<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8354165089554309826</id><updated>2024-11-08T07:36:27.674-08:00</updated><category term="News round the world"/><category term="HyperText MarkUp Language"/><category term="PHP"/><category term="Window&#39;s Trick&#39;s"/><category term="SQL"/><category term="JavaScript"/><category term="Security News"/><category term="ASP"/><category term="PERL"/><category term="MySQL"/><category term="XSS"/><category term="XML"/><category term="CSS"/><category term="SQLi"/><category term="VBScript"/><category term="SEO"/><category term="Flash"/><category term="Techy-News"/><category term="XPath Injection"/><category term="Malware"/><category term="Hacking Tools"/><category term="Mobile Tricks"/><category term="AJAX"/><category term="Metasploit"/><category term="Python"/><category term="Security Tips"/><category term="Viruse&#39;s"/><category term="BackTrack"/><category term="ICP (Defacements)"/><category term="Iphone"/><category term="Software&#39;s"/><category term="LFI"/><category term="Proxy&#39;s"/><category term="Backdoors"/><category term="DoS"/><category term="Ebooks"/><category term="RFI"/><category term="SE"/><category term="Wi-Fi"/><category term="Account Hacking - FB"/><category term="Android"/><category term="Blogger Hacks"/><category term="Blogger Tricks"/><category term="CRSF"/><category term="Games"/><category term="HTMLi"/><category term="SSI"/><category term="Anon"/><category term="Anonymous Defacements"/><category term="DDoS"/><category term="DNS"/><category term="Directory Transversal."/><category term="ICH (defacements)"/><category term="Internet Tricks"/><category term="Linux"/><category term="Networking"/><category term="One Man Army."/><category term="Projects"/><category term="SQLi Vulnerability"/><category term="XSS vulnerability"/><category term="Yahoo.."/><title type='text'>r00t@~SecurityVoid</title><subtitle type='html'>Live For Nothing Or&#xa;Die For Something</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default?start-index=26&amp;max-results=25'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>642</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-5879774659853896031</id><published>2012-10-13T06:12:00.000-07:00</published><updated>2012-10-13T06:12:02.242-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News round the world"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>US prepares first-strike cyber-forces</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;introduction&quot; id=&quot;story_continues_1&quot;&gt;
&lt;a href=&quot;http://news.bbcimg.co.uk/media/images/63450000/jpg/_63450968_000212218.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Aftermath of 9/11 attacks&quot; border=&quot;0&quot; height=&quot;304&quot; src=&quot;http://news.bbcimg.co.uk/media/images/63450000/jpg/_63450968_000212218.jpg&quot; width=&quot;304&quot; /&gt;&lt;/a&gt;Cyber-attacks could 
inflict as much damage on the US as the physical attacks on 11 September
 2001, the US defence secretary has warned.&lt;/div&gt;
Leon Panetta said the country was preparing to take pre-emptive action if a serious cyber-attack was imminent. &lt;br /&gt;

        He said US intelligence showed &quot;foreign actors&quot; were targeting control systems for utilities, industry and transport.&lt;br /&gt;

        Advanced tools were being created to subvert key computer control systems and wreak havoc, said Mr Panetta.&lt;br /&gt;

        &quot;An aggressor nation or extremist group could gain control of
 critical switches and derail passenger trains, or trains loaded with 
lethal chemicals,&quot; said Mr Panetta  in a speech to business leaders held
 on the USS Intrepid - a former aircraft carrier that is now a museum. &lt;br /&gt;

        &quot;They could contaminate the water supply in major cities, or shut down the power grid across large parts of the country.&lt;br /&gt;

        &quot;Such a destructive cyber-terrorist attack could paralyse the nation and create a profound new sense of vulnerability,&quot; he said.&lt;br /&gt;

        Smaller scale cyber-attacks were now commonplace, said Mr Panetta. &lt;br /&gt;

  &lt;div class=&quot;caption body-narrow-width&quot;&gt;
  

    &lt;span style=&quot;width: 304px;&quot;&gt;Cyber-attacks could inflict as much damage as 9/11. warned the US defense secretary&lt;/span&gt;
  &lt;/div&gt;
In recent weeks, many large US firms had suffered attacks that 
had involved them being bombarded with huge amounts of data, he said. In
 addition, oil companies in Qatar and Saudi Arabia had been hit by the 
Shamoon attack, which had tried to replace computer data with gibberish.
 About 30,000 machines were hit by the Shamoon attack.&lt;br /&gt;

        The US defence department had developed tools to trace 
attackers, he added, and a cyber-strike force that could conduct 
operations via computer networks. And it was now finalising changes to 
its rules of engagement that would define when it could &quot;confront major 
threats quickly&quot;.&lt;br /&gt;

        &quot;Potential aggressors should be aware that the United States 
has the capacity to locate them and hold them accountable for actions 
that harm America or its interests,&quot; he said.&lt;br /&gt;

        &quot;If we detect an imminent threat of attack that will cause 
significant physical destruction or kill American citizens, we need to 
have the option to take action to defend the nation, when directed by 
the president.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/5879774659853896031/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/10/us-prepares-first-strike-cyber-forces.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/5879774659853896031'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/5879774659853896031'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/10/us-prepares-first-strike-cyber-forces.html' title='US prepares first-strike cyber-forces'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-5208995741845257192</id><published>2012-05-26T06:28:00.001-07:00</published><updated>2012-05-26T06:30:43.386-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News round the world"/><title type='text'>Hackers threaten fresh wave of anti-capitalist web rioting</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho5Vx8q_CTI1Hlyg-073_QHu-5NhvFNsvOOwuUOTkAmETvZKGbRmXEybmoQ54WMZkVCDpkX99AHoct1_5D7ZNq46yoeTnAYsQmbC1yohWjCOB1b6xTsKDit8X0sjq7Ue-eK_ezNaw8iiE/s1600/cyber-war.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho5Vx8q_CTI1Hlyg-073_QHu-5NhvFNsvOOwuUOTkAmETvZKGbRmXEybmoQ54WMZkVCDpkX99AHoct1_5D7ZNq46yoeTnAYsQmbC1yohWjCOB1b6xTsKDit8X0sjq7Ue-eK_ezNaw8iiE/s320/cyber-war.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2&gt;Hackers threaten fresh wave of anti-capitalist web rioting&lt;/h2&gt;&lt;div class=&quot;standfirst&quot;&gt;Sticking it to The Man, man, but for lulz too&lt;/div&gt;A new activist group is drumming up recruits for a cyberwar campaign against corporate giants due to launch on Friday, 25 May.&lt;br /&gt;
&lt;a href=&quot;https://twitter.com/#%21/TheWikiBoat&quot; target=&quot;_blank&quot;&gt;TheWikiBoat&lt;/a&gt;  intends to hit a high profile list of more than 40 multinationals -  including BT, Best Buy, Tesco, McDonald&#39;s, Wal-Mart and Apple - with  denial of service attacks as well as attempts to raid corporate systems  for intelligence.&lt;br /&gt;
&lt;div id=&quot;article-mpu-container&quot;&gt;&lt;div class=&quot;ad-now&quot; id=&quot;ad-mpu1-spot&quot; style=&quot;height: auto; margin-top: 0px; width: auto;&quot;&gt;&lt;/div&gt;The precise motivations behind OpNewSon, which was announced around a  month ago, remain unclear but the overall flavour is part  anti-capitalist and part general devilment, a characteristic found in  many Anonymous-style hacktivist protests.&lt;/div&gt;&quot;While attacking the major companies of this planet may seem lulzy,  we also wish that this operation make a difference,&quot; the group said in a  &lt;a href=&quot;http://pastebin.com/wq6KdgDg&quot; target=&quot;_blank&quot;&gt;manifesto&lt;/a&gt; for OpNewSon. &quot;We are &#39;sticking it to the man&#39; so to speak.&quot;&lt;br /&gt;
Would be participants in the campaign, which aims to take out  targeted sites for at least two hours, are been encouraged to use the  LOIC denial of service tool, a favourite with hacktivists. By default  LOIC does nothing to shield the anonymity of its users, a factor that  has allowed police to track down and arrest many suspected hacktivists  across the world over recent months.&lt;br /&gt;
Previous pre-announced activist operations to take down Facebook or  launch assaults against the internet&#39;s DNS structure have turned out to  be damp squibs. Security firms nonetheless argue that corporations  targeted as part of Operation NewSon ought to take the threat seriously.&lt;br /&gt;
&quot;It remains to be seen if the hacking group live up to their claims,  but any organisation which is a target would be unwise to dismiss the  threat,&quot; said André Stewart, president international at Corero Network  Security.&lt;br /&gt;
&quot;With prior knowledge of an impending attack, they have the  opportunity to pro-actively put in place additional security measures to  ensure that they remain secure.&quot;&lt;br /&gt;
Stewart explained that TheWikiBoat pre-announced its intended as a tactic designed to rally recruits to its cause.&lt;br /&gt;
“It’s not uncommon for hacking groups to announce their targets,  particularly when they are ahead of a Distributed Denial of Service  (DDoS) attack,&quot; he explained. &quot;This enables them to ‘recruit’  like-minded individuals who support the ideology of the hacktivist group  to join in on the attack.&amp;nbsp;However, the majority of DDoS attacks are  often carried out using an army of automated computers, called botnets,  which can be controlled by a single user.&quot;&lt;br /&gt;
&quot;The hacking group is planning a second stage attack, in which they  will attempt to infiltrate the organisation’s network and steal  sensitive information.&amp;nbsp;DDoS attacks are often used as a smokescreen to  hide further, more dangerous attacks, and due to the long list of  potential targets, there is a high probability that they will succeed.&quot;&lt;br /&gt;
Additional commentary from application security firm Radware can be found &lt;a href=&quot;http://blog.radware.com/security/2012/05/ert-threat-alert-thewikiboat&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
#OpNewSon is due to begin begin at 4pm PST. &lt;br /&gt;
&lt;div class=&quot;standfirst&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/5208995741845257192/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/hackers-threaten-fresh-wave-of-anti.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/5208995741845257192'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/5208995741845257192'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/hackers-threaten-fresh-wave-of-anti.html' title='Hackers threaten fresh wave of anti-capitalist web rioting'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho5Vx8q_CTI1Hlyg-073_QHu-5NhvFNsvOOwuUOTkAmETvZKGbRmXEybmoQ54WMZkVCDpkX99AHoct1_5D7ZNq46yoeTnAYsQmbC1yohWjCOB1b6xTsKDit8X0sjq7Ue-eK_ezNaw8iiE/s72-c/cyber-war.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-7954848263444436607</id><published>2012-05-26T06:27:00.000-07:00</published><updated>2012-05-26T06:27:17.471-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Tips"/><title type='text'>Top 10 Android Mobile Security Apps</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;While 2011 was the year of the hacktivist, it looks like 2012 will be  the year of mobile malware with Android users in particular facing the  reality that their device may not be as secure as they&#39;d like to think.&lt;br /&gt;
&lt;a href=&quot;http://www.v3.co.uk/v3-uk/news/2174873/android-malware-levels-quadrupled-past&quot; target=&quot;_blank&quot; title=&quot;Android malware levels quadrupled over past two years&quot;&gt;F-Secure&lt;/a&gt;,  McAfee, Trend Micro and pretty much every other security vendor under  the sun have reported seeing a massive boom in the number of attacks  targeting smartphone devices.&lt;br /&gt;
Indeed, &lt;a href=&quot;http://www.v3.co.uk/v3-uk/news/2179042/android-malware-levels-rocket-200-cent-2012&quot; target=&quot;_blank&quot; title=&quot;Android malware levels rocket 1,200 per cent in 2012&quot;&gt;McAfee reported that Android malware has rocketed by a staggering 1,200 per cent in the last year&lt;/a&gt; as the platform continues to attract the attention of cyber criminals.&lt;br /&gt;
There&#39;s plenty of vendors out there seeking to capitalise on the  boom, with hundreds of anti-virus and security services flooding the  market claiming to make your device as secure and safe as possible.  However, with so much choice knowing which one to pick can be tough.&lt;br /&gt;
But fear not as &lt;em&gt;V3&lt;/em&gt;&#39;s here to help. We&#39;ve drawn up a list  detailing the ins and outs of the 10 best mobile security apps currently  available for Android smartphones to keep your beloved device free from  the claws of cyber criminals.&lt;br /&gt;
&lt;strong&gt;10. Super Security: Free &lt;/strong&gt;&lt;br /&gt;
&lt;img alt=&quot;Super Security Android app&quot; border=&quot;0&quot; class=&quot;left&quot; height=&quot;227&quot; src=&quot;http://www.v3.co.uk/IMG/092/222092/super-security-android-app-140x227.jpg?1337864306&quot; title=&quot;Super Security Android app&quot; width=&quot;140&quot; /&gt;&lt;br /&gt;
Super Security is a free cloud-based antivirus app that adds a  &quot;strongbox&quot; storage area to the device. The strongbox is a storage area  on the phone that lets users password protect three different folders:  Pictures, Videos and SMS.&lt;br /&gt;
As well as the strongbox, the service also boasts the standard virus  scan, app manager, task manager and phone finder features seen on most  other security apps.&lt;br /&gt;
As a free service, though, the features aren&#39;t as good as certain  other paid for services. It also has a significantly less polished user  interface and can at times feel a little clunky to use. Still, it&#39;s not a  bad place to start.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;9. Webroot Security and Antivirus: Free&lt;/strong&gt;&lt;br /&gt;
&lt;img alt=&quot;Webroot SecurityAnywhere Android app&quot; border=&quot;0&quot; class=&quot;left&quot; height=&quot;243&quot; src=&quot;http://www.v3.co.uk/IMG/096/222096/webroot-securityanywhere-android-app-150x243.jpg?1337864816&quot; title=&quot;Webroot SecurityAnywhere Android app&quot; width=&quot;150&quot; /&gt;&lt;br /&gt;
Webroot Security and Antivirus is another free app that offers users  online identity protection as well as defences against malware, phishing  and SMS attacks.&lt;br /&gt;
Webroot automatically scans apps when they are added to the device.  Like some of the other services on the list, Webroot can also help you  to locate a lost or stolen device.&lt;br /&gt;
The app is perfectly adequate, with the only problem we detected that  it can, at points, slow down performance on lower-end handsets.&lt;br /&gt;
This only really occurs when you&#39;re using the software on an old or underpowered 800MHz processor but is still an annoyance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;8. AVG Antivirus: Free or £6.50 Pro version&lt;/strong&gt;&lt;br /&gt;
&lt;img alt=&quot;AVG Anti Virus Android app&quot; border=&quot;0&quot; class=&quot;left&quot; height=&quot;150&quot; src=&quot;http://www.v3.co.uk/IMG/086/222086/avg-anti-virus-android-app-150x150.jpg?1337866379&quot; title=&quot;AVG Anti Virus Android app&quot; width=&quot;150&quot; /&gt;Available as a free download, AVG is a cheap, reliable option for any Android user.&lt;br /&gt;
The app automatically scans apps as they&#39;re downloaded and also  checks to see if files added via other connection methods like Wi-Fi or  USB are safe.&lt;br /&gt;
&lt;span style=&quot;text-align: center;&quot;&gt;As well as checking files and apps  being added to the device, the free version also lets you find your  phone if lost or stolen via Google Maps. It also features lock and wipe  your device services.&lt;/span&gt;&lt;br /&gt;
There is a Pro version available on the Google Play store, which  costs £6.50 and adds a few features like a task killer, though for the  money, given how good the free version is, we found little incentive to  upgrade.&lt;br /&gt;
&lt;strong&gt;7. Norton Mobile Security: £29.99&lt;/strong&gt;&lt;br /&gt;
&lt;img alt=&quot;Norton Mobile Security Android app&quot; border=&quot;0&quot; class=&quot;left&quot; height=&quot;227&quot; src=&quot;http://www.v3.co.uk/IMG/184/222184/norton-mobile-security-android-app-140x227.jpg?1337939626&quot; title=&quot;Norton Mobile Security Android app&quot; width=&quot;140&quot; /&gt;Norton  Mobile Security offers Android customers all the standard services and  tools you&#39;ll require to protect your smartphone&#39;s data.&lt;br /&gt;
The app boasts the usual anti-virus protection backed up by remote  locate, lock and wipe, call and text blocker and anti-phishing web  protection features.&lt;br /&gt;
As an added bonus, the company&#39;s &lt;a href=&quot;http://www.v3.co.uk/v3-uk/news/2179616/carphone-warehouse-pushes-mobile-security-android-half-price-norton-deal&quot; target=&quot;_blank&quot; title=&quot;Carphone Warehouse pushes mobile security for Android with half-price Norton deal&quot;&gt;recently inked a deal with UK retailer Carphone Warehouse&lt;/a&gt;, meaning you can pick it up for half-price at £14.99 instead of £29.99.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;6. Trend Micro Mobile Security Personal Edition: Free or £19 a year &lt;/strong&gt;&lt;br /&gt;
&lt;img alt=&quot;Trend Micro Mobile Security Android app&quot; border=&quot;0&quot; class=&quot;left&quot; height=&quot;194&quot; src=&quot;http://www.v3.co.uk/IMG/094/222094/trend-micro-mobile-security-android-app-120x194.jpg?1337864479&quot; title=&quot;Trend Micro Mobile Security Android app&quot; width=&quot;120&quot; /&gt;Trend  Micro&#39;s Mobile Security app is available in free and paid for versions,  though the paid for option is the only one that offers a full security  service.&lt;br /&gt;
The free app is available on Google Play and includes a basic malware  scanner that scans your phone or SD-card for malicious software.&lt;br /&gt;
The paid for premium version is available for £19 per year. For the  money you get a host of new features including parental controls, the  ability to remotely locate your device and a fraudulent-website blocker  that checks sites using Trend Micro&#39;s Smart Protection Network.&lt;br /&gt;
One annoyance that can seem a little pointless for business users is  the addition of parental control features to the app. While control  options may be desirable for parents looking to stop their child  downloading dangerous apps, they really aren&#39;t relevant to business or  adult users.&lt;br /&gt;
&lt;strong&gt;5. F-Secure Mobile Security: £8.08 per six months&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;img alt=&quot;F-Secure Mobile Security Android app&quot; border=&quot;0&quot; class=&quot;left&quot; height=&quot;194&quot; src=&quot;http://www.v3.co.uk/IMG/089/222089/f-secure-mobile-security-android-app-120x194.jpg?1337863661&quot; title=&quot;F-Secure Mobile Security Android app&quot; width=&quot;120&quot; /&gt;F-Secure&#39;s  Mobile Security app offers a number of mobile security features  including firewall and anti-theft protection and costs £8.08 per half  year.&lt;br /&gt;
The features on it work incredibly well and the app would rank higher  if it didn&#39;t lack certain key features like an app scanner.&lt;br /&gt;
Given the boom in Android Trojans this year, the lack of an app  scanning feature is a serious flaw and means you may have to get a  second security app to really protect your handset.&lt;br /&gt;
The app also has parental control features, though as was the case  with Trend Micro&#39;s app, they aren&#39;t all that useful for adult smartphone  users, but nice to know they&#39;re there, just in case.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;4. McAfee Mobile Security: £29.99 a year&lt;/strong&gt;&lt;br /&gt;
&lt;span style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;McAfee Mobile Security Android app&quot; border=&quot;0&quot; class=&quot;left&quot; height=&quot;170&quot; src=&quot;http://www.v3.co.uk/IMG/101/222101/mcafee-mobile-security-android-app-170x170.jpg?1337866013&quot; title=&quot;McAfee Mobile Security Android app&quot; width=&quot;170&quot; /&gt;&lt;/span&gt;McAfee Mobile Security application offers a desktop anti-virus and protection service on a smartphone.&lt;br /&gt;
&lt;span style=&quot;text-align: center;&quot;&gt;The service is free for the first  seven days but costs £29.99 per year after that. As well as Android,  there are also BlackBerry and Symbian versions.&lt;/span&gt;&lt;br /&gt;
In terms of features Mobile Security 2.0 offers the complete package,  boasting anti-virus protection, app screening, anti-theft remote  wiping, unlimited backup and call filtering services.&lt;br /&gt;
The only reason the app didn&#39;t rank higher in our list is its liberal  use of alerts. The app will pop up and intrude on your smartphone web  and app browsing experience on a regular basis.&lt;br /&gt;
One particularly annoying feature is the fact that app actually  starts alerting you on a regular basis that your free trial is about to  run out a full day before it happens.&lt;br /&gt;
&lt;strong&gt;3. Bitdefender Mobile Security: Free or $9.99 a year&lt;/strong&gt;&lt;br /&gt;
&lt;img alt=&quot;Bitdefender Mobile Security Android app&quot; border=&quot;0&quot; class=&quot;right&quot; height=&quot;170&quot; src=&quot;http://www.v3.co.uk/IMG/087/222087/bitdefender-mobile-security-android-app-170x170.jpg?1337863474&quot; title=&quot;Bitdefender Mobile Security Android app&quot; width=&quot;170&quot; /&gt;&lt;br /&gt;
Bitdefender Mobile Security comes in free and premium versions, the latter retailing for a fairly reasonable $9.99 per year.&lt;br /&gt;
The app is a solid choice for most Android users, featuring an intuitive user interface and retailing at an affordable price.&lt;br /&gt;
