Tuesday, August 21, 2007

Exploiting Software: How to Break Code

How does software break? How do attackers make software break on purpose? Why are
firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys?
What tools can be used to break software? This book provides the answers.
Exploiting Software is loaded with examples of real attacks, attack patterns, tools, and
techniques used by bad guys to break software. If you want to protect your software from
attack, you must first learn how real attacks are really carried out.
This must-have book may shock you—and it will certainly educate you.Getting beyond the
script kiddie treatment found in many hacking books, you will learn about
Why software exploit will continue to be a serious problem
When network security mechanisms do not work
Attack patterns
Reverse engineering
Classic attacks against server software
Surprising attacks against client software
Techniques for crafting malicious input
The technical details of buffer overflows
Rootkits
Exploiting Software is filled with the tools, concepts, and knowledge necessary to break
software.

Download:

http://rapidshare.com/files/49900600/ESHTBTC.rar




Tor: anonymity online

Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.

Tor aims to defend against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security. Communications are bounced around a distributed network of servers called onion routers, protecting you from websites that build profiles of your interests, local eavesdroppers that read your data or learn what sites you visit, and even the onion routers themselves.

Tor's security is improved as its user base grows and as more people volunteer to run servers. Please consider volunteering your time or volunteering your bandwidth. And remember that this is development code—while we believe Tor is better than all the other options out there at what it does, it's still not a good idea to rely on any current anonymity systems if you really need strong anonymity. You can Download this free software @ http://tor.eff.org/dist/vidalia-bundles/vidalia-bundle-0.1.2.16-0.0.13.exe. The installation instruction you will find @ http://tor.eff.org/docs/tor-doc-win32.html.en

Monday, August 20, 2007

Ashampoo System Software Pack 2007

Take control of Windows® with these 4 great tools!
Ashampoo System Pack is the control, installation and launch centre for Ashampoo’s popular Windows optimization and management tools.

All these tools are famous for their combination of power and ease of use – anyone can use them but they still deliver the performance that normally only Windows experts can achieve.

On installation the program checks your computer for existing Ashampoo Windows system tools and automatically integrates them in its launch pad interface.

If you want, you can then download and install any of the other tools you would like to have in a simple, one-click process.
You can also use it to try out the Ashampoo system management tools – you get the normal free trial options for every tool. Just click once on the tool that interests you to download, install and run.

All-in-one price offer
You can buy Ashampoo System Pack together with all four tools at an unbeatable all in one price. This is much less than you would pay for all four tools individually.

Ashampoo System Pack combines these tools:

Ashampoo
WinOptimizer 4:Keeps your Windows system clean and fast by getting rid of all the unnecessary junk that accumulates with time. Includes 1-click optimization and powerful tuning, file and tweaking tools.
More information... Ashampoo PowerUp
XP Platinum 2:The ultimate Windows configuration and tweaking tool. Gives you direct access to hundreds of settings with full explanations of what they do. Plus multiple desktops and more.
More information...Ashampoo
UnInstaller
Platinum 2:Completely removes applications from your computer, without leftover garbage. Test new software with confidence and monitor system changes. Easy mode for instant results.
More information...Ashampoo
Magical Defrag 2:The easy solution to disk fragmentation. Defragments whenever your computer is idle to keep your hard disks permanently optimized.
More information...


1. Ashampoo Magical Defrag 2.05 NEUE
2. Ashampoo WinOptimizer 4.00
3. Ashampoo UnInstaller Platinum 2.60
4. Ashampoo PowerUp XP Platinum 2.20



download:

http://rapidshare.com/files/14291116/ASSDat_2007.rar.html


Ethical Hacking and Countermeasures Tools

The International Council of Electronic Commerce Consultants (EC-Council) is a member supported professional organization. The purpose of the EC-Council is to support and enhance the role of individuals and organizations who design, create, manage or market Security and E-Business solutions. We support our members by providing Electronic Commerce Consultant certification as well as educational, technical, placement, member advantage, and discounted services. We enhance our membership by providing a community where discussion and information exchange can operate freely in the context of mutual trust and benefit.

