step 4: http://truruhfhqnviaosdpruejeslsuy.cx.cc/main.php

This domain hosts the BlackHole exploit pack. It exploits the visitor's browsing platform (the browser, the browser plugins like Adobe Flash, Adobe PDF, etc, Java, ...), and upon successful exploitation, permanently installs a piece of malware into the visitor's machine, without the visitor's knowledge. The visitor doesn't need to click or agree to anything; simply visiting mysql.com with a vulnerable browsing platform will result in an infection.

Sucuri Security researchers have also confirmed this and according to them "  the site has been compromised via JavaScript malware that "infects a web site through a compromised desktop (with virus), where it steals any stored password from the FTP client and uses that to attack the site.



[Source]



LulzSec member "Neuron" Tracked Down Via HideMyAss's Logs




One more member of the hacking group LulzSec, known as "Neuron", may be arrested if traced by their use of a British anonymous VPN , following a similar arrest last week of Cody Kretsinger, who was arrested by the FBI last Thursday for allegedly hacking into the Sony Pictures website, had been identified via his use of HideMyAss's proxy service to disguise his IP  address when connecting to the Sony Pictures site.

However a pastebin log shows that "Neuron" claims to use HideMyAss's Service in order to protect his identity.HideMyAss also posted a lengthy note regarding this topic of their blog after this new emerged.

HideMyAss It first came to our attention when leaked IRC chat logs were released, in these logs participants discussed about various VPN services they use, and it became apparent that some members were using our service. No action was taken, after all there was no evidence to suggest wrongdoing and nothing to identify which accounts with us they were using. At a later date it came as no surprise to have received a court order asking for information relating to an account associated with some or all of the above cases. As stated in our terms of service and privacy policy our service is not to be used for illegal activity, and as a legitimate company we will cooperate with law enforcement if we receive a court order (equivalent of a subpoena in the US). " 

LulzSec is going down #The Fourth Arrest 

Wednesday, September 21, 2011

David Beckhams Dead And The Top 5 Twitter Hacks

David Beckham’s Dead And The Top 5 Twitter Hacks


This morning twitter lit up with a rumour that David Beckham had died. While it appears to be nothing more than a rumour, it is the latest in a long line of hacks and rumours that spread like wildfire across the social networks. Here are 5 other hacks that have made the front pages…
Topiary, not just a lovely bush, but the nickname for one of the super hackers behind Anonymous and LulzSec, is allegedly the 19 year old arrested in the Shetland Islands this week by British police, for crimes against cyberspace. The arrest is closely linked to an enormous investigation alongside the FBI into a denial-of-service attack on third party payment service PayPal, that took down the site for four days last December. The Anti-Security hacker movement, notoriously sympathetic to Julian Assange, targeted the company after PayPal suspended all donations to WikiLeaks. Following the arrest this week, LulzSec and Anonymous have turned their boycott up a notch, again persuading hundreds of users to close their PayPal accounts.
While Scotland Yard have not identified the teenager’s identity as Topiary, his usually active Twitter account is now sparse but for the singular statement “You cannot arrest an idea.” So, with one of the most outspoken advocates of the Anti-Security hacking movement now apparently on lockdown, we take a look at cyber pests’ favourite soap-box and target of choice, Twitter. While  enormously popular, Twitter is a hackers delight having both notoriously vulnerable security and the ability to spread news of a hack like an Australian bush fire.
PayPal
PayPal’s shoddy customer service has been the subject of bitter criticism from users, with the website www.paypalsucks.comlong established before any Twitter hijacking. But when the UK’s PayPal account profile picture was changed to a steaming pile of poop and re-directed followers to the hate-website, users instantly smelt a LulzSec rat. However, this turned out not to be the handiwork of a hardcore hacker but that of one particularly enraged customer. So that should make you feel safe giving them all your bank account details.
Britney Spears
If YouTube comments are to be believed, Britney Spears is indeed at the fiery helm of the Illuminati world domination committee, along with every other popstar ever. Complete with a new illiminaughty triangle plentiful background and profile picture, the hackers Tweeted Spears’ allegiance to Lucifer to her 3 million plus followers. While many famous Twitter’s have been broken into, including the obvious prey of uber celebs Justin Bieber and Lady GaGa, other than lots of capital letters and profanities, Britters’ account jacks have been the most imaginative, including when it was famously compromised to announce her own death. Cue a frenzy of hysterical RIP hash-tagging.
Fox News
Again, this beautiful Twitter hijack was initially suspected to be a LulzSec job but was in fact by fellow Internet scamps, Scriptkiddies. Both Fox’s site and social networks have been repeatedly attacked by a number of different hacking groups, one time satisfyingly announcing that Fox reporter and everything-o-phobe, Bill O’Reilly, was gay. Though the hijack earlier this July, is possibly one of the worst egg on their face blunders for Fox, as Scriptkiddies not only Tweeted that President Obama had been assassinated, but the rogue messages were not noticed or removed by Fox for nearly ten hours. A favourite punching bag for hacktivists, there’s sure to be more Fox fun to come.
Iranian Cyber Army
December 2009, and millions of Twitter users looking to post motivational quotes and share photos of their breakfast shot through a vintage photography filter, are instead confronted with an ominous Iranian Cyber Army page. A drastic attack on Twitter, the radical Shiite hackers were able to re-route the entire site. The hack was said to be in response to Twitter’s unwitting yet pivotal role during the unrest in Tehran, where protestors were able to push news out while skirting the Iranian government’s media crackdown. It was, sadly, seen by some as interference. While only KOing the site for an hour, it stands as Twitter’s worst security embarrassment to date.