The only downside is that the app doesn&#39;t have any SIM-card removal  notification features and its Firewall protection only works on  Android&#39;s native browser. That means Ice Cream Sandwich handset owners  surfing the internet using the infinitely superior Chrome browser won&#39;t  be protected.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;2. Kaspersky Mobile Security: Free or £11.95&lt;/strong&gt;&lt;br /&gt;
Kaspersky Mobile Security Lite is a fantastic Android security app that&#39;s available in free and paid for versions.&lt;br /&gt;
&lt;img alt=&quot;Kaspersky Mobile Security Android app&quot; border=&quot;0&quot; class=&quot;left&quot; height=&quot;227&quot; src=&quot;http://www.v3.co.uk/IMG/090/222090/kaspersky-mobile-security-android-app-140x227.jpg?1337863838&quot; title=&quot;Kaspersky Mobile Security Android app&quot; width=&quot;140&quot; /&gt;&lt;br /&gt;
The paid for version costs £11.95 and offers the same features as a number of more expensive premium services.&lt;br /&gt;
The app grants access to Kaspersky&#39;s cloud-based Security Network,  which automatically checks any app you install to make sure its safe.&lt;br /&gt;
One feature we particularly like is the educational element included  in the app. Kaspersky Mobile Security doesn&#39;t take as draconian approach  as other apps, with helpful hints explaining the importance of each  feature being available as a shortcut on the app&#39;s user interface.&lt;br /&gt;
The paid for version of the app also houses all the standard device  wipe, call and message filter and phone tracking services expected of  any security app.&lt;br /&gt;
&lt;strong&gt;1. Lookout for Android: Free or $29.99 a year &lt;/strong&gt;&lt;br /&gt;
&lt;img alt=&quot;Lookout Android app&quot; border=&quot;0&quot; class=&quot;right&quot; height=&quot;227&quot; src=&quot;http://www.v3.co.uk/IMG/091/222091/lookout-android-app-140x227.jpg?1337866059&quot; title=&quot;Lookout Android app&quot; width=&quot;140&quot; /&gt;Lookout  is one of a select number of security companies purely dedicated to  developing mobile security services and we have to say its Android app  offers the most complete protection service currently on market.&lt;br /&gt;
Its Android app comes in free and paid for versions, with the paid for version costing a fairly hefty $29.99 per year.&lt;br /&gt;
The reason we&#39;d really recommend the app is its intuitive user  interface (UI). While the device features the same anti-virus  protection, remote wipe controls, data backup, firewall defences and an  app auditor services seen on other apps, Lookout is much more  streamlined.&lt;br /&gt;
This could be because of Lookout&#39;s specific mobile focus, with the UI  being far easier to navigate and understand than a number of its  competitors. This streamlined feel is enhanced by the apps nonintrusive  nature, with its protection features remaining nicely out of sight.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/7954848263444436607/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/top-10-android-mobile-security-apps.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/7954848263444436607'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/7954848263444436607'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/top-10-android-mobile-security-apps.html' title='Top 10 Android Mobile Security Apps'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-8115633573444061818</id><published>2012-05-26T06:23:00.000-07:00</published><updated>2012-05-26T06:23:00.016-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News round the world"/><title type='text'>US Mayor And Son Charged With Hacking Into Opposition Site</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://9e.img.v4.skyrock.net/9e7/titerebe93/pics/1832217941_small_1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;212&quot; src=&quot;http://9e.img.v4.skyrock.net/9e7/titerebe93/pics/1832217941_small_1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2&gt;US mayor and son charged with hacking into opposition site&lt;/h2&gt;&lt;div class=&quot;standfirst&quot;&gt;We&#39;d rather be fending off global cyberwar, sniff Feds&lt;br /&gt;
&lt;/div&gt;Dr Felix Roque, 55, the mayor of West New York, New Jersey, and  Joseph Roque, 22, of Passaic County, allegedly hacked into  recallroque.com and illegally accessed e-mails in February. Joseph Roque  is accused of gaining control of the administrative email account  associated with the dot-com before interacting with its web host, Go  Daddy, to shut the site down, &lt;a href=&quot;http://www.nytimes.com/2012/05/25/nyregion/west-new-york-nj-mayor-accused-of-hacking-opponents-web-site.html&quot; target=&quot;_blank&quot;&gt;&lt;i&gt;The New York Times&lt;/i&gt; reports&lt;/a&gt;.&lt;br /&gt;
&lt;div id=&quot;article-mpu-container&quot;&gt; &lt;div class=&quot;ad-now&quot; id=&quot;ad-mpu1-spot&quot; style=&quot;height: auto; width: auto;&quot;&gt;   &lt;/div&gt;The father and son team also &quot;sought to identify, intimidate and  harass&quot; those who operated the website and other critics of Roque&#39;s  administration, the &lt;a href=&quot;http://www.justice.gov/usao/nj/Press/files/Roque,%20Felix%20et%20al%20Arrest%20News%20Release.html&quot; target=&quot;_blank&quot;&gt;Department of Justice alleged&lt;/a&gt;:&lt;br /&gt;
&lt;/div&gt;&lt;blockquote&gt;By the late afternoon of February 8, 2012, Joseph Roque had  successfully hacked into various online accounts used in connection with  the recall website. Joseph Roque then used that access to disable the  website. Mayor Roque harassed and attempted to intimidate several  individuals whom he had learned were associated with the recall website.&lt;/blockquote&gt;The pair face conspiracy and computer hacking charges over the  alleged political dirty tricks. Both charges carry possible fines on  conviction of up to $250,000 and the risk of a substantial spell behind  bars. The alleged abuse of public trust involved in the case means the  charges are being treated especially seriously.&lt;br /&gt;
FBI Special Agent in Charge Michael B. Ward commented: &quot;In this  instance, an elected official conspired to hack into a website and email  account.&lt;br /&gt;
&quot;It&#39;s incredibly disappointing that resources have to be diverted  from protecting the US against cyber intrusions targeting critical  infrastructure, federally funded research and military technology, to  address a public official intruding into computer systems to further a  political agenda.&quot;&lt;br /&gt;
US Attorney Paul Fishman added: &quot;The elected leader of West New York  and his son allegedly hacked into computers to intimidate constituents  who were simply using the internet to exercise their Constitutional  rights to criticise the government.&quot;&lt;br /&gt;
Mayor Roque only gained office last year after leading a successful  recall against the previous mayor, Sal Vega, and beating him in the  subsequent election. West New York has a population of 50,000 and is  located around seven miles from Manhattan. It&#39;s unclear whether or not  Roque, who describes himself as an &quot;independent conservative democrat&quot;,  intends to resign as a result of the charges, &lt;i&gt;The Jersey Journal&lt;/i&gt; &lt;a href=&quot;http://www.nj.com/jjournal-news/index.ssf/2012/05/west_new_york_mayor_felix_roqu_3.html&quot; target=&quot;_blank&quot;&gt;reports&lt;/a&gt;&lt;div class=&quot;standfirst&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/8115633573444061818/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/us-mayor-and-son-charged-with-hacking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/8115633573444061818'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/8115633573444061818'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/us-mayor-and-son-charged-with-hacking.html' title='US Mayor And Son Charged With Hacking Into Opposition Site'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-309536552012669700</id><published>2012-05-25T01:01:00.002-07:00</published><updated>2012-05-25T01:01:58.915-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News round the world"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Comcast phishing site contains valid TRUSTe seal</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;space-2 content fancy s-7&quot;&gt;&lt;a href=&quot;http://i.zdnet.com/blogs/comcast_phishing_site_truste_seal.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;size-full wp-image-12293 aligncenter&quot; height=&quot;324&quot; src=&quot;http://i.zdnet.com/blogs/comcast_phishing_site_truste_seal.png&quot; width=&quot;475&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;c-1 heavy&quot;&gt;Summary: &lt;/span&gt;Security  researchers from Sophos are reporting on an intercepted Comcast-themed  phishing email, which contains a valid TRUSTe seal.&lt;/div&gt;&lt;br /&gt;
Security researchers from Sophos are reporting on an intercepted &lt;a href=&quot;http://nakedsecurity.sophos.com/2012/05/24/comcast-users-phished-by-constant-guard-spam-lure/&quot;&gt;&lt;strong&gt;Comcast-themed phishing email, which contains a valid TRUSTe seal&lt;/strong&gt;&lt;/a&gt;.&lt;br /&gt;
More on the phishing email:&lt;br /&gt;
&lt;blockquote&gt;Like many other sites that are compromised to host  phishing pages, this one appears to have been compromised through  vulnerable FrontPage server extensions.Yes, I said FrontPage. The old  Microsoft Office package used for building and publishing web sites.  Microsoft discontinued support for FrontPage publishing extensions in  2006 and they have been the source of many web site vulnerabilities over  the last 15 years.The fake page is an identical copy of the real  Comcast XFINITY login page, and surprisingly includes a fully functional  &lt;a href=&quot;http://en.wikipedia.org/wiki/TRUSTe&quot;&gt;&lt;strong&gt;TRUSTe&lt;/strong&gt;&lt;/a&gt; logo which may lend further credibility to the site.&lt;/blockquote&gt;Cybercriminals often take advantage of &lt;a href=&quot;http://blog.webroot.com/2009/11/18/faux-verified-by-visa-phishing-scam-targets-holiday-shoppers/&quot;&gt;&lt;strong&gt;visual social engineering elements&lt;/strong&gt;&lt;/a&gt;, by embedding logos of reputable and trusted brands in order to improve of authenticity of their bogus content.&lt;br /&gt;
Users are advised to keep in mind the fact that these security and  privacy seals often have limited applicability in real-life situations,  in particular in the process of ensuring a web site’s CIA  (Confidentiality, Integrity and Availability).&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/309536552012669700/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/comcast-phishing-site-contains-valid.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/309536552012669700'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/309536552012669700'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/comcast-phishing-site-contains-valid.html' title='Comcast phishing site contains valid TRUSTe seal'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-2017384941313999588</id><published>2012-05-25T00:51:00.000-07:00</published><updated>2012-05-25T00:51:49.713-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News round the world"/><title type='text'>35,000 Passwords Reset After BigPond GameArena Hacked</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2KpVxEAc3dJ9yw9NtxQGKjGnz1lyZhBDN-bgdfYTpSN0Fvqiz-Lljba4ph36bW8wIKi217K2YB5yWI4XJDJrbtcYepA34tAs-9Ea71CduQMiFWUxBHNlbTJUHuaBMc3FTROpOuf7xHzEQ/s640/100+Kenya+government+websites+breached+by+Indonesian+hacker.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2KpVxEAc3dJ9yw9NtxQGKjGnz1lyZhBDN-bgdfYTpSN0Fvqiz-Lljba4ph36bW8wIKi217K2YB5yWI4XJDJrbtcYepA34tAs-9Ea71CduQMiFWUxBHNlbTJUHuaBMc3FTROpOuf7xHzEQ/s320/100+Kenya+government+websites+breached+by+Indonesian+hacker.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2&gt;BigPond GameArena hacked, 35,000 passwords reset&lt;/h2&gt;&lt;div class=&quot;standfirst&quot;&gt;Quick disclosure from Telstra&lt;br /&gt;
&lt;/div&gt;Telstra has taken the unusual – in Australia – step of proactively announcing that a service has been compromised.&lt;br /&gt;
The carrier has announced that it’s reset the passwords of 35,000  users of its GameArena and Games Shop services, stating that “the sites,  operated by a third party company, were victims of a hacking attack.”&lt;br /&gt;
&lt;div id=&quot;article-mpu-container&quot;&gt; &lt;div class=&quot;ad-now&quot; id=&quot;ad-mpu1-spot&quot; style=&quot;height: auto; width: auto;&quot;&gt;   &lt;/div&gt;The carrier states that “no financial or credit card details were kept on the sites”.&lt;br /&gt;
&lt;/div&gt;“Information that might have been obtained was limited to BigPond  Games usernames, the email address used to join the site and the  encrypted GameArena and Games Shop passwords of up to 35,000 customers,”  the statement said.&lt;br /&gt;
Users’ BigPond Broadband passwords were not affected. Telstra will be contacting affected customers with their new passwords.&lt;br /&gt;
Last year, a third-party customer-service provider used by BigPond was taken offline after an &lt;a href=&quot;http://www.theregister.co.uk/2011/12/09/telstra_opens_customer_database_in_egregious_blunder/&quot;&gt;exposure&lt;/a&gt; that resulted in around 60,000 password resets, while in January, customer data was &lt;a href=&quot;http://www.theregister.co.uk/2012/01/01/telstra_data_on_stupid_insecure_cloud_spreadsheet/&quot;&gt;posted&lt;/a&gt; to a cloud-based spreadsheet. In both cases, the data breach was the result of process failures rather than external attacks.&lt;br /&gt;
Perhaps because of the criticism it suffered in those two incidents,  the carrier has taken the commendable decision both to disclose and to  act quickly&lt;div class=&quot;standfirst&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/2017384941313999588/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/35000-passwords-reset-after-bigpond.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/2017384941313999588'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/2017384941313999588'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/35000-passwords-reset-after-bigpond.html' title='35,000 Passwords Reset After BigPond GameArena Hacked'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2KpVxEAc3dJ9yw9NtxQGKjGnz1lyZhBDN-bgdfYTpSN0Fvqiz-Lljba4ph36bW8wIKi217K2YB5yWI4XJDJrbtcYepA34tAs-9Ea71CduQMiFWUxBHNlbTJUHuaBMc3FTROpOuf7xHzEQ/s72-c/100+Kenya+government+websites+breached+by+Indonesian+hacker.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-6180748696244623186</id><published>2012-05-25T00:48:00.000-07:00</published><updated>2012-05-25T00:48:29.592-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News round the world"/><title type='text'>Yahoo! leaks! private! key! in! Axis! Chrome! debut!</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://i1-news.softpedia-static.com/images/news2/Yahoo-Messenger-Users-Phished-for-Facebook-Credentials-2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://i1-news.softpedia-static.com/images/news2/Yahoo-Messenger-Users-Phished-for-Facebook-Credentials-2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Extension launch scuppered by certificate blunder&lt;br /&gt;
&lt;br /&gt;
Yahoo! today released its Axis extension for Chrome – and  accidentally leaked its private security key that could allow anyone to  create malicious plugins masquerading as official Yahoo! software.&lt;br /&gt;
Australian entrepreneur Nik Cubrilovic, who last year garnered notice for identifying Facebook&#39;s tracking cookies, &lt;a href=&quot;http://nikcub.appspot.com/posts/yahoo-axis-chrome-extension-leaks-private-certificate-file&quot;&gt;revealed the certificate blunder&lt;/a&gt; on his blog, and said users should not install the extension “until the issue is clarified”.&lt;br /&gt;
&lt;div id=&quot;article-mpu-container&quot;&gt; &lt;div class=&quot;ad-now&quot; id=&quot;ad-mpu1-spot&quot; style=&quot;height: auto; margin-top: 0px; width: auto;&quot;&gt;   &lt;/div&gt;Cubrilovic peeked into the extension’s source code and found the  private certificate, which Yahoo! uses to sign the application to prove  it is genuine and unaltered. The result, he says, is that a miscreant  could forge a malicious extension that would be verified by Google&#39;s web  browser as coming from Yahoo!&lt;br /&gt;
&lt;/div&gt;There are all sorts of attacks that could be executed with a spoofed  extension; the most obvious of these, as Cubrilovic notes, would be to  create and sign a traffic logger to capture a victim’s web activity. He  wrote:&lt;br /&gt;
&lt;blockquote&gt;The certificate file is used by Yahoo! to sign the extension  package, which is used by Chrome and the webstore to authenticate that  the package comes from Yahoo! With access to the private certificate  file a malicious attacker is able to create a forged extension that  Chrome will authenticate as being from Yahoo! The clearest implication is that with the private certificate file  and a fake extension you can create a spoofed package that captures all  web traffic, including passwords, session cookies, etc. The easiest way  to get this installed onto a victim&#39;s machine would be to DNS spoof the  update URL. The next time the extension attempts to update it will  silently install and run the spoofed extension.&lt;br /&gt;
&lt;/blockquote&gt;He’s also produced &lt;a href=&quot;http://github.com/nikcub/yahoo-spoof&quot;&gt;a proof-of-concept&lt;/a&gt; of a spoofing attack and written up instructions on how to remove the extension.&lt;br /&gt;
Yahoo! has since apologised and posted a replacement web search  extension that doesn’t include the private half of the security  certificate. The new plugin, billed as a search browser, is also  available for Firefox, Internet Explorer, Safari, and iPhones and iPads.&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/6180748696244623186/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/yahoo-leaks-private-key-in-axis-chrome.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/6180748696244623186'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/6180748696244623186'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/yahoo-leaks-private-key-in-axis-chrome.html' title='Yahoo! leaks! private! key! in! Axis! Chrome! debut!'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-666405452382738850</id><published>2012-05-25T00:45:00.000-07:00</published><updated>2012-05-25T00:45:27.766-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="News round the world"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>New SpyEye plugin takes control of crimeware victims!</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;a href=&quot;http://i.zdnet.com/blogs/spyeye_plugin_camera_microphone_flash.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;size-full wp-image-12288 aligncenter&quot; height=&quot;153&quot; src=&quot;http://i.zdnet.com/blogs/spyeye_plugin_camera_microphone_flash.jpg&quot; width=&quot;475&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;c-1 heavy&quot;&gt;Summary: &lt;/span&gt;Security researchers from  Kaspersky have profiled a new SpyEye plugin known as flashcamcontrol.dll  which takes control of the victim’s webcam and microphone.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security researchers from Kaspersky have &lt;a href=&quot;http://www.securelist.com/en/blog/208193513/Big_Brother&quot;&gt;&lt;strong&gt;profiled a new SpyEye plugin&lt;/strong&gt;&lt;/a&gt; known as &lt;strong&gt;flashcamcontrol.dll&lt;/strong&gt;.&lt;br /&gt;
What does it do? Basically, it modifies an infected host’s Flash  permissions, allowing cybercriminals the opportunity to control and  webcam and the microphone of the infected victims.&lt;br /&gt;
More details:&lt;br /&gt;
&lt;blockquote&gt;If an infected user visits the site of a specified bank  and the browser processing the page requests a flash-document via a link  from the first column, the webfakes.dll plugin (which runs in a browser  context) detects that request and replaces it with an address from the  second column – an address controlled by the intruders. As a result, the  browser will load a malicious document from the intruder’s server  (statistiktop.com) instead of a flash document from the bank site.&lt;/blockquote&gt;&lt;blockquote&gt;It turned out that both flash documents merely create a  window with a picture from the webcam. One of them sends a video stream  to the intruder’s server.&lt;/blockquote&gt;It appears that someone is experimenting, with long-term ambitions on their mind. &lt;a href=&quot;http://www.zdnet.co.uk/news/emerging-tech/2003/12/12/online-banks-plan-face-recognition-trials-39118499/&quot;&gt;&lt;strong&gt;Face recognition for online banking as a concept&lt;/strong&gt;&lt;/a&gt;  has been around for years, however, financial institutions globally  have failed to implement the solution on a large scale. Personally, I  believe that facial recognition as a value-added protection mechanism is  a futile attempt to prevent a successful crimeware attack on the  infected host.&lt;br /&gt;
Taking into consideration the fact that on the majority of occasions  users don’t know that they’re infected with crimeware, a visual  representation of the fact that a particular end user is indeed in front  of the computer wouldn’t change this. And now cybercriminals have  developed an efficient way to undermine the facial recognition process  with ease.&lt;br /&gt;
This latest development once again proves that cybercriminals are  steps ahead of the security industry, and will continue to innovate in  an attempt to increase their fraudulently obtained revenues.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/666405452382738850/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/new-spyeye-plugin-takes-control-of.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/666405452382738850'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/666405452382738850'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/new-spyeye-plugin-takes-control-of.html' title='New SpyEye plugin takes control of crimeware victims!'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-4787325309136041103</id><published>2012-05-22T04:57:00.003-07:00</published><updated>2012-05-22T05:03:56.029-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ebooks"/><title type='text'>Hacking ebooks collection!</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFQGrbNFX4oxhMe9O3o8mqmDDMisqU0gTe13TrmeEAxmaBM9VY4kcmzCTfu6HZEgwPrUOdbOUDHk5Y_jzPrkQC7YD8wq_gLsMcau3EsK5NrKzy-35C8mJ9eZCfEWOwRiC92RSgUC93xuU/s1600/thebestebookcollection.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFQGrbNFX4oxhMe9O3o8mqmDDMisqU0gTe13TrmeEAxmaBM9VY4kcmzCTfu6HZEgwPrUOdbOUDHk5Y_jzPrkQC7YD8wq_gLsMcau3EsK5NrKzy-35C8mJ9eZCfEWOwRiC92RSgUC93xuU/s1600/thebestebookcollection.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;(Ebook - Computer) Hacking The Windows Registry.pdf 0 MB&lt;br /&gt;