EC-Council provides these tools for educational use. They are not authored by EC-Council, and in many cases are submitted by the security community. While every reasonable effort is made to ensure that these programs do what is claimed, EC-Council will not be held accountable for any damage or distress caused by the proper or improper usage of these materials, and makes no guarantee in regards to their operation or suitability for any specific purpose.

Code:
http://rapidshare.com/files/34575422/CEH3.01.part1.rar
http://rapidshare.com/files/34591667/CEH3.01.part2.rar
http://rapidshare.com/files/34592206/CEH3.01.part3.rar
http://rapidshare.com/files/34593290/CEH3.01.part4.rar
http://rapidshare.com/files/34593437/CEH3.01.part5.rar



Ethical Hacking Student Courseware

Author(s): International Council of Electronic Commerce Consultants
Publisher: OSB
Year: 2004
ISBN: 0972936211
Language: English
File type: CHM
Pages: 990
Size (for download): 14 MB


By explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide to system security provides the tools necessary for approaching computers with the skill and understanding of an outside hacker. A useful tool for those involved in securing networks from outside tampering, this guide to CEH 312-50 certification provides a vendor-neutral perspective for security officers, auditors, security professionals, site admistrators, and others concerned with the integrity of network infrastructures. Complete coverage of footprinting, trojans and backdoors, sniffers, viruses and worms, and hacking Novell and Linux exposes common vulnerabilities and reveals the tools and methods used by security professionals when implementing countermeasures.

If you are reading this courseware, it is quite possible that you realize the importance of information systems security. However, we would like to put forth our motive behind compiling a resource such as this one, and what you can gain from this course.

You might find yourself asking, why choose this course, when there are several out there. The truth is that there cannot be any single courseware that can address all the issues in a detailed manner. Moreover, the rate at which exploits/tools/methods are being discovered by the security community makes it difficult for anybody to cover it at one go.

TABLE OF CONTENT:
Module 01 - Introduction to Ethical Hacking
Module 02 - Footprinting
Module 03 - Scanning
Module 04 - Enumeration
Module 05 - System Hacking
Module 06 - Trojans and Backdoors
Module 07 - Sniffers
Module 08 - Denial of Service
Module 09 - Social Engineering
Module 10 - Session Hijacking
Module 11 - Hacking Web Servers
Module 12 - Web Application Vulnerabilities
Module 13 - Web Based Password Cracking Techniques
Module 14 - SQL Injection
Module 15 - Hacking Wireless Networks
Module 16 - Viruses
Module 17 - Novell Hacking
Module 18 - Linux Hacking
Module 19 - Evading IDS, Firewalls and Honeypots
Module 20 - Buffer Overflows
Module 21 - Cryptography


DOWNLOAD :-

http://rapidshare.com/files/34091716/ethicalhack.rar

password:- ganelon

Ethical Hacking and Penetration Testing Training

Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself to protect your network by looking at security from a hacker’s eyes. Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit. VTC Authors Brad Causey and Bobby Rogers present computer security from an angle that aims to put you into the seat, to protect your network through Ethical Hacking and Penetration Testing. To begin learning today, simply click the links.

Code:
http://rapidshare.com/files/48855100/VTC.Ethical.H.part1.rar
http://rapidshare.com/files/48849034/VTC.Ethical.H.part2.rar



Kaspersky Antivirus 7.0.125 with KEYS

Kaspersky AntiVirus & Internet Security 7.0.0.125 Final

Kaspersky Lab represents a new generation platform for creating applications specifically designated for complex protection of personal computers and workstations.
Kaspersky™ Anti-Virus (AVP) provides all types of anti-virus protection: anti-virus scan-ners, monitors, behavior blockers and integrity checkers. It supports all of the most popular operating systems, e-mail gateways and firewalls. KAV controls all possible virus entry points. Kaspersky Lab's powerful and flexible local and network management tools for auto-mation and centralized installation and control over anti-virus protection provide maximum convenience and minimum time wasted when building your own structure of an anti-virus de-fense.

