Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Wednesday, January 22, 2014

5 Websites for Making Fake Calls - Caller ID Spoofing...


Caller ID spoofing is the process of faking your identity while making a call. Read about Caller ID spoofing and learn how it works. There are many websites available which offer free service to make fake calls. With these websites, you can make calls to any one from any one. In this post, we are listing 5 websites for making fake calls:

Warning: Use these websites only for educational purpose. These websites collect logs. If you use it for any illegal work, we will not be responsible for any criminal charge you face.

1. CrazyCall.net

CrazyCall is the most popular website used for call spoofing. Few countries have also blocked the website because of its use in many crimes. This website lets users make calls from any number they want. So, you can make prank calls with this. It also lets users change the voice to be anonymous while calling.

2. SpoofCard

SpoofCard is also a nice service that lets users call from any number. You can call your friends from his number. It also lets you make group calls. For using the service, you need to have credits in your account. You can make demo calls for free, but you need to buy credits for more calls.

3. Spooftel

Spooftel is also a similar kind of caller id spoofing service. Purchase credits and make prank calls. You can also make demo calls to see how the service works. It also has option to change the pitch of your voice. It also has an option to send messages.

4. BluffmyCall

BluffMyCall is another nice call spoofing web service with lots of features. It lets users change caller id, record calls, change voice and leave voice messages. After using your free minutes, you can purchase your minutes.

5. CallerIDFaker

CallerIDFaker comes with better offers. You can get unlimited calling for whole month only for $29.95. Like other services, it also lets users change voice and record calls.

Please use these websites only for playing pranks with friends. You can easily get caught if you use it for illegal work.

Posted By Bergin A10:27 AM

Sunday, September 15, 2013

Basics Of Web App Attack

Filled under: ,


In this article we’ll define how web applications are associated with network penetration testing and ethical hacking. In this up-front overview, we’ll also define web applications.Some of the most widespread web application vulnerabilities found today are Cross-Site Request Forgery (XSRF), Cross-Site Scripting (XSS), SQL Injection etc,

web_app_layout
In the penetration testing and ethical hacking field, network tests are often considered a separate kind of project from web application tests. The skills associated with each kind of test are, for the most part, distinct and specialized. Some testers focus on network tests, dealing with finding flaws in network-accessible services and clients. Other testers specialize in finding flaws in web applications. A smaller number of testers work both sides, dealing with network tests and web app tests.
Even if you focus exclusively on network penetration tests, you still need to be familiar with various web application vulnerabilities and tools for testing web apps. Sometimes, we are asked in a network test to perform a cursory review of a web app. Other times, we need to interact with web app pen testers to share findings and cooperate in a given attack. And, for some of us, we need to be able to perform both network tests and web app tests.
Before we get into the guts of web application vulnerabilities and testing, let’s start out by defining a web application. There are two fundamental properties that define a web application. First, the web app is accessed via HTTP or and/or HTTPS across the network. Secondly, web apps involve a web server. Those are the only two crucial properties that make a web application a web application.
Most (but not all) web applications involve a browser or related client that sends, receives, and renders HTML via HTTP and/or HTTPS. The browser may be a full-fledged browsing application, such as Internet Explorer or Firefox. Or, it could be a more specialized program, such as the iTunes music player. Furthermore, many (but not all) web apps involve a back end database that stores information for the web application. The most popular database back-ends to web apps are Microsoft SQL Server, Oracle, and MySQL.
Most attacks in the wild today deal with finding flaws in these three components and the way that they interact with each other: the logic of the web application on the web server, the web server and web browser’s interactions, and the web server and database’s interactions.