(eBook - PDF) Hugo Cornwall - The Hacker&#39;s Handbook .pdf 0 MB&lt;br /&gt;
(eBook pdf) Hacking into computer systems - a beginners guide.pdf 1 MB&lt;br /&gt;
(ebook_-_pdf)_Hacking_IIS_Servers.pdf 0 MB&lt;br /&gt;
0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf 2 MB&lt;br /&gt;
0764578014.Wiley.The Database Hacker&#39;s Handbook- Defending Database Servers.chm 1 MB&lt;br /&gt;
076459611X.John Wiley &amp;amp;_ Sons.Hacking GMail (ExtremeTech).pdf 0 MB&lt;br /&gt;
076459611X.John Wiley &amp;amp;amp_ Sons.Hacking GMail (ExtremeTech).pdf 5 MB&lt;br /&gt;
1246523-Hacking.Guide.V3.1.pdf 1 MB&lt;br /&gt;
1931769508.A-List Publishing.Hacker Linux Uncovered.chm 4 MB&lt;br /&gt;
2212948-Hacker&#39;S.Delight.chm 2 MB&lt;br /&gt;
285063-Hacker.Bibel.[278.kB_www.netz.ru].pdf 0 MB&lt;br /&gt;
3077366-HackerHighSchool.pdf 3 MB&lt;br /&gt;
731986-Hacker&#39;s Desk Reference.pdf 1 MB&lt;br /&gt;
A Beginners Guide To Hacking Computer Systems.pdf 1 MB&lt;br /&gt;
Addison Wesley - Hackers Delight 2002.pdf 6 MB&lt;br /&gt;
Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb.chm 14 MB&lt;br /&gt;
Anti-Hacker ToolKit - McGraw Hill 2E 2004.chm 29 MB&lt;br /&gt;
Attacking the DNS Protocol.pdf 0 MB&lt;br /&gt;
Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf 144 MB&lt;br /&gt;
Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf 18 MB&lt;br /&gt;
Certified Ethical Hacker (CEH) v3.0 Official Course.pdf 26 MB&lt;br /&gt;
Computer - Hackers Secrets - e-book.pdf 0 MB&lt;br /&gt;
Crc Press - The Hacker&#39;S Handbook.pdf 18 MB&lt;br /&gt;
Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru].pdf 0 MB&lt;br /&gt;
DangerousGoogle-SearchingForSecrets.pdf 2 MB&lt;br /&gt;
Dummies - Hack How To Create Keygens (1).pdf 0 MB&lt;br /&gt;
For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf 11 MB&lt;br /&gt;
For.Dummies.Hacking.for.Dummies.Apr.2004.eBook-DDU.pdf 9 MB&lt;br /&gt;
Hack IT Security Through Penetration Testing.pdf 12 MB&lt;br /&gt;
Hack Proofing - Your Network - Internet Tradecraft.pdf 3 MB&lt;br /&gt;
Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress - ISBN 1-928994-34-2.pdf 12 MB&lt;br /&gt;
Hack Proofing Sun Solaris 8.pdf 7 MB&lt;br /&gt;
Hack Proofing Your E-Commerce Site.pdf 7 MB&lt;br /&gt;
Hack Proofing Your Identity In The Information Age.pdf 9 MB&lt;br /&gt;
Hack Proofing Your Network Second Edition.pdf 9 MB&lt;br /&gt;
Hack Proofing Your Network_First Edition.pdf 3 MB&lt;br /&gt;
Hack Proofing Your Web Applications.pdf 9 MB&lt;br /&gt;
Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm 6 MB&lt;br /&gt;
Hack_IT_Security_Through_Penetration_Testing.chm 5 MB&lt;br /&gt;
Hacker Disassembling Uncovered.chm 5 MB&lt;br /&gt;
Hacker Linux Uncovered.chm 4 MB&lt;br /&gt;
Hacker Web Exploitation Uncovered.chm 1 MB&lt;br /&gt;
Hacker&#39;S.Delight.chm 2 MB&lt;br /&gt;
Hacker_s_Guide.pdf 4 MB&lt;br /&gt;
Hackers Beware.pdf 5 MB&lt;br /&gt;
Hackers Secrets Revealed.pdf 0 MB&lt;br /&gt;
Hackers Secrets.pdf 0 MB&lt;br /&gt;
Hackers, Heroes Of The Computer Revolution.pdf 0 MB&lt;br /&gt;
Hackers_Secrets.pdf 0 MB&lt;br /&gt;
Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf 3 MB&lt;br /&gt;
Hacking - The Art of Exploitation.chm 1 MB&lt;br /&gt;
Hacking Cisco Routers.pdf 0 MB&lt;br /&gt;
Hacking Exposed - Network Security Secrets &amp;amp; Solutions, 2nd Edition.pdf 10 MB&lt;br /&gt;
Hacking Exposed Network Security Secrets &amp;amp; Solutions, Third Edition ch1.pdf 2 MB&lt;br /&gt;
Hacking For Dummies 1.pdf 0 MB&lt;br /&gt;
Hacking For Dummies 2.pdf 0 MB&lt;br /&gt;
Hacking For Dummies.pdf 0 MB&lt;br /&gt;
Hacking GMail.pdf 5 MB&lt;br /&gt;
Hacking IIS Servers.pdf 0 MB&lt;br /&gt;
Hacking Windows XP.pdf 10 MB&lt;br /&gt;
Hacking into computer systems - a beginners guide.pdf 1 MB&lt;br /&gt;
Hacking the Code - ASP.NET Web Application Security Cookbook (2004) .chm 5 MB&lt;br /&gt;
Hacking-Hacker&#39;s Guide.pdf 4 MB&lt;br /&gt;
Hacking-Hackers Secrets Revealed.pdf 0 MB&lt;br /&gt;
Hacking-Hugo Cornwall-The Hacker&#39;s Handbook .pdf 0 MB&lt;br /&gt;
Hacking-The Hacker Crackdown.pdf 1 MB&lt;br /&gt;
Hacking-ebook - CIA-Book-of-Dirty-Tricks1.pdf 0 MB&lt;br /&gt;
Hacking.For.Dummies.Access.To.Other.People&#39;s.System.Made.Simple.pdf 1 MB&lt;br /&gt;
Hacking.Guide.V3.1.pdf 1 MB&lt;br /&gt;
Hackproofing Oracle Application Server.pdf 0 MB&lt;br /&gt;
Halting.The.Hacker.A.Practical.Guide.To.Computer.Security.chm 1 MB&lt;br /&gt;
How to Crack CD Protections.pdf 0 MB&lt;br /&gt;
John Wiley &amp;amp; Sons - Hacking For Dummies.pdf 9 MB&lt;br /&gt;
John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eBook-DDU.pdf 10 MB&lt;br /&gt;
John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eBook.pdf 10 MB&lt;br /&gt;
John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.Feb.2005.ISBN0764569597.pdf 3 MB&lt;br /&gt;
Jon.Erickson.Hacking.The.Art.Of.Exploitation.No.Starch.Press.2003.chm 1 MB&lt;br /&gt;
Linux-Server.Hacks-OReilly.pdf 34 MB&lt;br /&gt;
McGraw Hill - Web Applications (Hacking Exposed).pdf 8 MB&lt;br /&gt;
McGraw-Hill - Hacking Exposed, 3rd Ed - Hacking Exposed Win2.pdf 6 MB&lt;br /&gt;
McGraw.Hacking.Exposed.Cisco.Networks.chm 10 MB&lt;br /&gt;
McGraw.Hill.HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU.pdf 3 MB&lt;br /&gt;
McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eB.pdf 4 MB&lt;br /&gt;
McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eBook-DDU.pdf 4 MB&lt;br /&gt;
McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-.pdf 3 MB&lt;br /&gt;
McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf 3 MB&lt;br /&gt;
McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eB.pdf 5 MB&lt;br /&gt;
McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eBook-DDU.pdf 5 MB&lt;br /&gt;
Mind Hacks - Tips &amp;amp; Tricks for Using Your Brain.chm 3 MB&lt;br /&gt;
No.Starch.Press.Hacking.The.Art.Of.Exploitation.chm 1 MB&lt;br /&gt;
O&#39;Reilly - Online Investing Hacks.chm 5 MB&lt;br /&gt;
O&#39;Reilly.-.Network.Security.Hacks.chm 2 MB&lt;br /&gt;
O&#39;Reilly.Windows.Server.Hack.chm 2 MB&lt;br /&gt;
O&#39;Reilly.Windows.Server.Hack.rar 2 MB&lt;br /&gt;
OReilly Google Hacks, 1st Edition2003.pdf 3 MB&lt;br /&gt;
OReilly - Flickr Hacks Tips and Tools for Sharing Photos Online (Feb 2006).chm 5 MB&lt;br /&gt;
OReilly - Google Hacks.pdf 3 MB&lt;br /&gt;
OReilly,.Digital.Video.Hacks.(2005).DDU.LotB.chm 3 MB&lt;br /&gt;
OReilly,.IRC.Hacks.(2004).DDU.chm 3 MB&lt;br /&gt;
OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596008570.chm 5 MB&lt;br /&gt;
OReilly.Google.Maps.Hacks.Jan.2006.chm 9 MB&lt;br /&gt;
OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005.chm 2 MB&lt;br /&gt;
OReilly.Network.Security.Hacks.chm 2 MB&lt;br /&gt;
OReilly.PC.Hacks.Oct.2004.eBook-DDU.chm 6 MB&lt;br /&gt;
OReilly.PayPal.Hacks.Sep.2004.eBook-DDU.chm 2 MB&lt;br /&gt;
OReilly.Perl.Hacks.Tips.and.Tools.for.Programming.Debugging.and.Surviving.May.2006.chm 1 MB&lt;br /&gt;
OReilly.SQL.Hacks.Nov.2006.chm 2 MB&lt;br /&gt;
OReilly.Skype.Hacks.Tips.and.Tools.for.Cheap.Fun.Innovative.Phone.Service.Dec.2005.chm 4 MB&lt;br /&gt;
OReilly.Statistics.Hacks.May.2006.chm 1 MB&lt;br /&gt;
OReilly.Ubuntu.Hacks.Tips.and.Tools.for.Exploring.Using.and.Tuning.Linux.Jun.2006.chm 4 MB&lt;br /&gt;
OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Telephony.Dec.2005.chm 3 MB&lt;br /&gt;
OReilly.Word.Hacks.Oct.2004.eBook-DDU.chm 3 MB&lt;br /&gt;
OSB.Ethical.Hacking.and.Countermeasures.EC.Council.Exam.312.50.Student.Courseware.eBook-LiB.chm 14 MB&lt;br /&gt;
O_Reilly_-_Windows_XP_Hacks.chm 5 MB&lt;br /&gt;
Oreilly Access Hacks Apr 2005.chm 18 MB&lt;br /&gt;
Oreilly, Paypal Hacks (2004) Ddu.chm 2 MB&lt;br /&gt;
Oreilly.Amazon.Hacks.eBook.LiB.chm 3 MB&lt;br /&gt;
Oreilly.Linux.Desktop.Hacks.Mar.2005.eBook-LiB.chm 0 MB&lt;br /&gt;
PC Games - How to Crack CD Protection.pdf 0 MB&lt;br /&gt;
Que - UNIX Hints Hacks.chm 1 MB&lt;br /&gt;
Que.Certified.Ethical.Hacker.Exam.Prep.Apr.2006.chm 8 MB&lt;br /&gt;
SQL Hacks.chm 2 MB&lt;br /&gt;
SQLInjectionWhitePaper.pdf 1 MB&lt;br /&gt;
Security and Hacking - Anti-Hacker Tool Kit Second Edition.chm 29 MB&lt;br /&gt;
SoTayHacker1.0.chm 76 MB&lt;br /&gt;
Syngress - Hack Proofing Linux (2001).pdf 12 MB&lt;br /&gt;
Syngress - Hack Proofing Your Identity in the Information Age - 2002.pdf 9 MB&lt;br /&gt;
Syngress - Hacking a Terror Network. The Silent Threat of Covert Channels.pdf 9 MB&lt;br /&gt;
Syngress -- Hack Proofing Your Wireless Network.pdf 7 MB&lt;br /&gt;
Syngress Hack Proofing Your Identity in the Information Age.pdf 9 MB&lt;br /&gt;
Syngress.Buffer.Overflow.Attacks.Dec.2004.eBook-DDU.pdf 5 MB&lt;br /&gt;
Syngress.Hack.the.Stack.Oct.2006.pdf 7 MB&lt;br /&gt;
Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf 8 MB&lt;br /&gt;
The Little Black Book Of Computer Virus.pdf 1 MB&lt;br /&gt;
The_20Little_20Black_20Book_20of_20Computer_20Viruses.pdf 1 MB&lt;br /&gt;
Websters.New.World.Websters.New.World.Hacker.Dictionary.Sep.2006.pdf 5 MB&lt;br /&gt;
Wiley.Hacking.Firefox.More.Than.150.Hacks.Mods.and.Customizations.Jul.2005.eBook-DDU.pdf 14 MB&lt;br /&gt;
Wiley.Hacking.GPS.Mar.2005.ISBN0764598805.pdf 10 MB&lt;br /&gt;
Wiley.Hacking.Google.Maps.and.Google.Earth.Jul.2006.pdf 11 MB&lt;br /&gt;
Wiley.Lifehacker.Dec.2006.pdf 7 MB&lt;br /&gt;
Wiley.The.Database.Hackers.Handbook.Defending.Database.Servers.chm 1 MB&lt;br /&gt;
Win XP Hacks oreilly 2003.chm 5 MB&lt;br /&gt;
WinXP SP1 Hack.pdf 0 MB&lt;br /&gt;
Windows Server Hacks.chm 2 MB&lt;br /&gt;
Xbox-hack - AIM-2002-008.pdf 1 MB&lt;br /&gt;
Yahoo.Hacks.Oct.2005.chm 7 MB&lt;br /&gt;
[0735710090]Hackers Beware Defending Your Network From The Wiley Hacker.pdf 5 MB&lt;br /&gt;
addison wesley - web hacking - attacks and defense.chm 6 MB&lt;br /&gt;
amazon-hacks.chm 3 MB&lt;br /&gt;
bsd-hacks.pdf 2 MB&lt;br /&gt;
ceh-official-certified-ethical-hacker-review-guide-exam-312-50.9780782144376.27422.pdf 5 MB&lt;br /&gt;
cracking-sql-passwords.pdf 0 MB&lt;br /&gt;
database hacker handbook.chm 1 MB&lt;br /&gt;
eBooks.OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools.chm 4 MB&lt;br /&gt;
ebay-hacks-100-industrial-strength-tips-and-tools.pdf 4 MB&lt;br /&gt;
ebook.oreilly.-.windows.xp.hacks.sharereactor.chm 5 MB&lt;br /&gt;
ethical hacking, student guide.pdf 7 MB&lt;br /&gt;
excel-hacks.chm 3 MB&lt;br /&gt;
google-hacks.pdf 3 MB&lt;br /&gt;
hacker ethic.pdf 13 MB&lt;br /&gt;
hacker-disassembling-uncovered.9781931769228.20035.chm 5 MB&lt;br /&gt;
hacking the windows registry .pdf 0 MB&lt;br /&gt;
hacks.sfv 0 MB&lt;br /&gt;
linux-server-hacks.pdf 33 MB&lt;br /&gt;
little_black_book_oc_computer_viruses.pdf 1 MB&lt;br /&gt;
mac-os-hacks.chm 9 MB&lt;br /&gt;
network-security-hacks.chm 2 MB&lt;br /&gt;
online-investing-hacks.chm 5 MB&lt;br /&gt;
oreilly,.visual.studio.hacks.(2005).ddu.lotb.chm 6 MB&lt;br /&gt;
oreilly.firefox.hacks.ebook-lib.chm 3 MB&lt;br /&gt;
oreilly.windows.xp.hacks.2nd.edition.feb.2005.lib.chm 13 MB&lt;br /&gt;
prentice hall - pipkin - halting the hacker- a practical guide to computer security, 2nd edition.chm 1 MB&lt;br /&gt;
spidering-hacks.chm 1 MB&lt;br /&gt;
the-database-hackers-handbook-defending-database-servers.9780764578014.25524.chm 1 MB&lt;br /&gt;
tivo-hacks.100-industrial-strength-tips-and-tools.pdf 9 MB&lt;br /&gt;
u23_Wiley - Hacking GPS - 2005 - (By Laxxuss).pdf &lt;br /&gt;
&lt;br /&gt;
Torrent Link - &lt;a href=&quot;http://bitsnoop.com/hacking-and-security-ebooks-collect-q20229056.html&quot; target=&quot;_blank&quot;&gt;Click!&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/4787325309136041103/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/hacking-ebooks-collection.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/4787325309136041103'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/4787325309136041103'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/hacking-ebooks-collection.html' title='Hacking ebooks collection!'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFQGrbNFX4oxhMe9O3o8mqmDDMisqU0gTe13TrmeEAxmaBM9VY4kcmzCTfu6HZEgwPrUOdbOUDHk5Y_jzPrkQC7YD8wq_gLsMcau3EsK5NrKzy-35C8mJ9eZCfEWOwRiC92RSgUC93xuU/s72-c/thebestebookcollection.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-6561283830969802294</id><published>2012-05-22T04:03:00.000-07:00</published><updated>2012-05-22T04:03:54.636-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backdoors"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="News round the world"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Backdoor sniffed in ZTE&#39;s US Android smartphones</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://phandroid.s3.amazonaws.com/wp-content/uploads/2012/02/android-malware.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;221&quot; src=&quot;http://phandroid.s3.amazonaws.com/wp-content/uploads/2012/02/android-malware.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Chinese handset manufacturer ZTE has confirmed the presence of a backdoor in one of its Android smartphones.&lt;br /&gt;
ZTE&#39;s Score&amp;nbsp;M ships with an application featuring a hardcoded  password that gives the user, or software running on the device,  administrator-level access. Running the program with the password spawns  a root shell prompt on the Linux-powered mobes, allowing the phone to  be completely taken over.&lt;br /&gt;
&lt;div id=&quot;article-mpu-container&quot;&gt; &lt;div class=&quot;ad-now&quot; id=&quot;ad-mpu1-spot&quot; style=&quot;height: auto; margin-top: 0px; width: auto;&quot;&gt;   &lt;/div&gt;News of the ZTE Score&amp;nbsp;M smartphone backdoor first surfaced last week  in posts on the code-sharing website pastebin.com. The password needed  to access the backdoor, located in the &lt;code&gt;/system/bin/sync_agent&lt;/code&gt; file, is readily available online.&lt;br /&gt;
&lt;/div&gt;The world&#39;s fourth largest mobe-maker acknowledged a problem, but  said it was restricted to the Score&amp;nbsp;M, which runs Android 2.3.4 and is  distributed through MetroPCS in the US. ZTE is working on an &quot;over the  air&quot; patch to close the security hole, and the handset manufacturer  insists that the issue does not affect Skate smartphones - contrary to  internet rumours.&lt;br /&gt;
Mobile security firm Lookout advises users of the model to be  particularly careful about apps they download and websites they visit  until they get the security patch from ZTE. The poorly protected setuid  executable on the smartphones allows an application to grant itself  superuser privileges and run as the root user, Lookout explains.&lt;br /&gt;
&quot;This type of access allows an attacker full control over a target  device – which includes the ability to install or uninstall applications  without notice and access to any sensitive personal information on a  device,&quot; Lookout &lt;a href=&quot;http://blog.mylookout.com/blog/2012/05/21/zte-security-vulnerability&quot; target=&quot;_blank&quot;&gt;warns&lt;/a&gt;.&lt;br /&gt;
&quot;While this issue does not expose a remotely accessible vulnerability  on affected phones, it is an issue that could be exploited by targeted,  malicious applications installed to the phone. In addition, affected  users should download and install patches provided by ZTE and/or Metro  PCS as soon as they are rolled out to their device,&quot; it adds.&lt;br /&gt;
The sync_agent tool might have been put there to manage preloaded  applications, such as MetroPCS Visual Voicemail or MetroStudio,  according to Lookout.&lt;br /&gt;
Dmitri Alperovitch, co-founder of security startup CrowdStrike, said  ZTE was using the backdoor to update the smartphone&#39;s software,  suggesting that the feature was placed there deliberately. However he  said that it was unclear to him if the application was planted with  malicious intent or left available as the result of some careless  oversight, Reuters &lt;a href=&quot;http://www.reuters.com/article/2012/05/18/us-zte-phone-idUSBRE84H08J20120518&quot; target=&quot;_blank&quot;&gt;reports&lt;/a&gt;.&lt;br /&gt;
&quot;There are rumours about backdoors in Chinese equipment floating  around,&quot; Alperovitch said. &quot;That&#39;s why it&#39;s so shocking to see it  blatantly on a device.&quot;&lt;br /&gt;
The circumstances of the problem, especially the fact that the  problem was restricted to smartphones supplied to the US, is bound to  provide plenty of fodder for conspiracy theorists. China is repeatedly  accused of using technology to spy on the West&#39;s high-tech biz, defence  contractors, human right activists and energy firms. Allegations of  backdoors in devices supplied by Chinese network equipment manufacturers  have been a hot topic among Western politicians.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/6561283830969802294/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/backdoor-sniffed-in-ztes-us-android.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/6561283830969802294'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/6561283830969802294'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/backdoor-sniffed-in-ztes-us-android.html' title='Backdoor sniffed in ZTE&#39;s US Android smartphones'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-1943658709678395372</id><published>2012-05-22T04:00:00.000-07:00</published><updated>2012-05-22T04:00:02.348-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News round the world"/><title type='text'>Anonymous Hacks Bureau Of Justice, Leaks 1.7GB Of Data</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://upload.wikimedia.org/wikipedia/commons/thumb/4/49/AnonOps.jpg/200px-AnonOps.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://upload.wikimedia.org/wikipedia/commons/thumb/4/49/AnonOps.jpg/200px-AnonOps.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;c-1 heavy&quot;&gt;Summary: &lt;/span&gt;Anonymous has apparently hacked  the United States Bureau of Justice Statistics and posted 1.7GB of data  belonging to the agency on The Pirate Bay. This is a Monday Mail Mayhem  release.&lt;br /&gt;
&lt;br /&gt;
The hacktivist group Anonymous claims to have leaked 1.7GB of data belonging to the United States Bureau of Justice Statistics (&lt;a href=&quot;http://bjs.ojp.usdoj.gov/&quot;&gt;BJS&lt;/a&gt;). The file, which has been uploaded as a torrent and posted on &lt;a href=&quot;https://thepiratebay.se/torrent/7287633/1.7GB_leaked_from_the_Bureau_of_Justice&quot;&gt;The Pirate Bay&lt;/a&gt;, reportedly contains internal e-mails as well as the website’s “entire database dump.”&lt;br /&gt;
It remains to be seen if there’s anything incriminating in this leak.  After all, the BJS is simply a federal government agency belonging to  the U.S. Department of Justice (&lt;a href=&quot;http://www.justice.gov/&quot;&gt;DOJ&lt;/a&gt;) that collects, analyzes, and publishes data relating to crime in the U.S. (including hacker attacks).&lt;br /&gt;
As you can see in the video above, the group also claims the BJS took  down its website in response to the attack. By then it was supposedly  too late. Here’s the video’s transcript of the English part:&lt;br /&gt;
&lt;blockquote&gt;  Greetings world,&lt;br /&gt;
We are Anonymous.&lt;br /&gt;
Today we are releasing 1.7GB of data that used to belong to the United States Bureau of Justice, until now.&lt;br /&gt;
Within the booty you may find lots of shiny things such as internal emails, and the entire database dump.&lt;br /&gt;
We Lulzed as they took the website down after being owned, clearly showing they were scared of what inevitably happened. &lt;br /&gt;
We do not stand for any government or parties; we stand for freedom of people, freedom of speech and freedom of information.&lt;br /&gt;
We are releasing data to spread information, to allow the people to be  heard and to know the corruption in their government. We are releasing  it to end the corruption that exists, and truly make those who are being  oppressed free.&lt;br /&gt;
The price we pay very often is our own freedom. The price governments  pay is the exposure of their corruption and the truth being revealed,  for the truth will set us free in the end.&lt;br /&gt;
So once more we call on you. Hackers, activists, and freedom fighters; join us in our struggle against these corporate &lt;br /&gt;
&lt;/blockquote&gt;Curiously, an unmasked gentleman is shown at the end of the video. He says the following:&lt;br /&gt;
&lt;blockquote&gt; What’s next? What’s next is… all they can do is shut down the Internet  itself. And we see, how that went for them, in Egypt. And we the people  know, that when the government shuts down the Internet, that’s when it’s  time to shut down the government. &lt;/blockquote&gt;He then puts on the Guy Fawkes mask and repeats the well-known Anonymous slogan:&lt;br /&gt;
&lt;blockquote&gt; We are Anonymous&lt;br /&gt;
We do not forgive&lt;br /&gt;
We do not forget&lt;br /&gt;
Expect us &lt;/blockquote&gt;To keep things more interesting, he throws in a little something extra: “And now, expect a whole lot more.”&lt;br /&gt;
I have contacted the United States Bureau of Justice Statistics and will update you if I hear back.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/1943658709678395372/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/anonymous-hacks-bureau-of-justice-leaks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/1943658709678395372'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/1943658709678395372'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/anonymous-hacks-bureau-of-justice-leaks.html' title='Anonymous Hacks Bureau Of Justice, Leaks 1.7GB Of Data'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-8956007473593242833</id><published>2012-05-21T01:19:00.000-07:00</published><updated>2012-05-21T01:19:13.286-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="News round the world"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Call Of Duty Hacker Jailed After Meatspace Burglary</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.geek.com/wp-content/uploads/2011/06/500x_blackops.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;291&quot; src=&quot;http://www.geek.com/wp-content/uploads/2011/06/500x_blackops.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;A Brit who distributed a Trojan horse that posed as a patch for popular shoot-em-up game &lt;i&gt;Call of Duty&lt;/i&gt; has been jailed for 18 months.&lt;br /&gt;