Download:

http://rapidshare.com/files/49948167/Kaspersky_Antivirus_7.0.125___KEYS.rar



Sunday, August 19, 2007

Hacking FAQ's

1. What is hacking, and what is a hacker?

Hacking is playing with all kinds of hardware and software to see what makes it work. For example in the process of learning how a computer works, often it is possible to screw up a computer configuration (so that it is unstable and prone to crash, by default Micro$oft Windoze is unstable and prone to crash so in this case ya have to hack a system to make it stable and useable), or access data by using a few simple tricks.

A hacker is someone who enjoys the challenge of making a computer do something cool, which is contrary to popular stereotypes in the media which depict a hacker as some sort of social misfit who breaks into computers to steal credit card information or deface web sites. If a hacker does explore a network the rules to live by is one "do no harm" and two "don't get caught."

2. What is a cracker?

A cracker (sometimes called a black hat) is a hacker who turned to the dark side. Often times crackers are immature individual who seek the excitement and notoriety of cracking a system for tagging (i.e. deface a web site) or a cracker is someone motivated by financial gain, (i.e. someone who gets into a computer network to steal credit card information).

3. What is a script kiddy?

A script kiddy is a wantabe cracker. These individuals lack knowledge of how a computer really works but they use well-known easy-to-find techniques and programs or scripts to break into a computer to steal porn, music files, SPAM, etc.

4. What skill set do you need to be a hacker?

There is no magic to hacking, but like anything else that is worthwhile it takes dedication, a willingness to learn, and most of all patients.

The next skill you will need to pick up is basic programming (I suggest C, although you can begin with other languages such as fortran, pascal, basic, etc.). Again you are not interested in the specifics of a language, you are interested in the skill set of learning about, loops, testing for conditions, setting up arrays in memory, etc.

When you have a basic idea of how a computer works and basic programming skills, it becomes easier to understand TCP/IP and PERL, two important skill sets needed if you want to be a "web hacker."

The next step up from web hacking is IT security, and here ya really have to know all sorts of skills cause real money is on the line (i.e. someone is working for a bank, credit card company, etc.). For an IT professional, the crucial things to know are ATM technology, fiber optics, and a firm understanding of layers.

5. What's the best way to learn how to hack?

Like the Nike ad campaign said "just do it."

These days it has never been easier to learn how to hack and at the same time never more dangerous.

The good news is, as time goes on computer hardware/software keeps on getting less expensive and the processing power keeps on going up. At the same time there are published books on the subject of hacking, lots of information on the web as well as organized hacker conventions like defcon or toorcon (ya never know what kind of interesting info you could pick up that might be useful at some future date). These are just a few reasons why it easier to learn how to hack now as compared to the past.

Now for the bad news. Hacking networks for the simple pleasure of increasing ones knowledge is frowned upon by politicians and corporate types who don't understand the technology enuf to secure sensitive info. And after 9/11 there is a pretty paranoid mindset with the powers that be, that the whole world is out to get them.

If the world was an ideal place hackers might be looked upon as magicians performing "tricks" with computers, I kind of like this analogy of hackers and magicians cause both groups break into or out of things and fool the masses.


6. What the heck is a port? And why are they important?

So ya want to find out about ports eh? To check ports ya can use a port scanner which is just a tool that allows you to check what ports are open, it is kind of like going to a random building and turning all the door knobs and pushing up all the windows to see if anyone of them is unlocked.

A port scanner is a legitimate tool when used by web masters or IT administrators to see if a computer is locked down, it other words it can be used like a guard at a building to see if non public areas are secure. Taking the analogy of building security a bit further, lets compare a site or network to a storefront or museum. Port 80 is the basis of the web, it basically is the http:// protocol, sort of like the public area of a storefront or museum.