Posted By Bergin A11:08 AM

Transferring Files with Netcat

Filled under: ,


Netcat can also be used to transfer files, both text and binary, from one computer to another. To send a file from Computer 2 to Computer 1, try the following:
Computer 1: Set up Netcat to listen to and accept the connection and to redirect any input into a file.

root@bt:~# nc -lvp 4444 > output.txt
listening on [any] 4444 …
Computer 2: Connect to the listening Netcat on computer 1 (port 4444) and send the file:

C:\>echo “Hi! This is a text file!” > test.txt
C:\>type test.txt
“Hi! This is a text file!”
C:\>nc -vv 192.168.8.74 4444 < test.txt
192.168.8.74: inverse host lookup failed: h_errno 11004: NO_DATA
(UNKNOWN) [192.168.8.74] 4444 (?) open

Because Netcat doesn’t give any indication of file transfer progress, wait for a few seconds and then
press Ctrl+C to exit Netcat.
On Computer 1 you should see:

root@bt:~# nc -lvp 4444 > output.txt
listening on [any] 4444 …
192.168.9.158: inverse host lookup failed: Unknown server error : Connection timed out
connect to [192.168.8.74] from (UNKNOWN) [192.168.9.158] 1027
^C root@bt:~#

Now check that the file was transferred correctly:
Computer 1
root@bt:~# file output.txt
output.txt: ASCII text, with CRLF line terminators
root@bt:~# cat output.txt
“Hi! This is a text file!”
root@bt:~#

Posted By Bergin A11:06 AM

Forward Lookup Brute Force

Filled under: ,


The idea behind this method is to try to guess valid names of organizational servers by trying to resolve a given name. If the name resolves, the server exists. Here’s a short example using the host command:
root@bt:~# host www.checkpoint.com
www.checkpoint.com has address 216.200.241.66
root@bt:~# host idontexist.checkpoint.com
Host idontexist.checkpoint.com not found: 3(NXDOMAIN)
root@bt:~#
Notice that the DNS name www.checkpoint.com resolved and the host command (which acts as a DNS client) returned the IP address belonging to that FQDN. The name idontexist.checkpoint.com did not resolve and you received a “not found” result.
Taking this idea a bit further, with a bit of bash scripting you can automate the process of discovery. Next, compile a short list of common server names and enter them into a file: dns-names.txt (a more complete list of DNS names is available in /pentest/enumeration/dnsenum/dns.txt):
www
www2
firewall
cisco
checkpoint
smtp
pop3
proxy
dns

You can now write a short bash script (dodns.sh) that will iterate through this list and execute the host command on each line:
#!/bin/bash
for name in $(cat dns-names.txt);do
host $name.checkpoint.com
done
The output of this script is raw and not terribly useful:
root@bt:~# ./dodns.sh
www.checkpoint.com has address 216.200.241.66
Host www1.checkpoint.com not found: 3(NXDOMAIN)
www2.checkpoint.com is an alias for www.checkpoint.com.
www.checkpoint.com has address 216.200.241.66
Host firewall.checkpoint.com not found: 3(NXDOMAIN)
Host cisco.checkpoint.com not found: 3(NXDOMAIN)
Host checkpoint.checkpoint.com not found: 3(NXDOMAIN)
smtp.checkpoint.com is an alias for michael.checkpoint.com.
michael.checkpoint.com has address 194.29.32.68
pop3.checkpoint.com is an alias for michael.checkpoint.com.
michael.checkpoint.com has address 194.29.32.68
Host proxy.checkpoint.com not found: 3(NXDOMAIN)
Host dns.checkpoint.com not found: 3(NXDOMAIN)
Host dns1.checkpoint.com not found: 3(NXDOMAIN)
ns.checkpoint.com has address 194.29.32.199
root@bt:~#
Try cleaning up the output to show only the lines that contain the string “has address”:
#!/bin/bash
for name in $(cat dns-names.txt);do
host $name.checkpoint.com |grep “has address”
done
The output of this script looks much better and shows only hostnames that have been resolved:
root@bt:~# ./dodns.sh
www.checkpoint.com has address 216.200.241.66
www.checkpoint.com has address 216.200.241.66
michael.checkpoint.com has address 194.29.32.68
ns.checkpoint.com has address 194.29.32.199
root@bt:~#
To get a clean list of IPs, you can perform further test manipulation on this output. Cut the list and show only the IP address field:
#!/bin/bash
for name in $(cat dns-names.txt);do
host $name.checkpoint.com |grep “has address”|cut -d” ” -f4
done
The output is now limited to a list of IP addresses:
root@bt:~# ./dodns.sh
216.200.241.66

