<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-348393730651506269</atom:id><lastBuildDate>Wed, 06 Nov 2024 03:10:56 +0000</lastBuildDate><category>linux</category><category>Ubuntu</category><category>backtrack</category><category>MacOSX</category><category>Tools</category><category>WIFI</category><category>Windows</category><category>Password</category><category>EN</category><category>OS</category><category>Dos</category><category>HotSpot</category><category>IP</category><category>cracking</category><category>Nmap</category><category>Sql injection</category><category>hacking</category><category>Hacking tools</category><category>Multiboot Usb</category><category>Terminal</category><category>Tutorial</category><category>Tutorial Cracking</category><category>WEP</category><category>Ddos</category><category>Games</category><category>Hack</category><category>Hacking Tutorials</category><category>Live Linux USB Creator</category><category>Multiboot ISO</category><category>Multiboot Live USB</category><category>Netstat</category><category>Tool</category><category>Tutorials</category><category>USB</category><category>laptop</category><category>live linux usb</category><category>rfi</category><category>wireless</category><category>Bash</category><category>Browser</category><category>Encryption</category><category>Facebook</category><category>How-to</category><category>Installation</category><category>Kernel</category><category>Lfi</category><category>Metasploit</category><category>Multiboot USB Creator</category><category>Ports</category><category>Python</category><category>Rpm</category><category>Scurity</category><category>Software</category><category>Tutorial Backtrack</category><category>Tutorial Hacking</category><category>USB Creator Tools  Boot Multiple ISOs from Flash Drive</category><category>Video</category><category>Wardriving</category><category>Windows XP ToolBox</category><category>brute force password cracking</category><category>brute forcer</category><category>ipconfig</category><category>live cd</category><category>live usb</category><category>mozilla</category><category>network Scanning</category><category>password cracking tool</category><category>security</category><category>ARP Spoofing</category><category>AWLG</category><category>Acer</category><category>Admin Finder</category><category>Admin Login</category><category>AirCrack For WPA</category><category>Android</category><category>Asus</category><category>Attack</category><category>Auditing Tool</category><category>Backbox</category><category>Backtrack menu on ubuntu</category><category>Basic Remote File Inclusion</category><category>Beginner</category><category>Blackbuntu</category><category>Blackhat Edition</category><category>Boot Multiple ISOs from Flash Drive</category><category>Bot Net</category><category>Breaking News</category><category>CMD</category><category>CSRF vulnerability</category><category>Cansina</category><category>Change mac address in backtrack5</category><category>Chrome</category><category>Chrome Password Dump</category><category>Command</category><category>Computer</category><category>Conficker</category><category>Consol</category><category>Crack wep key</category><category>Cross Site Request Forger</category><category>Desktop</category><category>Directory structure</category><category>Discovery</category><category>Discovery Application</category><category>DockShelf MacOSX</category><category>Dork Scanner</category><category>Dorks List 2013</category><category>Event</category><category>FTP</category><category>Fedora core</category><category>Fedora core.linux</category><category>Firewal</category><category>Flash drive installs using Linux</category><category>Flock</category><category>Frozen Bubble</category><category>Fuzzer</category><category>GeexBox</category><category>Google</category><category>Google Chrome Browser</category><category>Google hacking</category><category>HITBSecConf2009</category><category>HTSHELLS</category><category>Hacking News</category><category>Hardening</category><category>Hexjector</category><category>Hijacking</category><category>Hijacking with android apps</category><category>Home</category><category>INSSIDER</category><category>INTERNET</category><category>Inguma</category><category>Injecting</category><category>Injection</category><category>Internet setting</category><category>Kismet</category><category>Lynis</category><category>Mac</category><category>Mandrake</category><category>Mandriva</category><category>Mapping</category><category>Media player</category><category>Multiboot</category><category>Multisystem USB</category><category>My dad</category><category>My hero</category><category>NGO</category><category>Netcut</category><category>Network Toolkit</category><category>Open</category><category>Operating System</category><category>Password Recovery</category><category>Password Remover</category><category>Password generator</category><category>Pendrive</category><category>Penetration</category><category>Phising</category><category>Pro Presenter MacOsX</category><category>Proxy</category><category>Recent Documents</category><category>Remote Pc</category><category>SQLi</category><category>Scan</category><category>Scanner</category><category>Shell</category><category>Slackware</category><category>Social Engineer</category><category>Software Razor SQL</category><category>Source code</category><category>Sql</category><category>Sqlmap</category><category>Subnet</category><category>Suse</category><category>TCP</category><category>Tools Cracker</category><category>Tools ddos</category><category>Triks</category><category>Trojan</category><category>Tutorial Aircrack-ng for windows</category><category>Tutorial Change Mac Address BackTrack5</category><category>Tutorial Cpanel</category><category>Tutorial Hack Websites Using Hajiv</category><category>Tutorial Upload Shell Jpg</category><category>UDP</category><category>USB Creator Tools</category><category>Ubuntu 11.10</category><category>Ubuntu Mint</category><category>Unix</category><category>Update nmap</category><category>Video Aircrack-ng</category><category>Video Cracker Wifi</category><category>Video Hacking</category><category>Vidoe Hackig</category><category>Virtualbox</category><category>Visual basic</category><category>Volume</category><category>Vulnerability</category><category>Vulnerability Scanner</category><category>Vulnerability Web</category><category>WAppEx</category><category>WPA</category><category>WPA2</category><category>Wallpaper</category><category>War Driving</category><category>Warcarrier</category><category>Warchalking</category><category>Web Application Vulnerability</category><category>Website</category><category>WiFi Password Remover</category><category>Wifi Cracking</category><category>Windows scurity</category><category>WineX</category><category>WireShark Sniffer</category><category>Wireshark</category><category>Wordlist</category><category>Workspace</category><category>XBOOT</category><category>Yumi</category><category>Zombie Computer</category><category>ads on</category><category>application</category><category>bypass</category><category>bypass Phone and sms Verification</category><category>c99</category><category>captha</category><category>cintruder</category><category>compiz</category><category>cryptography</category><category>detection</category><category>global warming</category><category>hacking wifi</category><category>htaccess</category><category>invisible</category><category>joomscan</category><category>menu</category><category>papa</category><category>pentest</category><category>php shells</category><category>portable</category><category>remote</category><category>security distro</category><category>sniffer</category><category>ubuntu 9.04</category><category>uploading shell</category><category>virus</category><category>web shells</category><category>websploit</category><category>zANTI</category><title>FOG FLAMES</title><description>GREEN COMPUTER and Think About Your Earth NoW!...</description><link>http://fogflames.blogspot.com/</link><managingEditor>noreply@blogger.com (fog flames)</managingEditor><generator>Blogger</generator><openSearch:totalResults>196</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-6509939991495524306</guid><pubDate>Wed, 25 Dec 2013 10:21:00 +0000</pubDate><atom:updated>2013-12-25T17:21:01.426+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking Tutorials</category><category domain="http://www.blogger.com/atom/ns#">hacking wifi</category><title>How to Hack a Wi-Fi Password | Crack Wi-Fi Passwords Easily</title><description>Hi Guys, I am back with another amazing hacking tutorial. I hope you are learning well from my other posts. In this post I will be teaching you How to Hack a Wi-Fi password. The following post will teach you how to crack wifi passwords easily in minutes.We strictly advise our readers to follow the tricks and tutorials presented at How to Hack at their own risk. We are sharing this knowledge for educational purpose only, well most of it! Blah Blah blah.Phew! Done with the formalities, now let us start with the Wi-FI cracking. But before starting the tutorial let me give you a small introduction to what Wi-Fi hacking is and what are the security protocols associated with it.In a secured wireless connected the data on internet is sent via encrypted packets. These packets are secured with network keys.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;There are basically 2 types of security keys : &lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
WEP( Wireless Encryption Protocol) : This is the most basic form of encryption. This has become an unsafe option as it is vulnerable and can be cracked with relative ease. Although this is the case many people still use this encryption.WPA( Wi-FI Protected Access) : This is the most secure wireless encryption. Cracking of such network requires use of a wordlist with common passwords. This is sort of brute force attack. This is virtually uncrackable if the network is secured with a strong password.So lets begin the actual Wifi Hacking tutorial!&lt;br /&gt;
&lt;br /&gt;&lt;u&gt;&lt;b&gt;In order to crack wi-fi password, you require the following things :&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
1.A Desktop or Laptop having a Wireless Adapter&lt;br /&gt;
2.Backtrack Live DVD : This DVD is used to boot into backtrack OS, Backtrack OS is a hacking OS and will be used in my further hacking tutorials that is why I am asking to download it. It can be downloaded at : Download Backtrack to hack wifi Passwords&lt;br /&gt;
3.Brain! ( The most important part)&lt;br /&gt;
These are the things you require now let us proceed with the steps to crack wifi passwords easily.&lt;br /&gt;
&lt;br /&gt;
1.Download the Backtrack OS ISO image and burn it to a DVD. Boot from that DVD ( Insert that DVD into CD-ROM and restart your PC.) You will see backtrack starting. Choose “Backtrack Default text version”. After that it will start executing some commands. Wait till you see something like in the following screenshot :&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjK4a-4QljWNQR6Drsm4hEZD21sz8_yTftHPUsR6JE2PCx1pE5Vr7OJCDCyXbG-jYGb8WAXe8lLqYtJx2pmZZt3xxGRr6_DS1dpjFIGN3OuHSEQEETZejO7RNYntU50dbdxCamXrDvx9VgH/s1600/666.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;249&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjK4a-4QljWNQR6Drsm4hEZD21sz8_yTftHPUsR6JE2PCx1pE5Vr7OJCDCyXbG-jYGb8WAXe8lLqYtJx2pmZZt3xxGRr6_DS1dpjFIGN3OuHSEQEETZejO7RNYntU50dbdxCamXrDvx9VgH/s320/666.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
