<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-2203478756514008118</atom:id><lastBuildDate>Thu, 19 Dec 2024 03:14:46 +0000</lastBuildDate><category>hacking</category><category>basics</category><category>downloads</category><category>tools</category><category>Virus</category><category>Windows</category><category>computer hacking</category><category>course</category><category>hacking software</category><category>password hacking</category><category>Download</category><category>Drive</category><category>Easiest</category><category>Install</category><category>Phone</category><category>Videos:</category><category>YouTube</category><category>Zemana</category><category>beginner</category><category>books</category><category>email bomber</category><category>imacros</category><category>keylogger</category><category>originally Posted by Rao Asfand Yar</category><category>phishing attack</category><category>sms bomber</category><title>pardon hackers</title><description></description><link>http://pardonhackers.blogspot.com/</link><managingEditor>noreply@blogger.com (yeshwanth)</managingEditor><generator>Blogger</generator><openSearch:totalResults>23</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-2695602043330191176</guid><pubDate>Wed, 05 Sep 2012 16:44:00 +0000</pubDate><atom:updated>2012-09-05T09:51:22.123-07:00</atom:updated><title>guptachari HTTP based trojan </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;guptachari is a bit different from other trojans for this you dont need a client to connect to the vitims server because it is HTTP based and your browser itself acts as client.&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;What is Guptachar ?&lt;/b&gt;&lt;br /&gt;
Guptachar is a remote administration tool. This means that once you install Guptachar on computer A, you can control computer A from any computer B provided that both computer A and computer B are on the same IP based network like the Internet.&lt;br /&gt;
Guptachar also differs from most remote administration tools in one respect. It does not require its own&amp;nbsp;&lt;i&gt;client&lt;/i&gt;. This is because Guptachar runs as a web server. So once you&#39;ve installed Guptachar on Computer A, all you need on Computer B is a web browser.&lt;br /&gt;
Guptachar has various features which allow you to administer the remote computer (aka Computer A) like browsing files, uploading files, executing programs, logging keys, shutting down and restarting, etc.&lt;br /&gt;
&lt;b&gt;I&#39;ve got Guptachar installed, how do I do the controlling ?&lt;/b&gt;&lt;br /&gt;
Say you&#39;ve got Guptachar installed on Computer A whose IP address is 10.7.1.5, just point your web browser to http://10.7.1.5/ and enjoy.&lt;br /&gt;
If you&#39;ve chosen to install Guptachar on a port other than 80 (discussed in the section on installation), say 8081, simply point your browser to http://10.7.1.5:8081/ instead.&lt;br /&gt;
&lt;b&gt;How do I get to know the remote computer&#39;s IP Address ?&lt;/b&gt;&lt;br /&gt;
That&#39;s a good question. If computer A accesses the internet through dialup, it is likely to have a different IP address every time it logs on. This is why Guptachar has the facility of an&amp;nbsp;&lt;i&gt;IRCBOT&lt;/i&gt;.&lt;br /&gt;
Basically, if the&amp;nbsp;&lt;i&gt;IRCBOT&lt;/i&gt;&amp;nbsp;feature is activated,whenever the remote computer (Computer A) goes online, Guptachar will connect to an IRC server with a predefined nickname, providing its IP address as its real name. So, whenever you want to know Computer A&#39;s IP address, you also connect to the same IRC server (use an IRC client like&amp;nbsp;&lt;a href=&quot;http://www.mirc.co.uk/&quot;&gt;mIRC&lt;/a&gt;) and type&amp;nbsp;&lt;i&gt;/whois&amp;nbsp;&lt;b&gt;nickname&lt;/b&gt;&lt;/i&gt;.&lt;br /&gt;
While installing Guptachar (or by changing its server options), you can specify which IRC server and with what nick to logon. In case, the nickname you specify is already occupied, it&#39;ll try to logon with variations of the nick. Say, the nick you specified was&amp;nbsp;&lt;i&gt;gupt&lt;/i&gt;, it&#39;ll try to login as&amp;nbsp;&lt;i&gt;gupt&lt;/i&gt;, then&amp;nbsp;&lt;i&gt;gupt1&lt;/i&gt;, then&amp;nbsp;&lt;i&gt;gupt2&lt;/i&gt;, etc.&lt;br /&gt;
You can also ask Guptachar to connect to IRC via an HTTP proxy. Beware though, some IRC servers do not allow you to connect through a proxy (especially an open one).&lt;br /&gt;
&lt;b&gt;How do I install Guptachar ?&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;Normal Installation&lt;/i&gt;&lt;br /&gt;
Just run the install.exe file. It&#39;ll ask you a series of questions and then install Guptachar on your machine.&lt;br /&gt;
Firstly, it&#39;ll ask you which port you want Guptachar to work on. Now webservers usually work on port 80. But it might not be such a good idea to operate on that port. Also, if you are installing it on an account with insufficient priveleges, you may be forced to use a higher port no. Remember this though, if you use a port other than 80, say 8081, you&#39;ll need to point your browser at&amp;nbsp;&lt;i&gt;http://ipaddress:8081/&lt;/i&gt;&amp;nbsp;instead of&amp;nbsp;&lt;i&gt;http://ipaddress/&lt;/i&gt;&amp;nbsp;or just&amp;nbsp;&lt;i&gt;ipaddress&lt;/i&gt;.&lt;br /&gt;
Then, it&#39;ll ask you whether you want access to the machine to be restricted and if so, it&#39;ll ask you for a username password pair.&lt;br /&gt;
Then it&#39;ll ask you whether you want Keylogging to be enabled. Following this, it&#39;ll ask you details about the IRCBOT feature.&lt;br /&gt;
Most of these options can be changed later through Guptachar, mostly using&amp;nbsp;&lt;i&gt;Server Options&lt;/i&gt;.&lt;br /&gt;
&lt;i&gt;Making a Quick Installer&lt;/i&gt;&lt;br /&gt;
A quick installer is a stand alone .exe file, which has both the guptachar binaries as well as your inputted options stored within itself. Just running the .exe file will install Guptachar on the system without any user interaction.&lt;br /&gt;
To make a quick installer, just run&amp;nbsp;&lt;i&gt;makeqinst.exe&lt;/i&gt;. It&#39;ll first ask you for the filename of the quickinstaller (ie. the name of the .exe file) and then the same questions that it asks during normal installation.&lt;br /&gt;
&lt;tt&gt;&lt;b&gt;Running makeqinst.exe does not install Guptachar on your system.&lt;/b&gt;&lt;/tt&gt;&lt;br /&gt;
You&#39;ll need to run the generated .exe file to actually install Guptachar&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.facebook.com/download/346938182055170/gupt.rar&quot; target=&quot;_blank&quot;&gt;CLICK TO DOWNLOAD&lt;/a&gt;&amp;nbsp;file in pardon hackers group&lt;br /&gt;
like pardon hackers in fb&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/PardonHackers&quot;&gt;http://www.facebook.com/PardonHackers&lt;/a&gt;&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2012/09/guptachari-http-based-trojan.html</link><author>noreply@blogger.com (yeshwanth)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-7281181955626848544</guid><pubDate>Tue, 04 Sep 2012 02:09:00 +0000</pubDate><atom:updated>2012-09-03T19:09:02.691-07:00</atom:updated><title>armadax keylogger 3.0 with serial </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3GXpig5D3Rb5Rlq715LnvYQXmaIJv-WmxT7Dur0dQ7zgTCDlsU2IknpsQ1wQOuEe7VS053lNLEdm1WMSgfrwtQgM8-3KFt1WM5RNORAxebrlrUOFUGQexrj8w1HBMB0a-q2-oOyKUj20/s1600/Ardamax+Keylogger+2.9+com+Serial.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3GXpig5D3Rb5Rlq715LnvYQXmaIJv-WmxT7Dur0dQ7zgTCDlsU2IknpsQ1wQOuEe7VS053lNLEdm1WMSgfrwtQgM8-3KFt1WM5RNORAxebrlrUOFUGQexrj8w1HBMB0a-q2-oOyKUj20/s320/Ardamax+Keylogger+2.9+com+Serial.jpg&quot; width=&quot;248&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.mediafire.com/file/oayboqjca9z8a84/pardonhackers.blogspot.com_(armdax_3.0).zip&quot; target=&quot;_blank&quot;&gt;Download The Ardamax Keylogger&amp;nbsp;3.0&lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;bbcode_container&quot;&gt;
&lt;div class=&quot;bbcode_description&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;pre class=&quot;bbcode_code&quot; style=&quot;height: 36px;&quot;&gt;Download it and Install in your computer.&lt;/pre&gt;
&lt;pre class=&quot;bbcode_code&quot; style=&quot;height: 36px;&quot;&gt;2-.Now right-hand click it and click ‘Enter registration key….&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=4220817325987494942&amp;amp;postID=3528459673924381003&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://i43.servimg.com/u/f43/12/33/79/02/step210.jpg&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
3-Enter the Name and password in the box fields&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4.Once done click ‘Ok’ and you should get a pop-up saying ‘Registration code is accepted. Thank you for registration!&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://i43.servimg.com/u/f43/12/33/79/02/step410.jpg&quot; /&gt;&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
II. Creating the Keylogger Remote file:&lt;/h4&gt;
&lt;br /&gt;
1. Now your going to make the Keylogger Remote file (The thing you give to your victim). Click ‘Remote Installation…’,&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://i43.servimg.com/u/f43/12/33/79/02/step514.jpg&quot; /&gt;&lt;br /&gt;
click ‘Next’&lt;br /&gt;
2.Now,you should see this.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://i43.servimg.com/u/f43/12/33/79/02/step613.jpg&quot; /&gt;&lt;br /&gt;
3.If you want to bind Keylogger Remote file with another application or   file click the box that says ‘Append keylogger Remote file to file or   another application’ and browse file or application that you want to   bind it with..  I would prefer to skip this and bind the keylogger after   creating the remote file.&lt;br /&gt;
&lt;br /&gt;
4. Now click ‘Additional components’ and tick ‘Installation Package Bilder’ like done in the screenshot.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://i43.servimg.com/u/f43/12/33/79/02/step810.jpg&quot; /&gt;&lt;br /&gt;
5.Now you should be at ‘Invisibility’, make sure all the boxes are ticked, then click ‘Next’.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://i43.servimg.com/u/f43/12/33/79/02/step918.jpg&quot; /&gt;&lt;br /&gt;
6. Now you should be at ‘Security’, click ‘Enable’ and put your password   (it can be any password you like, make it something easy so you can   remember). Once done, make sure all the boxes are ticked and click   ‘Next’.. Or else SkIp this also&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://i43.servimg.com/u/f43/12/33/79/02/step1110.jpg&quot; /&gt;&lt;br /&gt;
7-untik the update optiong&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://i43.servimg.com/u/f43/12/33/79/02/step1210.jpg&quot; /&gt;&lt;br /&gt;
8. Ok, you should now be at ‘Options’, use setting like done in screenshots.You can also select it destruction date&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://i43.servimg.com/u/f43/12/33/79/02/step1410.jpg&quot; /&gt;&lt;br /&gt;
9. Ok, now you should be at ‘Control’, click the box that says ‘Send   logs every’, now make it so it sends logs every 20 minutes, then where   it says ‘Delivery’, un-tick ‘Email’ and tick ‘FTP’, then where it says   ‘Include’ un-tick ‘Screenshots’, now un-tick the box where it says ‘Send   only if log size exceeds’, once thats done, it should all look like it   does in this screenshot:&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://i43.servimg.com/u/f43/12/33/79/02/step1510.jpg&quot; /&gt;&lt;br /&gt;
10. Now you should be at ‘FTP’, create a free account at &lt;a href=&quot;http://www.drivehq.com/secure/FreeSignup%E2%80%A6om=storage&quot; target=&quot;_blank&quot;&gt;http://www.drivehq.com&lt;/a&gt;   then make sure your at ‘Online Storage’, then make a new folder  called:  Logs (this is where the logs are sent to when you keylogg  someone), Now  on your FTP on Ardamax Keylogger, where it says ‘FTP  Host:’, put this:&lt;br /&gt;
&lt;a href=&quot;http://www.drivehq.com/secure/FreeSignup.aspx?from=storage&quot; target=&quot;_blank&quot;&gt;FTP.DriveHQ.com&lt;/a&gt;&lt;br /&gt;
Now where it says ‘Remote Folder:’, put this: Logs&lt;br /&gt;
Now where it says ‘Userame:’ and ‘Password:’, put your DriveHQ username and password, then it should look something like this:&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://i43.servimg.com/u/f43/12/33/79/02/step1610.jpg&quot; /&gt;&lt;br /&gt;
Now Click ‘Test’ and it should pop up like this&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://i43.servimg.com/u/f43/12/33/79/02/step1710.jpg&quot; /&gt;&lt;br /&gt;
If not then see if the password and username is right.&lt;br /&gt;
&lt;br /&gt;
Once done, do NOT change your DriveHQ password or rename/delete the   folder called ‘Logs’, if you do, the logs will not come through.&lt;br /&gt;
&lt;br /&gt;
11. You should now be at ‘Control’, un-tick ‘Enable Screenshots Capturing’ then click ‘Next’.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://i43.servimg.com/u/f43/12/33/79/02/step1810.jpg&quot; /&gt;&lt;br /&gt;
12. Now you can change name and icon your Keylogger Engine as you want it to look like.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://i43.servimg.com/u/f43/12/33/79/02/step2010.jpg&quot; /&gt;&lt;br /&gt;
ust click ‘Finish’.&lt;br /&gt;
13.After you click ‘Finish’ you should see this:&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://i43.servimg.com/u/f43/12/33/79/02/step2210.jpg&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
Now Your Remote File Is Created&lt;br /&gt;
&lt;br /&gt;
happy hacking ;]&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2012/09/armadax-keylogger-30-with-serial.html</link><author>noreply@blogger.com (yeshwanth)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3GXpig5D3Rb5Rlq715LnvYQXmaIJv-WmxT7Dur0dQ7zgTCDlsU2IknpsQ1wQOuEe7VS053lNLEdm1WMSgfrwtQgM8-3KFt1WM5RNORAxebrlrUOFUGQexrj8w1HBMB0a-q2-oOyKUj20/s72-c/Ardamax+Keylogger+2.9+com+Serial.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-4395553960890137306</guid><pubDate>Fri, 24 Aug 2012 05:20:00 +0000</pubDate><atom:updated>2012-08-23T22:21:03.355-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">computer hacking</category><category domain="http://www.blogger.com/atom/ns#">hacking software</category><category domain="http://www.blogger.com/atom/ns#">tools</category><category domain="http://www.blogger.com/atom/ns#">Virus</category><title>back orifice trojan horse </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h2 style=&quot;text-align: center;&quot;&gt;
&amp;nbsp;Back Orifice 2000&amp;nbsp;&lt;/h2&gt;
BO2K or Back Orifice 2000 is one of the most POWERFULL trojans/admin tools out there well for the microsoft environment its not just a trojan , its also a remote network administration tool&lt;br /&gt;
so you can use it to hack and if ur an admin&lt;br /&gt;
it can make your life a bit eisier i belive if you can master this trojanyou can master any trojan this is realy only foradvanced users (as it was first made for linux) its default TCP port is18006 if its UDPIO the port will be 54320.&lt;br /&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
Make your server&lt;/h2&gt;
Like SubSeven there is an edit server this is called bo2kcfg open it it willask you for ports and passwords just use thedefault port 18006 for TCP networking then it will go onto BO2K serverconfiguration select your server (BO2K) and insertthe BO_PEEP plugin this comes in the zip file adding this plugin will addthe vid streem option and hijack option BO_PEEPalso lets the server communicate better with the client then go to thestealth sub folder and enable the server to start upon the victims startup and you can change some default ports if you want butits not a good idia another good plugin to haveis Rattler v10 this send an email when the user is online but you need toconfigure this from the client. again re-namethe server and then get the IP from netstat -n now heres some thingdiffernet open bo2kgui this is the client then click thelittle computer in the bottom left it will come up with edit server settingsname of server well say you named the servermy pic put my pic in there the server address if there ip is http://www.facebook.com/l/165e3O03koA-Kq_cybr5mBOftCg/123.456.78.910and ur port is 18006 put in there http://www.facebook.com/l/165e3O03koA-Kq_cybr5mBOftCg/123.456.78.910:18006 then click ok then connect...it will say something like &amp;lt;BO2K BACK ORIFICE 1.0&amp;gt; in the server responcesection now this is pritty hard to master lets sayyou wanna log the victims key strokes you go to keylogging log keystrokesthen it will say diskfile this is where you wannalog the key strokes to type in a path likeC:\windows\system\catroot\{127D0A1D-4EF2-11D1-8608-00C04FC295EE} some wheretheywill never look then wait for around 20mins then go to stop keylogging andsend the command then to view keystroke logsC:\windows\system\catroot\{127D0A1D-4EF2-11D1-8608-00C04FC295EE} then sendcommand it will the let you view the logs in theserver responce section just mess around with it you will get it its one ofthose trojan that you need to work out your selftheres just so many commands for me to go frew them all but heres someoptionsKeyloggingM$ networkingTCP\IPnetwork mappingfile managerREGEIDTand more and belive me there is loads more also you can infect networks withthis trojan but its not a good idia becausean admin will spot it right away unless your an admin your self and want touse it to well admin things....:-)&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2012/08/orifice-2000-bo2k-or-back-orifice-2000.html</link><author>noreply@blogger.com (yeshwanth)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-8272814387046415534</guid><pubDate>Fri, 24 Aug 2012 04:50:00 +0000</pubDate><atom:updated>2012-08-23T22:06:17.008-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">computer hacking</category><category domain="http://www.blogger.com/atom/ns#">downloads</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">hacking software</category><category domain="http://www.blogger.com/atom/ns#">tools</category><title>trojan horse Guptachari </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;What is Guptachar ?&lt;/b&gt;&lt;br /&gt;
Guptachar is a remote administration tool ( &lt;a href=&quot;http://pardonhackers.blogspot.in/p/trojans.html&quot; target=&quot;_blank&quot;&gt;trojan&lt;/a&gt; ) . This means that once you install Guptachar on computer A, you can control computer A from any computer B provided that both computer A and computer B are on the same IP based network like the Internet.&lt;br /&gt;
Guptachar also differs from most remote administration tools in one respect. It does not require its own&amp;nbsp;&lt;i&gt;client&lt;/i&gt;. This is because Guptachar runs as a web server. So once you&#39;ve installed Guptachar on Computer A, all you need on Computer B is a web browser.&lt;br /&gt;
Guptachar has various features which allow you to administer the remote computer (aka Computer A) like browsing files, uploading files, executing programs, logging keys, shutting down and restarting, etc.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;I&#39;ve got Guptachar installed, how do I do the controlling ?&lt;/b&gt;&lt;br /&gt;
Say you&#39;ve got Guptachar installed on Computer A whose IP address is 10.7.1.5, just point your web browser to http://10.7.1.5/ and enjoy.&lt;br /&gt;
If you&#39;ve chosen to install Guptachar on a port other than 80 (discussed in the section on installation), say 8081, simply point your browser to http://10.7.1.5:8081/ instead.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;How do I get to know the remote computer&#39;s IP Address ?&lt;/b&gt;&lt;br /&gt;
That&#39;s a good question. If computer A accesses the internet through dialup, it is likely to have a different IP address every time it logs on. This is why Guptachar has the facility of an&amp;nbsp;&lt;i&gt;IRCBOT&lt;/i&gt;.&lt;br /&gt;
Basically, if the&amp;nbsp;&lt;i&gt;IRCBOT&lt;/i&gt;&amp;nbsp;feature is activated,whenever the remote computer (Computer A) goes online, Guptachar will connect to an IRC server with a predefined nickname, providing its IP address as its real name. So, whenever you want to know Computer A&#39;s IP address, you also connect to the same IRC server (use an IRC client like&amp;nbsp;&lt;a href=&quot;http://www.mirc.co.uk/&quot;&gt;mIRC&lt;/a&gt;) and type&amp;nbsp;&lt;i&gt;/whois&amp;nbsp;&lt;b&gt;nickname&lt;/b&gt;&lt;/i&gt;.&lt;br /&gt;
While installing Guptachar (or by changing its server options), you can specify which IRC server and with what nick to logon. In case, the nickname you specify is already occupied, it&#39;ll try to logon with variations of the nick. Say, the nick you specified was&amp;nbsp;&lt;i&gt;gupt&lt;/i&gt;, it&#39;ll try to login as&amp;nbsp;&lt;i&gt;gupt&lt;/i&gt;, then&amp;nbsp;&lt;i&gt;gupt1&lt;/i&gt;, then&amp;nbsp;&lt;i&gt;gupt2&lt;/i&gt;, etc.&lt;br /&gt;
You can also ask Guptachar to connect to IRC via an HTTP proxy. Beware though, some IRC servers do not allow you to connect through a proxy (especially an open one).&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;How do I install Guptachar ?&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;Normal Installation&lt;/i&gt;&lt;br /&gt;