Lewys Martin, 20, of Deal in Kent, used the malware to harvest bank  login credentials, credit card details and internet passwords from the  compromised Windows PCs of his victims. Martin then apparently laundered  the credentials via underground cybercrime forums, earning $5 or less  for every credential, directing proceeds of his criminal activity  towards an offshore account in Costa Rica, funds which remain beyond the  reach of UK police.&lt;br /&gt;
&lt;div id=&quot;article-mpu-container&quot;&gt; &lt;div class=&quot;ad-now&quot; id=&quot;ad-mpu1-spot&quot; style=&quot;height: auto; margin-top: 0px; width: auto;&quot;&gt;   &lt;/div&gt;Martin&#39;s activities might have gone undiscovered if not for his  arrest during what police described as a drunken attempt to break into a  local college and steal computer equipment. Police who raided his home  discovered printouts of stolen credit card numbers and papers relating  to a fraudulent bank loan, obtained under a false name.&lt;br /&gt;
&lt;/div&gt;The student was convicted last November but sentence was deferred to  allow him to complete a university computer course. However, bail was  revoked after Martin was caught with several other individuals trying to  break into Walmer Science College in Deal.&lt;br /&gt;
He caused hundreds of pounds of damages in criminal damages during the bungled burglary, according to &lt;a href=&quot;http://www.kentonline.co.uk/kentonline/news/2012/may/17/call_of_duty.aspx&quot; target=&quot;_blank&quot;&gt;local reports&lt;/a&gt;.&lt;br /&gt;
Martin was prosecuted and subsequently convicted for three burglary  and fraud charges, leading up to a sentence hearing this week when he  was jailed for 18 months.&lt;br /&gt;
A court clerk at Canterbury Crown Court confirmed the terms of the  sentencing this week, which following earlier guilty pleas on the  specimen charges. Further fraud charges were taken into consideration in  sentencing Martin to a substantial spell behind bars.&lt;br /&gt;
Gamers are a popular target for malware distributors. Much of this  malign activity is directed at gamers in the Far East but Western  shoot-em-up and role-playing fans are also at risk and ought to be wary  of malware posing as gaming cracks and other common tricks, as explained  in a blog post by Sophos &lt;a href=&quot;http://nakedsecurity.sophos.com/2012/05/17/call-of-duty-trojan-horse-jail&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/8956007473593242833/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/call-of-duty-hacker-jailed-after.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/8956007473593242833'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/8956007473593242833'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/call-of-duty-hacker-jailed-after.html' title='Call Of Duty Hacker Jailed After Meatspace Burglary'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-24908524324119155</id><published>2012-05-19T03:54:00.006-07:00</published><updated>2012-05-19T04:16:13.061-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Python"/><title type='text'>Website Source Code Grabber</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;it will create source.txt in the same directory&lt;br /&gt;
&lt;br /&gt;
import urllib&lt;br /&gt;
import httplib&lt;br /&gt;
import socket&lt;br /&gt;
&lt;br /&gt;
print &quot;\n\nFast Webpage Saver&quot;&lt;br /&gt;
print &quot;input URL and run it. It will Save Webpage Within Seconds&quot;&lt;br /&gt;
&lt;br /&gt;
print &quot;\n\n\t|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||&quot;&lt;br /&gt;
print &quot;\t|||||&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |||||&quot;&lt;br /&gt;
print &quot;\t|||||&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |||||&quot;&lt;br /&gt;
print &quot;\t|||||&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Coded By Ajith KP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |||||&quot;&lt;br /&gt;
print &quot;\t|||||&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |||||&quot;&lt;br /&gt;
print &quot;\t|||||&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |||||&quot;&lt;br /&gt;
print &quot;\t|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||&quot;&lt;br /&gt;
&lt;br /&gt;
try:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; url = raw_input(&quot;URL:&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; url =url.replace(&quot;http://&quot;,&quot;&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; txt = open(&#39;source.txt&#39;,&#39;w&#39;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cobra = urllib.urlopen(&#39;http://&#39;+url)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; for source in cobra.readlines():&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print source.rstrip()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; txt.write(source.rstrip())&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; txt.close()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cobra.close()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; raw_input(&#39;Complete: Open source.txt&#39;)&lt;br /&gt;
except (httplib.HTTPResponse, socket.error):&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\n\t[!] Session Cancelled; Error occured. Check internet settings&quot;&lt;br /&gt;
except (KeyboardInterrupt, SystemExit):&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t[x] Session cancelled&quot;&lt;br /&gt;
&lt;code class=&quot;plain&quot;&gt;&lt;/code&gt;&lt;code class=&quot;plain&quot;&gt;&lt;br /&gt;
&lt;/code&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/24908524324119155/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/website-source-code-grabber.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/24908524324119155'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/24908524324119155'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/website-source-code-grabber.html' title='Website Source Code Grabber'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-5107305372918996796</id><published>2012-05-19T03:52:00.000-07:00</published><updated>2012-05-19T03:52:45.497-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Python"/><title type='text'>Website Response Checker</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;import httplib&lt;br /&gt;
print &quot;Coded by Ajith KP&quot;&lt;br /&gt;
print &quot;This code can capture the response from website&quot;&lt;br /&gt;
print &quot;Eg. Website for Check: www.facebook.com&quot;&lt;br /&gt;
print &quot;Eg. Page for check: index.php&quot;&lt;br /&gt;
site=raw_input(&quot;\t\nWebsite for Check:&quot;)&lt;br /&gt;
pages=raw_input(&quot;\t\nPage for Check:&quot;)&lt;br /&gt;
pages = &quot;/&quot; + pages&lt;br /&gt;
conn = httplib.HTTPConnection(site)&lt;br /&gt;
conn.request(&quot;GET&quot;, pages)&lt;br /&gt;
capture = conn.getresponse()&lt;br /&gt;
print capture.status, capture.reason&lt;br /&gt;
&lt;br /&gt;
I dont want my readers to become lazy since its a small program write the code on your own :P&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/5107305372918996796/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/website-response-checker.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/5107305372918996796'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/5107305372918996796'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/website-response-checker.html' title='Website Response Checker'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-3308541386772266909</id><published>2012-05-19T03:47:00.000-07:00</published><updated>2012-05-19T03:47:47.838-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Python"/><title type='text'>Area Calculator in .py</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;print &quot;Select shape:&quot;&lt;br /&gt;
print &quot;1 rectangle&quot;&lt;br /&gt;
print &quot;2 Circle&quot;&lt;br /&gt;
print &quot;3 Triangle&quot;&lt;br /&gt;
shape=input(&quot;&amp;gt; &quot;)&lt;br /&gt;
if shape==1:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; l=input(&quot;Length:&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; b=input(&quot;breadth:&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; area=l*b&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;The area of rectangle is&quot;, area&lt;br /&gt;
if shape==2:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; r=input(&quot;radius:&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; area=3.14*r*r&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;The area of circle is&quot;, area&lt;br /&gt;
if shape==3:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; b=input(&quot;b:&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; h=input(&quot;h:&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; area=0.5*b*h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;The area of Triangle is&quot;, area&lt;br /&gt;
&lt;br /&gt;
Paste Link - &lt;a href=&quot;http://paste.ubuntu.com/995640/&quot; target=&quot;_blank&quot;&gt;Click&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/3308541386772266909/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/area-calculator-in-py.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/3308541386772266909'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/3308541386772266909'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/area-calculator-in-py.html' title='Area Calculator in .py'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-4078665184956561839</id><published>2012-05-19T03:45:00.000-07:00</published><updated>2012-05-19T03:45:54.681-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Python"/><title type='text'>Admin Page Finder in .py</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;#Created for coded32 and his teamopenfire Eliminated Some bugs from my last code shared here as Guest.&lt;br /&gt;
#Greets To T.O.F and Indishell&lt;br /&gt;
#Thanks friends for find bugs and give suggetions&lt;br /&gt;
&lt;br /&gt;
#cd direcory/to/code&lt;br /&gt;
#direcory/to/code&amp;gt;python code.py&lt;br /&gt;
&lt;br /&gt;
#improved Error Handling&lt;br /&gt;
#Find out usefull stuffs from www.teamopenfire.com&lt;br /&gt;
#&quot;wE aRe gREat inDIans&quot;&lt;br /&gt;
&lt;br /&gt;
import httplib&lt;br /&gt;
import socket&lt;br /&gt;
import sys&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
try:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t################################################################&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; www.teamopenfire.com&amp;nbsp; #&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ###############&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ########&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ############&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ##&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ##&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ######&amp;nbsp;&amp;nbsp; ######&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ##&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ##&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp; ########&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ##&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ##&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ##&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ##&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp; #####&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ##&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ##&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp; #####&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ##&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ##&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ##&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ##&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp; #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #####&amp;nbsp;&amp;nbsp;&amp;nbsp; [#]&amp;nbsp;&amp;nbsp;&amp;nbsp; ########&amp;nbsp;&amp;nbsp; [#] #####&amp;nbsp; AdminFinder #&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; coded by Ajith KP #&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Greets to Coded32 and T.O.F members #&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t################################################################&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; var1=0&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; var2=0&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; php = [&#39;admin/&#39;,&#39;administrator/&#39;,&#39;admin1/&#39;,&#39;admin2/&#39;,&#39;admin3/&#39;,&#39;admin4/&#39;,&#39;admin5/&#39;,&#39;usuarios/&#39;,&#39;usuario/&#39;,&#39;administrator/&#39;,&#39;moderator/&#39;,&#39;webadmin/&#39;,&#39;adminarea/&#39;,&#39;bb-admin/&#39;,&#39;adminLogin/&#39;,&#39;admin_area/&#39;,&#39;panel-administracion/&#39;,&#39;instadmin/&#39;,&lt;br /&gt;
&#39;memberadmin/&#39;,&#39;administratorlogin/&#39;,&#39;adm/&#39;,&#39;admin/account.php&#39;,&#39;admin/index.php&#39;,&#39;admin/login.php&#39;,&#39;admin/admin.php&#39;,&#39;admin/account.php&#39;,&lt;br /&gt;
&#39;admin_area/admin.php&#39;,&#39;admin_area/login.php&#39;,&#39;siteadmin/login.php&#39;,&#39;siteadmin/index.php&#39;,&#39;siteadmin/login.html&#39;,&#39;admin/account.html&#39;,&#39;admin/index.html&#39;,&#39;admin/login.html&#39;,&#39;admin/admin.html&#39;,&lt;br /&gt;
&#39;admin_area/index.php&#39;,&#39;bb-admin/index.php&#39;,&#39;bb-admin/login.php&#39;,&#39;bb-admin/admin.php&#39;,&#39;admin/home.php&#39;,&#39;admin_area/login.html&#39;,&#39;admin_area/index.html&#39;,&lt;br /&gt;
&#39;admin/controlpanel.php&#39;,&#39;admin.php&#39;,&#39;admincp/index.asp&#39;,&#39;admincp/login.asp&#39;,&#39;admincp/index.html&#39;,&#39;admin/account.html&#39;,&#39;adminpanel.html&#39;,&#39;webadmin.html&#39;,&lt;br /&gt;
&#39;webadmin/index.html&#39;,&#39;webadmin/admin.html&#39;,&#39;webadmin/login.html&#39;,&#39;admin/admin_login.html&#39;,&#39;admin_login.html&#39;,&#39;panel-administracion/login.html&#39;,&lt;br /&gt;
&#39;admin/cp.php&#39;,&#39;cp.php&#39;,&#39;administrator/index.php&#39;,&#39;administrator/login.php&#39;,&#39;nsw/admin/login.php&#39;,&#39;webadmin/login.php&#39;,&#39;admin/admin_login.php&#39;,&#39;admin_login.php&#39;,&lt;br /&gt;
&#39;administrator/account.php&#39;,&#39;administrator.php&#39;,&#39;admin_area/admin.html&#39;,&#39;pages/admin/admin-login.php&#39;,&#39;admin/admin-login.php&#39;,&#39;admin-login.php&#39;,&lt;br /&gt;
&#39;bb-admin/index.html&#39;,&#39;bb-admin/login.html&#39;,&#39;acceso.php&#39;,&#39;bb-admin/admin.html&#39;,&#39;admin/home.html&#39;,&#39;login.php&#39;,&#39;modelsearch/login.php&#39;,&#39;moderator.php&#39;,&#39;moderator/login.php&#39;,&lt;br /&gt;
&#39;moderator/admin.php&#39;,&#39;account.php&#39;,&#39;pages/admin/admin-login.html&#39;,&#39;admin/admin-login.html&#39;,&#39;admin-login.html&#39;,&#39;controlpanel.php&#39;,&#39;admincontrol.php&#39;,&lt;br /&gt;
&#39;admin/adminLogin.html&#39;,&#39;adminLogin.html&#39;,&#39;admin/adminLogin.html&#39;,&#39;home.html&#39;,&#39;rcjakar/admin/login.php&#39;,&#39;adminarea/index.html&#39;,&#39;adminarea/admin.html&#39;,&lt;br /&gt;
&#39;webadmin.php&#39;,&#39;webadmin/index.php&#39;,&#39;webadmin/admin.php&#39;,&#39;admin/controlpanel.html&#39;,&#39;admin.html&#39;,&#39;admin/cp.html&#39;,&#39;cp.html&#39;,&#39;adminpanel.php&#39;,&#39;moderator.html&#39;,&lt;br /&gt;
&#39;administrator/index.html&#39;,&#39;administrator/login.html&#39;,&#39;user.html&#39;,&#39;administrator/account.html&#39;,&#39;administrator.html&#39;,&#39;login.html&#39;,&#39;modelsearch/login.html&#39;,&lt;br /&gt;
&#39;moderator/login.html&#39;,&#39;adminarea/login.html&#39;,&#39;panel-administracion/index.html&#39;,&#39;panel-administracion/admin.html&#39;,&#39;modelsearch/index.html&#39;,&#39;modelsearch/admin.html&#39;,&lt;br /&gt;
&#39;admincontrol/login.html&#39;,&#39;adm/index.html&#39;,&#39;adm.html&#39;,&#39;moderator/admin.html&#39;,&#39;user.php&#39;,&#39;account.html&#39;,&#39;controlpanel.html&#39;,&#39;admincontrol.html&#39;,&lt;br /&gt;
&#39;panel-administracion/login.php&#39;,&#39;wp-login.php&#39;,&#39;adminLogin.php&#39;,&#39;admin/adminLogin.php&#39;,&#39;home.php&#39;,&#39;admin.php&#39;,&#39;adminarea/index.php&#39;,&lt;br /&gt;
&#39;adminarea/admin.php&#39;,&#39;adminarea/login.php&#39;,&#39;panel-administracion/index.php&#39;,&#39;panel-administracion/admin.php&#39;,&#39;modelsearch/index.php&#39;,&lt;br /&gt;
&#39;modelsearch/admin.php&#39;,&#39;admincontrol/login.php&#39;,&#39;adm/admloginuser.php&#39;,&#39;admloginuser.php&#39;,&#39;admin2.php&#39;,&#39;admin2/login.php&#39;,&#39;admin2/index.php&#39;,&#39;usuarios/login.php&#39;,&lt;br /&gt;
&#39;adm/index.php&#39;,&#39;adm.php&#39;,&#39;affiliate.php&#39;,&#39;adm_auth.php&#39;,&#39;memberadmin.php&#39;,&#39;administratorlogin.php&#39;]&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; asp = [&#39;admin/&#39;,&#39;administrator/&#39;,&#39;admin1/&#39;,&#39;admin2/&#39;,&#39;admin3/&#39;,&#39;admin4/&#39;,&#39;admin5/&#39;,&#39;moderator/&#39;,&#39;webadmin/&#39;,&#39;adminarea/&#39;,&#39;bb-admin/&#39;,&#39;adminLogin/&#39;,&#39;admin_area/&#39;,&#39;panel-administracion/&#39;,&#39;instadmin/&#39;,&lt;br /&gt;
&#39;memberadmin/&#39;,&#39;administratorlogin/&#39;,&#39;adm/&#39;,&#39;account.asp&#39;,&#39;admin/account.asp&#39;,&#39;admin/index.asp&#39;,&#39;admin/login.asp&#39;,&#39;admin/admin.asp&#39;,&lt;br /&gt;
&#39;admin_area/admin.asp&#39;,&#39;admin_area/login.asp&#39;,&#39;admin/account.html&#39;,&#39;admin/index.html&#39;,&#39;admin/login.html&#39;,&#39;admin/admin.html&#39;,&lt;br /&gt;
&#39;admin_area/admin.html&#39;,&#39;admin_area/login.html&#39;,&#39;admin_area/index.html&#39;,&#39;admin_area/index.asp&#39;,&#39;bb-admin/index.asp&#39;,&#39;bb-admin/login.asp&#39;,&#39;bb-admin/admin.asp&#39;,&lt;br /&gt;
&#39;bb-admin/index.html&#39;,&#39;bb-admin/login.html&#39;,&#39;bb-admin/admin.html&#39;,&#39;admin/home.html&#39;,&#39;admin/controlpanel.html&#39;,&#39;admin.html&#39;,&#39;admin/cp.html&#39;,&#39;cp.html&#39;,&lt;br /&gt;
&#39;administrator/index.html&#39;,&#39;administrator/login.html&#39;,&#39;administrator/account.html&#39;,&#39;administrator.html&#39;,&#39;login.html&#39;,&#39;modelsearch/login.html&#39;,&#39;moderator.html&#39;,&lt;br /&gt;
&#39;moderator/login.html&#39;,&#39;moderator/admin.html&#39;,&#39;account.html&#39;,&#39;controlpanel.html&#39;,&#39;admincontrol.html&#39;,&#39;admin_login.html&#39;,&#39;panel-administracion/login.html&#39;,&lt;br /&gt;
&#39;admin/home.asp&#39;,&#39;admin/controlpanel.asp&#39;,&#39;admin.asp&#39;,&#39;pages/admin/admin-login.asp&#39;,&#39;admin/admin-login.asp&#39;,&#39;admin-login.asp&#39;,&#39;admin/cp.asp&#39;,&#39;cp.asp&#39;,&lt;br /&gt;
&#39;administrator/account.asp&#39;,&#39;administrator.asp&#39;,&#39;acceso.asp&#39;,&#39;login.asp&#39;,&#39;modelsearch/login.asp&#39;,&#39;moderator.asp&#39;,&#39;moderator/login.asp&#39;,&#39;administrator/login.asp&#39;,&lt;br /&gt;
&#39;moderator/admin.asp&#39;,&#39;controlpanel.asp&#39;,&#39;admin/account.html&#39;,&#39;adminpanel.html&#39;,&#39;webadmin.html&#39;,&#39;pages/admin/admin-login.html&#39;,&#39;admin/admin-login.html&#39;,&lt;br /&gt;
&#39;webadmin/index.html&#39;,&#39;webadmin/admin.html&#39;,&#39;webadmin/login.html&#39;,&#39;user.asp&#39;,&#39;user.html&#39;,&#39;admincp/index.asp&#39;,&#39;admincp/login.asp&#39;,&#39;admincp/index.html&#39;,&lt;br /&gt;
&#39;admin/adminLogin.html&#39;,&#39;adminLogin.html&#39;,&#39;admin/adminLogin.html&#39;,&#39;home.html&#39;,&#39;adminarea/index.html&#39;,&#39;adminarea/admin.html&#39;,&#39;adminarea/login.html&#39;,&lt;br /&gt;
&#39;panel-administracion/index.html&#39;,&#39;panel-administracion/admin.html&#39;,&#39;modelsearch/index.html&#39;,&#39;modelsearch/admin.html&#39;,&#39;admin/admin_login.html&#39;,&lt;br /&gt;
&#39;admincontrol/login.html&#39;,&#39;adm/index.html&#39;,&#39;adm.html&#39;,&#39;admincontrol.asp&#39;,&#39;admin/account.asp&#39;,&#39;adminpanel.asp&#39;,&#39;webadmin.asp&#39;,&#39;webadmin/index.asp&#39;,&lt;br /&gt;
&#39;webadmin/admin.asp&#39;,&#39;webadmin/login.asp&#39;,&#39;admin/admin_login.asp&#39;,&#39;admin_login.asp&#39;,&#39;panel-administracion/login.asp&#39;,&#39;adminLogin.asp&#39;,&lt;br /&gt;
&#39;admin/adminLogin.asp&#39;,&#39;home.asp&#39;,&#39;admin.asp&#39;,&#39;adminarea/index.asp&#39;,&#39;adminarea/admin.asp&#39;,&#39;adminarea/login.asp&#39;,&#39;admin-login.html&#39;,&lt;br /&gt;
&#39;panel-administracion/index.asp&#39;,&#39;panel-administracion/admin.asp&#39;,&#39;modelsearch/index.asp&#39;,&#39;modelsearch/admin.asp&#39;,&#39;administrator/index.asp&#39;,&lt;br /&gt;
&#39;admincontrol/login.asp&#39;,&#39;adm/admloginuser.asp&#39;,&#39;admloginuser.asp&#39;,&#39;admin2.asp&#39;,&#39;admin2/login.asp&#39;,&#39;admin2/index.asp&#39;,&#39;adm/index.asp&#39;,&lt;br /&gt;
&#39;adm.asp&#39;,&#39;affiliate.asp&#39;,&#39;adm_auth.asp&#39;,&#39;memberadmin.asp&#39;,&#39;administratorlogin.asp&#39;,&#39;siteadmin/login.asp&#39;,&#39;siteadmin/index.asp&#39;,&#39;siteadmin/login.html&#39;]&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cfm = [&#39;admin/&#39;,&#39;administrator/&#39;,&#39;admin1/&#39;,&#39;admin2/&#39;,&#39;admin3/&#39;,&#39;admin4/&#39;,&#39;admin5/&#39;,&#39;usuarios/&#39;,&#39;usuario/&#39;,&#39;administrator/&#39;,&#39;moderator/&#39;,&#39;webadmin/&#39;,&#39;adminarea/&#39;,&#39;bb-admin/&#39;,&#39;adminLogin/&#39;,&#39;admin_area/&#39;,&#39;panel-administracion/&#39;,&#39;instadmin/&#39;,&lt;br /&gt;
&#39;memberadmin/&#39;,&#39;administratorlogin/&#39;,&#39;adm/&#39;,&#39;admin/account.cfm&#39;,&#39;admin/index.cfm&#39;,&#39;admin/login.cfm&#39;,&#39;admin/admin.cfm&#39;,&#39;admin/account.cfm&#39;,&lt;br /&gt;