Sunday, September 18, 2011

Install Windows 8 Developer In Vmware

Several versions of Windows 8 Developer Preview are public available on Microsoft’s Windows Developer Preview downloads. Just pick the one that fits for you. The downloaded file is an ISO file. You don’t need to burn it on disc.

If you don’t have a spare computer where you can install Windows 8 Developer Preview on, you can install it on your own machine using VMware. First you’ll need VMware Workstation 8 or VMware Player 4. The latter one is free, but at this moment you can only get it by downloading VMware Workstation 8. Don’t worry if you don’t have a license, you don’t need one because we will only use the free VMware Player 4. If you want full functionality you can download a trial version. For both downloads you’ll need to create an account. Go ahead and download and install VMware 8 if you have not already.

In this little tutorial I will use VMware Player, but the steps are nearly the same for VMware Workstation. Start VMware Player and click “Create a New Virtual Machine”. In the window that pops up, make sure you choose “I will install the operating system later.”

Installing-Win8-VMware-1

If you select one of the other options, you’ll get in trouble when Windows 8 Developer Preview is installing. Because in one of the next screens of the VMware wizard you’ll be asked to enter the license key for Windows 8 Developer Preview which you don’t have. You can leave it empty, but when Windows 8 Developer Preview is installing you’ll get the following error: “Windows cannot read the <ProductKey> setting from the unattend answer file”.

Installing-Win8-VMware-2

So, let’s proceed with the last option and click “Next >”. Depending on which version you have downloaded, select “Windows 7” or “Windows 7 x64” as operating system. I have downloaded the 64-bit version, so I chose “Windows 7 x64”.

Installing-Win8-VMware-3

Enter a Virtual machine name in the next step, for instance “Windows 8 Developer Preview”, and set the location of your virtual machine. I did not change anything in the next steps of the wizards, but you can choose the maximum disk size (default 60GB), whether to split the virtual disk or not. If you want to adjust the default allocated memory (1GB) you’ll need to click on “Customize Hardware…” in the last step to change it. This is my summary screen:

Installing-Win8-VMware-4

Click “Finish” and select the created virtual machine in VMware Player. Open the Virtual Machine Settings by clicking “Edit virtual machine settings” and select “CD/DVD IDE” in the device list. Make sure “Connect at power on” is checked and that you point it to the downloaded ISO file.

Installing-Win8-VMware-5

Click “OK” and power on the virtual machine. The Windows 8 Developer Preview installation wizard will start. At the end you can enjoy Windows 8 Developer Preview! One more tip: the metro style apps will only run if your screen resolution is at least 1024x768 (hardware or virtual machine).