Just run the install.exe file. It&#39;ll ask you a series of questions and then install Guptachar on your machine.&lt;br /&gt;
Firstly, it&#39;ll ask you which port you want Guptachar to work on. Now webservers usually work on port 80. But it might not be such a good idea to operate on that port. Also, if you are installing it on an account with insufficient priveleges, you may be forced to use a higher port no. Remember this though, if you use a port other than 80, say 8081, you&#39;ll need to point your browser at&amp;nbsp;&lt;i&gt;http://ipaddress:8081/&lt;/i&gt;&amp;nbsp;instead of&amp;nbsp;&lt;i&gt;http://ipaddress/&lt;/i&gt;&amp;nbsp;or just&amp;nbsp;&lt;i&gt;ipaddress&lt;/i&gt;.&lt;br /&gt;
Then, it&#39;ll ask you whether you want access to the machine to be restricted and if so, it&#39;ll ask you for a username password pair.&lt;br /&gt;
Then it&#39;ll ask you whether you want Keylogging to be enabled. Following this, it&#39;ll ask you details about the IRCBOT feature.&lt;br /&gt;
Most of these options can be changed later through Guptachar, mostly using&amp;nbsp;&lt;i&gt;Server Options&lt;/i&gt;.&lt;br /&gt;
&lt;i&gt;Making a Quick Installer&lt;/i&gt;&lt;br /&gt;
A quick installer is a stand alone .exe file, which has both the guptachar binaries as well as your inputted options stored within itself. Just running the .exe file will install Guptachar on the system without any user interaction. This quick installer will be considered as a &lt;a href=&quot;http://pardonhackers.blogspot.in/p/virus.html&quot; target=&quot;_blank&quot;&gt;virus&lt;/a&gt; by most of the antivirus to avoid detection use techinques like &lt;a href=&quot;http://pardonhackers.blogspot.in/2011/10/binders-used-for-binding-to-exe-files.html&quot; target=&quot;_blank&quot;&gt;binding&lt;/a&gt;&lt;br /&gt;
To make a quick installer, just run&amp;nbsp;&lt;i&gt;makeqinst.exe&lt;/i&gt;. It&#39;ll first ask you for the filename of the quickinstaller (ie. the name of the .exe file) and then the same questions that it asks during normal installation.&lt;br /&gt;
&lt;tt&gt;&lt;b&gt;Running makeqinst.exe does not install Guptachar on your system.&lt;/b&gt;&lt;/tt&gt;&lt;br /&gt;
You&#39;ll need to run the generated .exe file to actually install Guptachar.&lt;br /&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;a href=&quot;http://www.mediafire.com/?n375eu8f2ioyag8&quot; target=&quot;_blank&quot;&gt;click here to download&lt;/a&gt;&lt;/h2&gt;
&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2012/08/trojan-horse-guptachari.html</link><author>noreply@blogger.com (yeshwanth)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-7498863436917193024</guid><pubDate>Sat, 18 Aug 2012 18:32:00 +0000</pubDate><atom:updated>2012-08-18T11:50:11.645-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">tools</category><title>send free anonymous email using online fake mailer </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em;&quot;&gt;
&lt;b&gt;Email spoofing&lt;/b&gt;&amp;nbsp;is&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Email&quot; style=&quot;background-image: none; background-position: initial initial; background-repeat: initial initial; color: #0b0080; text-decoration: none;&quot; title=&quot;Email&quot;&gt;email&lt;/a&gt;&amp;nbsp;activity in which the sender address and other parts of the email header are altered to appear as though the email originated from a different source. Because core&amp;nbsp;&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/SMTP&quot; style=&quot;background-image: none; background-position: initial initial; background-repeat: initial initial; color: #0b0080; text-decoration: none;&quot; title=&quot;SMTP&quot;&gt;SMTP&lt;/a&gt;&amp;nbsp;doesn&#39;t provide any&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Authentication&quot; style=&quot;background-image: none; background-position: initial initial; background-repeat: initial initial; color: #0b0080; text-decoration: none;&quot; title=&quot;Authentication&quot;&gt;authentication&lt;/a&gt;, it is easy to impersonate and forge emails.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em;&quot;&gt;
Although there are legitimate uses, these techniques are also commonly used in&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Email_spam&quot; style=&quot;background-image: none; background-position: initial initial; background-repeat: initial initial; color: #0b0080; text-decoration: none;&quot; title=&quot;Email spam&quot;&gt;spam&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Phishing&quot; style=&quot;background-image: none; background-position: initial initial; background-repeat: initial initial; color: #0b0080; text-decoration: none;&quot; title=&quot;Phishing&quot;&gt;phishing&lt;/a&gt;&amp;nbsp;emails to hide the origin of the email message.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em;&quot;&gt;
By altering an email&#39;s identifying fields, such as the&amp;nbsp;&lt;i&gt;From&lt;/i&gt;,&amp;nbsp;&lt;i&gt;&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/Return-Path&quot; style=&quot;background-image: none; background-position: initial initial; background-repeat: initial initial; color: #0b0080; text-decoration: none;&quot; title=&quot;Return-Path&quot;&gt;Return-Path&lt;/a&gt;&lt;/i&gt;&amp;nbsp;and&amp;nbsp;&lt;i&gt;Reply-To&lt;/i&gt;&amp;nbsp;(which can be found in the message header), email can be made to appear to be from someone other than the actual sender.&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-1&quot; style=&quot;line-height: 1em;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Email_spoofing#cite_note-1&quot; style=&quot;background-image: none; background-position: initial initial; background-repeat: initial initial; color: #0b0080; text-decoration: none; white-space: nowrap;&quot;&gt;[2]&lt;/a&gt;&lt;/sup&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em;&quot;&gt;
Occasionally (especially if the spam requires a reply from the recipient, as in&amp;nbsp;&lt;a class=&quot;mw-redirect&quot; href=&quot;http://en.wikipedia.org/wiki/Advance-fee_fraud&quot; style=&quot;background-image: none; background-position: initial initial; background-repeat: initial initial; color: #0b0080; text-decoration: none;&quot; title=&quot;Advance-fee fraud&quot;&gt;advance-fee frauds&lt;/a&gt;), the source of the spam email is indicated in the&amp;nbsp;&lt;i&gt;Reply-To&lt;/i&gt;&amp;nbsp;field (or at least a way of identifying the spammer); if this is the case and the initial email is replied to, the delivery will be sent to the address specified in the&amp;nbsp;&lt;i&gt;Reply-To&lt;/i&gt;&amp;nbsp;field, which could be the spammer&#39;s address. However, most spam emails (especially malicious ones with a trojan/virus payload, or those advertising a web site) forge this address too, and replying to it will annoy an innocent third party.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em;&quot;&gt;
Prior to the advent of unsolicited commercial email (spam) as a viable business model, &quot;legitimately spoofed&quot; email was common. For example, a visiting user might use the local organization&#39;s&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol&quot; style=&quot;background-image: none; background-position: initial initial; background-repeat: initial initial; color: #0b0080; text-decoration: none;&quot; title=&quot;Simple Mail Transfer Protocol&quot;&gt;SMTP&lt;/a&gt;&amp;nbsp;server to send email from the user&#39;s foreign address. Since most servers were configured as open relays, this was a common practice. As spam email became an annoying problem, most of these &quot;legitimate&quot; uses fell victim to antispam techniques.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em;&quot;&gt;
It is much more difficult to spoof or hide the IP or Internet Protocol address. The IP address is a 32 or 128 bit numerical label assigned to each device participating in a network and originates through the network provider making it more difficult to spoof or hide.&amp;nbsp;Although this kind of verification is difficult for individual users, companies can use this technology as well as others such as cryptographic signatures (e.g., PGP &quot;Pretty Good Privacy&quot; or other encryption technologies) to exchange authenticated email messages. Authenticated email provides a mechanism for ensuring that messages are from whom they appear to be, as well as ensuring that the message has not been altered in transit. Similarly, sites may wish to consider enabling SSL/TLS in their mail transfer software. Using certificates in this manner increases the amount of authentication performed when sending mail.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em;&quot;&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;a href=&quot;http://pardonhackers.blogspot.in/p/fake-mail-creator-free-online-tool.html&quot; target=&quot;_blank&quot;&gt;CLICK HERE&lt;/a&gt; to go to online fake mailer tool&lt;/h2&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2012/08/send-free-anonymous-email-using-online.html</link><author>noreply@blogger.com (yeshwanth)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-2523356829519970290</guid><pubDate>Sat, 18 Aug 2012 04:05:00 +0000</pubDate><atom:updated>2012-08-17T21:05:14.199-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">course</category><category domain="http://www.blogger.com/atom/ns#">downloads</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><title>cehv7 ethical hacking course download</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; color: #4f4f4f; font-family: Arial, Helvetica, sans-serif; font-size: 12px;&quot;&gt;
To penetrate delicate information and confidential information, hackers are needed to have some large finish competencies and in-depth knowledge of penetrating computer systems and network. When we think with the expression hacker, we envisage a gloomy picture of a youthful tech-freak who insert few codes and instructions at the laptop display and in turn get some good hugely confidential information and some account quantities. Even so, reality is not that dramatic!...Right here, an ethical hacker is a person who understands and features a operating knowledge of pc systems and also provides the understanding of particular tools which can be integrated to locate the vulnerabilities within the operating of the computer system method and community.&lt;br /&gt;
What is CEHv7 education about?&lt;br /&gt;
The Certified Ethical HackerCEHv7 is proven and offered from the Global Council of E-Commerce Consultants (EC-Council). CEHv7 coaching and certification program validates and certifies the skills than me professionals with all the abilities and skills to perform specific responsibilities within a distinct task role.&lt;br /&gt;
CEHv7 coaching and certification is one of the high-in-demand IT certifications, the strain of IT professionals using this credential is soaring large in history. This really is a single of the greatest resorts for organizations, in these susceptible times, to guard their IT infrastructure. Each and every generally, IT experts are required within the firm to audit security policies and safe the delicate information and conserve their company in the security wreckage.&lt;br /&gt;
Hired by the employers, moral hacker&#39;s works include acknowledging the loopholes in the community or even the program and reporting the implications towards the owner in the method or the network. The recommended measures also are intended to become talked about and the best way to tackle the vulnerabilities is also recognized and labored upon. The entire process revolves about acquiring gaps inside the method set up and actions to rectify the security difficulties. This complete course of action is worked upon from the IT specialists that have pursued CEHv7 certification.&lt;br /&gt;
What would be the importance of CEHv7 education and certification system?&lt;br /&gt;
Malicious hacking crimes are inescapable as of late, together with the developing technologies, the security threats will also be increasing. Malicious hackers try to acquire unauthorized entry towards the corporate community, simply to fetch some sensitive information and make difficulty or steal delicate data from the systems.&lt;br /&gt;
Mainly, CEHv7 training&lt;br /&gt;
Finding the correct expert or possibly a applicant for such career profile is incredibly critical and 1 with the toughest decisions. Factors which can be meant to become taken care of when picking a applicant are lots of, like acquiring out whether or not the professional is equipped with most current understanding of the technologies, the certifications are genuine and to locate out the qualified truly understands what&#39;s claimed.&lt;br /&gt;
What right after CEHv7 training and certification?&lt;br /&gt;
• Security experts• ITDirector / Manager• IT Security Auditors• Method tray network administrators&lt;br /&gt;
Surpass IT Safety Difficulties With CEHv7 Instruction and Certification Program&lt;br /&gt;
To penetrate delicate data and confidential info, hackers are essential to have some high finish capabilities and in-depth understanding of penetrating laptop or computer techniques and community. When we believe from the expression hacker, we envisage a gloomy image of a youthful tech-freak who insert couple of codes and commands at the laptop or computer screen and consequently have some very confidential information and a few account numbers. Nonetheless, actuality will not be that remarkable!...Right here, an ethical hacker is actually a person who understands and has a working information of laptop systems and also gets the information of certain equipment that is incorporated to locate the vulnerabilities&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #4f4f4f; font-family: Arial, Helvetica, sans-serif; font-size: 12px;&quot;&gt;
I got numerous Information Technology Certification. I have written many articles in different ITcertification as well as he has a vast experience in IT industry. In this article I guide the students that how they can pass the exams and how can they get the certification for the latest knowledge this certification exam students click at&amp;nbsp;&lt;a href=&quot;http://www.examskey.com/microsoft-windows-embedded-certification.html&quot; style=&quot;color: #006db3; text-decoration: none;&quot; wrc_done=&quot;true&quot;&gt;Microsoft Windows Embedded&lt;/a&gt;&amp;nbsp;&amp;nbsp;or visit its&amp;nbsp;&lt;a href=&quot;http://www.examskey.com/microsoft-windows-embedded-certification.html&quot; style=&quot;color: #006db3; text-decoration: none;&quot; wrc_done=&quot;true&quot;&gt;Windows Embedded Certification&lt;/a&gt;&amp;nbsp;&amp;nbsp;its better for your bright future and will helpful to attain the IT certification for more information touch with me.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #4f4f4f; font-family: Arial, Helvetica, sans-serif; font-size: 12px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;
Course details:&lt;/h2&gt;
&lt;div&gt;
&lt;h1 style=&quot;background-color: white; border: 0px; color: #060606; font-family: Arial, Helvetica, sans-serif; font-size: 24px; font-weight: normal; margin: 0px; outline: 0px; padding: 0px 0px 15px; vertical-align: baseline;&quot;&gt;
Certified Ethical Hacker&lt;/h1&gt;
&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 12px;&quot;&gt;Certified Ethical Hacker (312-50) CEH&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Prepare for the Certified Ethical Hacker CEH certification in InfoSec Insitute&#39;s&amp;nbsp;&lt;a class=&quot;bluelink&quot; href=&quot;http://www.infosecinstitute.com/courses/ethical_hacking_training.html&quot; style=&quot;border: 0px; color: #009dda; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;u style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ethical Hacking&lt;/u&gt;&lt;/a&gt;course.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;1&quot; cellspacing=&quot;1&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td height=&quot;25&quot; style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;25%&quot;&gt;&lt;h4&gt;
Exam Details&lt;/h4&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;75%&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td align=&quot;right&quot; style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Number of Questions:&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;250&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td align=&quot;right&quot; style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Passing Score:&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;70%&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td align=&quot;right&quot; style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Test Duration:&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;4 Hours&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td align=&quot;right&quot; style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Test Format:&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Multiple Choice&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td align=&quot;right&quot; style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Test Delivery:&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Onsite at every InfoSec Institute Ethical Hacking class&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Skills Measured&lt;/strong&gt;&lt;br /&gt;
The Exam 312-50 tests Certified Ethical Hacker, CEH certification, candidates on the following 22 domains.&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;1&quot; cellspacing=&quot;1&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;5%&quot;&gt;1.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;40%&quot;&gt;CEH Ethics and Legal Issues&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;5%&quot;&gt;12.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;CEH Web Application Vulnerabilities&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;2.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH Footprinting&amp;nbsp;&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;13.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH Web Based Password Cracking Techniques&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;3.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH Scanning&amp;nbsp;&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;14.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH SQL Injection&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;4.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH Enumeration&amp;nbsp;&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;15.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH Hacking Wireless Networks&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;5.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH System Hacking&amp;nbsp;&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;16.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH Virus and Worms&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;6.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH Trojans and Backdoors&amp;nbsp;&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;17.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH Hacking Novell&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;7.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH Sniffers&amp;nbsp;&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;18.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH Hacking Linux&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;8.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH Denial of Service&amp;nbsp;&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;19.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH IDS, Firewalls and Honeypots&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;9.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH Social Engineering&amp;nbsp;&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;20.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH Buffer Overflows&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;10.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH Session Hijacking&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;21.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH Cryptography&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;11.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH Hacking Web Servers&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;22.&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CEH Penetration Testing Methodologies&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 1: Ethics and Legality&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;What is an Exploit?