You will see root@bt:’# , Type startx and hit enter.&lt;br /&gt;
The color of the screen will be different as the screenshot is of the earlier version of backtrack. You will get a red-black screen of backtrack. Wait for few minutes, after it is done, you will get a desktop like version of backtrack. &lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDGBBl7M5XDQXJlDbTUetKDVc6hmdIUz4NWL8O_jUG9MwLbRee5IXHowBFR_i4ZyA5e9H7noVc3G5Cpwglfr2d_vjdM_sioGPSnSMxJInNv-YeDI8mLBrtp6GISzGmfeDJAXcgwXaNNUMd/s1600/sss.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;139&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDGBBl7M5XDQXJlDbTUetKDVc6hmdIUz4NWL8O_jUG9MwLbRee5IXHowBFR_i4ZyA5e9H7noVc3G5Cpwglfr2d_vjdM_sioGPSnSMxJInNv-YeDI8mLBrtp6GISzGmfeDJAXcgwXaNNUMd/s320/sss.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Now Open the Konsole from the taskbar, Click on the icon against the dragon like icon in the taskbar in the above screenshot.You will have a Command Prompt like Shell. &lt;br /&gt;
&lt;br /&gt;2).Type airmon-ng and hit Enter. You will have a screen like this, note down the name of interface, in our case the the name is wlan0.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqYOwzCSMItGY-olBKZMfpI84BqHRJ22nX4oR4Kuzt9VV1JRc9UFYIHkWKrilkQyMBfSu8GWhA7auJ2Eg2KdXhPB99CXlWGCZ0hmAPXAiXdVIAGVav0FidH5EerJGwq8I6QeKJQ_4vDdDE/s1600/2013-12-25_170852.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;154&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqYOwzCSMItGY-olBKZMfpI84BqHRJ22nX4oR4Kuzt9VV1JRc9UFYIHkWKrilkQyMBfSu8GWhA7auJ2Eg2KdXhPB99CXlWGCZ0hmAPXAiXdVIAGVav0FidH5EerJGwq8I6QeKJQ_4vDdDE/s320/2013-12-25_170852.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
3.Now type ifconfig wlan0 down and hit enter.&lt;br /&gt;This command will disable your wireless adapter, we are doing this in order to change your MAC address.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;3.Now type ifconfig wlan0 hw ether 00:11:22:33:44:55 and hit enter.&lt;br /&gt;This command will change your MAC address to 00:11:22:33:44:55 in order to hide your identity.&lt;br /&gt;
&lt;br /&gt;
4.Now type airmon-ng start wlan0 and hit enter.&lt;br /&gt;This will start the network adapter in monitor mode. Note down the new interface name, it could be eth0&amp;nbsp; or mon0 or something like that. &lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAx7e8MxqGlYnH5x5U6ysS07BtK6XdQoNF4-cc9A7kJllcKJtRmDsozggvGxviqwELOO_OkyTmHqg3evG3BporZKuuu3qu6l_q0tbKEEDX53BVRRGKHC37dnD84p7wI4Xrh29X7uYVrux8/s1600/2013-12-25_171100.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;233&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAx7e8MxqGlYnH5x5U6ysS07BtK6XdQoNF4-cc9A7kJllcKJtRmDsozggvGxviqwELOO_OkyTmHqg3evG3BporZKuuu3qu6l_q0tbKEEDX53BVRRGKHC37dnD84p7wI4Xrh29X7uYVrux8/s320/2013-12-25_171100.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
The above command has started our network adapter in monitor mode as &lt;strong&gt;mon0,&amp;nbsp;&lt;/strong&gt; note down this name.&lt;br /&gt;
&lt;br /&gt;
5.After this type airmon-ng mon0 and hit enter&lt;br /&gt;Replace the mon0 with interface name you discovered in step 4. This command will show you the list of available networks. Press Ctrl+C to stop the airmon to search for more networds. Copy the BSSID of the wireless network which you want to hack. &lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihG1NNrqL2p4wjWUpOmZCDZRXkMrDEiriygHKWKWcHukpAkgBDz1AgIq0iEFdzYd-b9XKPKrvbQKARRMtEhiaeGBMdyeKAS1yyiL3jscA8IQMmebIZJ0qqwE6LaCoDsCp2P7AATW25pCMU/s1600/2013-12-25_171345.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;177&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihG1NNrqL2p4wjWUpOmZCDZRXkMrDEiriygHKWKWcHukpAkgBDz1AgIq0iEFdzYd-b9XKPKrvbQKARRMtEhiaeGBMdyeKAS1yyiL3jscA8IQMmebIZJ0qqwE6LaCoDsCp2P7AATW25pCMU/s320/2013-12-25_171345.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
In the above screenshot there is a list of available networks, Choose 1 network and note the BSSID andchannel of it.&lt;br /&gt;
&lt;br /&gt;
6.Type airodump-ng -c channelno –bssid BSSIDN1 mon0 -w filename and hit enter.&lt;br /&gt;Replace channelno and BSSIDN1 with the data from step 5. Replace the mon0 with network interface name from step 4. In place of filename write anyname and do remember that. Better use filename itself.&lt;br /&gt;This command will begin capturing the packets from the network.You need to capture more and more packets in order to crack the wifi password. This packet capturing is a slow process. &lt;br /&gt;
&lt;br /&gt;
7.To make the packet capturing faster, we will use another command. Open a new shell, don’t close the previous shell. In new shell type aireplay-ng -1 0 -a BSSIDN1 -h 00:11:22:33:44:55 mon0 and hit enter.&lt;br /&gt;Replace the BSSIDN1 with the data from step 5 and mon0 from step 4. This command will boost the data capturing process.The -1 tells the program the specific attack we wish to use which in this case is fake authentication with the access point. The 0 cites the delay between attacks, -a is the MAC address of the target access point, -h is your wireless adapters MAC address and the command ends with the your wireless adapters device name.&lt;br /&gt;
&lt;br /&gt;8.Now wait for few mins, let the DATA in the other console reach a count of 5000.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjctG4beSH8dInG20npYCydVfXQ0uVYJhkjoLk13ydD5qXXOSkyeCDaerweW1-UoQv15mNmG_H59-UTiQT8AZu7Vk2s7Af3au8JOsF25onPn7IH26Bl29HDG_HkKZ6EiGHF0NccliJpdBka/s1600/2013-12-25_171621.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;109&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjctG4beSH8dInG20npYCydVfXQ0uVYJhkjoLk13ydD5qXXOSkyeCDaerweW1-UoQv15mNmG_H59-UTiQT8AZu7Vk2s7Af3au8JOsF25onPn7IH26Bl29HDG_HkKZ6EiGHF0NccliJpdBka/s320/2013-12-25_171621.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
The data in above screenshot is 1, wait for that to reach 5000.&lt;br /&gt;
&lt;br /&gt;
9.After it reaches 5000, open another console and type aircrack-ng filename-01.cap and hit enter.&lt;br /&gt;Replace the filename with the name you used in step 6. Add -01.cap to it. .cap is the extension of file having captured data packets.After typing this command, aircrack will start trying to crack the Wi-FI password. If the encryption used is WEP, it will surely crack the password within few minutes. &lt;br /&gt;
&lt;br /&gt;
In case of WPA use the following command instead of the above aircrack-ng -w /pentest/wireless/aircrack-ng/test/password.lst -b BSSIDN1 filename-01.cap&lt;br /&gt;
&lt;br /&gt;
Replace BSSIDN1 and filename with data you used.&amp;nbsp;/pentest/wireless/aircrack-ng/test/password.lst is the address of a file having wordlist of popular passwords. In case of WPA aircrack will try to brute force the password. As I explained above that to crack WPA you need a file having passwords to crack the encryption. If you are lucky enough and the network owner is not smart enough, you will get the password.&lt;br /&gt;
&lt;br /&gt;
I hope that you will get what I have explained above, to make the 
explanation even more clear, I have made a sample video for you guys. I 
hope you will love this video :&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/CFUSwyNlPvs?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;
&amp;nbsp; &lt;br /&gt;
Well that is all for this Wi-Fi Cracking Tutorial. I hope now you will know how to hack a wifi password easily.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
</description><link>http://fogflames.blogspot.com/2013/12/how-to-hack-wi-fi-password-crack-wi-fi.html</link><author>noreply@blogger.com (fog flames)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjK4a-4QljWNQR6Drsm4hEZD21sz8_yTftHPUsR6JE2PCx1pE5Vr7OJCDCyXbG-jYGb8WAXe8lLqYtJx2pmZZt3xxGRr6_DS1dpjFIGN3OuHSEQEETZejO7RNYntU50dbdxCamXrDvx9VgH/s72-c/666.png" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-1235678349449541773</guid><pubDate>Wed, 25 Dec 2013 09:49:00 +0000</pubDate><atom:updated>2013-12-25T16:49:21.878+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Breaking News</category><category domain="http://www.blogger.com/atom/ns#">Cross Site Request Forger</category><category domain="http://www.blogger.com/atom/ns#">CSRF vulnerability</category><category domain="http://www.blogger.com/atom/ns#">Vulnerability</category><title>Namecheap CSRF Vulnerability could lead to DNS Hijacking </title><description>A Security researcher Henry Hoggard has discovered a cross site request forgery(CSRF) vulnerability in the Namecheap website that could lead attackers to hijack the DNS records.&lt;br /&gt;An attacker could have exploited this vulnerability and redirect the websites to fake website.&amp;nbsp; The attacker could also have managed to display defacement message.In his blog post, the researcher said the vulnerability could allowed hackers to redirect MX records and intercept email.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiO69tcfWvra0eV_DS9pekCS6WgeOn5SKCyy9al4RvagOZl9KVxHLe45aoRfFnf0ks1A3L4XQH5ybTgZBfsf7qnHetufEKBihMCVvsVAMqF_dMREiINpjGQDNIEgUnD3jdmlWPId3OKPJmk/s1600/2013-12-25_164436.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;202&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiO69tcfWvra0eV_DS9pekCS6WgeOn5SKCyy9al4RvagOZl9KVxHLe45aoRfFnf0ks1A3L4XQH5ybTgZBfsf7qnHetufEKBihMCVvsVAMqF_dMREiINpjGQDNIEgUnD3jdmlWPId3OKPJmk/s320/2013-12-25_164436.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
In an email sent to ThreatPost, the researcher said &quot;This would have impacted all customers, which I’m sure is a lot of high profile websites, as Namecheap is one of the most popular domain registrars&quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><link>http://fogflames.blogspot.com/2013/12/namecheap-csrf-vulnerability-could-lead.html</link><author>noreply@blogger.com (fog flames)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiO69tcfWvra0eV_DS9pekCS6WgeOn5SKCyy9al4RvagOZl9KVxHLe45aoRfFnf0ks1A3L4XQH5ybTgZBfsf7qnHetufEKBihMCVvsVAMqF_dMREiINpjGQDNIEgUnD3jdmlWPId3OKPJmk/s72-c/2013-12-25_164436.png" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-199198465962612937</guid><pubDate>Sat, 14 Dec 2013 08:12:00 +0000</pubDate><atom:updated>2013-12-14T15:12:44.520+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Flash drive installs using Linux</category><category domain="http://www.blogger.com/atom/ns#">live linux usb</category><category domain="http://www.blogger.com/atom/ns#">Live Linux USB Creator</category><category domain="http://www.blogger.com/atom/ns#">Multiboot</category><category domain="http://www.blogger.com/atom/ns#">Multiboot ISO</category><category domain="http://www.blogger.com/atom/ns#">Multiboot Live USB</category><category domain="http://www.blogger.com/atom/ns#">Multiboot Usb</category><category domain="http://www.blogger.com/atom/ns#">Multisystem USB</category><category domain="http://www.blogger.com/atom/ns#">USB Creator Tools  Boot Multiple ISOs from Flash Drive</category><title>MultiSystem – Create a MultiBoot USB from Linux</title><description>How to Create a MultiBoot USB Flash Drive from Linux: Multisystem is an awesome tool created by LiveUSB.info, that works similar to our Windows based MultiBootISOs USB creator, but was created for use within Linux. It also uses Grub2 instead of Grub Legacy, and can be run from within Ubuntu Linux to create a Custom Multiboot UFD containing your favorite Bootable Live Linux Distributions.&lt;br /&gt;