&#39;admin_area/admin.cfm&#39;,&#39;admin_area/login.cfm&#39;,&#39;siteadmin/login.cfm&#39;,&#39;siteadmin/index.cfm&#39;,&#39;siteadmin/login.html&#39;,&#39;admin/account.html&#39;,&#39;admin/index.html&#39;,&#39;admin/login.html&#39;,&#39;admin/admin.html&#39;,&lt;br /&gt;
&#39;admin_area/index.cfm&#39;,&#39;bb-admin/index.cfm&#39;,&#39;bb-admin/login.cfm&#39;,&#39;bb-admin/admin.cfm&#39;,&#39;admin/home.cfm&#39;,&#39;admin_area/login.html&#39;,&#39;admin_area/index.html&#39;,&lt;br /&gt;
&#39;admin/controlpanel.cfm&#39;,&#39;admin.cfm&#39;,&#39;admincp/index.asp&#39;,&#39;admincp/login.asp&#39;,&#39;admincp/index.html&#39;,&#39;admin/account.html&#39;,&#39;adminpanel.html&#39;,&#39;webadmin.html&#39;,&lt;br /&gt;
&#39;webadmin/index.html&#39;,&#39;webadmin/admin.html&#39;,&#39;webadmin/login.html&#39;,&#39;admin/admin_login.html&#39;,&#39;admin_login.html&#39;,&#39;panel-administracion/login.html&#39;,&lt;br /&gt;
&#39;admin/cp.cfm&#39;,&#39;cp.cfm&#39;,&#39;administrator/index.cfm&#39;,&#39;administrator/login.cfm&#39;,&#39;nsw/admin/login.cfm&#39;,&#39;webadmin/login.cfm&#39;,&#39;admin/admin_login.cfm&#39;,&#39;admin_login.cfm&#39;,&lt;br /&gt;
&#39;administrator/account.cfm&#39;,&#39;administrator.cfm&#39;,&#39;admin_area/admin.html&#39;,&#39;pages/admin/admin-login.cfm&#39;,&#39;admin/admin-login.cfm&#39;,&#39;admin-login.cfm&#39;,&lt;br /&gt;
&#39;bb-admin/index.html&#39;,&#39;bb-admin/login.html&#39;,&#39;bb-admin/admin.html&#39;,&#39;admin/home.html&#39;,&#39;login.cfm&#39;,&#39;modelsearch/login.cfm&#39;,&#39;moderator.cfm&#39;,&#39;moderator/login.cfm&#39;,&lt;br /&gt;
&#39;moderator/admin.cfm&#39;,&#39;account.cfm&#39;,&#39;pages/admin/admin-login.html&#39;,&#39;admin/admin-login.html&#39;,&#39;admin-login.html&#39;,&#39;controlpanel.cfm&#39;,&#39;admincontrol.cfm&#39;,&lt;br /&gt;
&#39;admin/adminLogin.html&#39;,&#39;acceso.cfm&#39;,&#39;adminLogin.html&#39;,&#39;admin/adminLogin.html&#39;,&#39;home.html&#39;,&#39;rcjakar/admin/login.cfm&#39;,&#39;adminarea/index.html&#39;,&#39;adminarea/admin.html&#39;,&lt;br /&gt;
&#39;webadmin.cfm&#39;,&#39;webadmin/index.cfm&#39;,&#39;webadmin/admin.cfm&#39;,&#39;admin/controlpanel.html&#39;,&#39;admin.html&#39;,&#39;admin/cp.html&#39;,&#39;cp.html&#39;,&#39;adminpanel.cfm&#39;,&#39;moderator.html&#39;,&lt;br /&gt;
&#39;administrator/index.html&#39;,&#39;administrator/login.html&#39;,&#39;user.html&#39;,&#39;administrator/account.html&#39;,&#39;administrator.html&#39;,&#39;login.html&#39;,&#39;modelsearch/login.html&#39;,&lt;br /&gt;
&#39;moderator/login.html&#39;,&#39;adminarea/login.html&#39;,&#39;panel-administracion/index.html&#39;,&#39;panel-administracion/admin.html&#39;,&#39;modelsearch/index.html&#39;,&#39;modelsearch/admin.html&#39;,&lt;br /&gt;
&#39;admincontrol/login.html&#39;,&#39;adm/index.html&#39;,&#39;adm.html&#39;,&#39;moderator/admin.html&#39;,&#39;user.cfm&#39;,&#39;account.html&#39;,&#39;controlpanel.html&#39;,&#39;admincontrol.html&#39;,&lt;br /&gt;
&#39;panel-administracion/login.cfm&#39;,&#39;wp-login.cfm&#39;,&#39;adminLogin.cfm&#39;,&#39;admin/adminLogin.cfm&#39;,&#39;home.cfm&#39;,&#39;admin.cfm&#39;,&#39;adminarea/index.cfm&#39;,&lt;br /&gt;
&#39;adminarea/admin.cfm&#39;,&#39;adminarea/login.cfm&#39;,&#39;panel-administracion/index.cfm&#39;,&#39;panel-administracion/admin.cfm&#39;,&#39;modelsearch/index.cfm&#39;,&lt;br /&gt;
&#39;modelsearch/admin.cfm&#39;,&#39;admincontrol/login.cfm&#39;,&#39;adm/admloginuser.cfm&#39;,&#39;admloginuser.cfm&#39;,&#39;admin2.cfm&#39;,&#39;admin2/login.cfm&#39;,&#39;admin2/index.cfm&#39;,&#39;usuarios/login.cfm&#39;,&lt;br /&gt;
&#39;adm/index.cfm&#39;,&#39;adm.cfm&#39;,&#39;affiliate.cfm&#39;,&#39;adm_auth.cfm&#39;,&#39;memberadmin.cfm&#39;,&#39;administratorlogin.cfm&#39;]&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; js = [&#39;admin/&#39;,&#39;administrator/&#39;,&#39;admin1/&#39;,&#39;admin2/&#39;,&#39;admin3/&#39;,&#39;admin4/&#39;,&#39;admin5/&#39;,&#39;usuarios/&#39;,&#39;usuario/&#39;,&#39;administrator/&#39;,&#39;moderator/&#39;,&#39;webadmin/&#39;,&#39;adminarea/&#39;,&#39;bb-admin/&#39;,&#39;adminLogin/&#39;,&#39;admin_area/&#39;,&#39;panel-administracion/&#39;,&#39;instadmin/&#39;,&lt;br /&gt;
&#39;memberadmin/&#39;,&#39;administratorlogin/&#39;,&#39;adm/&#39;,&#39;admin/account.js&#39;,&#39;admin/index.js&#39;,&#39;admin/login.js&#39;,&#39;admin/admin.js&#39;,&#39;admin/account.js&#39;,&lt;br /&gt;
&#39;admin_area/admin.js&#39;,&#39;admin_area/login.js&#39;,&#39;siteadmin/login.js&#39;,&#39;siteadmin/index.js&#39;,&#39;siteadmin/login.html&#39;,&#39;admin/account.html&#39;,&#39;admin/index.html&#39;,&#39;admin/login.html&#39;,&#39;admin/admin.html&#39;,&lt;br /&gt;
&#39;admin_area/index.js&#39;,&#39;bb-admin/index.js&#39;,&#39;bb-admin/login.js&#39;,&#39;bb-admin/admin.js&#39;,&#39;admin/home.js&#39;,&#39;admin_area/login.html&#39;,&#39;admin_area/index.html&#39;,&lt;br /&gt;
&#39;admin/controlpanel.js&#39;,&#39;admin.js&#39;,&#39;admincp/index.asp&#39;,&#39;admincp/login.asp&#39;,&#39;admincp/index.html&#39;,&#39;admin/account.html&#39;,&#39;adminpanel.html&#39;,&#39;webadmin.html&#39;,&lt;br /&gt;
&#39;webadmin/index.html&#39;,&#39;webadmin/admin.html&#39;,&#39;webadmin/login.html&#39;,&#39;admin/admin_login.html&#39;,&#39;admin_login.html&#39;,&#39;panel-administracion/login.html&#39;,&lt;br /&gt;
&#39;admin/cp.js&#39;,&#39;cp.js&#39;,&#39;administrator/index.js&#39;,&#39;administrator/login.js&#39;,&#39;nsw/admin/login.js&#39;,&#39;webadmin/login.js&#39;,&#39;admin/admin_login.js&#39;,&#39;admin_login.js&#39;,&lt;br /&gt;
&#39;administrator/account.js&#39;,&#39;administrator.js&#39;,&#39;admin_area/admin.html&#39;,&#39;pages/admin/admin-login.js&#39;,&#39;admin/admin-login.js&#39;,&#39;admin-login.js&#39;,&lt;br /&gt;
&#39;bb-admin/index.html&#39;,&#39;bb-admin/login.html&#39;,&#39;bb-admin/admin.html&#39;,&#39;admin/home.html&#39;,&#39;login.js&#39;,&#39;modelsearch/login.js&#39;,&#39;moderator.js&#39;,&#39;moderator/login.js&#39;,&lt;br /&gt;
&#39;moderator/admin.js&#39;,&#39;account.js&#39;,&#39;pages/admin/admin-login.html&#39;,&#39;admin/admin-login.html&#39;,&#39;admin-login.html&#39;,&#39;controlpanel.js&#39;,&#39;admincontrol.js&#39;,&lt;br /&gt;
&#39;admin/adminLogin.html&#39;,&#39;adminLogin.html&#39;,&#39;admin/adminLogin.html&#39;,&#39;home.html&#39;,&#39;rcjakar/admin/login.js&#39;,&#39;adminarea/index.html&#39;,&#39;adminarea/admin.html&#39;,&lt;br /&gt;
&#39;webadmin.js&#39;,&#39;webadmin/index.js&#39;,&#39;acceso.js&#39;,&#39;webadmin/admin.js&#39;,&#39;admin/controlpanel.html&#39;,&#39;admin.html&#39;,&#39;admin/cp.html&#39;,&#39;cp.html&#39;,&#39;adminpanel.js&#39;,&#39;moderator.html&#39;,&lt;br /&gt;
&#39;administrator/index.html&#39;,&#39;administrator/login.html&#39;,&#39;user.html&#39;,&#39;administrator/account.html&#39;,&#39;administrator.html&#39;,&#39;login.html&#39;,&#39;modelsearch/login.html&#39;,&lt;br /&gt;
&#39;moderator/login.html&#39;,&#39;adminarea/login.html&#39;,&#39;panel-administracion/index.html&#39;,&#39;panel-administracion/admin.html&#39;,&#39;modelsearch/index.html&#39;,&#39;modelsearch/admin.html&#39;,&lt;br /&gt;
&#39;admincontrol/login.html&#39;,&#39;adm/index.html&#39;,&#39;adm.html&#39;,&#39;moderator/admin.html&#39;,&#39;user.js&#39;,&#39;account.html&#39;,&#39;controlpanel.html&#39;,&#39;admincontrol.html&#39;,&lt;br /&gt;
&#39;panel-administracion/login.js&#39;,&#39;wp-login.js&#39;,&#39;adminLogin.js&#39;,&#39;admin/adminLogin.js&#39;,&#39;home.js&#39;,&#39;admin.js&#39;,&#39;adminarea/index.js&#39;,&lt;br /&gt;
&#39;adminarea/admin.js&#39;,&#39;adminarea/login.js&#39;,&#39;panel-administracion/index.js&#39;,&#39;panel-administracion/admin.js&#39;,&#39;modelsearch/index.js&#39;,&lt;br /&gt;
&#39;modelsearch/admin.js&#39;,&#39;admincontrol/login.js&#39;,&#39;adm/admloginuser.js&#39;,&#39;admloginuser.js&#39;,&#39;admin2.js&#39;,&#39;admin2/login.js&#39;,&#39;admin2/index.js&#39;,&#39;usuarios/login.js&#39;,&lt;br /&gt;
&#39;adm/index.js&#39;,&#39;adm.js&#39;,&#39;affiliate.js&#39;,&#39;adm_auth.js&#39;,&#39;memberadmin.js&#39;,&#39;administratorlogin.js&#39;]&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cgi = [&#39;admin/&#39;,&#39;administrator/&#39;,&#39;admin1/&#39;,&#39;admin2/&#39;,&#39;admin3/&#39;,&#39;admin4/&#39;,&#39;admin5/&#39;,&#39;usuarios/&#39;,&#39;usuario/&#39;,&#39;administrator/&#39;,&#39;moderator/&#39;,&#39;webadmin/&#39;,&#39;adminarea/&#39;,&#39;bb-admin/&#39;,&#39;adminLogin/&#39;,&#39;admin_area/&#39;,&#39;panel-administracion/&#39;,&#39;instadmin/&#39;,&lt;br /&gt;
&#39;memberadmin/&#39;,&#39;administratorlogin/&#39;,&#39;adm/&#39;,&#39;admin/account.cgi&#39;,&#39;admin/index.cgi&#39;,&#39;admin/login.cgi&#39;,&#39;admin/admin.cgi&#39;,&#39;admin/account.cgi&#39;,&lt;br /&gt;
&#39;admin_area/admin.cgi&#39;,&#39;admin_area/login.cgi&#39;,&#39;siteadmin/login.cgi&#39;,&#39;siteadmin/index.cgi&#39;,&#39;siteadmin/login.html&#39;,&#39;admin/account.html&#39;,&#39;admin/index.html&#39;,&#39;admin/login.html&#39;,&#39;admin/admin.html&#39;,&lt;br /&gt;
&#39;admin_area/index.cgi&#39;,&#39;bb-admin/index.cgi&#39;,&#39;bb-admin/login.cgi&#39;,&#39;bb-admin/admin.cgi&#39;,&#39;admin/home.cgi&#39;,&#39;admin_area/login.html&#39;,&#39;admin_area/index.html&#39;,&lt;br /&gt;
&#39;admin/controlpanel.cgi&#39;,&#39;admin.cgi&#39;,&#39;admincp/index.asp&#39;,&#39;admincp/login.asp&#39;,&#39;admincp/index.html&#39;,&#39;admin/account.html&#39;,&#39;adminpanel.html&#39;,&#39;webadmin.html&#39;,&lt;br /&gt;
&#39;webadmin/index.html&#39;,&#39;webadmin/admin.html&#39;,&#39;webadmin/login.html&#39;,&#39;admin/admin_login.html&#39;,&#39;admin_login.html&#39;,&#39;panel-administracion/login.html&#39;,&lt;br /&gt;
&#39;admin/cp.cgi&#39;,&#39;cp.cgi&#39;,&#39;administrator/index.cgi&#39;,&#39;administrator/login.cgi&#39;,&#39;nsw/admin/login.cgi&#39;,&#39;webadmin/login.cgi&#39;,&#39;admin/admin_login.cgi&#39;,&#39;admin_login.cgi&#39;,&lt;br /&gt;
&#39;administrator/account.cgi&#39;,&#39;administrator.cgi&#39;,&#39;admin_area/admin.html&#39;,&#39;pages/admin/admin-login.cgi&#39;,&#39;admin/admin-login.cgi&#39;,&#39;admin-login.cgi&#39;,&lt;br /&gt;
&#39;bb-admin/index.html&#39;,&#39;bb-admin/login.html&#39;,&#39;bb-admin/admin.html&#39;,&#39;admin/home.html&#39;,&#39;login.cgi&#39;,&#39;modelsearch/login.cgi&#39;,&#39;moderator.cgi&#39;,&#39;moderator/login.cgi&#39;,&lt;br /&gt;
&#39;moderator/admin.cgi&#39;,&#39;account.cgi&#39;,&#39;pages/admin/admin-login.html&#39;,&#39;admin/admin-login.html&#39;,&#39;admin-login.html&#39;,&#39;controlpanel.cgi&#39;,&#39;admincontrol.cgi&#39;,&lt;br /&gt;
&#39;admin/adminLogin.html&#39;,&#39;adminLogin.html&#39;,&#39;admin/adminLogin.html&#39;,&#39;home.html&#39;,&#39;rcjakar/admin/login.cgi&#39;,&#39;adminarea/index.html&#39;,&#39;adminarea/admin.html&#39;,&lt;br /&gt;
&#39;webadmin.cgi&#39;,&#39;webadmin/index.cgi&#39;,&#39;acceso.cgi&#39;,&#39;webadmin/admin.cgi&#39;,&#39;admin/controlpanel.html&#39;,&#39;admin.html&#39;,&#39;admin/cp.html&#39;,&#39;cp.html&#39;,&#39;adminpanel.cgi&#39;,&#39;moderator.html&#39;,&lt;br /&gt;
&#39;administrator/index.html&#39;,&#39;administrator/login.html&#39;,&#39;user.html&#39;,&#39;administrator/account.html&#39;,&#39;administrator.html&#39;,&#39;login.html&#39;,&#39;modelsearch/login.html&#39;,&lt;br /&gt;
&#39;moderator/login.html&#39;,&#39;adminarea/login.html&#39;,&#39;panel-administracion/index.html&#39;,&#39;panel-administracion/admin.html&#39;,&#39;modelsearch/index.html&#39;,&#39;modelsearch/admin.html&#39;,&lt;br /&gt;
&#39;admincontrol/login.html&#39;,&#39;adm/index.html&#39;,&#39;adm.html&#39;,&#39;moderator/admin.html&#39;,&#39;user.cgi&#39;,&#39;account.html&#39;,&#39;controlpanel.html&#39;,&#39;admincontrol.html&#39;,&lt;br /&gt;
&#39;panel-administracion/login.cgi&#39;,&#39;wp-login.cgi&#39;,&#39;adminLogin.cgi&#39;,&#39;admin/adminLogin.cgi&#39;,&#39;home.cgi&#39;,&#39;admin.cgi&#39;,&#39;adminarea/index.cgi&#39;,&lt;br /&gt;
&#39;adminarea/admin.cgi&#39;,&#39;adminarea/login.cgi&#39;,&#39;panel-administracion/index.cgi&#39;,&#39;panel-administracion/admin.cgi&#39;,&#39;modelsearch/index.cgi&#39;,&lt;br /&gt;
&#39;modelsearch/admin.cgi&#39;,&#39;admincontrol/login.cgi&#39;,&#39;adm/admloginuser.cgi&#39;,&#39;admloginuser.cgi&#39;,&#39;admin2.cgi&#39;,&#39;admin2/login.cgi&#39;,&#39;admin2/index.cgi&#39;,&#39;usuarios/login.cgi&#39;,&lt;br /&gt;
&#39;adm/index.cgi&#39;,&#39;adm.cgi&#39;,&#39;affiliate.cgi&#39;,&#39;adm_auth.cgi&#39;,&#39;memberadmin.cgi&#39;,&#39;administratorlogin.cgi&#39;]&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; brf = [&#39;admin/&#39;,&#39;administrator/&#39;,&#39;admin1/&#39;,&#39;admin2/&#39;,&#39;admin3/&#39;,&#39;admin4/&#39;,&#39;admin5/&#39;,&#39;usuarios/&#39;,&#39;usuario/&#39;,&#39;administrator/&#39;,&#39;moderator/&#39;,&#39;webadmin/&#39;,&#39;adminarea/&#39;,&#39;bb-admin/&#39;,&#39;adminLogin/&#39;,&#39;admin_area/&#39;,&#39;panel-administracion/&#39;,&#39;instadmin/&#39;,&lt;br /&gt;
&#39;memberadmin/&#39;,&#39;administratorlogin/&#39;,&#39;adm/&#39;,&#39;admin/account.brf&#39;,&#39;admin/index.brf&#39;,&#39;admin/login.brf&#39;,&#39;admin/admin.brf&#39;,&#39;admin/account.brf&#39;,&lt;br /&gt;
&#39;admin_area/admin.brf&#39;,&#39;admin_area/login.brf&#39;,&#39;siteadmin/login.brf&#39;,&#39;siteadmin/index.brf&#39;,&#39;siteadmin/login.html&#39;,&#39;admin/account.html&#39;,&#39;admin/index.html&#39;,&#39;admin/login.html&#39;,&#39;admin/admin.html&#39;,&lt;br /&gt;
&#39;admin_area/index.brf&#39;,&#39;bb-admin/index.brf&#39;,&#39;bb-admin/login.brf&#39;,&#39;bb-admin/admin.brf&#39;,&#39;admin/home.brf&#39;,&#39;admin_area/login.html&#39;,&#39;admin_area/index.html&#39;,&lt;br /&gt;
&#39;admin/controlpanel.brf&#39;,&#39;admin.brf&#39;,&#39;admincp/index.asp&#39;,&#39;admincp/login.asp&#39;,&#39;admincp/index.html&#39;,&#39;admin/account.html&#39;,&#39;adminpanel.html&#39;,&#39;webadmin.html&#39;,&lt;br /&gt;
&#39;webadmin/index.html&#39;,&#39;webadmin/admin.html&#39;,&#39;webadmin/login.html&#39;,&#39;admin/admin_login.html&#39;,&#39;admin_login.html&#39;,&#39;panel-administracion/login.html&#39;,&lt;br /&gt;
&#39;admin/cp.brf&#39;,&#39;cp.brf&#39;,&#39;administrator/index.brf&#39;,&#39;administrator/login.brf&#39;,&#39;nsw/admin/login.brf&#39;,&#39;webadmin/login.brfbrf&#39;,&#39;admin/admin_login.brf&#39;,&#39;admin_login.brf&#39;,&lt;br /&gt;
&#39;administrator/account.brf&#39;,&#39;administrator.brf&#39;,&#39;acceso.brf&#39;,&#39;admin_area/admin.html&#39;,&#39;pages/admin/admin-login.brf&#39;,&#39;admin/admin-login.brf&#39;,&#39;admin-login.brf&#39;,&lt;br /&gt;
&#39;bb-admin/index.html&#39;,&#39;bb-admin/login.html&#39;,&#39;bb-admin/admin.html&#39;,&#39;admin/home.html&#39;,&#39;login.brf&#39;,&#39;modelsearch/login.brf&#39;,&#39;moderator.brf&#39;,&#39;moderator/login.brf&#39;,&lt;br /&gt;
&#39;moderator/admin.brf&#39;,&#39;account.brf&#39;,&#39;pages/admin/admin-login.html&#39;,&#39;admin/admin-login.html&#39;,&#39;admin-login.html&#39;,&#39;controlpanel.brf&#39;,&#39;admincontrol.brf&#39;,&lt;br /&gt;
&#39;admin/adminLogin.html&#39;,&#39;adminLogin.html&#39;,&#39;admin/adminLogin.html&#39;,&#39;home.html&#39;,&#39;rcjakar/admin/login.brf&#39;,&#39;adminarea/index.html&#39;,&#39;adminarea/admin.html&#39;,&lt;br /&gt;
&#39;webadmin.brf&#39;,&#39;webadmin/index.brf&#39;,&#39;webadmin/admin.brf&#39;,&#39;admin/controlpanel.html&#39;,&#39;admin.html&#39;,&#39;admin/cp.html&#39;,&#39;cp.html&#39;,&#39;adminpanel.brf&#39;,&#39;moderator.html&#39;,&lt;br /&gt;
&#39;administrator/index.html&#39;,&#39;administrator/login.html&#39;,&#39;user.html&#39;,&#39;administrator/account.html&#39;,&#39;administrator.html&#39;,&#39;login.html&#39;,&#39;modelsearch/login.html&#39;,&lt;br /&gt;
&#39;moderator/login.html&#39;,&#39;adminarea/login.html&#39;,&#39;panel-administracion/index.html&#39;,&#39;panel-administracion/admin.html&#39;,&#39;modelsearch/index.html&#39;,&#39;modelsearch/admin.html&#39;,&lt;br /&gt;
&#39;admincontrol/login.html&#39;,&#39;adm/index.html&#39;,&#39;adm.html&#39;,&#39;moderator/admin.html&#39;,&#39;user.brf&#39;,&#39;account.html&#39;,&#39;controlpanel.html&#39;,&#39;admincontrol.html&#39;,&lt;br /&gt;
&#39;panel-administracion/login.brf&#39;,&#39;wp-login.brf&#39;,&#39;adminLogin.brf&#39;,&#39;admin/adminLogin.brf&#39;,&#39;home.brf&#39;,&#39;admin.brf&#39;,&#39;adminarea/index.brf&#39;,&lt;br /&gt;
&#39;adminarea/admin.brf&#39;,&#39;adminarea/login.brf&#39;,&#39;panel-administracion/index.brf&#39;,&#39;panel-administracion/admin.brf&#39;,&#39;modelsearch/index.brf&#39;,&lt;br /&gt;
&#39;modelsearch/admin.brf&#39;,&#39;admincontrol/login.brf&#39;,&#39;adm/admloginuser.brf&#39;,&#39;admloginuser.brf&#39;,&#39;admin2.brf&#39;,&#39;admin2/login.brf&#39;,&#39;admin2/index.brf&#39;,&#39;usuarios/login.brf&#39;,&lt;br /&gt;
&#39;adm/index.brf&#39;,&#39;adm.brf&#39;,&#39;affiliate.brf&#39;,&#39;adm_auth.brf&#39;,&#39;memberadmin.brf&#39;,&#39;administratorlogin.brf&#39;]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; try:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; site = raw_input(&quot;Web Site for Scan?: &quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; site = site.replace(&quot;http://&quot;,&quot;&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print (&quot;\tChecking website &quot; + site + &quot;...&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn = httplib.HTTPConnection(site)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn.connect()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t[$] Yes... Server is Online.&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; except (httplib.HTTPResponse, socket.error) as Exit:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; raw_input(&quot;\t [!] Oops Error occured, Server offline or invalid URL&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exit()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;Enter site source code:&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;1 PHP&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;2 ASP&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;3 CFM&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;4 JS&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;5 CGI&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;6 BRF&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\nPress 1 and &#39;Enter key&#39; for Select PHP\n&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; code=input(&quot;&amp;gt; &quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; if code==1:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print(&quot;\t [+] Scanning &quot; + site + &quot;...\n\n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; for admin in php:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; admin = admin.replace(&quot;\n&quot;,&quot;&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; admin = &quot;/&quot; + admin&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host = site + admin&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print (&quot;\t [#] Checking &quot; + host + &quot;...&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection = httplib.HTTPConnection(site)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection.request(&quot;GET&quot;,admin)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; response = connection.getresponse()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var2 = var2 + 1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if response.status == 200:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var1 = var1 + 1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s&quot; % ( &quot;\n\n&amp;gt;&amp;gt;&amp;gt;&quot; + host, &quot;Admin page found!&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; raw_input(&quot;Press enter to continue scanning.\n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; elif response.status == 404:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var2 = var2&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; elif response.status == 302:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s&quot; % (&quot;\n&amp;gt;&amp;gt;&amp;gt;&quot; + host, &quot;Possible admin page (302 - Redirect)&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; else:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s %s&quot; % (host, &quot; Interesting response:&quot;, response.status)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection.close()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print(&quot;\n\nCompleted \n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print var1, &quot; Admin pages found&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print var2, &quot; total pages scanned&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; raw_input(&quot;[/] The Game Over; Press Enter to Exit&quot;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; if code==2:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print(&quot;\t [+] Scanning &quot; + site + &quot;...\n\n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; for admin in asp:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; admin = admin.replace(&quot;\n&quot;,&quot;&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; admin = &quot;/&quot; + admin&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host = site + admin&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print (&quot;\t [#] Checking &quot; + host + &quot;...&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection = httplib.HTTPConnection(site)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection.request(&quot;GET&quot;,admin)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; response = connection.getresponse()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var2 = var2 + 1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if response.status == 200:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var1 = var1 + 1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s&quot; % ( &quot;\n\n&amp;gt;&amp;gt;&amp;gt;&quot; + host, &quot;Admin page found!&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; raw_input(&quot;Press enter to continue scanning.