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;The security functionality triangle&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;The attacker&#39;s process&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Passive reconnaissance&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Active reconnaissance&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Types of attacks&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Categories of exploits&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Goals attackers try to achieve&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ethical hackers and crackers - who are they&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Self proclaimed ethical hacking&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking for a cause (Hacktivism)&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Skills required for ethical hacking&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Categories of Ethical Hackers&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;What do Ethical Hackers do?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Security evaluation plan&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Types of Ethical Hacks&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Testing Types&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ethical Hacking Report&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Cyber Security Enhancement Act of 2002&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Computer Crimes&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Overview of US Federal Laws&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Section 1029&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Section 1030&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Punishment&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 2: Footprinting&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;What is Footprinting&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Steps for gathering information&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Whois&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;http://tucows.com&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Sam Spade&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Analyzing Whois output&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;NSLookup&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Finding the address range of the network&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;ARIN&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Traceroute&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: NeoTrace&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Visual Route&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Visual Lookout&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Smart Whois&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: eMailTracking Pro&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: MailTracking.com&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 3: Scanning&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Determining if the system is alive?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Active stack fingerprinting&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Passive stack fingerprinting&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Pinger&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Friendly Pinger&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: WS_Ping_Pro&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Netscan Tools Pro 2000&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Hping2&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: KingPing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: icmpenum&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SNMP Scanner&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Detecting Ping sweeps&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;ICMP Queries&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: netcraft.com&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Port Scanning&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;TCPs 3-way handshake&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;TCP Scan types&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: IPEye&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: IPSECSCAN&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: nmap&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Port Scan countermeasures&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: HTTrack Web Copier&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Network Management Tools&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SolarWinds Toolset&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;NeoWatch&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;War Dialing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: THC-Scan&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: PhoneSweep War Dialer&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Telesweep&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Queso&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Cheops&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Proxy Servers&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SocksChain&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Surf the web anonymously&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;TCP/IP through HTTP Tunneling&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: HTTPort&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Tunneld&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: BackStealth&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 4: Enumeration&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Determining if the system is alive?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;What is Enumeration&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;NetBios Null Sessions&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Null Session Countermeasures&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;NetBIOS Enumeration&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: DumpSec&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Hyena&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: NAT&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SNMP Enumertion&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SNMPUtil&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: IP Network Browser&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SNMP Enumeration Countermeasures&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Windows 2000 DNS Zone transfer&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Identifying Win2000 Accounts&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: User2SID&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SID2User&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Enum&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: UserInfo&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: GetAcct&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: smbbf&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SMB Auditing Tools&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Active Directory Enumeration&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;W2K Active Directory attack&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 5: System Hacking&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Administrator Password Guessing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Performing Automated Password Guessing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Legion&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;NTInfoScan&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Defending Against Password Guessing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Monitoring Event Viewer Logs&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;VisualLast&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Eavesdroppin on Network Password Exchange&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: L0phtCrack&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: KerbCrack&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Privilege Escalation&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: GetAdmin&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: hk&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Manual Password Cracking Algorithm&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Automatic Password Cracking Algorithm&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Password Types&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Types of Password Attacks&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Dictionary Attack&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Brute Force Attack&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Distributed Brute Force Attack&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Password Change Interval&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hybrid Attack&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Cracking Windows 2000 Passwords&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Retrieving the SAM file&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Redirecting SMB Logon to the Attacker&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SMB Redirection&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SMBRelay&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SMBRelay2&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: pwdump2&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SAMdump&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: C2MYAZZ&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Win32 Create Local Admin User&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Offline NT Password Resetter&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: psexec&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: remoxec&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SMBRelay Man-in-the-Middle (MITM)&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SMBRelay MITM Countermeasures&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SMBGrinder&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SMBDie&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: NBTDeputy&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;NetBIOS DoS Attack&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: nbname&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: John the Ripper&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;LanManager Hash&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 6: Trojans and Backdoors&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;What is a Trojan Horse?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Overt and Covert&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: QAZ&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Tini&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Netcat&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Donald Dick&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SubSeven&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: BackOrifice 2000&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Back Oriffice Plug-ins&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;BoSniffer&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: NetBus&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;ComputerSpy Key Logger&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Beast Trojan&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: CyberSpy Telnet Trojan&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SubRoot Telnet Trojan&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: LetMeRule&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Wrappers&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Graffiti&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Silk Rope 2000&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: EliteWrap&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: IconPlus&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Packaging Tool: Microsoft WordPad&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Whack a Mole Trojan Construction Kit&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Writing Trojans in Java&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: FireKiller 2000&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Covert Channels&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;ICMP Tunneling&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Loki&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Reverse WWW Shell&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Backdoor Countermeasures&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;BO Startup and Registry Entries&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;NetBus Startup and Registry Keys&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Port Monitoring Tools&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;fPort&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;TCPView&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Process Viewer&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Inzider - Tracks Processes and Ports&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Trojan Maker&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Hard Disk Killer&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Man-in-the-Middle Attack&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: dsniff&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;System File Verification&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;TripWire&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 7: Sniffers&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;What is a Sniffer?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Ethereal&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Snort&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: WinDump&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: EtherPeek&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Passive Sniffing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Active Sniffing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: EtherFlood&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;How ARP Works?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: ArpSpoof&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: DSniff&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Macof&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: mailsnarf&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: URLsnarf&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Webspy&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Ettercap&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: WebMiTM&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;IP Restrictions Scanner&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: sTerm&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Cain and Abel&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Packet Crafter&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SMAC&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;MAC Changer&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;ARP Spoofing Countermeasures&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: WinDNSSpoof&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Distributed DNS Flooder&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: WinSniffer&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Network Tool: IRIS&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Network Tool: NetInterceptor&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SniffDet&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: WinTCPKill&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 8: Denial of Service&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;What is Denial of Service Attack?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Types of DoS Attacks&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;How DoS Work?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;What is DDoS?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Ping of Death&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SSPing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Land&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Smurf&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SYN Flood&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: CPU Hog&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Win Nuke&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: RPC Locator&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Jolt2&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Bubonic&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Targa&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Tools for Running DDoS Attacks&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Trinoo&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: WinTrinoo&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: TFN&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: TFN2K&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Stacheldraht&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Shaft&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: mstream&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;DDoS Attack Sequence&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Preventing DoS Attack&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;DoS Scanning Tools&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Find_ddos&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SARA&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;DDoSPing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;RID&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Zombie Zapper&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 9: Social Engineering&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;What is Social Engineering?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Art of Manipulation&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Human Weakness&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Common Types of Social Engineering&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Human Based Impersonation&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Important User&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Tech Support&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Third Party Authorization&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;In Person&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Dumpster Diving&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Shoulder Surfing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Computer Impersonation&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Mail Attachments&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Popup Windows&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Website Faking&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Reverse Social Engineering&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Policies and Procedures&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Social Engineering Security Policies&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;The Importance of Employee Education&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 10: Session Hijacking&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;What is Session Hijacking?