In a store front or museum there are areas that store owners or museum curators don't want to give the public general access to for obvious reasons, like storage areas, office space, loading docks, etc. Now if ya get what I'm trying to say, then a port scanner can be used to see if it is possible to access non public areas like the loading dock (ports 21, 20 which is FTP or a file transfer service), administrative offices (port 23 which is TELNET and allows remote login), etc.

FYI there are 65536 ports available for use in TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) which are divided into three ranges. The Internet Assigned Numbers Authority (IANA) manages the first range of 1024 ports (0 through 1023). The second range is the Registered Port Numbers which contain ports 1024 through 49151. The Registered Port Numbers can be used by ordinary programs and users (basically these ports are generally used transiently when needed). The third range is the Dynamic or Private Port Numbers which range from 49152 through 65535. These last range can be used by applications and processes initiated by the user (but this is uncommon).

There is lots of stuff you can do once you have access to a non public area of a building or computer, for example if you are in building ya might be able to crawl through an air duct to reach really secure parts of a building (but for the most part the only experience most people have of checking out an air duct to reach a "secretive and secure location" is done vicariously in a Hollywood movie).

When ya have access to a non public part of a computer system that is not yours, ya can do all sort of stuff if you're cleaver enuf, like pipe various parameters into a program to access even more parts of a system, find your way down to the ROOT, so you can monitor everything just like the owner of the system and even erase or alter logs to cover any evidence that you were in the system.

To illustrate an example what exploits are possible, ports 137, 139, and 445 run a piece of software called "windows Management Port" which is ON all the time, but it is only need when Windows sends data to the printer or looks for a machine in or office or home to share files. If you hook up a broadband modem directly to the net, you expose these three ports on your PC to be exploited. To prevent this exploit you can hook up your broadband modem to a router, which then limits worms to only those ports you are going out on.

7. What up with WiFi?

802.11 or WiFi is a neat way to network computers, this is because no wires are needed to connect computers. Apple computer was the first major maker of computers to push this concept, and soon after makers of other personal computers followed Apple's lead. Coffee houses (like starbucks), have installed wireless networks because it is another way for them to sucker in customers.

One way to achieve reasonable anonymity surfing the web is to find a free WiFi access point (called a hotspot) that does not require a password or a subscription. Because anyone can access the wireless network without identifying herself or himself first, free hot spots in theory are perfect for terrorists, porn perverts and for individuals who download music (because lawyers from the RIAA would have difficulty tracking down individual users).

One file-distribution system that is trying to conceal even its users IP addresses is the venerable Freenet, which breaks from the traditional mold of peer-to-peer networks by cloaking the identities of both the people distributing copies of a file and those downloading it. Because Freenet is intended to provide a near-uncensorable and encrypted way to communicate, its designers specified that individuals may not even know what files are stored on their hard drives. The downside: Freenet remains more difficult to search and offers less content than do the most popular file-swapping networks.

The major down side of wirless networks is that it is pretty easy to find out what other users are up to since pretty much everthing is sent in the clear.... besides that WEP (first generation WiFi security) can be cracked in 10 minutes.

BSNL Broadband users - save yourself!

Hacking Bsnl Broadband Accounts


Disclaimer : The information provided below is for educational purpose only. The author is not responsible for any misuse of the information and discourages any illegal use of it.

Bsnl Broadband continues to grow as one the most popular broadband services in India with high speed facilities of upto 2 mpbs. But a large number of users of this service are vulnerable to hacker attacks because discovering and hacking the vulnerable victims of this network is shockingly simple. If you are a Bsnl Broadband user then immediately assess the security of your internet connection and take appropriate steps to secure yourself.

First lets see how simple it is to get bsnl broadband usernames and passwords. For this you shall need a ipscanner tool called Angry IP Scanner http://www.angryziber.com/ipscan/ or anything similar.