\n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; elif response.status == 404:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var2 = var2&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; elif response.status == 302:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s&quot; % (&quot;\n&amp;gt;&amp;gt;&amp;gt;&quot; + host, &quot;Possible admin page (302 - Redirect)&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; else:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s %s&quot; % (host, &quot; Interesting response:&quot;, response.status)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection.close()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print(&quot;\n\nCompleted \n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print var1, &quot; Admin pages found&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print var2, &quot; total pages scanned&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; raw_input(&quot;The Game Over; Press Enter to Exit&quot;)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; if code==3:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print(&quot;\t [+] Scanning &quot; + site + &quot;...\n\n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; for admin in cfm:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; admin = admin.replace(&quot;\n&quot;,&quot;&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; admin = &quot;/&quot; + admin&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host = site + admin&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print (&quot;\t [#] Checking &quot; + host + &quot;...&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection = httplib.HTTPConnection(site)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection.request(&quot;GET&quot;,admin)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; response = connection.getresponse()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var2 = var2 + 1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if response.status == 200:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var1 = var1 + 1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s&quot; % ( &quot;\n\n&amp;gt;&amp;gt;&amp;gt;&quot; + host, &quot;Admin page found!&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; raw_input(&quot;Press enter to continue scanning.\n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; elif response.status == 404:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var2 = var2&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; elif response.status == 302:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s&quot; % (&quot;\n&amp;gt;&amp;gt;&amp;gt;&quot; + host, &quot;Possible admin page (302 - Redirect)&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; else:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s %s&quot; % (host, &quot; Interesting response:&quot;, response.status)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection.close()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print(&quot;\n\nCompleted \n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print var1, &quot; Admin pages found&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print var2, &quot; total pages scanned&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; raw_input(&quot;The Game Over; Press Enter to Exit&quot;)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; if code==4:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print(&quot;\t [+] Scanning &quot; + site + &quot;...\n\n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; for admin in js:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; admin = admin.replace(&quot;\n&quot;,&quot;&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; admin = &quot;/&quot; + admin&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host = site + admin&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print (&quot;\t [#] Checking &quot; + host + &quot;...&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection = httplib.HTTPConnection(site)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection.request(&quot;GET&quot;,admin)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; response = connection.getresponse()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var2 = var2 + 1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if response.status == 200:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var1 = var1 + 1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s&quot; % ( &quot;\n\n&amp;gt;&amp;gt;&amp;gt;&quot; + host, &quot;Admin page found!&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; raw_input(&quot;Press enter to continue scanning.\n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; elif response.status == 404:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var2 = var2&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; elif response.status == 302:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s&quot; % (&quot;\n&amp;gt;&amp;gt;&amp;gt;&quot; + host, &quot;Possible admin page (302 - Redirect)&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; else:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s %s&quot; % (host, &quot; Interesting response:&quot;, response.status)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection.close()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print(&quot;\n\nCompleted \n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print var1, &quot; Admin pages found&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print var2, &quot; total pages scanned&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; raw_input(&quot;The Game Over; Press Enter to Exit&quot;)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; if code==5:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print(&quot;\t [+] Scanning &quot; + site + &quot;...\n\n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; for admin in cgi:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; admin = admin.replace(&quot;\n&quot;,&quot;&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; admin = &quot;/&quot; + admin&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host = site + admin&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print (&quot;\t [#] Checking &quot; + host + &quot;...&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection = httplib.HTTPConnection(site)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection.request(&quot;GET&quot;,admin)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; response = connection.getresponse()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var2 = var2 + 1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if response.status == 200:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var1 = var1 + 1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s&quot; % ( &quot;\n\n&amp;gt;&amp;gt;&amp;gt;&quot; + host, &quot;Admin page found!&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; raw_input(&quot;Press enter to continue scanning.\n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; elif response.status == 404:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var2 = var2&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; elif response.status == 302:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s&quot; % (&quot;\n&amp;gt;&amp;gt;&amp;gt;&quot; + host, &quot;Possible admin page (302 - Redirect)&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; else:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s %s&quot; % (host, &quot; Interesting response:&quot;, response.status)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection.close()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print(&quot;\n\nCompleted \n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print var1, &quot; Admin pages found&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print var2, &quot; total pages scanned&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; raw_input(&quot;The Game Over; Press Enter to Exit&quot;)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; if code==6:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print(&quot;\t [+] Scanning &quot; + site + &quot;...\n\n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; for admin in brf:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; admin = admin.replace(&quot;\n&quot;,&quot;&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; admin = &quot;/&quot; + admin&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host = site + admin&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print (&quot;\t [#] Checking &quot; + host + &quot;...&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection = httplib.HTTPConnection(site)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection.request(&quot;GET&quot;,admin)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; response = connection.getresponse()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var2 = var2 + 1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if response.status == 200:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var1 = var1 + 1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s&quot; % ( &quot;\n\n&amp;gt;&amp;gt;&amp;gt;&quot; + host, &quot;Admin page found!&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; raw_input(&quot;Press enter to continue scanning.\n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; elif response.status == 404:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var2 = var2&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; elif response.status == 302:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s&quot; % (&quot;\n&amp;gt;&amp;gt;&amp;gt;&quot; + host, &quot;Possible admin page (302 - Redirect)&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; else:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;%s %s %s&quot; % (host, &quot; Interesting response:&quot;, response.status)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connection.close()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print(&quot;\n\nCompleted \n&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print var1, &quot; Admin pages found&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print var2, &quot; total pages scanned&quot;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; raw_input(&quot;The Game Over; Press Enter to Exit&quot;)&lt;br /&gt;
except (httplib.HTTPResponse, socket.error):&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\n\t[!] Session Cancelled; Error occured. Check internet settings&quot;&lt;br /&gt;
except (KeyboardInterrupt, SystemExit):&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\n\t[!] Session cancelled&quot;&lt;br /&gt;
&lt;br /&gt;
Paste link - &lt;a href=&quot;http://paste.ubuntu.com/995637/&quot; target=&quot;_blank&quot;&gt;Click&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/4078665184956561839/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/admin-page-finder-in-py.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/4078665184956561839'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/4078665184956561839'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/admin-page-finder-in-py.html' title='Admin Page Finder in .py'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-385936889490574025</id><published>2012-05-19T03:41:00.000-07:00</published><updated>2012-05-19T03:41:04.872-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Python"/><title type='text'>Fast Wepage Saver In Python</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;#it will create source.txt in the same directory&lt;br /&gt;
&lt;br /&gt;
import urllib&lt;br /&gt;
import httplib&lt;br /&gt;
import socket&lt;br /&gt;
&lt;br /&gt;
print &quot;\n\nFast Webpage Saver&quot;&lt;br /&gt;
print &quot;input URL and run it. It will Save Webpage Within Seconds&quot;&lt;br /&gt;
&lt;br /&gt;
print &quot;\n\n\t|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||&quot;&lt;br /&gt;
print &quot;\t|||||&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |||||&quot;&lt;br /&gt;
print &quot;\t|||||&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |||||&quot;&lt;br /&gt;
print &quot;\t|||||Coded By Ajith KP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |||||&quot;&lt;br /&gt;
print &quot;\t|||||&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |||||&quot;&lt;br /&gt;
print &quot;\t||||| &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; |||||&quot;&lt;br /&gt;
print &quot;\t|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||&quot;&lt;br /&gt;
&lt;br /&gt;
try:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; url = raw_input(&quot;URL:&quot;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; txt = open(&#39;savedpage.html&#39;,&#39;w&#39;)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cobra = urllib.urlopen(&#39;http://&#39;+url)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; for source in cobra.readlines():&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print source.rstrip()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; txt.write(source.rstrip())&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; txt.close()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cobra.close()&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; raw_input(&#39;Complete: Open savedpage.html&#39;)&lt;br /&gt;
except (httplib.HTTPResponse, socket.error):&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\n\t[!] Session Cancelled; Error occured. Check internet settings&quot;&lt;br /&gt;
except (KeyboardInterrupt, SystemExit):&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print &quot;\t[x] Session cancelled&quot;&lt;br /&gt;
&lt;br /&gt;
Paste link - &lt;a href=&quot;http://paste.ubuntu.com/995631/&quot; target=&quot;_blank&quot;&gt;Click Here&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/385936889490574025/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/fast-wepage-saver-in-python.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/385936889490574025'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/385936889490574025'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/fast-wepage-saver-in-python.html' title='Fast Wepage Saver In Python'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-906154604158364789</id><published>2012-05-19T01:40:00.000-07:00</published><updated>2012-05-19T01:40:34.496-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News round the world"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>FBI &#39;looking at&#39; law making Web sites wiretap-ready, director says</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://asset0.cbsistatic.com/cnwk.1d/i/tim/2012/05/18/mueller2_550x349_270x171.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;405&quot; src=&quot;http://asset0.cbsistatic.com/cnwk.1d/i/tim/2012/05/18/mueller2_550x349_270x171.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Director Robert Mueller says FBI needs to be able to &quot;capture  communications&quot; of people under surveillance, but declines to elaborate  on renewed lobbying effort reported by CNET two weeks ago.&lt;br /&gt;
&lt;br /&gt;
FBI Director Robert Mueller confirmed that the bureau has renewed its push for a new Internet wiretapping law, which CNET &lt;a href=&quot;http://news.cnet.com/8301-1009_3-57428067-83/fbi-we-need-wiretap-ready-web-sites-now/&quot;&gt;reported two weeks ago&lt;/a&gt;. &lt;br /&gt;
In an appearance this week on Capitol Hill, Mueller downplayed privacy  concerns, saying the FBI&#39;s wiretap proposals -- social-networking Web  sites and providers of VoIP, instant messaging, and Web e-mail are the  primary targets -- would still require a court to be involved. &lt;br /&gt;
We want to &quot;be able to obtain those communications,&quot; Mueller said on  Wednesday. &quot;What we&#39;re looking at is some form of legislation that will  assure that when we get the appropriate court order that those  individuals -- individual companies are served with that order do have  the capability and the capacity to respond to that order.&quot; &lt;br /&gt;
&lt;div id=&quot;survChart&quot;&gt; &lt;h2&gt;&#39;Going Dark&#39; timeline&lt;/h2&gt;&lt;b&gt;June 2008:&lt;/b&gt; FBI Director Robert Mueller and his aides brief Sens. Barbara Mikulski, Richard Shelby, and Ted Stevens on &quot;Going Dark.&quot; &lt;br /&gt;
&lt;b&gt;June 2008:&lt;/b&gt; FBI Assistant Director Kerry Haynes holds &quot;Going Dark&quot;  briefing for Senate appropriations subcommittee and offers a  &quot;classified version of this briefing&quot; at Quantico. &lt;br /&gt;
&lt;b&gt;September 2008:&lt;/b&gt; FBI completes a &quot;high-level explanation&quot; of CALEA amendment package. &lt;br /&gt;
&lt;b&gt;May 2009:&lt;/b&gt; FBI Assistant Director Rich Haley briefs Senate  Intelligence committee and Mikulsi staffers on how bureau is &quot;dealing  with the &#39;Going Dark&#39; issue.&#39;&quot; Mikulski plans to bring up &quot;Going Dark&quot;  at a closed-door hearing the following week. &lt;br /&gt;
&lt;b&gt;November 2008:&lt;/b&gt; FBI Assistant Director Marcus Thomas, who oversees  the Quantico-based Operational Technology Division, prepares briefing  for President-Elect Obama&#39;s transition team. &lt;br /&gt;
&lt;b&gt;December 2008:&lt;/b&gt; FBI intelligence analyst in Communications Analysis Unit begins analysis of VoIP surveillance. &lt;br /&gt;
&lt;b&gt;February 2009:&lt;/b&gt; FBI memo to all field offices asks for anecdotal  information about cases where &quot;investigations have been negatively  impacted&quot; by lack of data retention or Internet interception. &lt;br /&gt;
&lt;b&gt;March 2009:&lt;/b&gt; Mueller&#39;s advisory board meets for a full-day briefing on Going Dark. &lt;br /&gt;
&lt;b&gt;April 2009:&lt;/b&gt; FBI distributes presentation for White House meeting on Going Dark. &lt;br /&gt;
&lt;b&gt;April 2009:&lt;/b&gt; FBI warns that the Going Dark project is &quot;yellow,&quot;  meaning limited progress, because of &quot;new administration personnel not  being in place for briefings.&quot; &lt;br /&gt;
&lt;b&gt;April 2009:&lt;/b&gt; FBI general counsel&#39;s office reports that the  bureau&#39;s Data Interception Technology Unit has &quot;compiled a list of FISA  dockets... that the FBI has been unable to fully implement.&quot; That&#39;s a  reference to telecom companies that are already covered by the FCC&#39;s  expansion of CALEA. &lt;br /&gt;
&lt;b&gt;May 2009:&lt;/b&gt; FBI e-mail boasts that the bureau&#39;s plan has &quot;gotten  attention&quot; from industry, but &quot;we need to strengthen the business case  on this.&quot; &lt;br /&gt;
&lt;b&gt;July 2010:&lt;/b&gt; FBI e-mail says the &quot;Going Dark Working Group (GDWG)  continues to ask for examples from Cvber investigations where  investigators have had problems&quot; because of new technologies. &lt;br /&gt;
&lt;b&gt;September 2010:&lt;/b&gt; FBI staff operations specialist in its  Counterterrorism Division sends e-mail on difficulties in &quot;obtaining  information from Internet Service Providers and social-networking  sites.&quot; &lt;br /&gt;
&lt;/div&gt;The FBI believes that the historic shift in communication from  telephones to the Internet has made it far more difficult for agents to  wiretap Americans suspected of illegal activities, which it refers to as  the &quot;Going Dark&quot; problem. Its solution: a proposed law that would  require Internet companies including Apple, Microsoft, Facebook, Yahoo,  and Google, to build in back doors for government surveillance. &lt;br /&gt;
Mueller&#39;s remarks came in response to prodding from two senators, Chuck  Grassley (R-Iowa) and Patrick Leahy (D-Vt.), who wanted him to elaborate  on the new lobbying push reported by CNET. &lt;br /&gt;
&quot;We have been waiting patiently for the administration to put forth a  proposal with necessary fixes to ensure the &#39;Going Dark&#39; problem is  addressed,&quot; Grassley said. &quot;I want the director to give us the status on  this proposal (and) when the administration plans to send something up  to the Hill.&quot; &lt;br /&gt;
&quot;Should I be expecting a specific legislative proposal from the FBI or  the administration in the near future?&quot; Leahy asked. He said he has not  yet seen the draft bill, saying the &quot;administration is not sending it up  here.&quot; &lt;br /&gt;
Mueller didn&#39;t answer their question directly about timing, instead  saying that the goal of the legislation is &quot;to capture communications of  a particular individual&quot; under surveillance. An FBI spokesman said, in  response to questions this afternoon, that &quot;we cannot comment on pending  legislation.&quot; &lt;br /&gt;
The FBI&#39;s proposal would amend a 1994 law, called the &lt;a href=&quot;http://epic.org/privacy/wiretap/calea/calea_law.html&quot;&gt;Communications Assistance for Law Enforcement Act&lt;/a&gt;,  or CALEA, that currently applies only to telecommunications providers,  not Web companies. From the FBI&#39;s perspective, expanding CALEA to cover  VoIP, Web e-mail, and social networks isn&#39;t expanding wiretapping law:  If a court order is required today, one will be required tomorrow as  well. Rather, it&#39;s making sure that a wiretap is guaranteed to produce  results. &lt;br /&gt;
Mueller is not asking companies to support the bureau&#39;s CALEA  expansion, but instead is asking them not to oppose it. The bureau is  also &quot;asking what can go in it to minimize impacts,&quot; one participant in  the closed-door discussions says. That included a scheduled trip this  month to the West Coast -- which was subsequently postponed -- to meet  with Internet companies&#39; CEOs and top lawyers.&lt;br /&gt;
In February 2011, CNET &lt;a href=&quot;http://news.cnet.com/8301-31921_3-20032518-281.html&quot;&gt;was the first to report&lt;/a&gt;  that then-FBI general counsel Valerie Caproni was planning to warn  Congress of the &quot;Going Dark&quot; problem. Caproni singled out &quot;Web-based  e-mail, social-networking sites, and peer-to-peer communications&quot; as  problems that have left the FBI &quot;increasingly unable&quot; to conduct the  same kind of wiretapping it could in the past. &lt;br /&gt;
A further expansion of CALEA is unlikely to be applauded by tech  companies, their customers, or privacy groups. Apple (which distributes  iChat and FaceTime) is currently lobbying on the topic, according to  disclosure documents filed with Congress last month. Microsoft (which  owns Skype and Hotmail) says its lobbyists are following the topic  because it&#39;s &quot;an area of ongoing interest to us.&quot; &lt;br /&gt;