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Session Hijacking Steps&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Spoofing Vs Hijacking&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Active Session Hijacking&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Passive Session Hijacking&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;TCP Concepts - 3 way Handshake&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Sequence Numbers&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Sequence Number Example&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Guessing the Sequence Numbers&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Juggernaut&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Hunt&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: TTYWatcher&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: IP Watcher&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: T-Sight&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Remote TCP Session Reset Utility&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Dangers Posed by Session Hijacking&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Protection against Session Hijacking&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 11: Hacking Web Servers&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Apache Vulnerability&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Attacks against IIS&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;IIS Components&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;ISAPI DLL Buffer Overflows&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;IPP Printer Overflow&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;msw3prt.dll&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Oversized Print Requests&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Jill32&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: IIS5-Koei&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: IIS5Hack&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;IPP Buffer Overflow Countermeasures&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;ISAPI DLL Source Disclosure&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;ISAPI.DLL Exploit&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Defacing Web Pages&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;IIS Directory Traversal&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Unicode&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Directory Listing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Clearing IIS Logs&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Network Tool: LogAnalyzer&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Attack Signature&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Creating Internet Explorer (IE) Trojan&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: IISExploit&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: UnicodeUploader.pl&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: cmdasp.asp&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Escalating Privilages on IIS&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: IISCrack.dll&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: ispc.exe&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;IIS WebDav Vulnerability&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: WB&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;RPC Exploit-GUI&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: DComExpl_UnixWin32&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Plonk&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Unspecified Executable Path Vulnerability&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: CleanIISLog&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;File System Traversal Countermeasures&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Microsoft HotFix Problems&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;UpdateExpert&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Cacls utility&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Network Tool: Whisker&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;N-Stealth Scanner&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: WebInspect&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Network Tool: Shadow Security Scanner&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 12: Web Application Vulnerabilities&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Documenting the Application Structure&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Manually Inspecting Applications&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Using Google to Inspect Applications&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Directory Structure&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Instant Source&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Java Classes and Applets&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Jad&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;HTML Comments and Contents&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Lynx&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Wget&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Black Widow&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: WebSleuth&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Cross Side Scripting&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Session Hijacking using XSS&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Cookie Stealing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: IEEN&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: IEflaw&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Exposing Sensitive Data with Google&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 13: Web Based Password Cracking Techniques&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Basic Authentication&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Message Digest Authentication&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;NTLM Authentication&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certificate based Authentication&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Digital Certificates&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Microsoft Passport Authentication&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Forms based Authentication&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Creating Fake Certificates&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: WinSSLMiM&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Password Guessing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Dfault Account Database&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: WebCracker&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Brutus&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: ObiWan&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Munga Bunga&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Password dictionary Files&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Attack Time&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Variant&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: PassList&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Query Strings&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Post data&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: cURL&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Stealing Cookies&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: CookieSpy&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: ReadCookies&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SnadBoy&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 14: SQL Injection&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;What is SQL Injection Vulnerability?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SQL Insertion Discovery&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Blank sa Password&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Simple Input Validation&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SQL Injection&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;OLE DB Errors&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;1=1&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;blah&#39; or 1=1&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Preventing SQL Injection&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Database Specific SQL Injection&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SQLDict&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SQLExec&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SQLbf&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SQLSmack&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SQL2.exe&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Oracle Password Buster&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 15: Hacking Wireless Networks&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;802.11 Standards&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;What is WEP?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Finding WLANs&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Cracking WEP keys&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Sniffing Trafic&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Wireless DoS Attacks&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;WLAN Scanners&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;WLAN Sniffers&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;MAC Sniffing&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Access Point Spoofing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Securing Wireless Networks&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: NetTumbler&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: AirSnort&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: AiroPeek&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: WEP Cracker&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Kismet&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: AirSnarf&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;WIDZ- Wireless IDS&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 16: Virus and Worms&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Cherobyl&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;ExploreZip&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;I Love You&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Melissa&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Pretty Park&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Code Red Worm&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;W32/Klez&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;BugBear&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;W32/Opaserv Worm&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Nimda&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Code Red&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SQL Slammer&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Batch File Virus Creator&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;How to write your own Virus?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Worm Construction Kits&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 17: Novell Hacking&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Common accounts and passwords&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Accessing password files&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Password crackers&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Netware Hacking Tools&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Chknull&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;NOVELBFH&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;NWPCRACK&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Bindery&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;BinCrack&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SETPWD.NLM&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Kock&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;userdump&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Burglar&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Getit&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Spooflog&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Gobbler&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Novelffs&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Pandora&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;C&lt;/strong&gt;&lt;strong style=&quot;background-color: white; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;ertified Ethical Hacker (CEH) Module 18: Linux Hacking&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Why Linux ?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Linux Basics&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Compiling Programs in Linux&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Scanning Networks&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Mapping Networks&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Password Cracking in Linux&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Linux Vulnerabilities&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SARA&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;TARA&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Sniffing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;A Pinger in Disguise&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Session Hijacking&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Linux Rootkits&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Linux Security Countermeasures&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;IPChains and IPTables&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 19: IDS, Firewalls and Honeypots&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Intrusion Detection System&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;System Integrity Verifiers&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;How are Intrusions Detected?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Anomaly Detection&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Signature Recognition&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;How does IDS match Signatures with Incoming Traffic?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Protocol Stack Verification&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Application Protocol Verification&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;What Happens after an IDS Detects an Attack?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;IDS Software Vendors&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SNORT&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Evading IDS (Techniques)&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Complex IDS Evasion&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: fragrouter&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: TCPReplay&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: SideStep&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: NIDSbench&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: ADMutate&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;IDS Detection&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Tools to Detect Packet Sniffers&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Tools to inject strangely formatted packets onto the wire&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Through Firewalls&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Placing Backdoors through Firewalls&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hiding behind Covert Channels&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Ncovert&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;What is a Honeypot?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Honeypots Evasion&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Honeypots vendors&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking Tool: Honeyd&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 20: Buffer Overflows&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;What is a Buffer Overflow?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Exploitation&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Assembly Language Basics&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;How to Detect Buffer Overflows in a Program?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Skills Required&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CPU/OS Dependency&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Understanding Stacks&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Stack Based Buffer Overflows&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Buffer Overflow Technical Implementation&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Writing your own Buffer Overflow Exploit in C&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Defense against Buffer Overflows&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Type Checking Tools for Compiling Programs&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;StackGuard&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Immunix&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 21: Cryptography&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;What is PKI?&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Digital Certificates&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;RSA&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;MD-5&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;RC-5&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SHA&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SSL&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;PGP&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SSH&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Encryption Cracking Techniques&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker (CEH) Module 22: Penetration Testing Methodologies&lt;/strong&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; border-collapse: collapse; border-spacing: 0px; border: 0px; color: black; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline; width: 100%px;&quot;&gt;&lt;tbody style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;tr style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Physical Security Testing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Port Scanning Testing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;System Identification Testing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Services Identification Testing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Vulnerability Research and Verification Testing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Application Testing and Source Code Review&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Router Testing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Firewall Testing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Intrusion Detection System Testing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Domain Trusted Systems Testing&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;border: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;h2&gt;
Download link:&lt;/h2&gt;
&lt;/div&gt;
&lt;div style=&quot;border: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;h2&gt;
&lt;a href=&quot;http://torrentz.eu/6eff1a99a472a303795a89d1c0ceafd0b9b21777&quot; target=&quot;_blank&quot;&gt;click here&amp;nbsp;&lt;/a&gt;&lt;/h2&gt;
&lt;/div&gt;
&lt;div style=&quot;border: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/td&gt;&lt;td style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; valign=&quot;top&quot; width=&quot;50%&quot;&gt;&lt;ul style=&quot;border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Application Password Cracking Testing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Denial of Service Testing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Containment Measures Testing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Information Security&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Document Grinding&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Gathering Competitive Intelligence&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Social Engineering Testing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Wireless Networks Testing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Cordless Communications Testing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Infrared Systems Testing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Modem Testing&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Writing Penetration Testing Reports&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div class=&quot;adsense adsense_managed&quot; style=&quot;background-color: white; color: #4f4f4f; font-family: Arial, Helvetica, sans-serif; font-size: 12px;&quot;&gt;
&lt;ins style=&quot;border: none; display: inline-table; height: 60px; margin: 0px; padding: 0px; position: relative; visibility: visible; width: 468px;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2012/08/cehv7-ethical-hacking-course-download.html</link><author>noreply@blogger.com (yeshwanth)</author><thr:total>5</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-8773613061066416259</guid><pubDate>Thu, 06 Oct 2011 04:47:00 +0000</pubDate><atom:updated>2012-08-17T11:10:14.739-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">password hacking</category><title>COOKIE STEALING</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Well I have posted lots of articles on &lt;b&gt;Phishing&lt;/b&gt; and&lt;b&gt; keylogging&lt;/b&gt;,
 but today I would like to throw some light on a very useful method 
which hackers use to hack gmail, facebook and other email accounts i.e. 
Stealing.&amp;nbsp; One of the reasons why I am writing this article as there are
 lots of newbies having lots of misconceptions related to cookie 
stealing and session hijacking, So I hope this tutorial cover all those 
misconception and if not all most of them.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikr0PwGnTnzlfnEhqStjfHK_bo9VglCjNvRMcdkO8nr5tObUFNmuSmLLn6bP-bxn3zUyswh3YGHuObMYd2KrAKpBOsvBMo2nKqE_j-aU6cEGdFEZkA-6LrZGtASageQ5yEMb7F4aDquHw/s1600/stealing-cookies.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikr0PwGnTnzlfnEhqStjfHK_bo9VglCjNvRMcdkO8nr5tObUFNmuSmLLn6bP-bxn3zUyswh3YGHuObMYd2KrAKpBOsvBMo2nKqE_j-aU6cEGdFEZkA-6LrZGtASageQ5yEMb7F4aDquHw/s1600/stealing-cookies.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;span lang=&quot;EN&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=2203478756514008118&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;What is a Cookie?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;A
 cookie is a piece of code which is used to authenticate a user on a 