194.29.32.68
194.29.32.68
root@bt:~#

Posted By Bergin A11:05 AM

Monday, July 15, 2013

Download Certified Ethical Hacker Ebook

Filled under: , ,


Preview

In this post i am providing you an ebook which can turn you into an ethical hacker.The actual objective of the ethical hacker training course would be to assist you to learn a repeatable, documentable penetration testing strategy which you can use within an ethical penetration testing or hacking scenario.

This ethical security training program features a substantial Return on Investment, you go out the doorway along with hacking abilities which are extremely sought after, along with the Certified Ethical Hacker accreditation!

An ethical hacker is generally hired by a company who trusts him / her to try and penetrate systems and personal computers, utilizing the exact same techniques like a hacker, with regards to getting as well as repairing personal computer protection weaknesses. Illegal hacking (i.e., getting entry to computer systems without having earlier consent from owner) is really a criminal offense in many nations, however penetration tests made by demand of the owner of the aimed system(s) or network(s) is not really.

A Certified Ethical Hacker has acquired a documentation in the way to search for the weak points as well as weaknesses in target devices and utilizes the identical information and equipment like a hacker.




Certified Ethical Hacker Volume-I
Preview

Certified Ethical Hacker Volume-II
Preview

Posted By Bergin A11:11 AM

Tuesday, July 9, 2013

Kaspersky Antivirus 2013

Filled under: , ,


 Kaspersky AntiVirus 2013 13.0.1.4190 FINAL + key


Kaspersky anti-virus protects you from the Phishing and Malware sites that you wouldn't otherwise know were attempting to steal from you.
At the same time, the Kaspersky Security Network allows your computer to report when it discovers a threat that hasn't been seen before. All 250 million Kaspersky users benefit from our combined knowledge!

Kaspersky features include
    Protects from viruses, Trojans, worms, spyware, adware
    Scans files, email, and internet traffic
    Protects Instant Messengers
    Protects From Unknown Threats
    Analyzes and closes Internet Explorer vulnerabilities
    Disables links to malware sites / phishing sites
    Global Threat Monitoring (Kaspersky Security Network)
    Blocks all types of keyloggers
    Automatic Database Updates
    Free Technical Support


How to Download
Click on the download linksWait for 5 seconds and then click on
Download only
Software
Password ----www.linkfunda.com
Download Only
Key-gen Crack and Patch Download

  




Posted By Bergin A9:42 PM

GData Internet Security 2014

Filled under: , ,


Name : G Data InternetSecurity
Version : 2014 Build 24.0.2.1 Final
Languange : English
Medicine : Include
OS Support : Xp/Vista/7/8
Password : No
Type File : Rar
Code File : gdi2014.b.24.0.2.1
Updated : 5 Juli 2013
Publisher : G data
Size : 341 Mb

Active hybrid protection provides effective interaction proactive, cloud and signature-based methods to detect malware and online threats c high speed, and also covers the specific region-specific threats.
Automatic firewall runs in the background and does not reduce the performance of your computer. Integrated tool Parental Control helps protect children and teenagers from inappropriate websites.
G Data BankGuard component as a plugin for your web browser provides secure Internet banking and online shopping. Cloud web protection ensures safety when visiting the active sites and social networks on the Internet.

New in the G Data InternetSecurity 2014
The main components of G Data InternetSecurity 2014
Main features of G Data InternetSecurity 2014
New Technology G Data CloseGap

New Technology G Data is already integrated in the G Data InternetSecurity 2014, and will allow even more efficiently and effectively protect your computer from malicious programs.
G Data CloseGap technology combines proactive and signature-based detection methods in a powerful hybrid of active defense. With each update CloseGap gets additional improvements, so that the functionality is constantly adapting to the current threat. Thus, the users and their data at any time, will be protected from new and previously unknown malicious scripting attacks.