Representatives of the FBI&#39;s Electronic Surveillance Technology Section  in Chantilly, Va., began quietly lobbying the FCC nearly a decade ago to  force broadband providers to provide more-efficient, standardized  surveillance facilities, which CNET &lt;a href=&quot;http://news.cnet.com/FBI-targets-Net-phoning/2100-1028_3-5056424.html&quot;&gt;reported at the time&lt;/a&gt;. The FCC &lt;a href=&quot;http://news.cnet.com/Feds-back-wiretap-rules-for-Internet/2100-7352_3-5296417.html&quot;&gt;approved that requirement&lt;/a&gt; a year later, sweeping in Internet phone companies that tie into the existing telecommunications system. It was &lt;a href=&quot;http://news.cnet.com/Appeals-court-upholds-Net-wiretapping-rules/2100-1028_3-6082085.html&quot;&gt;upheld in 2006&lt;/a&gt; by a federal appeals court. &lt;br /&gt;
But the FCC never granted the FBI&#39;s request to rewrite CALEA to cover  instant messaging and VoIP programs that are not &quot;managed&quot; -- meaning  peer-to-peer programs like Apple&#39;s FaceTime, iChat/AIM, Gmail&#39;s video  chat, and &lt;a href=&quot;http://www.cnet.com/xbox-360/&quot;&gt;Xbox&lt;/a&gt; Live&#39;s in-game chat that use the Internet, not the public telephone network. &lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/906154604158364789/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/fbi-looking-at-law-making-web-sites.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/906154604158364789'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/906154604158364789'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/fbi-looking-at-law-making-web-sites.html' title='FBI &#39;looking at&#39; law making Web sites wiretap-ready, director says'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-5404996952140656353</id><published>2012-05-19T00:53:00.000-07:00</published><updated>2012-05-19T00:53:12.378-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="News round the world"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Seeing Ads On Wikipedia? Then You&#39;re Infected</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://upload.wikimedia.org/wikipedia/commons/thumb/8/80/Wikipedia-logo-v2.svg/250px-Wikipedia-logo-v2.svg.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://upload.wikimedia.org/wikipedia/commons/thumb/8/80/Wikipedia-logo-v2.svg/250px-Wikipedia-logo-v2.svg.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Click fraudsters are milking you for cash&lt;br /&gt;
&lt;br /&gt;
Surfers who see ads when they visit Wikipedia are likely infected with malware, the online encyclopedia warns.&lt;br /&gt;
Wikipedia relies on donations to fund its work, resisting the  temptation to put ads on its pages. So internet users who see commercial  ads when they visit the encyclopedia are been served content via  cybercrime affiliates, a blog post by Wikipedia &lt;a href=&quot;http://blog.wikimedia.org/2012/05/14/ads-on-wikipedia-your-computer-infected-malware&quot; target=&quot;_blank&quot;&gt;explains&lt;/a&gt;.&lt;br /&gt;
&lt;div id=&quot;article-mpu-container&quot;&gt; &lt;div class=&quot;ad-now&quot; id=&quot;ad-mpu1-spot&quot; style=&quot;height: auto; width: auto;&quot;&gt;   &lt;/div&gt;&lt;blockquote&gt;We never run ads on Wikipedia. Wikipedia is funded by more  than a million donors, who give an average donation of less than 30  dollars. We run fundraising appeals, usually at the end of the year. If you&#39;re seeing advertisements for a for-profit industry (see  screenshot for an example) or anything but our fundraiser, then your web  browser has likely been infected with malware.&lt;br /&gt;
&lt;/blockquote&gt;&lt;/div&gt;Wikipedia doesn&#39;t warn over any specific malware but rather about the  symptoms of click fraud, one of they more common ways that virus  writers turn an illicit profit. The approach was used as the business  model behind the infamous Flashback Trojan, which notoriously created a  huge botnet on Mac machines until Apple belatedly patched the Java  vulnerability that the malware had exploited. Cupertino released a &lt;a href=&quot;http://www.theregister.co.uk/2012/05/15/mac_leopard_security_update/&quot;&gt;clean-up tool&lt;/a&gt; earlier this week.&lt;br /&gt;
An &lt;a href=&quot;http://www.symantec.com/connect/blogs/osxflashback-how-turn-your-botnet&quot; target=&quot;_blank&quot;&gt;updated analysis&lt;/a&gt;  by Symantec, published on Wednesday, reveals that over a three-week  period in April, the botnet displayed over 10 million ads on compromised  computers. &quot;Approximately 400,000 of those ads were clicked on, which  would have netted the attackers $14,000 if they were able to collect  it,&quot; an anonymous Symantec researcher explains. &quot;Many PPC providers  employ anti-fraud measures and affiliate-verification processes before  paying. Fortunately, the attackers in this instance appear to have been  unable to complete the necessary steps to be paid.&lt;br /&gt;
&quot;It is estimated the actual ad-clicking component of Flashback was  only installed on about 10,000 of the more than 600,000 infected  machines. In other words, utilising less than 2 per cent of the entire  botnet the attackers were able to generate $14,000 in three weeks,  meaning that if the attackers were able to use the entire botnet, they  could potentially have earned millions of dollars a year,&quot; Symantec  adds.&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/5404996952140656353/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/seeing-ads-on-wikipedia-then-youre.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/5404996952140656353'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/5404996952140656353'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/seeing-ads-on-wikipedia-then-youre.html' title='Seeing Ads On Wikipedia? Then You&#39;re Infected'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-7803158239952668243</id><published>2012-05-18T22:09:00.000-07:00</published><updated>2012-05-18T22:09:00.256-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Software&#39;s"/><title type='text'>IDM Autocracker script</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtobbB_Vmki6mjn-LyYmkt2hM-xlp6srrEvVhlYfanAxiI872aq8relp7ryPF0Ra44kYL4unJvYwYQtKS_rAT7C2TRJEmgcqzZJ-82YURRL-q_p1F_L-blPSfJlISxszCsNbHJYRtqd-E/s320/IDM.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;292&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtobbB_Vmki6mjn-LyYmkt2hM-xlp6srrEvVhlYfanAxiI872aq8relp7ryPF0Ra44kYL4unJvYwYQtKS_rAT7C2TRJEmgcqzZJ-82YURRL-q_p1F_L-blPSfJlISxszCsNbHJYRtqd-E/s640/IDM.PNG&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;-&amp;gt; Code by Subir aKa Whiskey&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; This a automated python script from which you can crack IDM and make it to full version&lt;br /&gt;
&lt;br /&gt;
-&amp;gt;&lt;a href=&quot;http://www.mediafire.com/?p33ld90qykhcnme&quot; target=&quot;_blank&quot;&gt;Click Here To Download&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/7803158239952668243/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/idm-autocracker-script.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/7803158239952668243'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/7803158239952668243'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/idm-autocracker-script.html' title='IDM Autocracker script'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtobbB_Vmki6mjn-LyYmkt2hM-xlp6srrEvVhlYfanAxiI872aq8relp7ryPF0Ra44kYL4unJvYwYQtKS_rAT7C2TRJEmgcqzZJ-82YURRL-q_p1F_L-blPSfJlISxszCsNbHJYRtqd-E/s72-c/IDM.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-7433778109174736093</id><published>2012-05-18T07:55:00.000-07:00</published><updated>2012-05-18T07:55:48.192-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="News round the world"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Android hackers hone skills in Russia</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://cdn.mactrast.com/wp-content/uploads/2012/05/Android-Malware-1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;412&quot; src=&quot;http://cdn.mactrast.com/wp-content/uploads/2012/05/Android-Malware-1.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2&gt;Sophos says they&#39;re starting in Russia, but will expand with success&lt;br /&gt;
&lt;/h2&gt;&lt;div id=&quot;first_paragraph&quot;&gt;&lt;span class=&quot;source&quot;&gt;CSO -&lt;/span&gt; The malware  business growing around Google Android -- now the leading smartphone  operating system -- is still in its infancy. Today, many of the apps  built to steal money from Android users originate from Russia and China,  so criminal gangs there have become cyber-trailblazers.&lt;/div&gt;Sophos  and Symantec on Wednesday released their latest Android malware  discoveries written in Russian. While the language narrows the number of  potential victims, the social-engineering tactics used to get Android  users to install the malware is universal. The gang tracked by Sophos is  using fake antivirus scanners, while Symantec is tracking  cybercriminals using mobile websites to offer bogus versions of popular  games.&lt;br /&gt;
&lt;strong&gt;[See also: &lt;a href=&quot;http://www.csoonline.com/article/706335/companies-slow-to-react-to-mobile-security-threat&quot; target=&quot;new&quot;&gt;Companies slow to react to mobile security threat&lt;/a&gt;]&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;&lt;/strong&gt;Sophos  says the criminals are like other entrepreneurs launching startups.  They&#39;re starting in Russia, but have far greater ambitions.&lt;br /&gt;
&quot;I  don&#39;t think we can say that they&#39;re necessarily using it as a testing  ground -- think of it more as a local business that as it grows may gain  multinational ambitions,&quot; Graham Cluley, senior technology consultant  at Sophos, said in an email interview on Wednesday.&lt;br /&gt;
While  criminals today are writing consumer-focused apps, it&#39;s only a matter of  time before the hackers go after corporate data, particularly if the  number of people accessing employers&#39; networks with personal devices  continue to grow, experts say. Android is the leading &lt;a href=&quot;http://www.computerworld.com/s/topic/75/Smartphones&quot; title=&quot;Computerworld coverage of smartphones&quot;&gt;smartphone&lt;/a&gt; OS.&lt;br /&gt;
In the first quarter, &lt;a href=&quot;http://www.computerworld.com/s/article/9227208/Android_Samsung_top_smartphone_sales_beat_Apple_s_iPhone&quot; target=&quot;_blank&quot;&gt;56% of the smartphones sold ran Android&lt;/a&gt;, compared with 23% with &lt;a href=&quot;http://www.computerworld.com/s/article/9137163/Apple_Update&quot; title=&quot;Computerworld coverage of Apple Computer Inc.&quot;&gt;Apple&lt;/a&gt; iOS, according to the latest figures from Gartner.&lt;br /&gt;
The cyber scam tracked by Sophos was reported this week by GFI Lab, which discovered links to the bogus antivirus software on &lt;a href=&quot;http://www.computerworld.com/s/article/9157658/Twitter_update_News_blogs_opinions_and_more_about_the_microblogging_service&quot; title=&quot;Computerworld coverage of Twitter&quot;&gt;Twitter&lt;/a&gt;. &lt;a href=&quot;http://www.computerworld.com/s/article/9227243/Fake%20anti-virus%20disguises%20used%20by%20Android%20malware&quot; target=&quot;_blank&quot;&gt;Sophos dug deeper&lt;/a&gt; and found that the .ru domains pointed to the same Internet protocol address hosted in Ukraine.&lt;br /&gt;
When  visited, the Web pages serve an Android .apk file that offers an AV  scan. If activated, the scan installs an app that uses an icon to trick  the victim in to believing it is from Russian security vendor Kaspersky  Lab.&lt;br /&gt;
Instead of &lt;a href=&quot;http://www.computerworld.com/s/topic/85/Malware+and+Vulnerabilities&quot; title=&quot;Computerworld coverage of viruses and security holes&quot;&gt;virus&lt;/a&gt;  protection, the app sends expensive text messages to premium services  that charge the Android user through their wireless providers. The  malicious code also has the ability to download and install code from  the internet.&lt;br /&gt;
&lt;a href=&quot;http://www.symantec.com/connect/blogs/thieves-temple-androidopfake-makes-another-run&quot; target=&quot;_blank&quot;&gt;Symantec&#39;s discovery&lt;/a&gt;  involves the latest version of the Android.Opfake malware the vendor  has been following for a while. In the past, the malware masqueraded as  an installer for the Opera Web &lt;a href=&quot;http://www.computerworld.com/s/topic/211/Browsers&quot; title=&quot;Computerworld coverage of browsers&quot;&gt;browser&lt;/a&gt; or a pornographic movie, and charged the user when either was downloaded.&lt;br /&gt;
The  latest version is disguised as popular games made available through  dummy sites that link back to a central back-end site that acts as a  file generator or repository. Bogus versions of Fruit Ninja, SIMS 3,  TempleRun and Angry Birds are used to disguise the malware.&lt;br /&gt;
Cluley  expects these criminal enterprises to expand, once the founders are  confident they can scam people in other countries. &quot;What makes money in  Russia today, could be used in attacks against American users tomorrow,&quot;  he said.&lt;br /&gt;
&lt;h2&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/7433778109174736093/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/android-hackers-hone-skills-in-russia.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/7433778109174736093'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/7433778109174736093'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/android-hackers-hone-skills-in-russia.html' title='Android hackers hone skills in Russia'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-6629397446529129452</id><published>2012-05-18T03:20:00.000-07:00</published><updated>2012-05-18T03:20:04.418-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><title type='text'>Scan a Windows PC for Viruses from a Ubuntu Live CD</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Getting a virus is bad. Getting a virus that causes your computer to  crash when you reboot is even worse. We’ll show you how to clean viruses  from your computer even if you can’t boot into Windows by using a virus  scanner in a Ubuntu Live CD.&lt;br /&gt;
There are a number of virus scanners available for Ubuntu, but we’ve  found that avast! is the best choice, with great detection rates and  usability.&lt;br /&gt;
Unfortunately, avast! does not have a proper 64-bit version, and forcing the install does not work properly. &lt;em&gt;If you want to use avast! to scan for viruses, then ensure that you have a 32-bit Ubuntu Live CD&lt;/em&gt;.&lt;br /&gt;
If you currently have a 64-bit Ubuntu Live CD on a bootable flash  drive, it does not take long to wipe your flash drive and go through &lt;a href=&quot;http://www.howtogeek.com/howto/13379/create-a-bootable-ubuntu-9.10-usb-flash-drive/&quot;&gt;our guide&lt;/a&gt;  again and select normal (32-bit) Ubuntu 9.10 instead of the x64  edition. For the purposes of fixing your Windows installation, the  64-bit Live CD will not provide any benefits.&lt;br /&gt;
Once Ubuntu 9.10 boots up, open up Firefox by clicking on its icon in the top panel.&lt;br /&gt;
&lt;img alt=&quot;sshot-1&quot; border=&quot;0&quot; height=&quot;102&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot110.png&quot; style=&quot;border-width: 0px; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;309&quot; /&gt;&lt;br /&gt;
Navigate to &lt;a href=&quot;http://www.avast.com/linux-home-edition&quot; title=&quot;http://www.avast.com/linux-home-edition&quot;&gt;http://www.avast.com/linux-home-edition&lt;/a&gt;.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;440&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot26.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;640&quot; /&gt;&lt;br /&gt;
Click on the Download tab, and then click on the link to download the DEB package.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;428&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot31.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;640&quot; /&gt;&lt;br /&gt;
Save it to the default location.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;228&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot41.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;488&quot; /&gt;&lt;br /&gt;
While avast! is downloading, click on the link to the registration  form on the download page. Fill in the registration form if you do not  already have a trial license for avast!.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;500&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot51.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;640&quot; /&gt;&lt;br /&gt;
By the time you’ve filled out the registration form, avast! will hopefully be finished downloading.&lt;br /&gt;
Open a terminal window by clicking on Applications in the top-left  corner of the screen, then expanding the Accessories menu and clicking  on Terminal.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;358&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot61.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;444&quot; /&gt;&lt;br /&gt;
In the terminal window, type in the following commands, pressing enter after each line.&lt;br /&gt;
&lt;blockquote&gt;cd Downloads&lt;br /&gt;
sudo dpkg –i avast*&lt;/blockquote&gt;&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;268&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot72.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;614&quot; /&gt;&lt;br /&gt;
This will install avast! on the live Ubuntu environment.&lt;br /&gt;
To ensure that you can use the latest virus database, while still in the terminal window, type in the following command:&lt;br /&gt;
&lt;blockquote&gt;sudo sysctl –w kernel.shmmax=128000000&lt;/blockquote&gt;&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;132&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot7b.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;510&quot; /&gt;&lt;br /&gt;
Now we’re ready to open avast!. Click on Applications on the top-left  corner of the screen, expand the Accessories folder, and click on the  new avast! Antivirus item.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;99&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot81.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;429&quot; /&gt;&lt;br /&gt;
You will first be greeted with a window that asks for your license  key. Hopefully you’ve received it in your email by now; open the email  that avast! sends you, copy the license key, and paste it in the  Registration window.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;245&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot91.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;395&quot; /&gt;&lt;br /&gt;
avast! Antivirus will open. You’ll notice that the virus database is outdated.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;627&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot101.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;473&quot; /&gt;&lt;br /&gt;
Click on the Update database button and avast! will start downloading the latest virus database.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;627&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot111.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;473&quot; /&gt;&lt;br /&gt;
To scan your Windows hard drive, you will need to “mount” it. While  the virus database is downloading, click on Places on the top-left of  your screen, and click on your Windows hard drive, if you can tell which  one it is by its size.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;346&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot131.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;225&quot; /&gt;&lt;br /&gt;
If you can’t tell which is the correct hard drive, then click on  Computer and check out each hard drive until you find the right one.  When you find it, make a note of the drive’s label, which appears in the  menu bar of the file browser.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;456&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshotxx.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;522&quot; /&gt;&lt;br /&gt;
Also note that your hard drive will now appear on your desktop.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;317&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot142.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;185&quot; /&gt;&lt;br /&gt;
By now, your virus database should be updated. At the time this article was written, the most recent version was 100404-0.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;87&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot121.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;473&quot; /&gt;&lt;br /&gt;
In the main avast! window, click on the radio button next to Selected  folders and then click on the “+” button to the right of the list box.  It will open up a dialog box to browse to a location.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;660&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot151.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;481&quot; /&gt;&lt;br /&gt;
To find your Windows hard drive, click on the “&amp;gt;” next to the  computer icon. In the expanded list, find the folder labelled “media”  and click on the “&amp;gt;” next to it to expand it. In this list, you  should be able to find the label that corresponds to your Windows hard  drive.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;436&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot161.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;354&quot; /&gt;&lt;br /&gt;
If you want to scan a certain folder, then you can go further into  this hierarchy and select that folder. However, we will scan the entire  hard drive, so we’ll just press OK.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;627&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot171.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;481&quot; /&gt;&lt;br /&gt;
Click on Start scan and avast! will start scanning your hard drive.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;627&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot191.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;481&quot; /&gt;&lt;br /&gt;