&lt;br /&gt;
Official HomePage: &lt;a href=&quot;http://liveusb.info/dotclear&quot;&gt;http://liveusb.info/dotclear&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Multisystem Prerequisites&lt;/strong&gt;:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Ubuntu Linux or Ubuntu Based System (can use an Ubuntu CD or USB)&lt;/li&gt;
&lt;li&gt;A USB Flash Drive (to use for your MultiBoot USB)&lt;/li&gt;
&lt;li&gt;Working Internet Connection&lt;/li&gt;
&lt;li&gt;install-depot-multiboot.sh.tar.bz2&lt;/li&gt;
&lt;/ul&gt;
&lt;strong&gt;How to Install the Multisystem LiveUSB Tool&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://liveusb.info/multisystem/install-depot-multisystem.sh.tar.bz2&quot;&gt;Download&lt;/a&gt; and Open the Script with Ubuntu&#39;s Archive Manager&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0yKBrl0HvSOM1n1oO3LpcdUqoAUrpzauEfW6-9GR3hTmqyTz1XGX9PpWrhq0UQ26Dhp7sVgmHQHJkMdB59GdTtQa5kEYbVnLWNhBPHJqe0H09HVESm5CMAMdSJxtNYQH7LXLWKG1VtdNU/s1600/2013-12-14_150512.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;210&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0yKBrl0HvSOM1n1oO3LpcdUqoAUrpzauEfW6-9GR3hTmqyTz1XGX9PpWrhq0UQ26Dhp7sVgmHQHJkMdB59GdTtQa5kEYbVnLWNhBPHJqe0H09HVESm5CMAMdSJxtNYQH7LXLWKG1VtdNU/s320/2013-12-14_150512.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
2.Extract the &lt;strong&gt;install-depot-multiboot.sh&lt;/strong&gt; Script to your Desktop&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0h2dCXP_8uJ54VfN6IZsc8OydBG1BjhCixMRmmJ8CWbm1K3sgwAqrPbufytZI5den6XYsnI4pDQ1OyECfMGwQpTsuk8zWXJpB1gbtBRTOia14u7JvqQSE0r5eAil9Qcoe-RxSy-plvYut/s1600/2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;261&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0h2dCXP_8uJ54VfN6IZsc8OydBG1BjhCixMRmmJ8CWbm1K3sgwAqrPbufytZI5den6XYsnI4pDQ1OyECfMGwQpTsuk8zWXJpB1gbtBRTOia14u7JvqQSE0r5eAil9Qcoe-RxSy-plvYut/s320/2.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdp2HzCGjV02FOd9w2N9-_yRSMKipc9QmP6gd7gJ_VH0B2ir2M1Kk6GHKemU3oll6RgA8dQiZ20jTiGY6yB7bxT_O1Ntx17j8oowCEuWIxL42hLxoAqhC_7ZhwH9SejljxuNd3NHwL_2F_/s1600/3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;290&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdp2HzCGjV02FOd9w2N9-_yRSMKipc9QmP6gd7gJ_VH0B2ir2M1Kk6GHKemU3oll6RgA8dQiZ20jTiGY6yB7bxT_O1Ntx17j8oowCEuWIxL42hLxoAqhC_7ZhwH9SejljxuNd3NHwL_2F_/s320/3.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.Double Click &lt;strong&gt;install-depot-multiboot.sh&lt;/strong&gt; from your desktop and select the option to &quot;&lt;strong&gt;Run in Terminal&lt;/strong&gt;&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;How to Use the Multisystem LiveUSB Tool&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Insert a USB Drive&lt;/li&gt;
&lt;li&gt;Launch the Script via &lt;strong&gt;Applications &amp;gt; Accessories &amp;gt; MultiBoot&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Select your &lt;b&gt;USB Device&lt;/b&gt; from the list and click &lt;b&gt;Validate&lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxhqM9Z0WoJTc0uA7lIuiBTMoIzGXGIbpNxkjbsawG4KiQL6PA2auL7d8JZNiBp0owXrxtKxshCG7SQI_cNs7ubJE0Evvn0hySUT19VIygYrLVMtwTAccVTKkA8pIE935ynuOTgb_tx_g_/s1600/4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;319&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxhqM9Z0WoJTc0uA7lIuiBTMoIzGXGIbpNxkjbsawG4KiQL6PA2auL7d8JZNiBp0owXrxtKxshCG7SQI_cNs7ubJE0Evvn0hySUT19VIygYrLVMtwTAccVTKkA8pIE935ynuOTgb_tx_g_/s320/4.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
4.Now simply Drag and Drop an ISO into the Window to add the Distribution (repeat the process to add more ISOs)&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq__bffjwfvRzoi_ZC8UUgt2vhYuskdD6LIq6q2wyOy8o5NACLvz8qm0dEkWNzGkbiNXkALwJt4Nsc2Z-0OniWXQhXYe-DjaglBvJY59j6IORsfdj84OsXcBHmQi8kKsXJHy0XkzohMDSL/s1600/5.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq__bffjwfvRzoi_ZC8UUgt2vhYuskdD6LIq6q2wyOy8o5NACLvz8qm0dEkWNzGkbiNXkALwJt4Nsc2Z-0OniWXQhXYe-DjaglBvJY59j6IORsfdj84OsXcBHmQi8kKsXJHy0XkzohMDSL/s320/5.jpg&quot; width=&quot;301&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
5.Once finished, restart your PC, set your boot menu to boot from the USB device, Select the Distro you want to Boot and enjoy!.&lt;br /&gt;
&lt;br /&gt;
</description><link>http://fogflames.blogspot.com/2013/12/multisystem-create-multiboot-usb-from.html</link><author>noreply@blogger.com (fog flames)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0yKBrl0HvSOM1n1oO3LpcdUqoAUrpzauEfW6-9GR3hTmqyTz1XGX9PpWrhq0UQ26Dhp7sVgmHQHJkMdB59GdTtQa5kEYbVnLWNhBPHJqe0H09HVESm5CMAMdSJxtNYQH7LXLWKG1VtdNU/s72-c/2013-12-14_150512.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-4742478850120084841</guid><pubDate>Sat, 14 Dec 2013 08:00:00 +0000</pubDate><atom:updated>2013-12-14T15:00:09.033+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">live linux usb</category><category domain="http://www.blogger.com/atom/ns#">Live Linux USB Creator</category><category domain="http://www.blogger.com/atom/ns#">live usb</category><category domain="http://www.blogger.com/atom/ns#">Multiboot ISO</category><category domain="http://www.blogger.com/atom/ns#">Multiboot Live USB</category><category domain="http://www.blogger.com/atom/ns#">Multiboot Usb</category><category domain="http://www.blogger.com/atom/ns#">Multiboot USB Creator</category><category domain="http://www.blogger.com/atom/ns#">USB Creator Tools  Boot Multiple ISOs from Flash Drive</category><title>SARDU – Multiboot USB Creator (Windows)</title><description>SARDU is another nice Windows based Multiboot USB Creator that can also be used to create Multiboot CD/DVD&#39;s. Created by Davide Costa, SARDU enables you to create a Multiboot UFD containing your basic essential Utilities, Antivirus, and Windows XP/7 Installers. On top of that, SARDU offers the built in ability to Defragment your USB Drive, and burn an ISO to CD/DVD.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;WARNING!&lt;/b&gt;&lt;/u&gt; I&#39;ve been informed that SARDU is now potentially packaged with Adware. As a result, I recommend avoiding this tool. Back in Jan 2011, when this post was originally written, SARDU was a good clean tool!.If you choose to use this program, first check it for viruses/trojans/malware using an online multiple scan utility such as &lt;a class=&quot;external&quot; href=&quot;https://www.virustotal.com/&quot; rel=&quot;nofollow&quot; target=&quot;&quot; title=&quot;Virus Total&quot;&gt;Virus Total&lt;/a&gt;.&lt;strong&gt;SARDU – Another Multiboot USB Creator for Windows&lt;/strong&gt;&lt;br /&gt;
Authors Website: &lt;a href=&quot;http://www.sarducd.it/&quot;&gt;http://www.sarducd.it&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Simple usage example to create a Multiboot USB:&lt;br /&gt;
&lt;br /&gt;1.Download Unzip and Run latest version of SARDU&lt;br /&gt;2.(1) Click the ISO Icon to select the folder containing your ISO&#39;s (2) Select your USB Drive (3) Click the USB Icon to Create the Multiboot USB&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS31eqdBG8ry6wZ27UUZ30MCak6LEMtl5gcfDhuY2qjDf1czemp3Bav10qmYv_m_E6if8QumgvjXzDzhZLs9iTry08sY8qa3d73RaDEQ6wpg2xTHidyppi-KsHXX8NJ7WMDy4XRvh67Q4N/s1600/1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS31eqdBG8ry6wZ27UUZ30MCak6LEMtl5gcfDhuY2qjDf1czemp3Bav10qmYv_m_E6if8QumgvjXzDzhZLs9iTry08sY8qa3d73RaDEQ6wpg2xTHidyppi-KsHXX8NJ7WMDy4XRvh67Q4N/s320/1.jpg&quot; width=&quot;306&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
3.Restart your PC,setting your BIOS or Boot Menu to boot from the Flash Drive. Proceed to boot from the USB and enjoy.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; </description><link>http://fogflames.blogspot.com/2013/12/sardu-multiboot-usb-creator-windows.html</link><author>noreply@blogger.com (fog flames)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS31eqdBG8ry6wZ27UUZ30MCak6LEMtl5gcfDhuY2qjDf1czemp3Bav10qmYv_m_E6if8QumgvjXzDzhZLs9iTry08sY8qa3d73RaDEQ6wpg2xTHidyppi-KsHXX8NJ7WMDy4XRvh67Q4N/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-3857511279059906371</guid><pubDate>Sat, 14 Dec 2013 07:52:00 +0000</pubDate><atom:updated>2013-12-14T14:52:18.243+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Boot Multiple ISOs from Flash Drive</category><category domain="http://www.blogger.com/atom/ns#">live linux usb</category><category domain="http://www.blogger.com/atom/ns#">Live Linux USB Creator</category><category domain="http://www.blogger.com/atom/ns#">live usb</category><category domain="http://www.blogger.com/atom/ns#">Multiboot ISO</category><category domain="http://www.blogger.com/atom/ns#">Multiboot Live USB</category><category domain="http://www.blogger.com/atom/ns#">Multiboot Usb</category><category domain="http://www.blogger.com/atom/ns#">Multiboot USB Creator</category><category domain="http://www.blogger.com/atom/ns#">USB Creator Tools</category><category domain="http://www.blogger.com/atom/ns#">XBOOT</category><title>XBOOT – Multiboot ISO USB Creator (Windows)</title><description>XBOOT is yet another neat little Multiboot ISO USB Creator. It is a Windows based application that can be used to create a Live Multiboot USB or even a Multiboot ISO file that can then be burnt to a CD/DVD. XBOOT supports many Linux Distributions and Utilities,and allows you to use your choice of a Grub or Syslinux bootloader.Also included is a built in QEMU emulator (enabling you to boot an ISO from within Windows).&lt;strong&gt;XBOOT – Multiboot ISO/USB Creator&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;Authors Website&lt;/strong&gt;: &lt;a class=&quot;external&quot; href=&quot;http://sites.google.com/site/shamurxboot/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;XBOOT - Official Site&quot;&gt;http://sites.google.com/site/shamurxboot/&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
Usage Example: Creating a Live Multiboot USB with XBOOT:&lt;br /&gt;
&lt;br /&gt;
1.&lt;a href=&quot;http://sites.google.com/site/shamurxboot/download&quot;&gt;Download&lt;/a&gt;, extract and run the latest version of XBOOT&lt;br /&gt;2.(1) Drag and drop some ISOs into the XBOOT window (2) Select Create USB &lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwnYfEhJU6ZgiM96C5R6iLrq1rRlDPuD8nNrmbp356YGa5Rf5HW7sd2Rw6EioQTrBjDOI0AZMP4djq2F-cWCI0pSNMe4QGl8L9MCD8nDWU5nm_l9fqUnYldVNOUvpHsPf-gv-fPLNSXyxZ/s1600/1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;255&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwnYfEhJU6ZgiM96C5R6iLrq1rRlDPuD8nNrmbp356YGa5Rf5HW7sd2Rw6EioQTrBjDOI0AZMP4djq2F-cWCI0pSNMe4QGl8L9MCD8nDWU5nm_l9fqUnYldVNOUvpHsPf-gv-fPLNSXyxZ/s320/1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
3.(3) Select your USB Drive from the Droplist (4) Select a Bootloader to use (5) Click OK to begin creation.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidTesNiizrvyDtAKcA-AtE65MbI-B3XGEVNbXBYk0jW8jZxhflLTU_tNThSCYO1MPTaUpzRmkLt1IybR7rd2bV8zKwueh9WRP6ovadypkkTuQcsf7GdbkfxjSUCU20MBLx7QslGqjltPBe/s1600/2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;196&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidTesNiizrvyDtAKcA-AtE65MbI-B3XGEVNbXBYk0jW8jZxhflLTU_tNThSCYO1MPTaUpzRmkLt1IybR7rd2bV8zKwueh9WRP6ovadypkkTuQcsf7GdbkfxjSUCU20MBLx7QslGqjltPBe/s320/2.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
A copy notification window appears to keep you informed of the progress.