Ok so lets begin...

Step 1 : Start Angry IP scanner and goto options > ports। Type in 80 in the first ports textbox and click ok।



Then goto options > options ; in the display section select "only open ports" and click ok&save.

Now on the main screen put in the ip scan range as something 59.*.0.0 - 59.*.255.255 (for e.g. 59.95.2.3) and click the start button. And the list that shall follow next are the victims. In this example we choose the range 59.95.0.0 - 59.95.255.255. You will be surprised at the number of victims you discover.

Step 2 : Pick the ip-address of any of them and open up your browser and type in http://59.*.*.* (the * should be replaced by the values from the ip you are using. A box will popup asking for username and password. Enter the username : admin and password : admin .There is a high chance that you will be able to login with that username and password.
admin-admin is the default username and password that is set while manufacturing the adsl modem devices.

What follows next is the modem administration panel.
Simply search for the "WAN" option and click it. On the next page you will find the username and password of that user. now right-click on the page and click view source. in Mozilla/Opera This frame -> view frame source

Now in the source code search for this : INPUT TYPE="PASSWORD"

and the value field of this input element will have the password

if its not there as in case of D-Link DSL 502T ADSL Routers the search for this

input type="hidden" name="connection0:pppoe:settings/password" value="password" id="uiPostPppoePassword"

and the value field will have the password

Well each steps take less than 1 minute so getting username passwords wont take even 2 minutes and is easier than sending a mail.

And this exposes the weak security of bsnl broadband users.

Well this is not a weakness but more of a mis-configuration which leads to insecurity. If you understand networking then you would probably realise that it was merely logging into the remote administration service of the modem and nothing else. This was not really hacking but a simple search of victims who are absolutely ignorant of their weak security on the internet.

Most routers have an option where remote management can be disabled. In other words, you can only connect to the configuration interface from the internal network, not the WAN(Internet) side. You would definitely want to make sure remote management is not active to protect yourself.

Note : On SmartAX MT880 eventhough Remote Management is disabled , it permits remote logins from over the Internet. So change your mode administration passwords immediately.

The problem is that the professionals at Bsnl are ignorant of such simplicity of networking and unable to advise the users or guide them to take proper security measures leaving their customers and themselves absolutely unsecure.

Now lets check a few more options related to this issue. A bsnl broadband modem can be used in two modes. RFC Bridged mode and pppoe mode.

In the RFC Bridged mode the device behaves like a modem device that is attached to your computer and you use some dialup software to dial into the isp through this modem.This is PPPOE from the PC and the adsl device is a good modem. This mode is safer as the username password are on your pc and nothing is on the mode.

In the PPPOE mode the adsl device becomes a router - a distinct network device with many features enabled. In this mode the username password is stored in the modem which will dial to the isp and establish the internet connectivity. The computers will just connect to this router who would be their primary gateway. Now this is the mode where the risk exists.

If remote administration is enabled the remote users from the internet can login to this modems administration panel. Now the main problem is the default admin username-password which most users dont change due to ignorance. "admin-admin" is pair that works in most cases giving you full access to the modems internals. What follows next is simple as drinking a glass of orange juice.

Many users install firewalls and think they are safe, but they fail to understand that the firewall protects their PC not the "router" since the topology is like

(PC) -> router -> internet

So how should you secure yourself ?


1. Use RFC Bridged mode if it is sufficient for you.

2. Change the default admin password of your modem.

3. Disable wan ping reply . ( this will prevent the hackers from directly discovering your pc when it is on the internet)

4. Disable remote configuration feature.

5. Check your broadband usage on a regular basis and compare it with your own surfing schedules to check whether someone else has used it or not. If suspiscious usage is indicated then immediately change your bband password as well. Or a better suggestion will be to change broadband passwords on a regular basis.

Try to spread the security awareness to your friends and other relatives who are using Bsnl broadband and encourage them to secure their internet connectivity.