website, In other words when ever you login to a website such as&lt;b&gt; &lt;a href=&quot;http://facebookhackingcourse.com/&quot;&gt;Facebook&lt;/a&gt;, Gmail, Orkut&lt;/b&gt;
 etc your browser assigns you a cookie which basically tells the browser
 that for how long the user should be logged it, Apart of authentication
 purpose a cookie can be used for variety of different purposes, If you 
would like to know more about cookie stealing kindly google it up.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;What is a Session Token?&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;After
 an authentication is completed , A webserver hands the browser a 
session token which is used because a webserver needs a way to recognize
 between different connections, If a hacker could capture your session 
token then it&#39;s a cakewalk for the hacker to hack into your&lt;b&gt; gmail, facebook or any other account&lt;/b&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;What is a Session Hijacking Attack?&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;A
 session hijacking attack is basically an act of capturing session token
 and injecting it into your own browser to gain acess to victims 
account.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;What is a Cookie Stealer?&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;A
 cookie stealer is basically a script used to steal victims 
authentication cookies, Now for a cookie stealing process to work the 
website or the webpage should be vulnerable to an XSS attack, This is 
the most common and widely known misconception among newbies.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;How the stealing process work?&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;1.&lt;/b&gt; The attacker creates a PHP script and uploades it to a webhosting site.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;2.&lt;/b&gt; The attacker then asks the victim to visit that particular link containing the PHP code.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;3.&lt;/b&gt; Once the victim visits it his/her authentication cookie is saved in a .txt file.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;4.&lt;/b&gt;
 Next the attacker uses a cookieinjector or a cookie editor, There are 
lots of firefox addons, google chrome extensions to do the work for you.
 Personally I use &lt;b&gt;Cookie manager v1.5.1 &lt;/b&gt;as it&#39;s quite&amp;nbsp;user friendly.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbMOAwZ3uRY4sRC8r3-GKgPc__tSEazaMeRDv_1c7QNFnR4505m6XwGX9yIWeu9XMyhnK4VWIX8r0Z1Zfk-HyXRW8_y2ZUNohK8QPPew2hO0mNQCV8DjUg1_Qrj2GV12QHxTdsS1Llqxc/s1600/Untitled.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;379&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbMOAwZ3uRY4sRC8r3-GKgPc__tSEazaMeRDv_1c7QNFnR4505m6XwGX9yIWeu9XMyhnK4VWIX8r0Z1Zfk-HyXRW8_y2ZUNohK8QPPew2hO0mNQCV8DjUg1_Qrj2GV12QHxTdsS1Llqxc/s400/Untitled.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;o:p&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;o:p&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;You can also use the webdeveloper toolbar to do the work for you.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;5.&lt;/b&gt; The attacker replaces his own cookies with the victims cookies as a result of which the victims session is hijacking&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Why it does not work on a website which is not vulnerable to XSS?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;It&#39;s due to the browser&#39;s same origin policy, and according to it the browsers don&#39;t allow the javascripts to acess the cookies.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Gmail GX Cookie&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYhiwKPc3htq3SEG12dhk633bPFDguCqJoYX-NjNXTRuQ7druYSzKy3TAjaNRzEet1Oci8L-UGyceAFanbVcw4riuoTM40o9ssl2GjZ79ylwn_wpomHYTLC-qsJOfvILTQ4FVu9yo4SQ8/s1600/20213_gmail-hacked.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYhiwKPc3htq3SEG12dhk633bPFDguCqJoYX-NjNXTRuQ7druYSzKy3TAjaNRzEet1Oci8L-UGyceAFanbVcw4riuoTM40o9ssl2GjZ79ylwn_wpomHYTLC-qsJOfvILTQ4FVu9yo4SQ8/s1600/20213_gmail-hacked.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;By
 now I believe that I might have cleared lots of misconceptions related 
to cookie stealing, but all of those information is only good for you if
 you try to do it practically, &amp;nbsp;So let&#39;s get to the main topic.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;In
 gmail the cookie which authenticates users is called a GX cookie, Now 
as we cannot use a cookie stealer as by now we don&#39;t know any XSS 
vulnerability in gmail, So if you are on a LAN&amp;nbsp; you can use wireshark or
 any other packet sniffer to steal gmail Unsecured GX cookie and use it 
to gain acess.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Will this hack always work?&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Well this trick won&#39;t work on all Gmail accounts and as Gmail now offers End to End &lt;span style=&quot;color: blue;&quot;&gt;https://&lt;/span&gt;
 encryption, Which encrypts the session token so even if we could get 
our hands on the GX cookie it&#39;s useless, but if a user has turned off 
the End to End &lt;span style=&quot;color: blue;&quot;&gt;https://&lt;/span&gt; encryption in gmail it can work for sure.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuoEE4iQplXRu0-myAQaGdx-LH_jZw9Aq8SYp7mKxVGtXHoazstMYbFhL3tC4OZR-WB01nsxW_bX-D9ke6PAcC0nG3hPMhW_SOr0nKSX3EkB5FTMRMKdBtE0-7nv-5mVLLT_21vpEtTxA/s1600/1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;290&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuoEE4iQplXRu0-myAQaGdx-LH_jZw9Aq8SYp7mKxVGtXHoazstMYbFhL3tC4OZR-WB01nsxW_bX-D9ke6PAcC0nG3hPMhW_SOr0nKSX3EkB5FTMRMKdBtE0-7nv-5mVLLT_21vpEtTxA/s400/1.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;span lang=&quot;EN&quot;&gt;I
 hope you have liked the post uptill now, I will cover the method to 
steal gmail gx cookies and using it to hack gmail accounts in the next 
post, So stay tuned !.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span lang=&quot;EN&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2011/10/cookie-stealing.html</link><author>noreply@blogger.com (yeshwanth)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikr0PwGnTnzlfnEhqStjfHK_bo9VglCjNvRMcdkO8nr5tObUFNmuSmLLn6bP-bxn3zUyswh3YGHuObMYd2KrAKpBOsvBMo2nKqE_j-aU6cEGdFEZkA-6LrZGtASageQ5yEMb7F4aDquHw/s72-c/stealing-cookies.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-5469373968714663715</guid><pubDate>Wed, 05 Oct 2011 03:28:00 +0000</pubDate><atom:updated>2012-08-17T11:09:50.442-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">basics</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><title>skiping ads</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-large;&quot;&gt;&amp;nbsp;Skip or bypass Rapidshare, Megaupload Waiting time&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Yes, you are reading it correctly, its not a prank or joke, now you can easily avoid the waiting time or usually we say time limit when you download as a free user from the file sharing services such as rapidshare, megaupload, deposifiles, hotfile. Normally you have to wait for 20-60 minutes to download the second file after downloading the first one. They implement ways to invite users to purchase a premium service. But this way of limiting Free download limit and asking free users to wait for long time to start another download can be annoying one.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjddvmwn-w4JctgFqh0fFie3pyyCuj66oWp_OTP5GMuMlcD8dNeO5YvSBi9vpvZjW0Gw4T3mOmYnrlk4fIhv02zc2tC7EsSaac0W_LFJ5pfRP45bvtzMDK3RyoZ1qmU0rTekJ6BhuPW6zgI/s320/30985.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;262&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjddvmwn-w4JctgFqh0fFie3pyyCuj66oWp_OTP5GMuMlcD8dNeO5YvSBi9vpvZjW0Gw4T3mOmYnrlk4fIhv02zc2tC7EsSaac0W_LFJ5pfRP45bvtzMDK3RyoZ1qmU0rTekJ6BhuPW6zgI/s400/30985.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Skipscreen is an extension to browser to by pass waiting time on download. Unfortunately it can only be used with Firefox browsers to avoid waiting time while downloading files from some popular File hosting services like:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;* Rapidshare.com&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;* zShare.net&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;* MediaFire.com&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;* Megaupload.com&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;* Sharebee.com&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;* Depositfiles.com&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;* Sendspace.com&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;* Divshare.com&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;* Linkbucks.com&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;* Uploaded.to&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;* Hotfiles.com&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;* 4shared.com&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;* Limelinx.com&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;* Link-Protector.com&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Its use is very simple and does not require any configuration, just go to the addon page of the extension and install it, restart your browser and enter one of thesedownload sites and you will no longer have to wait.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Download Skip ----&lt;a href=&quot;http://adf.ly/2CWWL&quot;&gt;Screen Firefox Extention&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Alternative Methods or Hacks to Beat Rapidshare Download Limits and Waiting Time&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Method 1: &amp;nbsp;Using Java Script:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;1. Goto the page you want to download&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;2. Select FREE button&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;3. In the address bar put the following: javascript:alert(c=0)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;4. Click OK&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;5. Click OK to the pop-up box&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;6. Enter the captcha&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;7. Download Your File&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Method 2: &amp;nbsp;Request a new IP address from your ISP server&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Here’s how to do it in windows:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;1. Click Start&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;2. Click run&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;3. In the run box type cmd.exe and click OK&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;4. When the command prompt opens type the following.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;ENTER after each new line.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;ipconfig /flushdns&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;ipconfig /release&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;ipconfig /renew&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;exit&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Note: This might only work for DSL/Modem Internet Connection, not for Cable Internet users&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;2). Skipping or Bypassing Rapidshare or Megaupload, hotfile waiting time.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;In this post I have a new Rapidshare hacking tip for you. Well, you might be aware of Browsers like Firefox, or Internet Explorer. I would like to introduce you to a browser known as Torpark Browser, which works as a anonymous web browser. It is like a proxy browser where you can change your permanent IP Address &amp;nbsp;to dynamic IP Address. So, when ever you run this browser you get a new IP address. &amp;nbsp;Now download mutliple files at the same time. Yes you read it right, you can download multiple rapidshare files or megaupload, hotfile files at the same time. You can even skip or bypass the time limit on downloading files. The most amazing thing is IDM works with this browser.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;http://adf.ly/2CXFE&quot;&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Note: You need to close the browser window after each download coz it will reset the ip address.&lt;/span&gt;&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2011/10/or-bypass-rapidshare-megaupload-waiting.html</link><author>noreply@blogger.com (yeshwanth)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjddvmwn-w4JctgFqh0fFie3pyyCuj66oWp_OTP5GMuMlcD8dNeO5YvSBi9vpvZjW0Gw4T3mOmYnrlk4fIhv02zc2tC7EsSaac0W_LFJ5pfRP45bvtzMDK3RyoZ1qmU0rTekJ6BhuPW6zgI/s72-c/30985.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-5720943668226084861</guid><pubDate>Wed, 05 Oct 2011 02:08:00 +0000</pubDate><atom:updated>2012-08-17T11:09:29.647-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">basics</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><title>rocovering hacked Email</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;h2 style=&quot;text-align: center;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-large;&quot;&gt;How to Recover Hacked Email Accounts?&lt;/span&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.gohacking.com/wp-content/uploads/2010/05/email-hacked.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Email Hacked?&quot; border=&quot;0&quot; class=&quot;alignleft size-full wp-image-3285&quot; height=&quot;316&quot; src=&quot;http://www.gohacking.com/wp-content/uploads/2010/05/email-hacked.jpg&quot; title=&quot;Email hacked?&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
I&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;t
 can be a real nightmare if someone hacks and&amp;nbsp;takes control of your 
email account&amp;nbsp;as it may contain confidential information like bank 
logins, credit card details and other sensitive data. If you are one 
such Internet user whose email account has been compromised, then this 
post will surely help you out. In this post you will find the possible 
ways and procedures&amp;nbsp;to get back&amp;nbsp;your hacked email account.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;h2&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-large;&quot;&gt;For Gmail:&lt;/span&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;It can be a big disaster if your Gmail 
account has been compromised as&amp;nbsp;it may&amp;nbsp;be associated with&amp;nbsp;several 
services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing 
access to your Gmail account means losing access to all the services 
associated it with too. Here is a list of possible recovery actions that
 you can try.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;strong&gt;Step -1:&lt;/strong&gt; Try resetting 
your password since it is the easiest way to get your account back in 
action. In this process Google may ask you to&amp;nbsp;answer&amp;nbsp;the secret question
 or may send the&amp;nbsp;password reset details&amp;nbsp;to&amp;nbsp;the secondary email address 
associated with&amp;nbsp;your compromised account. You can reset you password 
from the following link&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;stb-info_box&quot; id=&quot;stb-box-9454&quot;&gt;
&lt;a href=&quot;https://www.google.com/accounts/ForgotPasswd&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Gmail Password Reset Link&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;If you cannot find success from the Step-1 then proceed to Step-2.&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;strong&gt;Step-2:&lt;/strong&gt;&amp;nbsp;Many times&amp;nbsp;the 
hacker&amp;nbsp;will change the secret question and secondary email address&amp;nbsp;right
 after the account is compromised. This is the reason&amp;nbsp;for&amp;nbsp;the Password 
Reset process to fail. If this is the case then you need to contact the 
Gmail support team by filling out the account recovery form. This form 
will ask you to fill out several questions like&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;1. Email addresses of up to five frequently emailed contacts&lt;br /&gt;
2. Names of any 4 Labels that you may have created in your account&lt;br /&gt;
3. List of other services associated with your compromised account&lt;br /&gt;
4. Your last successful login date&lt;br /&gt;
5. Account created date&lt;br /&gt;
6. Last password that you remember and many more…&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;You need to fill out this form as 
much&amp;nbsp;accurately as&amp;nbsp;possible. It is obvious to forget the dates&amp;nbsp;of last 
login, account creation and similar terms. However you need to figure 
out the closest possible date/answers and fill out&amp;nbsp;this form. This 
is&amp;nbsp;your last chance! The more accurate the information filled out in 
the&amp;nbsp;recovery form, the more the chances of getting your account back. 
You may reach the account recovery page form the following link&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;stb-info_box&quot; id=&quot;stb-box-7835&quot;&gt;
&lt;a href=&quot;http://www.google.com/support/accounts/bin/request.py?ara=1&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Account Recovery Form&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;h2&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-large;&quot;&gt;For Yahoo and&amp;nbsp;Hotmail:&lt;/span&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Unfortunately for Yahoo/Hotmail there is
 no second option like filling out the form or contacting the support 
team. All you need to do is either answer the secret questions&amp;nbsp;that you 
have setup or reset the password using the secondary email option.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;To initiate the password reset process just click on the &lt;strong&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Forgot password link&lt;/span&gt;&lt;/strong&gt;&amp;nbsp;in your&amp;nbsp;login page and proceed as per the screen instructions.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;I hope this post will help you recover the lost account. I highly recommend that you also read my post on &lt;a href=&quot;http://www.gohacking.com/2008/10/how-to-protect-email-account-from-being.html&quot; target=&quot;_blank&quot;&gt;How to protect your email account&lt;/a&gt; from being hacked and &lt;a href=&quot;http://www.gohacking.com/2009/05/tips-to-find-unauthorized-activity-on-your-email-account.html&quot; target=&quot;_blank&quot;&gt;Tips to find unauthorized activity on your Gmail account&lt;/a&gt; so that you always stay protected!&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2011/10/rocovering-hacked-email.html</link><author>noreply@blogger.com (yeshwanth)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-8354413990050732681</guid><pubDate>Tue, 04 Oct 2011 18:19:00 +0000</pubDate><atom:updated>2012-08-17T11:09:09.698-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">basics</category><category domain="http://www.blogger.com/atom/ns#">downloads</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">tools</category><title>Email tracking(ip)</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Hai this post is for noobs if you are a&amp;nbsp;daemon&amp;nbsp;ignore&amp;nbsp;it!!!&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-large;&quot;&gt;Tracing mails you recieve&lt;/span&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;If you have any abusive mails or if you want to trace victims IP&amp;nbsp;address&amp;nbsp;or if you want to know&amp;nbsp;whether&amp;nbsp;your friend has read your mail then this will help you&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Here it goes:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; You can trace the email&amp;nbsp;received&amp;nbsp;by&amp;nbsp;analyzing&amp;nbsp;the header actually this could be done manually ,but i wont be recommending that becoz there are tools which make life easier follow the steps&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;1.open the email header (you can find the header by clicking show original option in gmail)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;2.copy the header and paste in below mentioned tools&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Recommended tools:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Utility name: Neo Trace Pro&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://images.six.betanews.com/screenshots/944696732-1.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;280&quot; src=&quot;http://images.six.betanews.com/screenshots/944696732-1.gif&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Fantastic tool top recommended this will geographically trace your ip address .It is very accurate and has extremely useful functionalities.