 Once the process is complete, you should have a Bootable Multiboot USB 
Flash Drive with your ISO selections installed.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWQmM39uPS_mgHgqg5zBoZAuuBS93c3Aoku3nKYt661THzLcqQpa1iG3b6Q6g3m9KmqQx0juuNbhalOtzHB4E76P9CjB6GkgSTvhUzMvPqjcfjuDB59uZqHKFsCca-R1buhxsk5b2G3CIi/s1600/2013-12-14_145127.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;77&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWQmM39uPS_mgHgqg5zBoZAuuBS93c3Aoku3nKYt661THzLcqQpa1iG3b6Q6g3m9KmqQx0juuNbhalOtzHB4E76P9CjB6GkgSTvhUzMvPqjcfjuDB59uZqHKFsCca-R1buhxsk5b2G3CIi/s320/2013-12-14_145127.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://fogflames.blogspot.com/2013/12/xboot-multiboot-iso-usb-creator-windows.html</link><author>noreply@blogger.com (fog flames)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwnYfEhJU6ZgiM96C5R6iLrq1rRlDPuD8nNrmbp356YGa5Rf5HW7sd2Rw6EioQTrBjDOI0AZMP4djq2F-cWCI0pSNMe4QGl8L9MCD8nDWU5nm_l9fqUnYldVNOUvpHsPf-gv-fPLNSXyxZ/s72-c/1.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-1270834056797559880</guid><pubDate>Sun, 08 Dec 2013 08:40:00 +0000</pubDate><atom:updated>2013-12-08T15:40:35.156+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Chrome</category><category domain="http://www.blogger.com/atom/ns#">Chrome Password Dump</category><category domain="http://www.blogger.com/atom/ns#">EN</category><category domain="http://www.blogger.com/atom/ns#">Google Chrome Browser</category><category domain="http://www.blogger.com/atom/ns#">Password Recovery</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>[Chrome Password Dump] Command-line Tool to Recover Login Password from Google Chrome Browser </title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5yPT7HTIVHEps6jaogbEgXsfLyCFaI2F9w6V_9KGpg1cDRNv6fhlEdUtMjlhLJulQ1WQxrUEtuGEwwX64ksSgteQ4v6G2E9CpIRMr5ty3aa9-wdnxgMJoCbydTBLgr9O8gBXwoeoOZxLn/s1600/2013-12-08_153714.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;195&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5yPT7HTIVHEps6jaogbEgXsfLyCFaI2F9w6V_9KGpg1cDRNv6fhlEdUtMjlhLJulQ1WQxrUEtuGEwwX64ksSgteQ4v6G2E9CpIRMr5ty3aa9-wdnxgMJoCbydTBLgr9O8gBXwoeoOZxLn/s320/2013-12-08_153714.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;strong&gt;Chrome Password Dump&lt;/strong&gt; is the free command-line tool to quickly recover your lost web login passwords from Google Chrome browser.&lt;br /&gt;
&lt;br /&gt;
It &lt;strong&gt;automatically&lt;/strong&gt; detects the default Chrome profile for current user and recovers all the stored web login passwords.&lt;br /&gt;
&lt;br /&gt;
Alternatively you can also specify the &lt;strong&gt;custom profile path&lt;/strong&gt;
 in case your Chrome user profile is not in standard location. This is 
very useful in recovering the login passwords from other Chrome based 
browsers such as Chrome SXS/Canary, CoolNovo, Flock, Comodo Dragon etc.&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Command line interface makes it helpful for &lt;strong&gt;Penetration Testers&lt;/strong&gt; &amp;amp;  Forensic investigators.&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;a href=&quot;http://securityxploded.com/download.php#chromepassworddump&quot;&gt;Download Chrome Password Dump v1.0 &lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</description><link>http://fogflames.blogspot.com/2013/12/chrome-password-dump-command-line-tool.html</link><author>noreply@blogger.com (fog flames)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5yPT7HTIVHEps6jaogbEgXsfLyCFaI2F9w6V_9KGpg1cDRNv6fhlEdUtMjlhLJulQ1WQxrUEtuGEwwX64ksSgteQ4v6G2E9CpIRMr5ty3aa9-wdnxgMJoCbydTBLgr9O8gBXwoeoOZxLn/s72-c/2013-12-08_153714.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-2567289755923729845</guid><pubDate>Sun, 08 Dec 2013 08:33:00 +0000</pubDate><atom:updated>2013-12-08T15:33:06.789+07:00</atom:updated><title> +1000 Sql Vulnerable Sites</title><description>&lt;br /&gt;
&lt;div style=&quot;background-color: #444444; border-radius: 0em 0em 0em 1em; border: 2px solid rgb(0, 0, 0); color: white; height: auto; margin: 0px auto; overflow: hidden;&quot;&gt;
&lt;pre&gt;http://www.us.ute.com/product_info.php?id=45&#39;
http://www.avmaniacs.com/review.php?id=1335&#39;
http://www.planetbollywood.com/displ...=m091511034819&#39;
http://www.latintourdimensions.com/o...tail.php?id=86&#39;
http://hamiltoncityschools.com/item/?id=671&#39;
http://isectech.net/Forum/printthread.php?tid=578&#39;
http://www.2hgs.com/detail_humor.php?ID=27&#39;
http://www.2hgs.com/detail_humor.php?ID=42&#39;
http://www.nitro-helmets.com/product...category_id=83&#39;
http://www.tomkane.com/section.php?id=1&#39;
http://www.medix.com.hr/aboutbook.php?id=30&#39;
http://motdrb.com/tr/trainers.php?do...Trainer_ID=336&#39;&lt;/pre&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt; +1000 Sql Vulnerable Sites Klik &lt;a href=&quot;http://pastebin.com/raw.php?i=fWeMBqPU&quot;&gt;Here&lt;/a&gt;&lt;/b&gt;
&lt;/div&gt;
</description><link>http://fogflames.blogspot.com/2013/12/1000-sql-vulnerable-sites.html</link><author>noreply@blogger.com (fog flames)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-5160735132764016504</guid><pubDate>Sun, 08 Dec 2013 08:14:00 +0000</pubDate><atom:updated>2013-12-08T15:14:53.799+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">EN</category><category domain="http://www.blogger.com/atom/ns#">htaccess</category><category domain="http://www.blogger.com/atom/ns#">HTSHELLS</category><category domain="http://www.blogger.com/atom/ns#">web shells</category><title>[HTSHELLS] Self contained web shells and other attacks via .htaccess files </title><description>Attacks are named in the following fashion, module.attack.htaccess and grouped
by attack type in directories. Pick the one you need and copy it to a new file
named .htaccess, check the file to see if it needs editing before you upload it.
Web shells executes commands from the query parameter c, unless the file states
otherwise.&lt;a href=&quot;https://github.com/wireghoul/htshells&quot;&gt;Download&amp;nbsp; HTSHELLS&lt;/a&gt;</description><link>http://fogflames.blogspot.com/2013/12/htshells-self-contained-web-shells-and.html</link><author>noreply@blogger.com (fog flames)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-5660422134994412241</guid><pubDate>Sun, 08 Dec 2013 08:06:00 +0000</pubDate><atom:updated>2013-12-08T15:06:00.454+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Auditing Tool</category><category domain="http://www.blogger.com/atom/ns#">EN</category><category domain="http://www.blogger.com/atom/ns#">Hardening</category><category domain="http://www.blogger.com/atom/ns#">linux</category><category domain="http://www.blogger.com/atom/ns#">Lynis</category><title>[Lynis v1.3.5] The Unix / Linux auditing, security and hardening Tool</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4CP_NFTYl7ySBBKCBRKjfVS8YfYrQtNENJZNM2DZXylOL9FbGAIac-_U5TkEJVRYAvEnYEYMG2QTFWohRwNp_DVKGLZJ6AKQMUyAU8paRWg6RoWtaX_XZwDMvuf1AnRLn5TMjOB2C2d82/s1600/2013-12-08_150023.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;219&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4CP_NFTYl7ySBBKCBRKjfVS8YfYrQtNENJZNM2DZXylOL9FbGAIac-_U5TkEJVRYAvEnYEYMG2QTFWohRwNp_DVKGLZJ6AKQMUyAU8paRWg6RoWtaX_XZwDMvuf1AnRLn5TMjOB2C2d82/s320/2013-12-08_150023.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Security and system auditing tool to harden Linux systems (and more)&lt;br /&gt;&lt;br /&gt;Lynis is an auditing tool for Unix/Linux. It performs a security scan and determines the hardening state of the machine. Any detected security issues will be provided in the form of a suggestion or warning. Beside security related information it will also scan for general system information, installed packages and possible configuration errors.&lt;br /&gt;
&lt;br /&gt;
This
 software aims in assisting automated auditing, hardening, software 
patch management, vulnerability and malware scanning of Unix/Linux based
 systems. It can be run without prior installation, so inclusion on read
 only storage is possible (USB stick, cd/dvd). &lt;br /&gt;
&lt;br /&gt;
Lynis assists auditors in performing Basel II, GLBA, HIPAA, PCI DSS and SOx (Sarbanes-Oxley) compliance audits.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Intended audience:&lt;/b&gt;&lt;br /&gt;
Security specialists, penetration testers, system auditors, system/network managers. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Examples of audit tests:&lt;/b&gt;&lt;br /&gt;- Available authentication methods&lt;br /&gt;- Expired SSL certificates&lt;br /&gt;- Outdated software&lt;br /&gt;- User accounts without password&lt;br /&gt;- Incorrect file permissions&lt;br /&gt;- Configuration errors&lt;br /&gt;- Firewall auditing&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Current state:&lt;/b&gt;&lt;br /&gt;
Stable releases are available, development is active.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Background information:&lt;/b&gt;&lt;br /&gt;Lynis is an audit script written in the common shell scripting language (sh). Therefore it runs on most systems without any adjustments. Packages are created by several maintainers, for easier installation. Still, if one would like to use the latest version, simply download the tarball, extract it to a temporary directory and run the tool. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;System requirements:&lt;/b&gt;&lt;br /&gt;- Compatible operating system (see &#39;Supported operating systems&#39;)&lt;br /&gt;- Default shell&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Supported operating systems&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;&lt;b&gt;Tested on:&lt;/b&gt;&lt;br /&gt;- Arch Linux&lt;br /&gt;- CentOS&lt;br /&gt;- Debian&lt;br /&gt;- Fedora Core&lt;br /&gt;- FreeBSD&lt;br /&gt;- Gentoo&lt;br /&gt;- Knoppix&lt;br /&gt;- Linux Mint&lt;br /&gt;- Mac OS X&lt;br /&gt;- Mandriva&lt;br /&gt;- OpenBSD&lt;br /&gt;- OpenSolaris&lt;br /&gt;- OpenSuSE&lt;br /&gt;- Oracle Linux&lt;br /&gt;- PcBSD&lt;br /&gt;- PCLinuxOS&lt;br /&gt;- Red Hat Enterprise Linux (RHEL)&lt;br /&gt;- Red Hat derivatives&lt;br /&gt;- Slackware&lt;br /&gt;- Solaris 10&lt;br /&gt;- Ubuntu&lt;br /&gt;
&lt;a href=&quot;http://www.rootkit.nl/projects/lynis.html&quot;&gt;Download Lynis v1.3.5&lt;/a&gt;</description><link>http://fogflames.blogspot.com/2013/12/lynis-v135-unix-linux-auditing-security.html</link><author>noreply@blogger.com (fog flames)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4CP_NFTYl7ySBBKCBRKjfVS8YfYrQtNENJZNM2DZXylOL9FbGAIac-_U5TkEJVRYAvEnYEYMG2QTFWohRwNp_DVKGLZJ6AKQMUyAU8paRWg6RoWtaX_XZwDMvuf1AnRLn5TMjOB2C2d82/s72-c/2013-12-08_150023.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-3858114565461866870</guid><pubDate>Sun, 08 Dec 2013 07:56:00 +0000</pubDate><atom:updated>2013-12-08T14:56:03.674+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">EN</category><category domain="http://www.blogger.com/atom/ns#">Password Remover</category><category domain="http://www.blogger.com/atom/ns#">WEP</category><category domain="http://www.blogger.com/atom/ns#">WiFi Password Remover</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><category domain="http://www.blogger.com/atom/ns#">wireless</category><category domain="http://www.blogger.com/atom/ns#">WPA</category><category domain="http://www.blogger.com/atom/ns#">WPA2</category><title>[WiFi Password Remover] Wireless (WEP/WPA/WPA2) Password/Profile Removal Software </title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpQRX2O-Z_c95DNI1ZV8efAx3DTY2bJYTyF7Nnzmml7m3kkZRrDaeFaytRMvBwHKoB5tOKlO-dZGSALUXU_7tp9NCr8WEGFaNFZXrpx1V4ESoJhLKvjiP1kzLmCkog8KKKIJXKcdnDh3qE/s1600/wifipasswordremover_mainscreen_big.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;250&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpQRX2O-Z_c95DNI1ZV8efAx3DTY2bJYTyF7Nnzmml7m3kkZRrDaeFaytRMvBwHKoB5tOKlO-dZGSALUXU_7tp9NCr8WEGFaNFZXrpx1V4ESoJhLKvjiP1kzLmCkog8KKKIJXKcdnDh3qE/s320/wifipasswordremover_mainscreen_big.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
WiFi Password Remover is the Free software to quickly recover and remove Wireless account passwords stored on your system.&lt;br /&gt;
&lt;br /&gt;
For each recovered Wi-Fi account, it displays following details,&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;WiFi Name (SSID)&lt;/li&gt;
