Skip to main content

Posts

Showing posts from October, 2011

Steve Jobs got the last laugh everytime

Steve Jobs got the last laugh everytime Steve Jobs in an interview with All Things D. After  Steve Jobs  anointed  Walter Isaacson  as his authorized biographer in 2009, he took Isaacson to see the Mountain View, California, house in which he had lived as a boy. He pointed out its "clean design" and "awesome little features." He praised the developer, Joseph Eichler, who built more than 11,000 homes in California subdivisions, for making an affordable product on a mass-market scale. And he showed Isaacson the stockade fence built 50 years earlier by his father, Paul Jobs. "He loved doing things right," Jobs said. "He even cared about the look of the parts you couldn't see." Jobs, the brilliant and protean creator whose inventions so utterly transformed the allure of technology, turned those childhood lessons into an all-purpose theory of intelligent design. He gave Isaacson a chance to play by the sam

EMail Hacking

-: EMail Hacking :- All email communications on the internet are possible by two protocols: 1)  Simple Mail Transfer Protocol (SMTP port-25) 2)  Post Office Protocol (POP port-110) E-Mail hacking consists of various techniques as discussed below. 1) EMail Tracing :-  Generally, the path taken by an email while travelling from sender to receiver can be explained by following diagram. The most effective and easiest way to trace an email is to analyze it's email headers. This can be done by just viewing the full header of received email. A typical email header looks something like this: From Barr Thu Jan 3 05:33:26 2008 X-Apparently-To: prasannasherekar@yahoo.co.in via 203.104.16.34; Thu, 03 Jan 2008 05:25:38 +0530 X-YahooFilteredBulk: 189.160.34.89 X-Originating-IP: [189.160.34.89] Return-Path: Authentication-Results: mta113.mail.in.yahoo.com from=destatis.de; domainkeys=neutral (no sig) Received: from 189.160.34.89 (HELO dsl-189-160-34-89.prod-infinitum.com.mx) (18

Password Hacking

-: Password Hacking :- Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Most passwords can be cracked by using following techniques : 1) Hashing :-  Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password. If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords. One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length. LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately. Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly. 2) Guess

Network Hacking

-: Network Hacking :- Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc. It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools. Ping :-  Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not. To ping a particular host the syntax is (at command prompt)-- c:/>ping hostname.com example:- c:/>ping www.google.com Various attributes used with 'Ping' command and their usage can be viewed by just typing  c:/>ping  at the command prompt. Netstat :-  It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc. It's syntax is (at command prompt)-- c:/>netstat -n Telnet :-  Telnet is a program which runs on TCP/IP. Using it we can connect to

Encryption Tools :-

Encryption Tools  :-   GnuPG / PGP :-  Secure your files and communication with the advanced encryption. PGP is the famous encryption program by Phil Zimmerman which helps secure your data from eavesdroppers and other risks. GnuPG is a very well-regarded open source implementation of the PGP standard (the actual executable is named gpg). While GnuPG is always free, PGP costs money for some uses. http://www.gnupg.org/ http://www.pgp.com/ OpenSSL :-  The premier SSL/TLS encryption library. The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and open source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation. http://www.openssl.org/ Tor :-  An ano

Packet Sniffers :-

Packet Sniffers  :- Ethereal :-  This (also known as Wireshark) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. Home:-   http://www.wireshark.org Latest Release:-   Wireshark 1.0.4 (Ethereal) Download:-   http://www.wireshark.org/download.html Kismet :-  A powerful wireless sniffer. Kismet is a console based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing, and can even decloak hidden networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DH

Vulnerability Scanners :-

Vulnerability Scanners  :- Nessus :-  Premier UNIX vulnerability assessment tool Nessus is the best free network vulnerability scanner available, and the best to run on UNIX at any price. It is constantly updated, with more than 11,000 plugins for the free (but registration and EULA-acceptance required) feed. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones. Home:-   http://www.nessus.org Latest Release:-   Nessus 4 Download:-   http://www.nessus.org/download/ GFI LANguard :-  A commercial network security scanner for Windows GFI LANguard scans IP networks to detect what machines are running. Then it tries to discern the host OS and what applications are running. I also tries to collect Windows machine's service pack level, missing security patches, wireless access points, USB devices, open shares

Password Crackers :-

Password Crackers  :- Cain and Abel :-  The top password recovery tool for Windows. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. Home:-   http://www.oxid.it Latest Release:-   cain & abel v4.9.40 Download:-   http://www.oxid.it/cain.html John the Ripper :-  A powerful, flexible, and fast multi-platform password hash cracker. John the Ripper is a fast password cracker, currently available for many flavors of Unix, DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several o

Port Scanners :-

Port Scanners  :- Nmap :-  This tool developed by Fyodor is one of the best unix and windows based port scanners. This advanced port scanner has a number of useful arguments that gives user a lot of control over the process. Home:-   http://www.insecure.org Latest Release:-   Nmap 5.50 Download:-   http://nmap.org/download.html Superscan :-  A Windows-only port scanner, pinger, and resolver SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois. Home:-   http://www.foundstone.com Latest Release:-   SuperScan v4.0 Download:- http://www.foundstone.com/us/resources/proddesc/superscan4.htm Angry IP Scanner :-  A fast windows IP scanner and port scanner. Angry IP Scanner can perform basic host discovery and port scans on Windows. Its binary file size is very small compared to other scanners and other pieces of information about the target hosts can be exte

The technology behind Google's great results

The technology behind Google's great results As a Google user, you're familiar with the speed and accuracy of a Google search. How exactly does Google manage to find the right results for every query as quickly as it does? The heart of Google's search technology is PigeonRank™, a system for ranking web pages developed by Google founders  Larry Page  and  Sergey Brin  at Stanford University. Building upon the breakthrough work of  B. F. Skinner , Page and Brin reasoned that low cost pigeon clusters (PCs) could be used to compute the relative value of web pages faster than human editors or machine-based algorithms. And while Google has dozens of engineers working to improve every aspect of our service on a daily basis, PigeonRank continues to provide the basis for all of our web search tools. Why Google's patented PigeonRank™ works so well PigeonRank's success relies primarily on the superior trainability of the domestic pigeon (Columba livia) and its uniqu

What is Wikileaks ?

About Donate Archives 2006-2010 Editorials 2011-09-22    Julian Assange: Statement on the Unauthorised, Secret Publishing of the Julian Assange “autobiography” by Canongate 2011-09-19    WikiLeaks Launches the First of Four Fundraising Auctions 2011-08-24    US espionage investigation against WikiLeaks: PATRIOT Act order unsealed 2011-06-15    In Conversation with Julian Assange Part II 2011-05-24    "WikiSecrets" Julian Assange Full Interview Footage 2011-05-23    In Conversation with Julian Assange Part I   What is Wikileaks ? About WikiLeaks is a not-for-profit media organisation. Our goal is to bring important news and information to the public. We provide an innovative, secure and anonymous way for sources to leak information to our journalists (our electronic drop box). One of our most important activities is to publish original source material alongside our news stories so readers and historians alike can see evidence of the