Friday, September 16, 2011

Windows Update Can Be Hacked

yeah windows update can be hacked

Comodohacker: I can hack Windows Update

Hackable??

Following on from the recent hack attack carried out against Dutch security specialist DigiNotar , it would appear notorious hacker Comodohacker is setting his/her sights on a significantly bigger target. 
Moreover, while claiming to be “so smart, sharp, dangerous [and] powerful”, the hacker has offered up a statement conflicting directly with Microsoft’s recent insistence that its Windows Update system cannot be compromised.
“I’m able to issue Windows updates—Microsoft’s statement about Windows Update and that I can’t issue such [an] update is totally false,” the hacker wrote via Pastebin. “Simply I can issue updates via Windows Update!”
“I already reversed ENTIRE Windows update protocol, how it reads XMLs via SSL, which includes URL, KB no, SHA-1 hash of file for each update, how it verifies that downloaded file is signed using WinVerifyTrust API,” the post boasted.
Although Microsoft remains staunch in its belief that Windows Update cannot be circumvented “even to an attacker with a fraudulent certificate”, hundreds of millions of unwitting users could face a flood of malware if Comodohacker is able to make good on the claim.
“Attackers are not able to leverage a fraudulent Windows Update certificate to install malware via the Windows Update servers”, wrote the software giant via its official blog.
“The Windows Update client will only install binary payloads signed by the actual Microsoft root CA certificate, which is issued and secured by Microsoft,” it added.

Wireless Hacks MegaPack

Wireless Hacks MegaPack - the best final wireless hack 2011 !

Amazing wireless hack pack you've never found !!

Tons of useful wireless hack tools, ebooks,
tutorial guide. There are a lot of wireless signal around you.
Now it's time to use it, absolutely free.

Wireless tools include in this great package:

+ NetStumbler-0.4.0: wireless access point identifier - listens for SSIDs and sends beacons as probes searching for access points.
+ Kismet-2005-08-R: wireless sniffer and monitor - passively monitors wireless traffic and sorts data to identify SSIDs, MAC addresses, channels and connection speeds.
+ Wellenreiter-v1.9: WLAN discovery tool - uses brute force to identify low traffic access points; hides your real MAC address; integrates with GPS.
+ WEP 0.1.0: Unix based-pearl aplication encryption breaker - s 802.11 WEP encryption keys using the latest discovered weakness of RC4 key scheduling.
+ Airsnort-0.2.7e: encryption breaker - passively monitoring transmissions, computing the encryption key when enough packets have been gathered.
+ Wepwedgie-0.1.0-alpha: for toolkit that determines 802.11 WEP keystreams and injects traffic with known keystreams in order to WEP in minutes.
+ Hotspotter-0.4: Wireless client attacking too.
+ and much, much more...

Note: most programs are open source, and very useful if you know what your doing.

Thursday, September 15, 2011

DROIDSHEEP

DROIDSHEEP SESSION HIJACKING ANDROID APPLICATION: 
Droidsheep is free alternate of faceniff which is available on download droidsheep website for free.Its one click hijacking tool which supports

- amazon.de
– facebook.com
– fl ickr.com
– twitter.com
– linkedin.com
– yahoo.com
– live.com
– google.de (only the non-encrypted services like “maps”)


Limitations of Droidsheep


DroidSheep now supports OPEN, WEP, WPA and WPA2 secured networks.
For WPA/WPA2 it uses an DNS-Spoofing attack.
DNS-Spoofing, means it makes all devices within the network think, the DroisSheep-device is the router and sending their data to the device. This might have an impact to the network and cause connection problems or bandwith-limitations – and it can be spotted. DroidSheeps attack can not, as it only reads the packets sent over the WiFi, but instead of dismissing them, it uses the data

What do you need to run DroidSheep?
- You need an android-powered device, running at least version 2.1 of Android
- You need Root-Access on your phone (link)
- You need DroidSheep :-) (You can get it in the “GET IT” section)


you can download Droidsheep android application here

Tuesday, September 13, 2011

Hackers Brings Down Linux Websites

Hackers Brings Down Linux Websites



A number of Linux websites, including LinuxFoundation.org and Linux.com, have been pulled offline after a security breach.