&lt;li&gt;Security Settings (WEP-64/WEP-128/WPA2/AES/TKIP) &lt;/li&gt;
&lt;li&gt;Password Type&lt;/li&gt;
&lt;li&gt;Password in Hex format&lt;/li&gt;
&lt;li&gt;Password in clear text &lt;/li&gt;
&lt;/ul&gt;
Once recovered, you can either remove single or all of them with just a click.Before proceeding with deletion, you can also take a backup of recovered Wi-Fi password list to HTML/XML/TEXT file.&lt;br /&gt;
&lt;br /&gt;
One of the unique feature of this tool is that it can recover all type of Wi-Fi passwords including the ones which are not shown by &#39;Windows Wireless Manager&#39;, thus allowing you to remove all the hidden wireless passwords/profiles also.&lt;a href=&quot;http://securityxploded.com/download.php#wifipasswordremover&quot;&gt;Download WiFi Password Remover v1.0&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
&lt;br /&gt;</description><link>http://fogflames.blogspot.com/2013/12/wifi-password-remover-wireless.html</link><author>noreply@blogger.com (fog flames)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpQRX2O-Z_c95DNI1ZV8efAx3DTY2bJYTyF7Nnzmml7m3kkZRrDaeFaytRMvBwHKoB5tOKlO-dZGSALUXU_7tp9NCr8WEGFaNFZXrpx1V4ESoJhLKvjiP1kzLmCkog8KKKIJXKcdnDh3qE/s72-c/wifipasswordremover_mainscreen_big.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-381825181752732996</guid><pubDate>Sat, 07 Dec 2013 08:13:00 +0000</pubDate><atom:updated>2013-12-07T15:13:12.641+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blackhat Edition</category><category domain="http://www.blogger.com/atom/ns#">Ubuntu Mint</category><category domain="http://www.blogger.com/atom/ns#">Video Hacking</category><title>Video Dark Mint [Blackhat Edition]</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_itJ-o-E-z3L9qR0HUCJ224DmSVZM2K8KPcHRZ7kuDUCqzMcTYNnHAn8yarBMlvoKFG5ZDLUsHwb3PvS_YvvEOvrItMr-EiT3zDMiM_K0Fpe_L03tX9J7jZHPnOp8ZqGjYJgsrXv9gO1J/s1600/2013-12-07_151047.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;188&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_itJ-o-E-z3L9qR0HUCJ224DmSVZM2K8KPcHRZ7kuDUCqzMcTYNnHAn8yarBMlvoKFG5ZDLUsHwb3PvS_YvvEOvrItMr-EiT3zDMiM_K0Fpe_L03tX9J7jZHPnOp8ZqGjYJgsrXv9gO1J/s320/2013-12-07_151047.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;Video&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/45iNVBaUKlM?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://fogflames.blogspot.com/2013/12/video-dark-mint-blackhat-edition.html</link><author>noreply@blogger.com (fog flames)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_itJ-o-E-z3L9qR0HUCJ224DmSVZM2K8KPcHRZ7kuDUCqzMcTYNnHAn8yarBMlvoKFG5ZDLUsHwb3PvS_YvvEOvrItMr-EiT3zDMiM_K0Fpe_L03tX9J7jZHPnOp8ZqGjYJgsrXv9gO1J/s72-c/2013-12-07_151047.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-7618267301835739310</guid><pubDate>Sat, 07 Dec 2013 08:06:00 +0000</pubDate><atom:updated>2013-12-07T15:06:48.714+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">AirCrack For WPA</category><category domain="http://www.blogger.com/atom/ns#">Vidoe Hackig</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Crunch + Aircrack GUI for WPA [For Windows]</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKoVkn2D8anuhmvyTE90UXXcjg-PpYikeC976v7F7S5fZS4pZd4a_ZSBwDesekfyYUR_3Hf9QGIYmAlUrDe9FT9nFWjKgL_Jz8kV9J9nkX_4cKp2IaRvbEYHSIgPDI46TnRDwzO92ytzqZ/s1600/2013-12-07_150056.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;217&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKoVkn2D8anuhmvyTE90UXXcjg-PpYikeC976v7F7S5fZS4pZd4a_ZSBwDesekfyYUR_3Hf9QGIYmAlUrDe9FT9nFWjKgL_Jz8kV9J9nkX_4cKp2IaRvbEYHSIgPDI46TnRDwzO92ytzqZ/s320/2013-12-07_150056.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/iq4du--5Tfs?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Download AirCrack GUI For WPA For Windows &lt;a href=&quot;http://1-ps.googleusercontent.com/x/www.n0where.net/n0where.net/wp-content/uploads/2010/11/468x310xcrunch.jpg.pagespeed.ic.YD3tf3onIO.jpg&quot;&gt;Here&lt;/a&gt;&lt;/div&gt;
</description><link>http://fogflames.blogspot.com/2013/12/crunch-aircrack-gui-for-wpa-for-windows.html</link><author>noreply@blogger.com (fog flames)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKoVkn2D8anuhmvyTE90UXXcjg-PpYikeC976v7F7S5fZS4pZd4a_ZSBwDesekfyYUR_3Hf9QGIYmAlUrDe9FT9nFWjKgL_Jz8kV9J9nkX_4cKp2IaRvbEYHSIgPDI46TnRDwzO92ytzqZ/s72-c/2013-12-07_150056.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-6604653625706668877</guid><pubDate>Sat, 07 Dec 2013 07:56:00 +0000</pubDate><atom:updated>2013-12-07T14:56:26.477+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking News</category><category domain="http://www.blogger.com/atom/ns#">Home</category><title>Hydra v 7.4: Fast Network cracker </title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPLywp3qNEMAPLtmmC-QxzkfVXpviWuhvWDpLSpDNxVLUGREXGmJvg5pzus2JIW-mWOivLGLTowdXC5axF-AKPlCbVoUEqxwFySkzEt6CJoCBV29MedveIQeOa5ZN6dgUpKeNNJEBZ-aui/s1600/2013-12-07_145324.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPLywp3qNEMAPLtmmC-QxzkfVXpviWuhvWDpLSpDNxVLUGREXGmJvg5pzus2JIW-mWOivLGLTowdXC5axF-AKPlCbVoUEqxwFySkzEt6CJoCBV29MedveIQeOa5ZN6dgUpKeNNJEBZ-aui/s320/2013-12-07_145324.jpg&quot; width=&quot;296&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;One of the biggest security holes 
are passwords, as every password security study shows. A very fast 
network logon cracker which support many different services, THC-Hydra 
is now updated to 7.4 version.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;Hydra available:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;for Linux, 
Windows/Cygwin, Solaris 11, FreeBSD 8.1 and OSX, Currently supports AFP,
 Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET,
 HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-PROXY, HTTPS-FORM-GET, 
HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, 
LDAP, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, Oracle SID, Oracle, 
PC-Anywhere, PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, Rsh, SAP/R3, 
SIP, SMB, SMTP, SMTP Enum, SNMP, SOCKS5, SSH (v1 and v2), Subversion, 
Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;Change Log:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;New module: SSHKEY - for testing for ssh private keys (thanks to deadbyte(at)toucan-system(dot)com!)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Added support for win8 and win2012 server to the RDP module&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Better target distribution if -M is used&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Added colored output (needs libcurses)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Better library detection for current Cygwin and OS X&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Fixed the -W option&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Fixed a bug when the -e option was used without -u, -l, -L or -C, only half of the logins were tested&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Fixed HTTP Form module false positive when no answer was received from the server&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Fixed SMB module return code for invalid hours logon and LM auth disabled&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Fixed http-{get|post-form} from xhydra&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Added OS/390 mainframe 64bit support (thanks to dan(at)danny(dot)cz)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Added limits to input files for -L, -P, -C and -M - people were using unhealthy large files! ;-)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Added debug mode option to usage (thanks to Anold Black).Download Hydra &lt;a href=&quot;http://www.thc.org/thc-hydra/&quot;&gt;Here&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;</description><link>http://fogflames.blogspot.com/2013/12/hydra-v-74-fast-network-cracker.html</link><author>noreply@blogger.com (fog flames)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPLywp3qNEMAPLtmmC-QxzkfVXpviWuhvWDpLSpDNxVLUGREXGmJvg5pzus2JIW-mWOivLGLTowdXC5axF-AKPlCbVoUEqxwFySkzEt6CJoCBV29MedveIQeOa5ZN6dgUpKeNNJEBZ-aui/s72-c/2013-12-07_145324.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-4943557357985782418</guid><pubDate>Fri, 06 Dec 2013 09:43:00 +0000</pubDate><atom:updated>2013-12-06T16:43:39.869+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cansina</category><category domain="http://www.blogger.com/atom/ns#">Discovery</category><category domain="http://www.blogger.com/atom/ns#">Discovery Application</category><category domain="http://www.blogger.com/atom/ns#">EN</category><category domain="http://www.blogger.com/atom/ns#">linux</category><category domain="http://www.blogger.com/atom/ns#">Mac</category><category domain="http://www.blogger.com/atom/ns#">Python</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>[Cansina] Web Content Discovery Application </title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheGhegZliH1G0SibYjcrRcPgVAhcpQM7570Hiven85Un9U7rdChTlMwaGpQYw8PfJ4D9ShGIj4OT3y0pTU9CohZ_jkZa-aDcYfew8L7Hd6Cy3gZ1voH9HEhL78t1zVK88CEI-9mYmpRRCe/s1600/showcase.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheGhegZliH1G0SibYjcrRcPgVAhcpQM7570Hiven85Un9U7rdChTlMwaGpQYw8PfJ4D9ShGIj4OT3y0pTU9CohZ_jkZa-aDcYfew8L7Hd6Cy3gZ1voH9HEhL78t1zVK88CEI-9mYmpRRCe/s320/showcase.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
It takes general available lists of common path and files used by web applications and make URL requests looking back to the server response code. Cansina stores the information in a sqlite database (omitting 404 responses). One for every new url (think this as a kind of projects feature) and the same database for every new payload on the same url.It aims to be (very) simple and straight to use doing only one thing: Discover content.The app is far from being finished, probably is poorly coded and I wouldn&#39;t recommend it to use in a serious pentesting session.Lists from fuzzdb are included in this repository for convenience but are not part of the project. You can use whatever list you want. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;u&gt;&lt;b&gt;Features&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Threads (well, processes)&lt;/li&gt;
&lt;li&gt;HTTP/S Proxy support (thanks to requests)&lt;/li&gt;
&lt;li&gt;Data persistance (sqlite3)&lt;/li&gt;
&lt;li&gt;Support for multiextensions list (-e php,asp,aspx,txt...)&lt;/li&gt;
&lt;li&gt;Content inspector (will watch for a specific string inside web page content)&lt;/li&gt;
&lt;li&gt;Skip fake 404 (best as possible)&lt;/li&gt;
&lt;li&gt;Skip by filtering content&lt;/li&gt;
&lt;li&gt;Replacing (for URL fuzzing)&lt;/li&gt;
&lt;li&gt;Reporting tool&lt;/li&gt;
&lt;li&gt;Basic Authentication&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp;Download Cansina &lt;a href=&quot;https://github.com/deibit/cansina&quot;&gt;Here &lt;/a&gt;</description><link>http://fogflames.blogspot.com/2013/12/cansina-web-content-discovery.html</link><author>noreply@blogger.com (fog flames)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheGhegZliH1G0SibYjcrRcPgVAhcpQM7570Hiven85Un9U7rdChTlMwaGpQYw8PfJ4D9ShGIj4OT3y0pTU9CohZ_jkZa-aDcYfew8L7Hd6Cy3gZ1voH9HEhL78t1zVK88CEI-9mYmpRRCe/s72-c/showcase.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-1900830023980753582</guid><pubDate>Fri, 06 Dec 2013 09:04:00 +0000</pubDate><atom:updated>2013-12-06T16:04:13.280+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android</category><category domain="http://www.blogger.com/atom/ns#">EN</category><category domain="http://www.blogger.com/atom/ns#">Network Toolkit</category><category domain="http://www.blogger.com/atom/ns#">zANTI</category><title>[zAnti] Android Network Toolkit</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_KKAvkxFj4nTRTOYQ-l4ajIzT6yayY8b6XhhFfml8_TMe-l_FALjKy_w962YmajUFpZCWM4a_hzU3zvDEZaqEPAnJeOnGTDhSDNsUOU77t7M9qsDHFqmaRonKj4Y3iutT_yXNIAXoVuJD/s1600/aaaa.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;285&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_KKAvkxFj4nTRTOYQ-l4ajIzT6yayY8b6XhhFfml8_TMe-l_FALjKy_w962YmajUFpZCWM4a_hzU3zvDEZaqEPAnJeOnGTDhSDNsUOU77t7M9qsDHFqmaRonKj4Y3iutT_yXNIAXoVuJD/s320/aaaa.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Anti consists of 2 parts: The Anti version itself and extendable plugins. Upcoming updates will add functionality, plugins or vulnerabilities/exploits to Anti.&lt;br /&gt;