 ---------------------------------------------
All Link Resumable and Speed ^^*
No Password No Need Leech!!
Please Sellect 1 Link Dont All, Thanks
---------------------------------------------
Download Here :

Download | Via Verzend
Download | Via Tusfile
Download | Via Cyberlocker
Download | Via Megafiles
Download | Via Secureupload
Download | Via Exoshare 24 Site(Sharebeast,Sharebees,ifiles,Cyberlocker, More..)
Download | Via Embedupload 12 Site(Sharebeast,4shared,tusfile,fileswaf,More..)
Download | Via jheberg 15 Site(Turbobit,uptobox,netload,netload,more..)

Posted By Bergin A9:36 PM

Saturday, July 6, 2013

How To Password Protect Your Post With Password in Blogger

Filled under: , ,

 
 
 
Whenever we think about security the first words arrives in our mind is “Password Protection”. We are in 21st century the era of information technology, now days almost every thing has highest security i.e. online communities, files, documents and etc. Security plays vital role and have great significance when it comes to the personal matters and complex things. If the entire world is getting protected so why do we bloggers left behind.

An extremely powerful and useful script for blogger Blogspot blogs has been introduced by well known blog vincentcheung This script is capable of hiding what ever text you want in a form of encrypted code which can be uncovered if your users know the password to see the hidden text. Currently it is the most useful and secured method of protecting our post which I personally liked a lot. The hidden text is not easy to crack so it remains hidden from un-welcomed visitors. And according to the creator even he cannot decrypt (View) the hidden text except the person who knows the password. The whole systems works like a security lock which will only operate if we have the key to unlock so Today we will Password Protect our Bloggers Posts.

I know you would love to see the live demo that how the whole process works so before we spin our fingers over the tutorial first look at the instant preview

Adding JavaScript To Blogger Blogs:

These steps are simple so do as directed
  • Go To Blogger.com >> Your Blog
  • Now Select Template >> Edit HTML
  • Now Press Proceed >> And Search For 
]]></b:skin>
  • And Now just below it paste the following code 
<!--POST PASSWORD PROTECT CODING --> <script type="text/javascript" src="http://www.vincentcheung.ca/jsencryption/jsencryption.js"></script>

 How To Password Protect Our Post in Blogger

Now it is up to us whatever we wish to show images, text, videos, or any thing to only preferred visitors. So to password protect a certain content of your post simply go to Blogger.com>> Create Post and once you are finished do as directed

Step #1.  Now Switch to HTML mode and copy all the code that is present there as shown in the image below


Step #2.  Now we will go to Encryption PageOn this page you will be able to see four boxes
  • One with yellow color is called Key Box.
  • One with green color is called Plain Text Box 
  • One with red color is called Cipher Text Box.
  • And one with blue color is called HTML Code BoxBut we are only interested in Key box, Plain Text Box and Html Box. so do as follows.
  • Enter your desirable password in Key box.


  • And Now after Pasting the code Hit Encrypt button present below Plain Text Box
  • After Pressing Encrypt Button COPY the code from the HTML CODE box

The Html Code which you copied in the previous step is the same post that you created previously in Blogger but this time you will observe strange illogical characters so don’t worry it is the same post with same images, videos. Now you can use this HTML code in your any posts and instead of seeing the big sum of code your visitors will see a link >> Show Encrypted text.

Step #3.  Now after copying the code get back where we were working previously, Blogger >> Create Post>> Now in the Blogger Post Editorunder HTML TAB paste the HTML code which your copied earlier. You can write anything instead of this text >> Show Encrypted text But make sure you do all the changes under HTML TAB


So That's how we can password protect our post in Blogger. This is a new feature which we discovered I hope you will enjoy this newly introduced function. Till then Peace, Blessings, And Happy Protecting

Posted By Bergin A8:35 PM