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Download from &lt;a href=&quot;http://www.neotrace.com/&quot;&gt;here&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;utility name:&amp;nbsp;VisualRoute , Download from &lt;a href=&quot;http://www.visualroute.com/download.html&quot;&gt;here&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;utility name: eMailTrackerPro , Download from &lt;a href=&quot;http://www.visualware.com/personal/download/index.html&quot;&gt;here&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-large;&quot;&gt;Tracing the mails that you send&lt;/span&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Most of you find fun in this bcoz the tool i&#39;m gonna explain will send you information when the victim opens it.All you need to do is&amp;nbsp;visit&amp;nbsp;spypig.com enter the&amp;nbsp;required&amp;nbsp;fields then it will give you a image which has to be sent to your victim. the tool&amp;nbsp;looks&amp;nbsp;like this&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhO_uhCDPzAe7veB0p8UiKMavM-8e5NxxxpKEhVlggGz57UKenoNE-ITcTSnjnmhOdxKKkymbrIelACUCkRntF4Y3Li3N9Mm_tPYTjXo7oCGx1wTziM5raD4gMIZDQWB57BbfIEJVD9khE/s1600/spypig.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhO_uhCDPzAe7veB0p8UiKMavM-8e5NxxxpKEhVlggGz57UKenoNE-ITcTSnjnmhOdxKKkymbrIelACUCkRntF4Y3Li3N9Mm_tPYTjXo7oCGx1wTziM5raD4gMIZDQWB57BbfIEJVD9khE/s640/spypig.JPG&quot; width=&quot;296&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Step 1:&lt;/b&gt; Specify the email id to&amp;nbsp;which&amp;nbsp;you want to get the&amp;nbsp;Destination&#39;s&amp;nbsp;ip&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Step 2:&lt;/b&gt; Here goes your message title&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Step 3:&lt;/b&gt; Select the image you want to send , you may upload your own image too but its recommended to select the first one(white) becoz it will mix up with white background of your mail body so some one looking at this will think that there is no image&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Step 4:&lt;/b&gt; Press the create button&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Step 5:&lt;/b&gt;Here the tricky part comes copy your image into your mail body within in the time limit shown by spy pig or else it will expire&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Note :&lt;/b&gt; Use the New gmail version bcoz in older one you cant copy a image into body&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Step 6:&lt;/b&gt; this step says you to send the mail&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Hopefully if the victim opens the mail you will&amp;nbsp;receive&amp;nbsp;all the information of victim like OS,browser,ip &amp;amp; mac address&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Note :&lt;/b&gt; there is no counter measure for this&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;HAPPY HACKING ;]&lt;/span&gt;&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2011/10/email-trackingip.html</link><author>noreply@blogger.com (yeshwanth)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhO_uhCDPzAe7veB0p8UiKMavM-8e5NxxxpKEhVlggGz57UKenoNE-ITcTSnjnmhOdxKKkymbrIelACUCkRntF4Y3Li3N9Mm_tPYTjXo7oCGx1wTziM5raD4gMIZDQWB57BbfIEJVD9khE/s72-c/spypig.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-1518074046862589143</guid><pubDate>Tue, 04 Oct 2011 08:55:00 +0000</pubDate><atom:updated>2012-08-17T11:08:26.709-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">email bomber</category><category domain="http://www.blogger.com/atom/ns#">imacros</category><category domain="http://www.blogger.com/atom/ns#">sms bomber</category><title>Email/SMS Bomber</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Bombers are programs which will be using the online resources for sending continues unlimited messages to a mail or mobile.This sounds great right! ,but the problem with these bombers is mostly they will be fake or it will be a virus&amp;nbsp;which&amp;nbsp;will fool you so its better to stay off from them(if you find any legitimate bomber plZZ&amp;nbsp;comment that information.)&lt;br /&gt;
-&amp;gt;Alternative, simple, best option is to move for tools which will automatically click the pages for you&lt;br /&gt;
Tools i&amp;nbsp;recommend&amp;nbsp;are:&lt;br /&gt;
1.iMacros&lt;br /&gt;
2.Greece Monkey&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; both do the same work for you. I&#39;m going to explain about iMacros today which is a extension available for Chrome and Firefox.It looks:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNST7gmtamK0bHBqHntDhxTrhmfoTw5o3-CPXeo4l9FGqseHnQ1JoX6UXSXKj37C0ZscKk0dwle9l7dnHGaX-FfFFb5rsXhHOF7T5ouAY4AP3A93cFC_eErAvn8s2ECVJMWh92bW_eTHk/s1600/imacro.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNST7gmtamK0bHBqHntDhxTrhmfoTw5o3-CPXeo4l9FGqseHnQ1JoX6UXSXKj37C0ZscKk0dwle9l7dnHGaX-FfFFb5rsXhHOF7T5ouAY4AP3A93cFC_eErAvn8s2ECVJMWh92bW_eTHk/s640/imacro.JPG&quot; width=&quot;193&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Simply goooogle to find this extension for your browser&lt;br /&gt;
-&amp;gt;All you need to do here is to click play button in iMacros and do what ever you want to be repeated in chrome.&lt;br /&gt;
-&amp;gt;Once you finish doing it may be sending message to any portal or sending mail ,you have to stop the session in iMacros you will find save option in the next window save that with desired name.&lt;br /&gt;
-&amp;gt;now click on the saved file and click play loop you will see the repetition of what you have done&lt;br /&gt;
-&amp;gt;By setting &quot;max&quot; option you can control how many times the loop runs&lt;br /&gt;
Hope this is helpful&lt;br /&gt;
IF YOU STILL NEED HELP WATCH THE VIDEO&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/377G701RxOw?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;
The greece monkey is pretty much the same&lt;br /&gt;
HAPPY HACKING;]&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2011/10/emailsms-bomber.html</link><author>noreply@blogger.com (yeshwanth)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNST7gmtamK0bHBqHntDhxTrhmfoTw5o3-CPXeo4l9FGqseHnQ1JoX6UXSXKj37C0ZscKk0dwle9l7dnHGaX-FfFFb5rsXhHOF7T5ouAY4AP3A93cFC_eErAvn8s2ECVJMWh92bW_eTHk/s72-c/imacro.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-5148807332870831585</guid><pubDate>Tue, 04 Oct 2011 05:53:00 +0000</pubDate><atom:updated>2012-08-17T11:12:32.122-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">basics</category><title>google unofficial shell account</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgj3Jt2fGnLyVg4VmNEuI4a5UkllOBz9epjp0sNchzfWarSzsEGpemKDv86SVvBrzYZVG1oBCrLidmEfxFYZpiPrkd4x_KdNV2tk5nhzTTTA4EGPmQR5uUhDgxsIYgwRaheYp8O938GTU/s1600/sshell.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;273&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgj3Jt2fGnLyVg4VmNEuI4a5UkllOBz9epjp0sNchzfWarSzsEGpemKDv86SVvBrzYZVG1oBCrLidmEfxFYZpiPrkd4x_KdNV2tk5nhzTTTA4EGPmQR5uUhDgxsIYgwRaheYp8O938GTU/s400/sshell.JPG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: monospace; font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: monospace; font-size: large;&quot;&gt;This google-interface behaves similar to a unix-shell.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: monospace; font-size: large;&quot;&gt;You type commands and the results are shown on this page.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: monospace;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: monospace; font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: monospace; font-size: large;&quot;&gt;goosh is powered by google.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: monospace; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: monospace; font-size: large;&quot;&gt;goosh is written by Stefan Grothkopp &amp;lt;grothkopp@gmail.com&amp;gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: monospace; font-size: large;&quot;&gt;it is NOT an official google product!&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: monospace; font-size: large;&quot;&gt;goosh is open source under the Artistic License/GPL.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: monospace; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: monospace; font-size: large;&quot;&gt;Click &lt;a href=&quot;http://www.goosh.org/&quot;&gt;here&lt;/a&gt; to see.&lt;/span&gt;&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2011/10/google-unofficial-shell-account.html</link><author>noreply@blogger.com (yeshwanth)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgj3Jt2fGnLyVg4VmNEuI4a5UkllOBz9epjp0sNchzfWarSzsEGpemKDv86SVvBrzYZVG1oBCrLidmEfxFYZpiPrkd4x_KdNV2tk5nhzTTTA4EGPmQR5uUhDgxsIYgwRaheYp8O938GTU/s72-c/sshell.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-2331657188555471740</guid><pubDate>Mon, 03 Oct 2011 08:00:00 +0000</pubDate><atom:updated>2011-10-04T02:21:52.941-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Virus</category><title>online virus scanner</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Im gonna share a site where a data uploaded will be scanned by most popular anti virus tools and results will be shown.Its better check that on your own&lt;br /&gt;
&lt;br /&gt;
&lt;div id=&quot;sites-chrome-header-wrapper&quot; style=&quot;text-align: -webkit-auto;&quot; xmlns=&quot;http://www.w3.org/1999/xhtml&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;sites-chrome-main-wrapper&quot;&gt;
&lt;div id=&quot;sites-chrome-main-wrapper-inside&quot;&gt;
&lt;table cellspacing=&quot;0&quot; class=&quot;sites-layout-hbox&quot; id=&quot;sites-chrome-main&quot; style=&quot;text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class=&quot;sites-layout-sidebar-left&quot; id=&quot;sites-chrome-sidebar-left&quot;&gt;&lt;div class=&quot;sites-clear&quot; xmlns=&quot;http://www.w3.org/1999/xhtml&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;/td&gt;
&lt;td id=&quot;sites-canvas-wrapper&quot;&gt;&lt;div id=&quot;sites-canvas&quot;&gt;
&lt;div id=&quot;goog-ws-editor-toolbar-container&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;sites-canvas-main&quot; id=&quot;sites-canvas-main&quot;&gt;
&lt;div id=&quot;sites-canvas-main-content&quot;&gt;
&lt;div class=&quot;sites-layout-name-two-column-hf sites-layout-vbox&quot; xmlns=&quot;http://www.w3.org/1999/xhtml&quot;&gt;
&lt;div class=&quot;sites-layout-tile sites-tile-name-header&quot;&gt;
&lt;div dir=&quot;ltr&quot;&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;best site for online virus scan&amp;nbsp;
&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;a href=&quot;http://virusscan.jotti.org/en&quot; rel=&quot;nofollow&quot;&gt;http://virusscan.jotti.org/en&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;display: block; text-align: left;&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;https://sites.google.com/site/yyeshwanth4/home/Fullscreen%20capture%20342011%20101853%20PM.bmp?attredirects=0&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://sites.google.com/site/yyeshwanth4/_/rsrc/1299306196318/home/Fullscreen%20capture%20342011%20101853%20PM.bmp&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Actually guys this post will be helpful to the virus writers ,with a single click we can find which AV can trace the virus.&lt;/div&gt;
&lt;div id=&quot;sites-chrome-main-wrapper-inside&quot;&gt;
&quot;SAFE HACKING&quot;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2011/10/online-virus-scanner.html</link><author>noreply@blogger.com (yeshwanth)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-380077880011334157</guid><pubDate>Mon, 03 Oct 2011 02:39:00 +0000</pubDate><atom:updated>2011-10-02T20:24:11.640-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">originally Posted by Rao Asfand Yar</category><title>phishing tutorial</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; font-family: sans-serif, &#39;Trebuchet MS&#39;, Arial, Tahoma; font-size: 13px; line-height: 19px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
A video which is made by me on phishing and the important thing is you will not get banned&lt;br /&gt;
if you will do phishing in this manner.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Click&amp;nbsp;&lt;a href=&quot;http://www.youtube.com/watch?v=1mPFKF-3XN0&quot; style=&quot;text-decoration: none;&quot;&gt;here&lt;/a&gt;&amp;nbsp;to see video in Good quality&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: white; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: white; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.blogger.com/video.g?token=AD6v5dzjJv-2d0OkEGxJi0-MJ0LXPKx2XdK4e7o4B551tJ-rEO36gg20exqOp17UVjgGWEcjTq7ojmCsw2u8HWo2Gw&#39; class=&#39;b-hbp-video b-uploaded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;a href=&quot;rtsp://v5.cache3.googlevideo.com/ChoLENy73wIaEQm-kT-Tu0aRhhMYDSANFEgDDA==/0/0/0/video.3gp&quot; style=&quot;color: #aad0ff; text-decoration: none;&quot; type=&quot;video/3gpp&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; color: white;&quot;&gt;&lt;br /&gt;
Cant see anything clearly than click&amp;nbsp;&lt;a href=&quot;http://www.youtube.com/watch?v=1mPFKF-3XN0&quot; style=&quot;text-decoration: none;&quot;&gt;here&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
THIS INFORMATION IS ONLY FOR EDUCATIONAL PURPOSE&lt;br /&gt;
&quot;SAFE HACKING&quot;&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://pardonhackers.blogspot.com/2011/10/phishing-tutorial.html</link><author>noreply@blogger.com (yeshwanth)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-147300541631877794</guid><pubDate>Mon, 03 Oct 2011 02:35:00 +0000</pubDate><atom:updated>2011-10-04T01:59:00.283-07:00</atom:updated><title>binders -used for binding two exe files</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: sans-serif, &#39;Trebuchet MS&#39;, Arial, Tahoma; font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: sans-serif, &#39;Trebuchet MS&#39;, Arial, Tahoma;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: sans-serif, &#39;Trebuchet MS&#39;, Arial, Tahoma;&quot;&gt;A binder is a software that is used to combine two or more files into a single file so that when the user opens the single file,two files are executed.90% binders are used for hacking.you can combine a good exe with trojan so your friend and Anti virus thinks that they are opening a normal exe.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: sans-serif, &#39;Trebuchet MS&#39;, Arial, Tahoma;&quot;&gt;one more coolest thing about this is if you join a virus with autorun.exe of any pendrive..........guess what happens?........................&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: sans-serif, &#39;Trebuchet MS&#39;, Arial, Tahoma;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: sans-serif, &#39;Trebuchet MS&#39;, Arial, Tahoma;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: sans-serif, &#39;Trebuchet MS&#39;, Arial, Tahoma;&quot;&gt;How to use binder for Hacking:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: sans-serif, &#39;Trebuchet MS&#39;, Arial, Tahoma;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: sans-serif, &#39;Trebuchet MS&#39;, Arial, Tahoma;&quot;&gt;1.first of all download registered file joiner (a simple file binder) 100% working from&amp;nbsp;&lt;a href=&quot;http://www.ziddu.com/download/12339650/FileJoiner.rar.html&quot;&gt;here&lt;/a&gt;,It also has little option to encypt the files, if you are facing problems while downloading then download from &lt;a href=&quot;http://adf.ly/AFXY&quot;&gt;here&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: sans-serif, &#39;Trebuchet MS&#39;, Arial, Tahoma;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: sans-serif, &#39;Trebuchet MS&#39;, Arial, Tahoma;&quot;&gt;2.Now click on add file and select RATS,keyloggers,bots etc.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: sans-serif, &#39;Trebuchet MS&#39;, Arial, Tahoma;&quot;&gt;3.Now again click on add file and select any file,here you can see i have added mozilla firefox.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: sans-serif, &#39;Trebuchet MS&#39;, Arial, Tahoma;&quot;&gt;4.Change icon (optional).&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: sans-serif, &#39;Trebuchet MS&#39;, Arial, Tahoma;&quot;&gt;5.Click join files.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: sans-serif, &#39;Trebuchet MS&#39;, Arial, Tahoma; font-size: 13px; line-height: 19px;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3qq2XqLAsj9_8-rUi7ZH4-dVYyw2kivMDj6i74sCEVnxee50WRg2MpWNLCvuLxOf7NOynt189UPRuvX-g_3fMCnoSKqYaFVIKQJnTX0t9wUwNCPAHX9732eJzP3mJ27fDzqV9eIa5oew/s1600/file+joiner.bmp&quot; style=&quot;background-color: black; color: white; text-decoration: underline;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5534660970432986674&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3qq2XqLAsj9_8-rUi7ZH4-dVYyw2kivMDj6i74sCEVnxee50WRg2MpWNLCvuLxOf7NOynt189UPRuvX-g_3fMCnoSKqYaFVIKQJnTX0t9wUwNCPAHX9732eJzP3mJ27fDzqV9eIa5oew/s400/file+joiner.bmp&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: #111111; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: block; height: 300px; margin-bottom: 10px; margin-left: auto; margin-right: auto; margin-top: 0px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px; text-align: center; width: 343px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2011/10/binders-used-for-binding-to-exe-files.html</link><author>noreply@blogger.com (yeshwanth)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3qq2XqLAsj9_8-rUi7ZH4-dVYyw2kivMDj6i74sCEVnxee50WRg2MpWNLCvuLxOf7NOynt189UPRuvX-g_3fMCnoSKqYaFVIKQJnTX0t9wUwNCPAHX9732eJzP3mJ27fDzqV9eIa5oew/s72-c/file+joiner.bmp" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-3689252104939608663</guid><pubDate>Mon, 03 Oct 2011 02:26:00 +0000</pubDate><atom:updated>2012-08-17T11:07:46.220-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">course</category><category domain="http://www.blogger.com/atom/ns#">downloads</category><title>AFCEH 5.0 slides</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.relianceworld.in/e_images/afceh4_big.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;105&quot; src=&quot;http://www.relianceworld.in/e_images/afceh4_big.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #f4f4f4; color: #666666; font-family: Arial, Tahoma, &#39;Century gothic&#39;, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;b style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: orange; font-size: medium; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Powerpoint slides for all weeks of AFCEH course&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;i style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;b style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-size: medium; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;
WEEK-1&lt;/div&gt;
&lt;div style=&quot;font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.mediafire.com/?v1kytkzpoosrxi0&quot; style=&quot;background-color: transparent; color: #368f2c; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot;&gt;click here&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
WEEK-2&lt;/div&gt;
&lt;div style=&quot;font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.mediafire.com/?1l01in4zziv7qn0&quot; style=&quot;background-color: transparent; color: #368f2c; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot;&gt;click here&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
WEEK-3&lt;/div&gt;
&lt;div style=&quot;font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.mediafire.com/?dgrk7d0o6molgn3&quot; style=&quot;background-color: transparent; color: #368f2c; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot;&gt;click here&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
WEEK-4&lt;/div&gt;
&lt;div style=&quot;font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.mediafire.com/?5o0er3i2pua04oe&quot; style=&quot;background-color: transparent; color: #368f2c; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot;&gt;click here&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
ankith Fadia certification course helps noobs in hacking to know all about hacking ,dont expect to learn from this course&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
slides of this course can be downloaded from the above links.&lt;/div&gt;
&lt;div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Contents in the course are:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;font-weight: bold;&quot;&gt;
Week 1:-&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Spoofing ip address and mac addresses&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Proxy bouncing&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Hacking rapidshare&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Shortened URL Vulnerabilities&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Network reconnaissance&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Ping sweeping and traceroute&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Reverse DNS lookups&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Netcat and NCat&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Port scanning&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Daemon banner grabbing&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Week 2&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