&lt;br /&gt;
Using Anti is very intuitive - on each run, Anti will map your network, scan for active devices and vulnerabilities, and will display the information accordingly: Green led signals an &#39;Active device&#39;, Yellow led signals &quot;Available ports&quot;, and Red led signals &quot;Vulnerability found&quot;. Also, each device will have an icon representing the type of the device. When finished scanning, Anti will produce an automatic report specifying which vulnerabilities you have or bad practices used, and how to fix each one of them.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/tKW-XV59-gk?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;</description><link>http://fogflames.blogspot.com/2013/12/zanti-android-network-toolkit.html</link><author>noreply@blogger.com (fog flames)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_KKAvkxFj4nTRTOYQ-l4ajIzT6yayY8b6XhhFfml8_TMe-l_FALjKy_w962YmajUFpZCWM4a_hzU3zvDEZaqEPAnJeOnGTDhSDNsUOU77t7M9qsDHFqmaRonKj4Y3iutT_yXNIAXoVuJD/s72-c/aaaa.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-601881771619863684</guid><pubDate>Fri, 06 Dec 2013 08:53:00 +0000</pubDate><atom:updated>2013-12-06T15:53:15.939+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">EN</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">Hacking tools</category><category domain="http://www.blogger.com/atom/ns#">Lfi</category><category domain="http://www.blogger.com/atom/ns#">rfi</category><category domain="http://www.blogger.com/atom/ns#">Scan</category><category domain="http://www.blogger.com/atom/ns#">Scanner</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">SQLi</category><category domain="http://www.blogger.com/atom/ns#">WAppEx</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>[WAppEx v1.0] Web Application Exploitation Tool </title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://i1202.photobucket.com/albums/bb365/arissesat/666666_zps818f1ae0.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;271&quot; src=&quot;http://i1202.photobucket.com/albums/bb365/arissesat/666666_zps818f1ae0.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://i1202.photobucket.com/albums/bb365/arissesat/2013-12-05_174536_zpscdcdfaba.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;274&quot; src=&quot;http://i1202.photobucket.com/albums/bb365/arissesat/2013-12-05_174536_zpscdcdfaba.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
WAppEx is an integrated Web Application security assessment and exploitation platform designed with the whole spectrum of security professionals to web application hobbyists in mind. It suggests a security assessment model which revolves around an extensible exploit database. Further, it complements the power with various tools required to perform all stages of a web application attack.Download &lt;a href=&quot;https://app.box.com/s/feos3fj5z0e5nk12uijc&quot;&gt;Here&lt;/a&gt;</description><link>http://fogflames.blogspot.com/2013/12/wappex-v10-web-application-exploitation.html</link><author>noreply@blogger.com (fog flames)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-6604752420831407826</guid><pubDate>Thu, 05 Dec 2013 08:11:00 +0000</pubDate><atom:updated>2013-12-05T15:11:24.071+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutorial Cpanel</category><category domain="http://www.blogger.com/atom/ns#">Tutorial Hacking</category><title>Tutorial Cpanel Hacking/Cracking Tutorial</title><description>Cpanel Hacking/Cracking Tutorial:&lt;br /&gt;
&lt;br /&gt;
&quot;Index of /sh3llZ&quot; Upload your shell&lt;br /&gt;
while Late Night Browsing Random websites I saw a website with a directory &quot;sh3llz&quot;, this directory contain many shells like c99, c100 r57 and others,&lt;br /&gt;
it was intresting, i dont know its a Bug or These files was uploaded by any hacker, when I googled it I got Many similar websites&lt;br /&gt;
so its Devil&#39;s Cafe New exploit, shells already Uploaded and you Can Upload your new one or use and already Uploaded shell and deface the website ..=)&lt;br /&gt;
&lt;br /&gt;
cats.jpg (363×506)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Exploit Title : &quot;Index of /sh3llZ&quot;&lt;br /&gt;
&lt;br /&gt;
Google and Big Dorks :&lt;br /&gt;
&lt;br /&gt;
&quot;Index of /sh3llZ&quot;&lt;br /&gt;
&quot;/sh3llZ/uploadshell/uploadshell.php&quot;&lt;br /&gt;
intitle:index of/sh3llZ&lt;br /&gt;
and you can make own dorks for getting more results =)&lt;br /&gt;
Lets Start : Goto Google or Bing.com and type any Dork &quot;Index of /sh3llZ&quot;&lt;br /&gt;
&quot;/sh3llZ/uploadshell/uploadshell.php&quot; or intitle:index of/sh3llZ&lt;br /&gt;
After Going to Serach result, you will Shell There&lt;br /&gt;
Now upload your new shell, or upload Your deface using old shell =) enjoy!!&lt;br /&gt;
Must Leave a Comment below to say Thanks !!&lt;br /&gt;
&lt;br /&gt;
Live Demo :&lt;br /&gt;
&lt;br /&gt;
Shell : &lt;br /&gt;
&lt;br /&gt;
http://john.itscool.sx33.net/sh3llZ/uplo...l5c4f3.php&lt;br /&gt;
shell password : ..:: Devil&#39;s Cafe ::.. (its 404 Not Found Shell Download it here )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Demo Deface :&lt;br /&gt;
&lt;br /&gt;
http://john.itscool.sx33.net/sh3llZ/uplo...klinks.html&lt;br /&gt;
(click here to Get Best Deface Pages)&lt;br /&gt;
&lt;br /&gt;
More Shells :&lt;br /&gt;
&lt;br /&gt;
http://sqladminportal.com/sh3llz/&lt;br /&gt;http://phpadmin.org/sh3llz/&lt;br /&gt;http://donate-for-charity.com/sh3llz/&lt;br /&gt;http://php-admin.org/sh3llz/&lt;br /&gt;http://smf-forum.org/sh3llz/&lt;br /&gt;Index of /sh3llZ&lt;br /&gt;Index of /sh3llZ&lt;br /&gt;Index of /sh3llZ&lt;br /&gt;Index of /sh3llZ&lt;br /&gt;http:// blog.dark-action.net/sh3llZ/&lt;br /&gt;Index of /sh3llZ&lt;br /&gt;Index of /sh3llZ&lt;br /&gt;Index of /sh3llZ&lt;br /&gt;http://donate-for-charity.net/sh3llZ/&lt;br /&gt;Index of /sh3llZ&lt;br /&gt;Index of /sh3llZ&lt;br /&gt;Index of /sh3llZ&lt;br /&gt;Index of /sh3llZ&lt;br /&gt;Index of /sh3llZ&lt;br /&gt;Index of /sh3llZ&lt;br /&gt;Index of /sh3llZ&lt;br /&gt;http://donate-for-charity.com/sh3llZ/&lt;br /&gt;http:// Forum.brainshotsblog.com /sh3llZ/&lt;br /&gt;Index of /sh3llZ&lt;br /&gt;http:// john.shots-blog.com/sh3llz/&lt;br /&gt;http:// fisher.active-styles.com/sh3llz/&lt;br /&gt;http:// blog.balcesionlineshop.org/sh3llz/&lt;br /&gt;Index of /sh3llZ&lt;br /&gt;
&lt;br /&gt;</description><link>http://fogflames.blogspot.com/2013/12/tutorial-cpanel-hackingcracking-tutorial_5.html</link><author>noreply@blogger.com (fog flames)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-5590128654217492487</guid><pubDate>Thu, 05 Dec 2013 08:00:00 +0000</pubDate><atom:updated>2013-12-05T15:00:09.054+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutorial Upload Shell Jpg</category><title>How To Acess Your Shell In JPG</title><description>Some time a website have want only image extension&lt;br /&gt;and shell is in PHP so how to upload&lt;br /&gt;&lt;br /&gt;First open your shell with notepad and then Save As and change the extension to one of these&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;code&quot;&gt;
shell.php;.jpg shell.php.jpg shell.php..jpg
shell.php.jpg shell.php.jpg: ;shell.php.jpg%;
shell.php.jpg; shell.php.jpg; shell.php.jpg:;
&lt;/div&gt;

If you did not find any option for uploading files, but have place where you can add news or new event or something you can use meta http-equiv to make redirection from website to your deface page.Just add this code in news
&lt;div class=&quot;code&quot;&gt;
&lt; meta http-equiv=&quot;refresh&quot; content=&quot;0;url=http://link_to_your_defacee_page&quot; &gt;
&lt;/div&gt;
after Getting admin Panel,if you can&#39;t upload .php directly upload it with modified extensions as I stated above.

After uploading, find the directoey where your fle uploaded,

example if you uploaded it in images then it will be in http://website/images/shell.php

Sometimes
simple extension hiding will not work so you have to use one addon for firefox Live HTTP Headers, Get Live firefox HTTP headers Here

h&lt;a href=&quot;ttps://addons.mozilla.org/en-US/fir...-http-headers/&quot;&gt;ttps://addons.mozilla.org/en-US/fir...-http-headers/&lt;/a&gt;

Install

it and then hide shell extension, go to the upload section. Open Live.HTTP Headers and upload shell. Now if you try to go to the link where
you have your shell uploaded it will give you error (only on some websites) so we will have to change that hided .php.jpg extension into the.php. So as we uploaded the shell and opened the Live HTTP Headers you should find where you have uploaded your shell.You will have to find the line where ti writes that you uploaded the shell. Select it and then click on button reply.

After that you have to find once again the same line of code which shows that you have uploaded shell.So when you find it select the extension you used to hide original.php.In my case it is .jpg (List of all these extension is given in this tutorial at the beginning).When you select it delete it so that we have only c100.php. And after that once again click on reply.

It will take you to the shell, and if it does not then you will have to find manually where shell has been uploaded and go to that link.

Note : This doesn&#39;t work for every website but working in mostly websites 


</description><link>http://fogflames.blogspot.com/2013/12/how-to-acess-your-shell-in-jpg_5.html</link><author>noreply@blogger.com (fog flames)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-1907322139984104685</guid><pubDate>Thu, 05 Dec 2013 07:32:00 +0000</pubDate><atom:updated>2013-12-05T14:32:55.711+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Admin Finder</category><category domain="http://www.blogger.com/atom/ns#">Admin Login</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">Website</category><title>Admin Finder to find Admin login page easily at websites </title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEion5Tqx3p9Rq6nd2lqrleZzrGklG8MdIhNTLp3l7DpasfK_kCNxsU3ulSN5bY1O1XQ0wlmcEyiWklxfBeOnmc8g22I_D-DwE5WOAhAu2gqeFPY3IExXwpT1Hu7KmWzBDA8zHZYRp0_H5GN/s1600/6666.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;270&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEion5Tqx3p9Rq6nd2lqrleZzrGklG8MdIhNTLp3l7DpasfK_kCNxsU3ulSN5bY1O1XQ0wlmcEyiWklxfBeOnmc8g22I_D-DwE5WOAhAu2gqeFPY3IExXwpT1Hu7KmWzBDA8zHZYRp0_H5GN/s320/6666.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;While hacking a website the most difficult task for a hacker is finding the admin login page of the site where he can input the stolen login Username/Password when he is using SQL Injection. . .&lt;br /&gt;&lt;br /&gt;So here we will make their work easier by giving this tool namely AdminFinder! This will search for all suspicious pages on the site and will finally give you the login page!&lt;br /&gt;Get this tool for free from here.Download &lt;a href=&quot;https://app.box.com/s/vwxfvgh8jswv3vphwpe7&quot;&gt;Here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;</description><link>http://fogflames.blogspot.com/2013/12/admin-finder-to-find-admin-login-page.html</link><author>noreply@blogger.com (fog flames)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEion5Tqx3p9Rq6nd2lqrleZzrGklG8MdIhNTLp3l7DpasfK_kCNxsU3ulSN5bY1O1XQ0wlmcEyiWklxfBeOnmc8g22I_D-DwE5WOAhAu2gqeFPY3IExXwpT1Hu7KmWzBDA8zHZYRp0_H5GN/s72-c/6666.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-5752378524598242752</guid><pubDate>Thu, 05 Dec 2013 07:11:00 +0000</pubDate><atom:updated>2013-12-05T14:11:38.891+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Proxy</category><title>Proxy Gear Pro 2.1</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://i1202.photobucket.com/albums/bb365/arissesat/2013-12-03_152243_zps2fdf38c4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;234&quot; src=&quot;http://i1202.photobucket.com/albums/bb365/arissesat/2013-12-03_152243_zps2fdf38c4.