The breach is believed to be related to the hack of the Kernel.org website that is home to the Linux Project, nearly two weeks ago.

In a holding message on its website, the Linux Foundation said that it had discovered a security breach on Sept. 8, which led to its taking down the Linux websites and their subdomains for maintenance.

The Linux Foundation infrastructure also supports services such as Open Printing and Linux Mark. However, it does not house the Linux kernel or its code repositories.

"The Linux Foundation made this decision in the interest of extreme caution and security best practices.

"We believe this breach was connected to the intrusion on kernel.org," the statement on Linux Foundation said.

While the Linux Foundation is restoring services, it warned users that their passwords may be compromised, and advised them to change them urgently:

"As with any intrusion and as a matter of caution, you should consider the passwords and SSH keys that you have used on these sites compromised. If you have reused these passwords on other sites, please change them immediately."

The foundation added that it is auditing all its systems, and will provide an updated statement when it has more information.

Users who want to find out more about the issue can contact the foundation on info@linuxfoundation.org.

WikiLeaks knocked offline by Anonymous RefRef due Sept 17

WikiLeaks knocked offline by Anonymous - RefRef due Sept. 17
wikileaks.org taken offline during refref test

On Tuesday, WikiLeaks.org crashed, under what the organization called a heavy cyberattack. However, the developer behind RefRef, an application created for those associating with Anonymous to use instead of LOIC, said that WikiLeaks was taken offline during a test of the new tool. RefRef will be tested again Wednesday, before it is released on September 17.
RefRef is platform neutral tool, leveraging JavaScript and vulnerabilities within SQL to create a devastating impact on the targeted website. In late July, an Anon on IRC was promoting the tool, explaining to those in a room frequented by journalists that RefRef is pure JavaScript, and uses the target site’s own processing power against itself. In the end, the server succumbs to resource exhaustion due to RefRef’s usage.
As it turns out, the attack is launched client side, and will send a separate script in the connection request made to the target server. This request is actually the exploit itself, and once the server renders the code, it will continue to render it until crashing. In essence, the stronger the server, the faster it crashes. All from a JavaScript file that is no more than 52 lines of code.
At the time, The Tech Herald was able to get the Anon to open up some on the tool itself. “Imagine giving a large beast a simple carrot, [and then] watching the best choke itself to death,” explained the Anon promoting the tool.
Testing the code in July, a run of 17 seconds led to a 42 minute outage on Pastebin.com, which was confirmed by Pastebin on Twitter. The test on Tuesday, which targeted WikiLeaks.org, lasted just 72 seconds.
“WikiLeaks is currently under heavy attack. In order to fully protect the CableGate archives, we ask you to mirror it again,” the organization told Twitter followers.
It was assumed by the AP and other news organizations that WikiLeaks was down due to the controversy surrounding the latest batch of diplomatic cables.
As this was being written, the developers tested RefRef again, this time targeting 4Chan.org. The imageboard was offline for just a few minutes. This test lasted 16 seconds. StormFront.org was also an unwilling test subject. A 12 second test knocked the site offline for about two minutes.
In July, the Anon who announced RefRef told The Tech Herald that the tool itself exploits server vulnerabilities, and will work as long as the target server supports JavaScript and some type of SQL. Asked if the vulnerability being exploited could be patched, the Anon responded that it could, but added that administrators would have to “mass-patch” a file that actually affects many services.
As it turns out, this was incorrect. Originally, patching was unlikely to stop RefRef because, “most SQL servers are pulling from a master SQL host” and the tool itself targets “one of the most common SQL services, but also one of the most widespread,” the Anon added.
However, this has changed. Early Wednesday, the Anon who was testing RefRef before its release, said “…it seems they can patch it easily, not having to patch the SQL host.”
So once the SQL patch is released, and there is one coming, the tool itself will be useless. “A SQL patch will be out within a week, so we must all use it on the sites fast,” the Anon explained.
According to statements on Twitter, RefRef will be tested on Wednesday, against a high profile site, before its release to the public on September 17. Administrators wishing to get ahead of the game may want to watch for patch releases this month.