ICMP scanning&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
OS fingerprinting&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Firewall enumeration&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Passive fingerprinting with p0f&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Web server fingerprinting&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Spoofed packet attacks&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Email forging&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
DOS attaicks&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Reflective DDOS attacks&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Password cracking attacks&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Cracking saved password in browsers&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Password managers&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Intellectual property thefts&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
EXE binders&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Social engineering attacks&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
TCP/IP: A mammoth description&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Firewall tunneling using SSH and putty&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
HTTP tunneling&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Cracking Email accounts&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Port Forwarding and port triggering&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;WEEK 3&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Identity thefts&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Input validation attacks&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
SQL injection&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
IP spoofing&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Cross site scripting attacks&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Misuse of hidden HTML tags&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Canonicalization attacks&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
HTTP response splitting&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Buffer overflows&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Passive and active sniffing attacks&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
ARP poisoning attack&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
MAC flooding attack&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
MAC duplication attack&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Social networking websites security&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Windows 7 and windows vista password cracking&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Cracking CAPTCHA&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Tab napping&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
DNS cache poisoning&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
DNS cache poisoning birthday attack&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Domain hijacking&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;WEEK 4&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Meet in the middle attacks&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Shell accounts&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
USB hacking&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Road sign hacking&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Steganography&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Wireless hacking&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
War driving&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
De-authentication attacks&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Cracking WEP keys&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Caffe latte attacks&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Cracking WPA and WPA2&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Computer forensics&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Honeypots&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Viruses torn apart&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Penetration testing and vulnerability assessment&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Software hacking&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Backtrack&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
hope to listen some comments&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&quot;SAFE HACKING&quot;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2011/10/afceh-50-slides.html</link><author>noreply@blogger.com (yeshwanth)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-6913844811814992222</guid><pubDate>Sun, 02 Oct 2011 17:42:00 +0000</pubDate><atom:updated>2011-10-02T19:17:56.177-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Drive</category><category domain="http://www.blogger.com/atom/ns#">Install</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>How to Install Windows 7 From a USB Drive</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq9i4rM2kdotN2vG9cQyDqylh27xPkG2OWfB9hxZI0LzLh67Nq3GXhZq97F8NhJu46VGNCQt4RbQI9wPJaEMwqCtBgc9UN4EWkBx5Al2ExycmPEA05zQCMVHaHBbfK0Vir9gIpLNXlHVI/s320/Windows+Vista+With+Pendrive.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq9i4rM2kdotN2vG9cQyDqylh27xPkG2OWfB9hxZI0LzLh67Nq3GXhZq97F8NhJu46VGNCQt4RbQI9wPJaEMwqCtBgc9UN4EWkBx5Al2ExycmPEA05zQCMVHaHBbfK0Vir9gIpLNXlHVI/s320/Windows+Vista+With+Pendrive.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Installing Windows from a USB flash drive has several advantages – First of all, the overall speed of the installation process will increase significantly,&amp;nbsp;carrying a USB stick is much more convenient than a DVD, and finally it becomes possible to install&amp;nbsp;the OS&amp;nbsp;even on those systems&amp;nbsp;that do not have a DVD drive, such as a netbook.&lt;br /&gt;
In this post, I will show you how to load the Windows installation on to your USB&amp;nbsp;flash drive&amp;nbsp;and make it bootable just like the DVD.&lt;br /&gt;
Tools Required:&lt;br /&gt;
1. USB&amp;nbsp;flash drive with a minimum capacity of 4 GB.&lt;br /&gt;
2. Windows 7&amp;nbsp;set-up DVD.&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: Arial, Helvetica; font-size: 14px; line-height: 24px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot;&gt;&lt;span style=&quot;font-size: small; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Step-1:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&amp;nbsp;Plug-in your USB flash drive and backup all the existing data in it.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-size: small; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Step-2:&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&amp;nbsp;Open the command prompt. If you are using Windows 7/Vista then open it with administrator rights*.&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: Arial, Helvetica; font-size: 14px; line-height: 24px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-size: small; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Step 3:&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&amp;nbsp;In the command prompt, type in the following command:&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;stb-info_box&quot; id=&quot;stb-box-835&quot; style=&quot;background-color: #e2f8de; background-image: url(http://www.gohacking.com/wp-content/plugins/wp-special-textboxes/images/info.png); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(122, 217, 117); border-bottom-left-radius: 5px 5px; border-bottom-right-radius: 5px 5px; border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(122, 217, 117); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(122, 217, 117); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(122, 217, 117); border-top-left-radius: 5px 5px; border-top-right-radius: 5px 5px; border-top-style: dashed; border-top-width: 1px; color: black; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; min-height: 20px; padding-bottom: 5px; padding-left: 25px; padding-right: 5px; padding-top: 5px; text-align: left;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;pre style=&quot;padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;DISKPART&lt;/pre&gt;&lt;/strong&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/strong&gt;&lt;/div&gt;&lt;/div&gt;&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;This will start the&amp;nbsp;&lt;i style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Microsoft DiskPart&lt;/i&gt;&amp;nbsp;utility as shown below:&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;img alt=&quot;Microsoft DiskPart&quot; class=&quot;alignleft size-full wp-image-4452&quot; height=&quot;189&quot; src=&quot;http://www.gohacking.com/wp-content/uploads/2011/06/DiskPart.jpg&quot; style=&quot;border-bottom-color: rgb(204, 204, 204); border-bottom-style: solid; border-bottom-width: 0px; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 0px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 0px; border-top-color: rgb(204, 204, 204); border-top-style: solid; border-top-width: 0px; display: inline; float: left; margin-bottom: 2px; margin-left: 0px; margin-right: 7px; margin-top: 0px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;&quot; width=&quot;550&quot; /&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Now issue the following command:&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;stb-info_box&quot; id=&quot;stb-box-9403&quot; style=&quot;background-color: #e2f8de; background-image: url(http://www.gohacking.com/wp-content/plugins/wp-special-textboxes/images/info.png); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(122, 217, 117); border-bottom-left-radius: 5px 5px; border-bottom-right-radius: 5px 5px; border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(122, 217, 117); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(122, 217, 117); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(122, 217, 117); border-top-left-radius: 5px 5px; border-top-right-radius: 5px 5px; border-top-style: dashed; border-top-width: 1px; color: black; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; min-height: 20px; padding-bottom: 5px; padding-left: 25px; padding-right: 5px; padding-top: 5px; text-align: left;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;pre style=&quot;padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;LIST DISK&lt;/pre&gt;&lt;/strong&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/strong&gt;&lt;/div&gt;&lt;/div&gt;&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;This will show you a list of&amp;nbsp; available disks on your system.&amp;nbsp;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Disk 0&lt;/strong&gt;&amp;nbsp;is usually the hard disk. In my case,&amp;nbsp;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Disk 5&lt;/strong&gt;&amp;nbsp;is the USB drive (this can be a different one in your case). Now issue the command as shown below:&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;div class=&quot;stb-info_box&quot; id=&quot;stb-box-6234&quot; style=&quot;background-color: #e2f8de; background-image: url(http://www.gohacking.com/wp-content/plugins/wp-special-textboxes/images/info.png); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(122, 217, 117); border-bottom-left-radius: 5px 5px; border-bottom-right-radius: 5px 5px; border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(122, 217, 117); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(122, 217, 117); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(122, 217, 117); border-top-left-radius: 5px 5px; border-top-right-radius: 5px 5px; border-top-style: dashed; border-top-width: 1px; color: black; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; min-height: 20px; padding-bottom: 5px; padding-left: 25px; padding-right: 5px; padding-top: 5px; text-align: left;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;pre style=&quot;padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;SELECT DISK 5&lt;/pre&gt;&lt;/strong&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/strong&gt;&lt;/div&gt;&lt;/div&gt;&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;img alt=&quot;Install Windows 7 from USB&quot; class=&quot;alignleft size-full wp-image-4453&quot; height=&quot;270&quot; src=&quot;http://www.gohacking.com/wp-content/uploads/2011/06/Capture1.jpg&quot; style=&quot;border-bottom-color: rgb(204, 204, 204); border-bottom-style: solid; border-bottom-width: 0px; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 0px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 0px; border-top-color: rgb(204, 204, 204); border-top-style: solid; border-top-width: 0px; display: inline; float: left; margin-bottom: 2px; margin-left: 0px; margin-right: 7px; margin-top: 0px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;&quot; width=&quot;450&quot; /&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;NOTE:&lt;/strong&gt;&lt;/span&gt;&amp;nbsp;In the above command,&amp;nbsp;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;5&lt;/strong&gt;&amp;nbsp;is the USB drive number on my system. If you have a different number on your system, then you need to replace 5 with&amp;nbsp;that number.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-size: small; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Step-4:&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&amp;nbsp;Now issue the following list of commands one by one as shown below:&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;stb-info_box&quot; id=&quot;stb-box-2664&quot; style=&quot;background-color: #e2f8de; background-image: url(http://www.gohacking.com/wp-content/plugins/wp-special-textboxes/images/info.png); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(122, 217, 117); border-bottom-left-radius: 5px 5px; border-bottom-right-radius: 5px 5px; border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(122, 217, 117); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(122, 217, 117); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(122, 217, 117); border-top-left-radius: 5px 5px; border-top-right-radius: 5px 5px; border-top-style: dashed; border-top-width: 1px; color: black; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; min-height: 20px; padding-bottom: 5px; padding-left: 25px; padding-right: 5px; padding-top: 5px; text-align: left;&quot;&gt;&lt;pre style=&quot;padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;CLEAN&lt;/strong&gt;

&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;CREATE PARTITION PRIMARY&lt;/strong&gt;

&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;SELECT PARTITION 1&lt;/strong&gt;

&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;ACTIVE&lt;/strong&gt;

&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;FORMAT FS=NTFS QUICK&lt;/strong&gt;

&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;ASSIGN&lt;/strong&gt;

&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;EXIT&lt;/strong&gt;
&lt;/pre&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;/div&gt;&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;img alt=&quot;Install Windows 7 from USB&quot; class=&quot;size-full wp-image-4461&quot; height=&quot;456&quot; src=&quot;http://www.gohacking.com/wp-content/uploads/2011/06/Capture2.jpg&quot; style=&quot;border-bottom-color: rgb(204, 204, 204); border-bottom-style: solid; border-bottom-width: 0px; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 0px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 0px; border-top-color: rgb(204, 204, 204); border-top-style: solid; border-top-width: 0px; margin-bottom: 5px; margin-left: 0px; margin-right: 10px; margin-top: 0px; padding-bottom: 2px; padding-left: 2px; padding-right: 2px; padding-top: 2px;&quot; width=&quot;450&quot; /&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;Minimize the command prompt and proceed to the next step.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;u style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-size: small; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Step 5:&lt;/strong&gt;&lt;/span&gt;&lt;/u&gt;&amp;nbsp;Insert the Windows 7/Vista installation disc and&amp;nbsp;note down the “drive letter” of your DVD drive. In my case, it is “H:”. Now type the following list of commands as shown below:&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;stb-info_box&quot; id=&quot;stb-box-5750&quot; style=&quot;background-color: #e2f8de; background-image: url(http://www.gohacking.com/wp-content/plugins/wp-special-textboxes/images/info.png); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(122, 217, 117); border-bottom-left-radius: 5px 5px; border-bottom-right-radius: 5px 5px; border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(122, 217, 117); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(122, 217, 117); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(122, 217, 117); border-top-left-radius: 5px 5px; border-top-right-radius: 5px 5px; border-top-style: dashed; border-top-width: 1px; color: black; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; min-height: 20px; padding-bottom: 5px; padding-left: 25px; padding-right: 5px; padding-top: 5px; text-align: left;&quot;&gt;&lt;pre style=&quot;padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;H: CD BOOT&lt;/strong&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;CD BOOT&lt;/strong&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;BOOTSECT.EXE /NT60 M:&lt;/strong&gt;(NOTE: M: is&amp;nbsp;your USB&amp;nbsp;drive letter)
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;EXIT&lt;/strong&gt;
&lt;/div&gt;&lt;/pre&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;/div&gt;&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;img alt=&quot;Win 7 from USB flash drive&quot; class=&quot;alignleft size-full wp-image-4469&quot; height=&quot;202&quot; src=&quot;http://www.gohacking.com/wp-content/uploads/2011/06/Capture3.jpg&quot; style=&quot;border-bottom-color: rgb(204, 204, 204); border-bottom-style: solid; border-bottom-width: 0px; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 0px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 0px; border-top-color: rgb(204, 204, 204); border-top-style: solid; border-top-width: 0px; display: inline; float: left; margin-bottom: 2px; margin-left: 0px; margin-right: 7px; margin-top: 0px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;&quot; width=&quot;450&quot; /&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;u style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Step-6:&lt;/u&gt;&lt;/strong&gt;&lt;/span&gt;&amp;nbsp;Copy the contents of&amp;nbsp;your Windows 7/Vista&amp;nbsp;installation disk into the USB flash drive.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;That’s it! Your USB stick is now ready to boot and install the OS for you. Don’t forget to enable the “USB Boot” option and change the “boot priority to USB device from hard disk”&amp;nbsp;in your BIOS settings.&lt;/div&gt;&lt;/div&gt;</description><link>http://pardonhackers.blogspot.com/2011/10/how-to-install-windows-7-from-usb-drive.html</link><author>noreply@blogger.com (yeshwanth)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq9i4rM2kdotN2vG9cQyDqylh27xPkG2OWfB9hxZI0LzLh67Nq3GXhZq97F8NhJu46VGNCQt4RbQI9wPJaEMwqCtBgc9UN4EWkBx5Al2ExycmPEA05zQCMVHaHBbfK0Vir9gIpLNXlHVI/s72-c/Windows+Vista+With+Pendrive.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-1079708182505643844</guid><pubDate>Sun, 02 Oct 2011 17:33:00 +0000</pubDate><atom:updated>2011-10-02T10:35:56.907-07:00</atom:updated><title>How to Make a Trojan Horse</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.wga.hu/art/t/tiepolo/giandome/1/trojan_ho.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;232&quot; src=&quot;http://www.wga.hu/art/t/tiepolo/giandome/1/trojan_ho.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: Arial, Helvetica; font-size: 14px; line-height: 24px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;Most of you may be curious to know about&amp;nbsp;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;how to&amp;nbsp;make a Trojan&amp;nbsp;&lt;/strong&gt;or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you&amp;nbsp;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;how to&amp;nbsp;make a simple Trojan on your own&amp;nbsp;&lt;/strong&gt;using C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run. Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using&amp;nbsp;a high level programming language it is often undetected by antivirus. The source code for this Trojan is available for download&amp;nbsp;at the end of this post.&amp;nbsp;Let’s see how this Trojan works…&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;Before I move to explain the features of this Trojan you need to know&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Trojan_horse_(computing)&quot; style=&quot;color: #b50000; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;what exactly is a Trojan horse&lt;/a&gt;&amp;nbsp;and how&amp;nbsp;it works. As most of us think a Trojan or a Trojan horse is not a virus.