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Features:&lt;br /&gt;&lt;br /&gt;Easy to use&lt;br /&gt;URL Grabber&lt;br /&gt;High Speed&lt;br /&gt;Adaptive filters&lt;br /&gt;Avtoparser proxies from text / file / URL&lt;br /&gt;The opening of multiple files totaling&amp;gt; 2GB&lt;br /&gt;Identification of the country Proxy&lt;br /&gt;Export lists in whatever mask&lt;br /&gt;Defining proxy timeout&lt;br /&gt;Set up the proxy server directly from the program&lt;br /&gt;Multithreading (up to 1,000 threads and priority control)&lt;br /&gt;Ability to set the connection timeout&lt;br /&gt;Identify the type of proxy (Transparent, Anonymous or Elite)&lt;br /&gt;Work through your own check-server&lt;br /&gt;&lt;br /&gt;NEW! Proxy Gear Pro 2.1&lt;br /&gt;&lt;br /&gt;* Fixed Google CAPTCHA bug&lt;br /&gt;* Fixed detection of Elite proxy servers&lt;br /&gt;* Added date filter in Google Grabber&lt;br /&gt;* Added antigate.com support for Google Grabber&lt;br /&gt;* Added ability to limit page size in URL Grabber&lt;br /&gt;* Added save button for grabbed proxy in main window&lt;br /&gt;* New parsing algorithm for better speed results&lt;br /&gt;* Clicking on ad-banner now opens default browser&lt;br /&gt;* Minor bugs fixed.Download Proxy Gear Pro Via &lt;a href=&quot;https://app.box.com/s/uwj2d0y8xeg3pwg309pm&quot;&gt;Box&lt;/a&gt; And &lt;a href=&quot;https://app.box.com/s/uwj2d0y8xeg3pwg309pm&quot;&gt;Sendspace&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><link>http://fogflames.blogspot.com/2013/12/proxy-gear-pro-21.html</link><author>noreply@blogger.com (fog flames)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-8703472816803028016</guid><pubDate>Sun, 17 Nov 2013 09:32:00 +0000</pubDate><atom:updated>2013-11-17T16:32:13.349+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutorial Aircrack-ng for windows</category><title>Running Aircrack-ng for Windows:</title><description>Once as many IVs as required have been captured using the &lt;a href=&quot;http://wirelessdefence.org/Contents/Aircrack-ng_WinAirodump.htm&quot;&gt;airodump&lt;/a&gt; packet capture utility the resultant [filename].cap file can be imported into aircrack to break the static WEP or WPA-PSK keys.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;To view all available switches: &lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: Center;&quot;&gt;
&lt;br /&gt;&lt;div style=&quot;background-color: #444444; border-radius: 0em 0em 0em 1em; border: 2px solid rgb(0, 0, 0); color: white; height: auto; margin: 0px auto; overflow: hidden;&quot;&gt;
&lt;br /&gt;cd&amp;nbsp; c:\aircrack-ng-[version]&lt;br /&gt;aircrack-ng.exe&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt68-PMoeKiZ_-RIQnenfdjtiQhOv-QIlW09pQBiHRGYbWfYzDPYUKi3kS8vfR72ySG0WdS2wNDTAOpoHCADx8xE-rW-CLAlpo2_bT6y0rLcLhmh7F8dR07TJ5gzvZNhhkvaOTPZJkv53g/s1600/aircrack_win1.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt68-PMoeKiZ_-RIQnenfdjtiQhOv-QIlW09pQBiHRGYbWfYzDPYUKi3kS8vfR72ySG0WdS2wNDTAOpoHCADx8xE-rW-CLAlpo2_bT6y0rLcLhmh7F8dR07TJ5gzvZNhhkvaOTPZJkv53g/s320/aircrack_win1.PNG&quot; width=&quot;308&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;u&gt;&lt;b&gt;Basic usage:&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: Center;&quot;&gt;
&lt;br /&gt;&lt;div style=&quot;background-color: #444444; border-radius: 0em 0em 0em 1em; border: 2px solid rgb(0, 0, 0); color: white; height: auto; margin: 0px auto; overflow: hidden;&quot;&gt;
&lt;br /&gt;aircrack&amp;nbsp; -q&amp;nbsp; -n&amp;nbsp; [WEP key length]&amp;nbsp; -b [BSSID]&amp;nbsp; [filename].cap&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Breaking WEP:&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
As you can see the capture file in use below (capture1.ivs) was created with airodump capture option &quot;Only capture WEP IVs (y/n)&quot; set to &quot;y&quot; as the resultant file is in the .ivs format.&amp;nbsp; If n had been selected the resultant file would be in the .cap format.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZYbcbYymziuFg5ZjmjQZFl-vcvEULj-fwcdGTTK7vYE2fxZPlIf_fg_PCcguDzrAmvvs8zk7mp7nNrtEm9aWKLkJaDO0nnUCiAc_HUjGQy-NNoz54rmlRWTlZZnyAeje-dG6oZJWnnUtd/s1600/aircrack_win2.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;56&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZYbcbYymziuFg5ZjmjQZFl-vcvEULj-fwcdGTTK7vYE2fxZPlIf_fg_PCcguDzrAmvvs8zk7mp7nNrtEm9aWKLkJaDO0nnUCiAc_HUjGQy-NNoz54rmlRWTlZZnyAeje-dG6oZJWnnUtd/s320/aircrack_win2.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Whilst this will work, we can could have cut down the cracking options for Aircrack-ng by specifying the WEP key length (-n) or by specifying the target AP MAC address (-b) on the command line:&lt;br /&gt;&lt;div style=&quot;text-align: Center;&quot;&gt;
&lt;br /&gt;&lt;div style=&quot;background-color: #444444; border-radius: 0em 0em 0em 1em; border: 2px solid rgb(0, 0, 0); color: white; height: auto; margin: 0px auto; overflow: hidden;&quot;&gt;
&lt;br /&gt;aircrack -a 1 -q&amp;nbsp; -n 128&amp;nbsp; -b&amp;nbsp; 11:11:11:11:11:11&amp;nbsp; capture1.ivs&amp;nbsp; (Where 11:11:11:11:11:11 = Target AP&#39;s MAC address)&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPrpH6pWrBOCQf2qq0jq5vafvFwsJKfWJwLPx3nFluXbxwyLLLTTZRS4bv59UfXV83mkXbC14D9a8HpliqsHlD0_N33XKO2dtqMg7hHB_AkgdvDc99AQVfRo-CboQT9fSStXP66bUe2P44/s1600/aircrack_win3.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;159&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPrpH6pWrBOCQf2qq0jq5vafvFwsJKfWJwLPx3nFluXbxwyLLLTTZRS4bv59UfXV83mkXbC14D9a8HpliqsHlD0_N33XKO2dtqMg7hHB_AkgdvDc99AQVfRo-CboQT9fSStXP66bUe2P44/s320/aircrack_win3.PNG&quot; width=&quot;320&quot; /&gt;&amp;nbsp;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
As you can see aircrack found the WEP key for our 1008195 IV capture file (capture1.ivs) in only 4 seconds.The capture file itself (capture1.ivs) is included here to test your own aircrack installs (note: the file is a 5.77mb download).&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;b&gt;Breaking WPA:&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;b&gt;&lt;u&gt;In order to be carry out the WPA dictionary attack using aircrack-ng we either have to:&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;
&lt;ol&gt;
&lt;li&gt;Wait for a WPA client to associate to the network (This could take a while)&lt;/li&gt;
&lt;li&gt;Force a WPA client off the network, forcing it to reassociate.&lt;/li&gt;
&lt;/ol&gt;
Either of these two method allows us to capture the WPA handshake, which is what we require to perform a dictionary attack.The downside to using this Windows version of aircrack-ng is that there are not any freely available tools to perform this attack.&amp;nbsp; So we have to either use a Linux tools (e.g.&lt;a href=&quot;http://wirelessdefence.org/Contents/Aircrack_aireplay.htm&quot;&gt; aireplay&lt;/a&gt; or &lt;a href=&quot;http://wirelessdefence.org/Contents/Void11Main.htm&quot;&gt;void11&lt;/a&gt;) or wait for an association to occur.Which ever way we gather the WPA handshake we still use the same tool; &lt;a href=&quot;http://wirelessdefence.org/Contents/Aircrack-ng_WinAirodump.htm&quot;&gt;airodump&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Once we think we have captured the WPA handshake, we simply run the capture file through aircrack for confirmation:&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoukU6E8sJq3sXOg4JyYKCKOb9mDMGsiA39C8tHN-U5i4eA5Tr57naL9qlDIvsM_K2T0f94tXNNZ7KLM567cnt-1MlNwYlgxfX7aWxr7By7MIfnJbWZkMh-p98Q0DT6LR1tLxKd8gvQH4E/s1600/aircrack_win3.5.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;113&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoukU6E8sJq3sXOg4JyYKCKOb9mDMGsiA39C8tHN-U5i4eA5Tr57naL9qlDIvsM_K2T0f94tXNNZ7KLM567cnt-1MlNwYlgxfX7aWxr7By7MIfnJbWZkMh-p98Q0DT6LR1tLxKd8gvQH4E/s320/aircrack_win3.5.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;u&gt;&lt;b&gt;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;u&gt;&lt;b&gt;&lt;br /&gt;If have confirmed we have the WPA handshake (as above) we can attempt the dictionary attack:&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioOySnF-6_H1F6TxS31ODnC6hqhy1S8LULojbx9zMvQ3qlVo5cB5iJ1NFXDuYZZzRe69jDAQmUkPN_ePtleEHDF0FlWUOgINLE4EdVHvDxM8MezGnR14swc5DmsrWGZSnEPiGVeVQSdNrg/s1600/aircrack_win5ddd.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;153&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioOySnF-6_H1F6TxS31ODnC6hqhy1S8LULojbx9zMvQ3qlVo5cB5iJ1NFXDuYZZzRe69jDAQmUkPN_ePtleEHDF0FlWUOgINLE4EdVHvDxM8MezGnR14swc5DmsrWGZSnEPiGVeVQSdNrg/s320/aircrack_win5ddd.PNG&quot; width=&quot;320&quot; /&gt;&amp;nbsp;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
As you can see above aircrack found the WPA PSK of &quot;passphrase&quot;&lt;br /&gt;The capture file itself (capture2.cap) is included &lt;a href=&quot;http://homepage.ntlworld.com/matt.byrne/Capture2/capture2.cap&quot;&gt;here&lt;/a&gt; to test your own aircrack installs&lt;/div&gt;
&lt;br /&gt;</description><link>http://fogflames.blogspot.com/2013/11/running-aircrack-ng-for-windows.html</link><author>noreply@blogger.com (fog flames)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt68-PMoeKiZ_-RIQnenfdjtiQhOv-QIlW09pQBiHRGYbWfYzDPYUKi3kS8vfR72ySG0WdS2wNDTAOpoHCADx8xE-rW-CLAlpo2_bT6y0rLcLhmh7F8dR07TJ5gzvZNhhkvaOTPZJkv53g/s72-c/aircrack_win1.PNG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-3758366346560240142</guid><pubDate>Sun, 17 Nov 2013 08:30:00 +0000</pubDate><atom:updated>2013-11-17T15:30:01.145+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows scurity</category><title>ObserveIT</title><description>Record and Replay all remote user sessions on your network servers. Any remote access or console session is searchable and ready for playback! Protocol-agnostic: ObserveIT records Terminal Server, Citrix, Remote Desktop, SSH, VMware and more.ObserveIT makes easy work out of security audits by generating video and text logs for everything that happens on your servers. (Even for apps that don&#39;t have their own internal logs!) You&#39;ll be up and running in minutes.&lt;a href=&quot;http://www.observeit-sys.com/LP/People_Audit?B=va_ft&amp;amp;id=70120000000cu5t&quot;&gt;Download Here&lt;/a&gt;</description><link>http://fogflames.blogspot.com/2013/11/observeit.html</link><author>noreply@blogger.com (fog flames)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-7658604912446856689</guid><pubDate>Thu, 07 Nov 2013 05:25:00 +0000</pubDate><atom:updated>2013-11-07T12:25:19.308+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking Tutorials</category><category domain="http://www.blogger.com/atom/ns#">linux</category><category domain="http://www.blogger.com/atom/ns#">Warcarrier</category><title>warcarrier</title><description>&lt;div style=&quot;text-align: center;&quot;&gt;
An NCURSES-based, all-in-one instrument panel for professional Wardriving.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg61oGIsHK74trgbqBoejyyBmHTh9JuFjLtn785P6IFDPSzfRbSiJOlHKVxOLg7-gxt_XXWvVzQm-_CN1xDekdVJv4ywOHQkJ4lxs_0oZNgRmq_YnMXb6JvWQeTfv4Psuxf0nnFZDzEBeoh/s1600/wc.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg61oGIsHK74trgbqBoejyyBmHTh9JuFjLtn785P6IFDPSzfRbSiJOlHKVxOLg7-gxt_XXWvVzQm-_CN1xDekdVJv4ywOHQkJ4lxs_0oZNgRmq_YnMXb6JvWQeTfv4Psuxf0nnFZDzEBeoh/s320/wc.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;b&gt;&lt;u&gt;802.11&amp;nbsp; &lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
I use Airodump-ng&#39;s output which I parse and add GPS coordinates. These are then used by the lib::GMAPS Google Maps Perl module that I made for creating code which is then viewed in the web browser. (most of this done as a proof of concept). TCPDUMP was initially used for 802.11 scanning on the RFMON device, but it doesn&#39;t return which encryption type is in use by the AP from the Beacon packets (just says 1 for PRIVACY). Scapy uses TCPDUMP and can only do the same thing. After doing research with C+Libpcap I recognized that Airodump-NG was the best option and that no other 802.11 protocol analyzer should ever be needed.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;Bluetooth&amp;nbsp; &lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;The current version (all versions are in testing) includes support for the &lt;a href=&quot;http://ubertooth.sourceforge.net/&quot;&gt;Ubertooth Bluetooth&lt;/a&gt; dongle for spectrum analyzing the 802.15 band of the ISM spectrum (2.400GHz-2.485GHz). Current &lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;u&gt;Global Positioning&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
This can only be used with the tested version of GPSd (3.4). The Perl modules lib::GPSO uses an OO algorithm to obtain the JSON data from gpspipe.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;u&gt;Logging &lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
All logging is done with txt,HTML, and/or JavaScript. The Google Maps API is used for mapping Bluetooth devices found and WiFi APs. There currently is no logging function for Stations.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;u&gt;WarcarrierOS &lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;a href=&quot;http://warcarrier.org/&quot;&gt;http://warcarrier.org&lt;/a&gt; Live DVD ISO with a professional Wardriving Theme created around the Warcarrier application.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;u&gt;WARCARRIER and GPS &lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
The wcd file is a &quot;daemon&quot; which will be called from the WARCARRIER application. This is programmed this way because while polling a GPS device, we can easily get a lot of lag. This means that say we are lagging by the 3 seconds it takes to initiate a new POLL to the GPS device on our on screen display. If we are wardriving at 30 miles an hour, we will be losing 44ft 3s in our scan! WARCARRIER is smart and logs the data instantly. If you are standing still you may notice that trilateration shows you &quot;moving&quot; according to the GPS coordinates. This is because even with WAAS, GPS isn&#39;t 100% accurate, but because you are seeing this change, WARCARRIER is 100% accurate according to your device!&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;b&gt;&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/0SNPzJ3ejFU?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;http://weaknetlabs.com/gmaps/&quot;&gt;View an online demo of the HTML reporting software (mock-up)&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
Its first release will be with WEAKERTH4N: BLUE GHOST Edition and inspired by the &quot;Blue Ghost&quot; USS Lexington.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf3SOmZmpDXpdFQ2NrN1fePr1lBNaGbkV4rqzY9TCGOIYlXG2ihUwJtDd42F_wbfCIy_vAwFVJusHg92tRarjJ-rM22xuDQGY200BQo3YqkOn5tU4U0aC_6TJwWhkDOtgcLkMmuG7oshFh/s1600/wchtmlreport.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf3SOmZmpDXpdFQ2NrN1fePr1lBNaGbkV4rqzY9TCGOIYlXG2ihUwJtDd42F_wbfCIy_vAwFVJusHg92tRarjJ-rM22xuDQGY200BQo3YqkOn5tU4U0aC_6TJwWhkDOtgcLkMmuG7oshFh/s320/wchtmlreport.png&quot; width=&quot;277&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;u&gt;&lt;b&gt;Dependencies:&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;Perl5+:&lt;br /&gt;Curses::UI&lt;br /&gt;JSON::XS&lt;br /&gt;
&lt;h3&gt;
&lt;u&gt;&lt;b&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Linux/UNIX:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;/h3&gt;
&lt;h3&gt;
&lt;b&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Hci-utils (Bluetooth scanning)&lt;br /&gt;Current version of GPSd (NMEA support)&lt;br /&gt;Airodump-ng (for WiFi Monitoring and logging)&lt;br /&gt;spectools_raw (may be included in future releases) for Ubertooth raw data poll &lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;h3&gt;
&lt;u&gt;&lt;b&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Hardware:&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;/h3&gt;
&lt;h3&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;GPS Device and current drivers&lt;br /&gt;Bluetooth Device and current drivers&lt;br /&gt;802.11 WiFi Device with driver that supports &quot;Monitor Mode&quot;&lt;/span&gt;&lt;/h3&gt;
&lt;h3&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;h3&gt;
&lt;b&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;
</description><link>http://fogflames.blogspot.com/2013/11/warcarrier.html</link><author>noreply@blogger.com (fog flames)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg61oGIsHK74trgbqBoejyyBmHTh9JuFjLtn785P6IFDPSzfRbSiJOlHKVxOLg7-gxt_XXWvVzQm-_CN1xDekdVJv4ywOHQkJ4lxs_0oZNgRmq_YnMXb6JvWQeTfv4Psuxf0nnFZDzEBeoh/s72-c/wc.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-1331029494340285029</guid><pubDate>Thu, 07 Nov 2013 05:06:00 +0000</pubDate><atom:updated>2013-11-07T12:06:53.442+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Multiboot Usb</category><category domain="http://www.blogger.com/atom/ns#">Yumi</category><title>YUMI – Multiboot USB Creator</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn1yiksVRloze6PPpvLWJOfJLwMUNb4vaAWztt6PJjd4pKAk2zBNlu75l2hNLLnG7VydfFEE4_fSqDE1_cYvmBQZXqjpJk-cL8Wwt8iHqGveZJKDY9XmPtBJWcAyfa9eZCSHtXjTmgszMQ/s1600/YUMI-Multiboot-USB-Creator.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;249&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn1yiksVRloze6PPpvLWJOfJLwMUNb4vaAWztt6PJjd4pKAk2zBNlu75l2hNLLnG7VydfFEE4_fSqDE1_cYvmBQZXqjpJk-cL8Wwt8iHqGveZJKDY9XmPtBJWcAyfa9eZCSHtXjTmgszMQ/s320/YUMI-Multiboot-USB-Creator.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
YUMI (Your Universal Multiboot Installer), is the successor to our MultibootISOs. It can be used to create a Multiboot USB Flash Drive containing multiple operating systems, antivirus utilities, disc cloning, diagnostic tools, and more. Contrary to MultiBootISOs which used grub to boot ISO files directly from USB, YUMI uses syslinux to boot extracted distributions stored on the USB device, and reverts to using grub to Boot Multiple ISO files from USB, if necessary.Aside from a few distributions, all files are stored within the Multiboot or yumi folder (depending on version), making for a nicely organized Multiboot USB Drive that can still be used for other storage purposes.&lt;b&gt;Creating a YUMI Multiboot MultiSystem Bootable USB Flash Drive&lt;/b&gt;.YUMI works much like Universal USB Installer, except it can be used to install more than one distribution to run from your USB. Distributions can also be uninstalled using the same tool!&lt;br /&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtHjV-4GTc9hUKumWAgne0z9NUUnCOIPTASlGG1Ge0wIfdjHs4Yr8x05-nteCzlmkxxOb1HQzhGs8L98C9Npbyuh7UFiNM389pcCc-8IdpWTpjYznousHDqk26IGA0X_mlb_L5MHIktNDY/s1600/YUMI-Boot-Menu.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;233&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtHjV-4GTc9hUKumWAgne0z9NUUnCOIPTASlGG1Ge0wIfdjHs4Yr8x05-nteCzlmkxxOb1HQzhGs8L98C9Npbyuh7UFiNM389pcCc-8IdpWTpjYznousHDqk26IGA0X_mlb_L5MHIktNDY/s320/YUMI-Boot-Menu.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&amp;nbsp;YUMI&#39;s Main Multiboot Boot Menu&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.pendrivelinux.com/downloads/YUMI/YUMI-1.9.9.1.exe&quot;&gt;YUMI-1.9.9.1.exe &lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;u&gt;&lt;b&gt;NOTE:&lt;/b&gt;&lt;/u&gt; YUMI V2 can&#39;t remove distributions previously installed with Legacy YUMI! Although no longer supported, you can still &lt;a href=&quot;http://www.pendrivelinux.com/downloads/YUMI/YUMI-0.1.1.0.exe&quot;&gt;Download Legacy YUMI&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;u&gt;&lt;b&gt;Linux Based Legacy YUMI Downloads: &lt;/b&gt;&lt;/u&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
1.&lt;a href=&quot;http://www.pendrivelinux.com/downloads/YUMI/ubuntu/yumi_0.0.1-1_all.deb&quot;&gt;YUMI for Ubuntu Linux&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
2.&lt;a href=&quot;http://www.pendrivelinux.com/downloads/YUMI/debian/yumi_0.0.1-1_all.deb&quot;&gt;YUMI for Debian Linux&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</description><link>http://fogflames.blogspot.com/2013/11/yumi-multiboot-usb-creator.html</link><author>noreply@blogger.com (fog flames)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn1yiksVRloze6PPpvLWJOfJLwMUNb4vaAWztt6PJjd4pKAk2zBNlu75l2hNLLnG7VydfFEE4_fSqDE1_cYvmBQZXqjpJk-cL8Wwt8iHqGveZJKDY9XmPtBJWcAyfa9eZCSHtXjTmgszMQ/s72-c/YUMI-Multiboot-USB-Creator.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-348393730651506269.post-3607067272693823945</guid><pubDate>Thu, 07 Nov 2013 04:50:00 +0000</pubDate><atom:updated>2013-11-07T11:50:58.279+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Ubuntu 11.10</category><title>Make a USB Boot CD for Ubuntu 11.10</title><description>Creating a USB Boot CD that can be used to boot your Ubuntu Live 11.10 USB Flash Drive from a PC or Mac with a BIOS that doesn&#39;t natively support booting from a USB device (USB drivers are loaded from CD). I used a Macbook Pro to test this tutorial. This process is similar to our older USB Boot CD for Ubuntu tutorial, with new requirements added to make it work with 11.10. A boot menu option has been included for booting from a Macbook (forcing bypass of the Nouveau nVidia drivers, which do not play well with a Macbook.).&lt;u&gt;&amp;nbsp;&lt;/u&gt;&lt;br /&gt;
&lt;u&gt;Boot CD for Ubuntu 11.10 USB Prerequisites:&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
1.PC or Macbook that can Boot from a Live CD&lt;br /&gt;2.USB flash drive with Ubuntu preinstalled&lt;br /&gt;3.Working CD Burner and USB Port&lt;br /&gt;4.Active Internet Connection&lt;br /&gt;
Making a USB Boot CD to Boot Ubuntu 11.10 from a Flash Drive&lt;br /&gt;&lt;b&gt;&lt;u&gt;Note:&lt;/u&gt;&lt;/b&gt; I prefer to perform the following steps by booting from a prebuilt Live Ubuntu Flash Drive created using UUI, using a machine that does support booting from USB. This allows us to free up the CD Burner and use it to burn the final ISO.&lt;br /&gt;
1.Insert your Ubuntu Live USB (or Ubuntu CD) and restart your computer, booting from the CD or USB&lt;br /&gt;2Open a Terminal&lt;br /&gt;3.Type sudo apt-get update&lt;br /&gt;4.Type sudo apt-get install --reinstall nvidia-current grub&lt;br /&gt;5.Type mkdir -p ubcd/boot/grub&lt;br /&gt;6.Type cp /usr/lib/grub/i386-pc/stage2_eltorito ubcd/boot/grub&lt;br /&gt;7.Type gedit ubcd/boot/grub/menu.lst&lt;br /&gt;Add the following information to your menu.lst file and click save:&lt;br /&gt;
&lt;div style=&quot;text-align: Center;&quot;&gt;
&lt;br /&gt;&lt;div style=&quot;background-color: #444444; border-radius: 0em 0em 0em 1em; border: 2px solid rgb(0, 0, 0); color: white; height: auto; margin: 0px auto; overflow: hidden;&quot;&gt;
&lt;br /&gt;title Start Ubuntu from USB DISK (MACBOOK)&lt;br /&gt;root (cd)&lt;br /&gt;kernel /boot/vmlinuz file=/cdrom/preseed/ubuntu.seed boot=casper noprompt cdrom-detect/try-usb=true persistent nouveau.noaccel=1 blacklist=vga16fb&lt;br /&gt;initrd /boot/initrd.lz&lt;br /&gt;boot&lt;br /&gt;title Start Ubuntu from USB DISK (PC)&lt;br /&gt;root (cd)&lt;br /&gt;kernel /boot/vmlinuz file=/cdrom/preseed/ubuntu.seed boot=casper noprompt cdrom-detect/try-usb=true persistent&lt;br /&gt;initrd /boot/initrd.lz&lt;br /&gt;boot&lt;/div&gt;
&lt;br /&gt;1.Type cp /cdrom/casper/vmlinuz ~/ubcd/boot&lt;br /&gt;2.Type sudo gedit /etc/initramfs-tools/modules&lt;br /&gt;Add the following lines to the modules file and click save:&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: Center;&quot;&gt;
&lt;br /&gt;&lt;div style=&quot;background-color: #444444; border-radius: 0em 0em 0em 1em; border: 2px solid rgb(0, 0, 0); color: white; height: auto; margin: 0px auto; overflow: hidden;&quot;&gt;
&lt;br /&gt;usbcore&lt;br /&gt;usb-storage&lt;br /&gt;uhci_hcd&lt;br /&gt;ohci_hcd&lt;br /&gt;ehci_hcd&lt;br /&gt;sd_mod&lt;br /&gt;scsi_mod&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
3.Type sudo gedit /etc/initramfs-tools/initramfs.conf&lt;br /&gt;Add the following line to the bottom of the file and click save:&lt;br /&gt;
&lt;div style=&quot;text-align: Center;&quot;&gt;
&lt;br /&gt;&lt;div style=&quot;background-color: #444444; border-radius: 0em 0em 0em 1em; border: 2px solid rgb(0, 0, 0); color: white; height: auto; margin: 0px auto; overflow: hidden;&quot;&gt;
&lt;br /&gt;WAIT=8&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
4.Type sudo mkinitramfs -o ubcd/boot/initrd.lz&lt;br /&gt;5.Type mkisofs -R -b boot/grub/stage2_eltorito -no-emul-boot -boot-load-size 4 -boot-info-table -o usbcd.iso ubcd&lt;br /&gt;6.Insert a blank CD and type brasero -i usbcd.iso (to burn the usbcd.iso to a CD)</description><link>http://fogflames.blogspot.com/2013/11/make-usb-boot-cd-for-ubuntu-1110.html</link><author>noreply@blogger.com (fog flames)</author><thr:total>0</thr:total></item></channel></rss>