&amp;nbsp;In simple words&amp;nbsp;a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Now lets move to the working of our Trojan&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in the&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Windows\System32&lt;/strong&gt;&amp;nbsp;folder with the&amp;nbsp;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;.dll&amp;nbsp;&lt;/strong&gt;extension. Since the junk file has the&amp;nbsp;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;.dll&lt;/strong&gt;&amp;nbsp;extention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;The algorithm of the Trojan is as follows&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;1. Search for the&amp;nbsp;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;root drive&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;2. Navigate to&amp;nbsp;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;WindowsSystem32&lt;/strong&gt;&amp;nbsp;on the root drive&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;3. Create the file named “&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;spceshot.dll&lt;/strong&gt;”&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;4. Start&amp;nbsp;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;dumping the junk data&amp;nbsp;&lt;/strong&gt;onto the above file and keep increasing it’s size until the drive is full&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;5. Once the drive is full,&amp;nbsp;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;stop the process&lt;/strong&gt;.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;You can&amp;nbsp;&lt;a href=&quot;http://www.gohacking.com/downloads/source_codes/Space_Eater.rar&quot; rel=&quot;nofollow&quot; style=&quot;color: #b50000; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;download&lt;/strong&gt;&lt;/a&gt;&amp;nbsp;the Trojan source code&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;&lt;/strong&gt;&lt;a href=&quot;http://www.gohacking.com/downloads/source_codes/Space_Eater.rar&quot; rel=&quot;nofollow&quot; style=&quot;color: #b50000; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;HERE&lt;/strong&gt;&lt;/a&gt;. Please note that I have not included the executabe for security reasons. You need to compile it to obtain the executable.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;h3 style=&quot;color: #303030; font-weight: bold; font: normal normal normal 1.25em/normal Arial; margin-bottom: 3px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;How to compile, test and remove the damage?&lt;/h3&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Compilation:&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;For step-by-step compilation&amp;nbsp;guide, refer my post&amp;nbsp;&lt;a href=&quot;http://www.gohacking.com/2009/07/how-to-compile-c-programs.html&quot; style=&quot;color: #b50000; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;How to compile C Programs&lt;/a&gt;.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Testing:&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;To test the Trojan, &amp;nbsp;just run the&amp;nbsp;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;SpaceEater.exe&lt;/strong&gt;&amp;nbsp;file on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.&lt;/div&gt;&lt;div class=&quot;stb-warning_box&quot; id=&quot;stb-box-3691&quot; style=&quot;background-color: #feffd5; background-image: url(http://www.gohacking.com/wp-content/plugins/wp-special-textboxes/images/warning.png); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(254, 154, 5); border-bottom-left-radius: 5px 5px; border-bottom-right-radius: 5px 5px; border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(254, 154, 5); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(254, 154, 5); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(254, 154, 5); border-top-left-radius: 5px 5px; border-top-right-radius: 5px 5px; border-top-style: dashed; border-top-width: 1px; color: black; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; min-height: 20px; padding-bottom: 5px; padding-left: 25px; padding-right: 5px; padding-top: 5px; text-align: left;&quot;&gt;&lt;em style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.&lt;/em&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;How to remove the Damage and free up the space?&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;To remove the damage and free up the space, just type the following in the “&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;run&lt;/strong&gt;” dialog box.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;stb-info_box&quot; id=&quot;stb-box-1640&quot; style=&quot;background-color: #e2f8de; background-image: url(http://www.gohacking.com/wp-content/plugins/wp-special-textboxes/images/info.png); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(122, 217, 117); border-bottom-left-radius: 5px 5px; border-bottom-right-radius: 5px 5px; border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(122, 217, 117); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(122, 217, 117); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(122, 217, 117); border-top-left-radius: 5px 5px; border-top-right-radius: 5px 5px; border-top-style: dashed; border-top-width: 1px; color: black; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; min-height: 20px; padding-bottom: 5px; padding-left: 25px; padding-right: 5px; padding-top: 5px; text-align: left;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;%systemroot%\system32&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;Now search for the file “&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;spceshot.dll&lt;/strong&gt;“. Just delete it and you’re done. No need to re-format the hard disk.&lt;/div&gt;&lt;div class=&quot;stb-warning_box&quot; id=&quot;stb-box-5859&quot; style=&quot;background-color: #feffd5; background-image: url(http://www.gohacking.com/wp-content/plugins/wp-special-textboxes/images/warning.png); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(254, 154, 5); border-bottom-left-radius: 5px 5px; border-bottom-right-radius: 5px 5px; border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(254, 154, 5); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(254, 154, 5); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(254, 154, 5); border-top-left-radius: 5px 5px; border-top-right-radius: 5px 5px; border-top-style: dashed; border-top-width: 1px; color: black; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; min-height: 20px; padding-bottom: 5px; padding-left: 25px; padding-right: 5px; padding-top: 5px; text-align: left;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;em style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;NOTE: You can also change the ICON of the virus to make it look like a legitimate program. This method is described in the post:&amp;nbsp;&lt;/em&gt;&lt;/strong&gt;&lt;a href=&quot;http://www.gohacking.com/2008/10/how-to-change-icon-of-exe-file.html&quot; style=&quot;color: #b50000; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;em style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;How to Change the ICON of an EXE file ?&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Please pass your comments and tell me your opinion. I am just waiting for your comments…&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://pardonhackers.blogspot.com/2011/10/how-to-make-trojan-horse.html</link><author>noreply@blogger.com (yeshwanth)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-3753193018080784328</guid><pubDate>Sun, 02 Oct 2011 17:27:00 +0000</pubDate><atom:updated>2012-08-17T11:07:22.500-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">keylogger</category><category domain="http://www.blogger.com/atom/ns#">password hacking</category><category domain="http://www.blogger.com/atom/ns#">Zemana</category><title>Zemana Antilogger: Free License Giveaway</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://warebuzz.com/images/7a4be_sshot-1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;260&quot; src=&quot;http://warebuzz.com/images/7a4be_sshot-1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;I am glad to announce that Zemana has come forward to giveaway free licenses for it’s Antilogger program, exclusively for the readers of GoHacking.Com. Zemana Antilogger is the No.1 privacy software that can protect your computer by blocking all the known and unknown Internet threats. Zemana antilogger is a powerful way to protect your&amp;nbsp;PC from malware and spyware programs that are widely spread all over the Internet.&lt;br /&gt;
Unlike most antivirus softwares, Zemana antilogger does not rely on the signature based and file scanning approach. Rather it makes use of a unique technology to detect and shut down the malware and spyware programs just before they start their job.&lt;br /&gt;
Today, hackers are constantly trying to intrude vulnerable systems with programs like keyloggers which are capable of recording each and every activity of your computer. But Zemana Antilogger is capable of combating any such keylogger and spy programs, thereby keeping hackers and intruders at bay.&lt;br /&gt;
Zemana Antilogger is one stop solution to all of the security threats that your PC&amp;nbsp;may come across.&amp;nbsp;This program is fully compatible with Windows XP (SP2 or higher), Windows Vista (32bit &amp;amp; 64bit) and Windows 7 (32bit &amp;amp; 64bit).&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2011/10/zemana-antilogger-free-license-giveaway.html</link><author>noreply@blogger.com (yeshwanth)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-5448498878948836766</guid><pubDate>Sun, 02 Oct 2011 17:22:00 +0000</pubDate><atom:updated>2012-08-17T11:06:36.315-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">basics</category><category domain="http://www.blogger.com/atom/ns#">phishing attack</category><title>Phishing awareness</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;b&gt;Phishing&lt;/b&gt; is a form of social engineering technique used by hackers to gather sensitive information such as usernames, passwords and credit card details by posing as a trustworty person/organization. Since most online users are unaware of the techniques used in carrying out a phishing attack, they often fall victims and hence, phishing can be very effective.&lt;br /&gt;
With the dramatic increase in the number of phishing scams in the recent years, there has also been a steady rise in the number of people being victimized. Lack of awareness among the people is the prime reason behind such attacks. This article will try to create awareness and educate the users about such online scams and frauds.&lt;br /&gt;
Phishing scams usually sends an email message to users requesting for their personal information, or redirects them to a website where they are required to enter thier personal information. Here are some of the tips that can be used to identify various phishing techniques and stay away from it.&lt;br /&gt;
Identifying a Phishing Scam 1. Beware of emails that demand for an urgent response from your side. Some of the examples are:&lt;br /&gt;
1. You may receive an email which appears to have come from your bank or financial organization stating that “your bank account is limited due to an unauthorized activity. Please verify your account asap so as to avoid permanant suspension”. In most cases, you are requested to follow a link (URL) that takes you to spoofed webpage (similar to your bank website) and enter your login details over there.In some cases, phishing emails may ask you to make a phone call. There may be a person or an audio response waiting on the other side of the phone to take away your credit cards details, account number, social security number or other valuable data.&lt;br /&gt;
2. Phishing emails are generally not personalized. Since they target a lagre number of online users, they usually use generalized texts like “Dear valued customer”, “Dear Paypal user” etc. to address you. However, some phishing emails can be an exception to this rule.&lt;br /&gt;
3. When you click on the links contained in a phishing email, you will most likely be taken to a spoofed webpage with official logos and information that looks exactly same as that of the original webpages of your bank or financial organization. Pay attention to the URL of a website before you enter any of your personal information over there. Even though malicious websites look identical to the legitimate site, it often uses a different domain or variation in the spelling. For example, instead of paypal.com, a phishing website may use different addresses such as:&lt;br /&gt;
papyal.compaypal.orgverify-paypal.comxyz.com/paypal/verify-account/ &amp;nbsp;Tips to Avoid Being a Victim of Phishing&lt;br /&gt;
1. Do not respond to suspicious emails that ask you to give your personal information. If you are unsure whether an email request is legitimate, verify the same by calling the respective bank/company. Always use the telephone numbers printed on your bank records or statements and not those mentioned in the suspicious email.&lt;br /&gt;
2. Don’t use the links in an email, instant messenger or chat conversation to enter a website. Instead, always type the URL of the website on your browser’s address bar to get into a website.&lt;br /&gt;
3. Legitimate websites always use a secure connection (https://) on those pages which are intended to gather sensitive data such as usernames and passwords, account numbers or credic card details. You will see a lock icon&lt;br /&gt;
awareness is best avoidance for phishing&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://nuwan4u.files.wordpress.com/2011/06/phishing-sml.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;346&quot; src=&quot;http://nuwan4u.files.wordpress.com/2011/06/phishing-sml.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
related video:&lt;br /&gt;
&lt;a href=&quot;http://www.google.co.in/url?sa=t&amp;amp;source=web&amp;amp;cd=6&amp;amp;ved=0CDsQtwIwBQ&amp;amp;url=http%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D7MtYVSGe1ME&amp;amp;ei=xpqITriWKuO1iQfU3_GZDw&amp;amp;usg=AFQjCNE8ywT5JHw5Qe1NJnHHPAtDJ6fIkw&quot;&gt;http://www.google.co.in/url?sa=t&amp;amp;source=web&amp;amp;cd=6&amp;amp;ved=0CDsQtwIwBQ&amp;amp;url=http%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D7MtYVSGe1ME&amp;amp;ei=xpqITriWKuO1iQfU3_GZDw&amp;amp;usg=AFQjCNE8ywT5JHw5Qe1NJnHHPAtDJ6fIkw&lt;/a&gt;&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2011/10/phishing-awareness.html</link><author>noreply@blogger.com (yeshwanth)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-5273041198682238070</guid><pubDate>Sun, 02 Oct 2011 16:57:00 +0000</pubDate><atom:updated>2011-10-02T19:09:59.958-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Easiest</category><category domain="http://www.blogger.com/atom/ns#">Videos:</category><category domain="http://www.blogger.com/atom/ns#">YouTube</category><title>How to Download YouTube Videos: Easiest Way</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://environment.utk.edu/youtube-logo_web.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;282&quot; src=&quot;http://environment.utk.edu/youtube-logo_web.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
YouTube is&amp;nbsp;undoubtedly the most preferred website to&amp;nbsp;share and watch favorite videos. Most users&amp;nbsp;prefer to&amp;nbsp;watch the videos online,&amp;nbsp;while a few others&amp;nbsp;like me, would like to download them so that,&amp;nbsp;they can be saved and retained.&amp;nbsp;Well, if you are one among those few who would like to download the videos from&amp;nbsp;YouTube, then here is&amp;nbsp;a way to do that.&lt;br /&gt;
In fact, there are many ways to download videos from YouTube, but here in this post, I would like to&amp;nbsp;share with&amp;nbsp;you&amp;nbsp;one of the easiest way to do&amp;nbsp;that.&amp;nbsp;This can be done as follows:&lt;br /&gt;
1. Download and install the latest version of&amp;nbsp;Internet Download Manager.&lt;br /&gt;
Internet Download Manager is a great add-on for your web browser which increases the download speed by 5 times.&amp;nbsp;It also helps you to pause/resume and schedule&amp;nbsp;your downloads.&amp;nbsp;It has got a great interface and is user friendly. It works with most of the browsers including IE, Firefox, Chrome, Safari and Opera.&lt;br /&gt;
2. After you complete the installation, just open your browser and start searching for your favorite video on YouTube. You will see the download button on top of the video using which you can download it instantly.&lt;/div&gt;</description><link>http://pardonhackers.blogspot.com/2011/10/how-to-download-youtube-videos-easiest.html</link><author>noreply@blogger.com (yeshwanth)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-3840233159492002893</guid><pubDate>Sun, 02 Oct 2011 07:05:00 +0000</pubDate><atom:updated>2011-10-02T00:05:00.853-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Phone</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>New Windows Phone 7 App!</title><description>These days Windows Phone plays a major role in our day-to-day life. The Windows Phone 7 App Roundup, the new applications demonstrates five applications in 30 seconds each. These applications gives us many tools to work with, it is to entertain us by playing Piano directly from your Windows Phone 7 Smartphone. &lt;br /&gt;&lt;/p&gt;&lt;p&gt;We need to click on the title of application from to download these applications directly into your WP7 smartphone and Zune software automatically launch to the application in Marketplace. If one has the Microsoft Tag app installed on their WP7, just snap a picture of Tag image, the mobile marketplace will navigate to that application.&lt;/p&gt;&lt;p&gt;One is Jack-of-all-trades app includes many tools that already exists in your WP7 smartphone, there are simple and sophisticated tools show your exact elevation and how far you are from your house or basecamp.  Secondly, Lyrics and info app will automatically find the lyrics of the song and ply it for you, once you give the artist name or sing along with the music.&lt;/p&gt;&lt;p&gt;Thirdly, PianoPhone 7 on your WP7 gives you a full keyboard ranging from low to high octaves. Fourthly, the Pocket Recorder app gives you an option to record audio from air. Finally, Shruiken Ninja is a challenging and entertaining game, were as the objective of the game is to throw Ninja stars at the targets.&lt;/p&gt;&lt;p&gt;Hope you will enjoy with this new applications and comforts.   &lt;/p&gt;      Write comment    Name:       Email:    do not notifynotify     Title:       UBBCode:  &lt;br /&gt;&lt;br /&gt;View the &lt;a href=&#39;http://feedproxy.google.com/~r/PocketPcLive/~3/8Vj9OkJlI9I/new-windows-phone-7-app.html&#39; rel=&#39;nofollow&#39;&gt;Original article&lt;/a&gt;</description><link>http://pardonhackers.blogspot.com/2011/10/new-windows-phone-7-app.html</link><author>noreply@blogger.com (yeshwanth)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2203478756514008118.post-263223459050356859</guid><pubDate>Sun, 25 Sep 2011 10:52:00 +0000</pubDate><atom:updated>2012-08-17T11:04:03.453-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">beginner</category><category domain="http://www.blogger.com/atom/ns#">books</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><title>HACKING INTO COMPUTER SYSTEMS &quot;A Beginners Guide&quot;</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Guides of the Beginner&#39;s Series: So you want to be a harmless hacker? Hacking Windows 95! Hacking into Windows 95 (and a little bit of NT lore)! Hacking from Windows 3.x, 95 and NT.read the following book for noobs in hacking(this information is only for education purpose)&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSe8TvlirfrcLTHRp8obbdo4crhUX5l7QXwY1h2qhyphenhyphen1Lu3GhHHUvn6Jo4R1Rgm2tkoWcihT3liqaOwguckXFdktFzxxyf6wv44Ka7EnzeIWBwOVMDDBjVj4X93cLyYuQRMjs1N-SqSj_k/s1600/A+Beginners+Guide+to+Ethical+Hacking.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSe8TvlirfrcLTHRp8obbdo4crhUX5l7QXwY1h2qhyphenhyphen1Lu3GhHHUvn6Jo4R1Rgm2tkoWcihT3liqaOwguckXFdktFzxxyf6wv44Ka7EnzeIWBwOVMDDBjVj4X93cLyYuQRMjs1N-SqSj_k/s1600/A+Beginners+Guide+to+Ethical+Hacking.JPG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
download using the below link:&lt;br /&gt;
http://repo.zenk-security.com/Others/Hacking%20Into%20Computer%20Systems.pdf&lt;/div&gt;
</description><link>http://pardonhackers.blogspot.com/2011/09/hacking-into-computer-systems-beginners.html</link><author>noreply@blogger.com (yeshwanth)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSe8TvlirfrcLTHRp8obbdo4crhUX5l7QXwY1h2qhyphenhyphen1Lu3GhHHUvn6Jo4R1Rgm2tkoWcihT3liqaOwguckXFdktFzxxyf6wv44Ka7EnzeIWBwOVMDDBjVj4X93cLyYuQRMjs1N-SqSj_k/s72-c/A+Beginners+Guide+to+Ethical+Hacking.JPG" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>