If a virus is found, you’ll be prompted to select an action. If you  know that the file is a virus, then you can Delete it, but there is the  possibility of false positives, so you can also choose Move to chest to  quarantine it.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;411&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot181.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;640&quot; /&gt;&lt;br /&gt;
When avast! is done scanning, it will summarize what it found on your  hard drive. You can take different actions on those files at this time  by right-clicking on them and selecting the appropriate action. When  you’re done, click Close.&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;&quot; class=&quot;lazyLoad&quot; height=&quot;384&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/04/sshot201.png&quot; style=&quot;border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;&quot; width=&quot;640&quot; /&gt;&lt;br /&gt;
Your Windows PC is now free of viruses, in the eyes of avast!. Reboot your computer and with any luck it will now boot up!&lt;br /&gt;
&lt;br /&gt;
Credits - how to geek&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/6629397446529129452/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/scan-windows-pc-for-viruses-from-ubuntu.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/6629397446529129452'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/6629397446529129452'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/scan-windows-pc-for-viruses-from-ubuntu.html' title='Scan a Windows PC for Viruses from a Ubuntu Live CD'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-2366439601558908549</id><published>2012-05-17T09:31:00.000-07:00</published><updated>2012-05-17T09:31:07.913-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Iphone"/><category scheme="http://www.blogger.com/atom/ns#" term="Mobile Tricks"/><title type='text'>iPhone 4S Jailbreak: Why Not to Jailbreak</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;So, you may have heard. The untethered &lt;a href=&quot;http://www.gottabemobile.com/tag/jailbreak&quot;&gt;jailbreak&lt;/a&gt; for the &lt;a href=&quot;http://www.gottabemobile.com/tag/iphone-4s&quot;&gt;iPhone 4S&lt;/a&gt; (and the &lt;a href=&quot;http://www.gottabemobile.com/tag/ipad-2&quot;&gt;iPad 2&lt;/a&gt;), called Absinthe, has &lt;a href=&quot;http://www.gottabemobile.com/2012/01/20/iphone-4s-jailbreak-finally-released&quot;&gt;finally arrived&lt;/a&gt;  courtesy of a “dream team” of hackers/developers. And if you own an  iPhone 4S, you might be thinking about taking the plunge. We don’t blame  you, but there are definitely some reasons why you might want to think  about holding off from doing so.&lt;br /&gt;
&lt;strong&gt;Read: &lt;a href=&quot;http://www.gottabemobile.com/2012/01/23/ultimate-iphone-4s-jailbreak-guide/&quot;&gt;Ultimate iPhone 4S Jailbreak Guide&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;
If you’re not familiar with the term jailbreak, we’ll break it down  for you real quick. We know for a lot of you, the iPhone 4S represents  your first iPhone, so there is no reason to be ashamed.&lt;br /&gt;
Jailbreaking means exactly what you’re probably thinking it means.&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;iPhone 4S&quot; class=&quot;aligncenter  wp-image-91735&quot; height=&quot;224&quot; src=&quot;http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/2012/01/iPhone-4S-Jailbreak-App-620x2801.jpg&quot; title=&quot;iPhone 4S&quot; width=&quot;496&quot; /&gt;&lt;/div&gt;It unlocks parts of your phone that Apple has locked down with its  software which in turn allows you to customize your phone and install  applications that you can’t find through the official iOS App Store.&lt;br /&gt;
For a lot of you, this will be a dream come true. Others may end up wishing that they didn’t jailbreak.&lt;br /&gt;
We’re here to help make that decision as easy as possible and so we  wanted to point out a couple of pitfalls that come with jailbreaking  your iPhone 4S.&lt;br /&gt;
Keep in mind (trolls, I am looking at you), not all of these will  happen in every use case. But just because something didn’t happen to  you, doesn’t mean it won’t happen to someone else.&lt;br /&gt;
So, with that, let’s take a look at some reasons why you may not want to jailbreak your iPhone 4S.&lt;br /&gt;
&lt;h2&gt;&lt;img alt=&quot;Cydia&quot; class=&quot;alignright  wp-image-91733&quot; height=&quot;240&quot; src=&quot;http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/2012/01/cydia-300x300.jpg&quot; title=&quot;iPhone 4S Jailbreak: Why Not to Jailbreak&quot; width=&quot;240&quot; /&gt;Your iPhone 4S May Lose Stability&lt;/h2&gt;While the developers of Absinthe have gone to great lengths to  provide as seamless of an experience as possible, jailbreaking is still a  hack and there are unexpected things that could happen because of that.  It’s possible, after jailbreaking your iPhone and installing  applications via Cydia – the unofficial App Store, your iPhone 4S may  become buggy and slow.&lt;br /&gt;
It may even crash.&lt;br /&gt;
Now, for power users and those willing to troubleshoot, this probably  won’t be too much of an issue. However, for the average person, it can  and probably will become a headache.&lt;br /&gt;
For many of you, having a stable iPhone 4S will be more of a priority then having a customized one.&lt;br /&gt;
&lt;h2&gt;Updating Is a Pain&lt;/h2&gt;While the stability issue might not be one that affects everyone that  jailbreaks, the pain in the rear end known as updating your jailbroken  phone does. If you’re the kind of person that wants the latest and  greatest software right off the bat, jailbreaking might not be fore you.&lt;br /&gt;
When Apple releases an update, you will have to wait for the devs to  either release a patch or a new jailbreak for your iPhone. When it comes  to smaller iOS updates, it’s usually a fast process.&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;iPhone 4S&quot; class=&quot;aligncenter  wp-image-91731&quot; height=&quot;446&quot; src=&quot;http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/2012/01/iPhone-4S-Restore-437x446-custom.jpg&quot; title=&quot;iPhone 4S Jailbreak: Why Not to Jailbreak&quot; width=&quot;437&quot; /&gt;&lt;/div&gt;However, when it comes to larger updates like &lt;a href=&quot;http://www.gottabemobile.com/2011/12/05/ios-5-1-release-date-what-to-expect-from-ios-5-1/&quot; title=&quot;iOS 5.1 Release Date: What to Expect From iOS 5.1&quot;&gt;iOS 5.1&lt;/a&gt;, it takes awhile. So, if you’re the impatient type, keep this in mind.&lt;br /&gt;
And once you get the update, your headache might remain as you’ll  need to re-install the jailbreak and all of the apps that you downloaded  from Cydia. There are definitely tools out there that can help you  restore, but it’s still going to take some time.&lt;br /&gt;
In other words, it’s not the seamless process you might expect from an official update.&lt;br /&gt;
&lt;h2&gt;Factory Resets Aren’t Fun&lt;/h2&gt;&lt;strong&gt;Loss of Genius Bar Support&lt;/strong&gt;&lt;br /&gt;
If you run into a problem with your iPhone 4S, you might decide to  take it to the Genius Bar in an Apple retail location. Well, if you’ve  jailbroken your phone, chances are, the Genius will refuse to help you.&lt;br /&gt;
Suggestion: Don’t mention that your phone is jailbroken.&lt;br /&gt;
You can also un-jailbreak&amp;nbsp; your phone but if you find yourself  bringing it in on a semi-regular basis, you’re going to start getting  annoyed with doing that over and over again.&lt;br /&gt;
A factory reset will work as well but that will wipe everything from your phone.&lt;br /&gt;
Fun.&lt;br /&gt;
&lt;strong&gt;Loss of Warranty&lt;/strong&gt;&lt;br /&gt;
Back in 2012, jailbreaking your iPhone became a legal thing to do.  Seriously, this was illegal at one point. But just because it’s not  legal doesn’t change the fact that it will void your iPhone 4S warranty  with Apple.&lt;br /&gt;
So if your phone starts acting up, even it has nothing to do with the  jailbreak, you more than likely won’t get the support that you need to  get the issue fixed.&lt;br /&gt;
That means that you’ll have to factory reset.&lt;br /&gt;
Again, lots of fun.&lt;br /&gt;
So yes, it’s possible to avoid both of these, but for many of you it won’t be worth the hassle.&lt;br /&gt;
–&lt;br /&gt;
Now that you know some of the risks involved with jailbreaking, you  can make an informed decision. And if interested in going through with  it and freeing your iPhone 4S from Apple’s chains, you’ll want to read  our &lt;strong&gt;How to Jailbreak the iPhone 4S&lt;/strong&gt; to find out exactly how to do it.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/2366439601558908549/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/iphone-4s-jailbreak-why-not-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/2366439601558908549'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/2366439601558908549'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/iphone-4s-jailbreak-why-not-to.html' title='iPhone 4S Jailbreak: Why Not to Jailbreak'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-5252741202308429068</id><published>2012-05-17T09:29:00.002-07:00</published><updated>2012-05-17T09:29:49.800-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Iphone"/><category scheme="http://www.blogger.com/atom/ns#" term="Mobile Tricks"/><title type='text'>18 Reasons to Jailbreak the iPhone 4S</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;The iPhone 4S has been available for a month, and we are still  waiting for a proper jailbreak. You might want to know why so many of us  are excited for an iPhone 4S jailbreak, so I have rounded up 18 reasons  to jailbreak the iPhone 4S.&lt;br /&gt;
I’ve already shared &lt;a href=&quot;http://www.gottabemobile.com/2011/10/20/5-reasons-i-want-an-iphone-4s-jailbreak-now/&quot;&gt;5 reasons I am excited&lt;/a&gt;, and you’ll notice a little overlap. This is a companion to our &lt;a href=&quot;http://www.gottabemobile.com/2011/11/14/5-reasons-you-shouldnt-jailbreak-your-iphone-4s/&quot;&gt;5 reasons not to jailbreak the iPhone 4S&lt;/a&gt;. You’ll be quick to notice that there are more reasons for most users to jailbreak&amp;nbsp;their&amp;nbsp;iPhone than there are reasons not to.&lt;br /&gt;
&lt;strong&gt;Update: &lt;a href=&quot;http://www.gottabemobile.com/2012/01/20/iphone-4s-jailbreak-how-to-jailbreak-the-iphone-4s/&quot;&gt;How to Jailbreak the iPhone 4S&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;
The iPhone 4S&amp;nbsp;jailbreak&amp;nbsp;&lt;del&gt;is still a ways off&lt;/del&gt;, but the iPhone jailbreaking community has&amp;nbsp;successfully&amp;nbsp;&lt;strong&gt;&lt;a href=&quot;http://www.gottabemobile.com/2011/11/10/iphone-4s-jailbreak-status-progress-made-avoid-ios-5-0-1/&quot;&gt;jailbroken the iPhone 4S&lt;/a&gt;&lt;/strong&gt;.  That’s the good news. The bad news is that you will need to wait until  it is ready for the public release, which could be as early as December,  but may not come along until 2012.&lt;br /&gt;
When the iPhone 4S&amp;nbsp;jailbreak&amp;nbsp;is&amp;nbsp;available&amp;nbsp;to the public, it won’t  cost you anything, and there are a number of reasons I think you’ll want  to join me in jailbreaking your new iPhone.&lt;br /&gt;
&lt;h2&gt;18 Reasons to Jailbreak the iPhone 4S&lt;/h2&gt;&lt;h3&gt;Cydia Apps&lt;/h3&gt;&lt;a href=&quot;http://www.gottabemobile.com/2011/11/18/reasons-iphone-4s-jailbreak/cydia/&quot; rel=&quot;attachment wp-att-82594&quot;&gt;&lt;img alt=&quot;Cydia&quot; class=&quot;aligncenter size-full wp-image-82594&quot; height=&quot;68&quot; src=&quot;http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/Cydia.jpg&quot; title=&quot;Cydia&quot; width=&quot;292&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
Cydia is an alternate app store that makes it easy to find and  install apps that&amp;nbsp;Apple&amp;nbsp;wouldn’t approve. Many of the&amp;nbsp;reasons&amp;nbsp;to  jailbreak will require a trip to this new app store, only&amp;nbsp;available&amp;nbsp;on  jailbroken iPhones. This is the place to go for all the cool apps and  features you want on your iPhone,&amp;nbsp;but&amp;nbsp;that Apple won’t&amp;nbsp;deliver&amp;nbsp;until iOS  6.&lt;br /&gt;
&lt;h3&gt;BrowserChanger&lt;/h3&gt;&lt;a href=&quot;http://www.gottabemobile.com/2011/11/18/reasons-iphone-4s-jailbreak/browserchanger-2/&quot; rel=&quot;attachment wp-att-82598&quot;&gt;&lt;img alt=&quot;BrowserChanger&quot; class=&quot;aligncenter size-full wp-image-82598&quot; height=&quot;480&quot; src=&quot;http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/BrowserChanger.jpg&quot; title=&quot;BrowserChanger&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
If you want to use an alternate iPhone browsers like Opera or  Dolphin, you don’t need to jailbreak, but then all of your apps will use  the open in safari behavior and skip right past your favorite browser.  Not anymore. Install BrowserChanger and you can choose which browser you  want to open when you grab a link from Facebook or Twitter.&lt;br /&gt;
&lt;h3&gt;Real Google Voice&lt;/h3&gt;&lt;div class=&quot;wp-caption aligncenter&quot; id=&quot;attachment_77278&quot; style=&quot;width: 595px;&quot;&gt;&lt;a href=&quot;http://www.gottabemobile.com/2011/10/20/5-reasons-i-want-an-iphone-4s-jailbreak-now/google-voice-extension-iphone-4s-jailbreak/&quot; rel=&quot;attachment wp-att-77278&quot;&gt;&lt;img alt=&quot;Google Voice Extension iPhone 4S Jailbreak&quot; class=&quot;size-full wp-image-77278&quot; height=&quot;295&quot; src=&quot;http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/Google-Voice-Extension-iPHone-4S-Jailbreak.jpg&quot; title=&quot;Google Voice Extension iPhone 4S Jailbreak&quot; width=&quot;585&quot; /&gt;&lt;/a&gt;&lt;div class=&quot;wp-caption-text&quot;&gt;Google Voice Extension - iPhone 4S Jailbreak&lt;/div&gt;&lt;/div&gt;As I mentioned, this is one of my biggest reasons for wanting an iPhone 4S Jailbreak. The &lt;a href=&quot;http://gvexts.appspot.com/phone/phone.html&quot;&gt;PhoneGV Extension&lt;/a&gt;  and SMS GV Extension will allow your phone to handle all the nasty  tapping and routing, that you must use the Google Voice app for, in the  background. Once you install these apps, all the hard work is done  behind the scenes, just use Messages and your Dialer like you normally  would.&lt;br /&gt;
&lt;h3&gt;3G Facetime&lt;/h3&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;a href=&quot;http://www.gottabemobile.com/2011/11/18/reasons-iphone-4s-jailbreak/facetime-over-3g/&quot; rel=&quot;attachment wp-att-82599&quot;&gt;&lt;img alt=&quot;Facetime over 3G&quot; class=&quot;aligncenter size-full wp-image-82599&quot; height=&quot;378&quot; src=&quot;http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/Facetime-over-3G.jpg&quot; title=&quot;Facetime over 3G&quot; width=&quot;672&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Once you jailbreak your iPhone, you can trick your phone into  thinking you are connected to WiFi so that you can make FaceTime calls  over WiFi. I don’t make many FaceTime calls, but I am more likely to  want to do a video call when I am far from my home WiFi network.&lt;br /&gt;
&lt;h3&gt;SB Settings&lt;/h3&gt;&lt;span class=&quot;embed-youtube&quot; style=&quot;display: block; text-align: center;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
SB&amp;nbsp;Settings&amp;nbsp;gives you fast access to your WiFi, Bluetooth and  brightness settings. Of all the things Apple makes simple, it sucks at  giving you fast access to these essential controls. SB Settings puts  them right in your notification pull down so that you can quickly change  brightness, turn on Bluetooth and more.&lt;br /&gt;
&lt;h3&gt;Customized Looks&lt;/h3&gt;&lt;span class=&quot;embed-youtube&quot; style=&quot;display: block; text-align: center;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
If you wan to change the whole look of your iPhone, to something like  OS X Lion or your favorite color combination, you can do this when you  Jailbreak your iPhone 4S. There are a number fo WinterBoard  themes&amp;nbsp;available&amp;nbsp;to change how your iPhone looks. From minor tweaks to  massive changes, you get to customize your iPhone 4S.&lt;br /&gt;
&lt;h3&gt;MyWi – 3G Hotspot&lt;/h3&gt;&lt;a href=&quot;http://www.gottabemobile.com/2011/11/18/reasons-iphone-4s-jailbreak/mywi-2/&quot; rel=&quot;attachment wp-att-82591&quot;&gt;&lt;img alt=&quot;MyWi&quot; class=&quot;aligncenter size-full wp-image-82591&quot; height=&quot;338&quot; src=&quot;http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/MyWi.jpg&quot; title=&quot;MyWi&quot; width=&quot;225&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
If you want to use your iPhone 4S as a hotspot without signing up for  a plan from your carrier, you can use MyWi. This could end up getting  you in trouble with certain carriers, and if you use a lot of data you  may be better off paying for a hotspot from your carrier. A cool tool,  but&amp;nbsp;definitely&amp;nbsp;one to use at your own risk.&lt;br /&gt;
&lt;h3&gt;Mario on Your iPhone&lt;/h3&gt;&lt;span class=&quot;embed-youtube&quot; style=&quot;display: block; text-align: center;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
Another awesome addition when you jailbreak is the ability to load up  your favorite emulators like nes4iPhone, snes4iPhone and others. These  tools will let you play Roms from your favorite old-time game systems.  ROMS are a grey area, so if you don’t own the actual game, you are  probably breaking the law. Another fun hack, but one to do at your own  risk. You can see the this in action, using the Wiimote as a controller.&lt;br /&gt;
&lt;h3&gt;Five Icon Dock&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px; font-weight: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;&lt;a href=&quot;http://www.gottabemobile.com/2011/11/18/reasons-iphone-4s-jailbreak/five-icon-dock/&quot; rel=&quot;attachment wp-att-82590&quot;&gt;&lt;img alt=&quot;five icon dock&quot; class=&quot;aligncenter size-full wp-image-82590&quot; height=&quot;101&quot; src=&quot;http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/five-icon-dock.jpg&quot; title=&quot;five icon dock&quot; width=&quot;336&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
If you want to add another favorite program to your dock, Five Icon  Dock will do that for you by&amp;nbsp;packing&amp;nbsp;in icons tighter. A small&amp;nbsp;tweak,  but we all have one more program we want on&amp;nbsp;the&amp;nbsp;home screen at all  times. right?&lt;br /&gt;
&lt;h3&gt;Five Icon Switcher&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px; font-weight: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;&lt;a href=&quot;http://www.gottabemobile.com/2011/11/18/reasons-iphone-4s-jailbreak/five-icon-switcher/&quot; rel=&quot;attachment wp-att-82586&quot;&gt;&lt;img alt=&quot;Five Icon Switcher&quot; class=&quot;aligncenter size-full wp-image-82586&quot; height=&quot;142&quot; src=&quot;http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/Five-Icon-Switcher.jpg&quot; title=&quot;Five Icon Switcher&quot; width=&quot;317&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
If you’re going to put 5 icons in your home dock, you’ll want the  same five icon look in the multitasking switcher, which is&amp;nbsp;exactly&amp;nbsp;what  this app does for you.&lt;br /&gt;
&lt;h3&gt;Overboard&lt;/h3&gt;&lt;span class=&quot;embed-youtube&quot; style=&quot;display: block; text-align: center;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
Even after you add an extra icon to your dock, you’ll want to have  Overboard installed. You can pull up a a&amp;nbsp;listing&amp;nbsp;of all of your iPhone  screens for easy jumping and navigation. This one is $2 in the Cydia app  store and essential if you have page after page of apps. You can see  how Overboard works in the video shown above.&lt;br /&gt;
&lt;h3&gt;BiteSMS&lt;/h3&gt;&lt;span class=&quot;embed-youtube&quot; style=&quot;display: block; text-align: center;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
Forget about going into the Message app to reply to texts and  iMessages, Bite SMS allows you to reply directly from&amp;nbsp;the&amp;nbsp;notification.  This is fully compatible with iOS 5 and works with iMessaging. Check out  the BiteSMS features in the demo above.&lt;br /&gt;
&lt;h3&gt;IntelliscreenX&lt;/h3&gt;&lt;span class=&quot;embed-youtube&quot; style=&quot;display: block; text-align: center;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
If you want to do even more in the Notification Center,  IntelliscreenX looks like the best solution. You can access more than  just notifications with this jailbreak only app. Check&amp;nbsp;out&amp;nbsp;the video  above for all the details.&lt;br /&gt;
&lt;h3&gt;Add More Gestures&lt;/h3&gt;&lt;span class=&quot;embed-youtube&quot; style=&quot;display: block; text-align: center;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
Activator will add more gestures to your iPhone 4S. You can swipe  left ont he status bar to launch a specific app or double tap to start a  new text message in Bite SMS. You’ll be amazed by how much time you  save using this app. Ignore the horrible music, and look at&amp;nbsp;Activator&amp;nbsp;in  action in the video shown above.&lt;br /&gt;
&lt;h3&gt;Arrange Icons As You Want&lt;/h3&gt;&lt;span class=&quot;embed-youtube&quot; style=&quot;display: block; text-align: center;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
Instead of filling up from the upper left to the lower right,  Gridlock allows you to place your iPhone apps wherever you want them,  leaving open places if you want to keep space around your favorite app  for easy tapping. Check out Gridlock in action in&amp;nbsp;the&amp;nbsp;video above.&lt;br /&gt;
&lt;h3&gt;Never Enter Your App Store Password Again&lt;/h3&gt;&lt;span class=&quot;embed-youtube&quot; style=&quot;display: block; text-align: center;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
With PasswordPilot, you don’t need to enter your password&amp;nbsp;every  time&amp;nbsp;you download an app or download updates. This isn’t good if you are  sharing your iPhone, but if you keep a passcode on your iPhone and are  sick of typing in your password with every purchase and download it is  awesome.&lt;br /&gt;
&lt;h3&gt;Add Pictures To Your Contacts&lt;/h3&gt;&lt;span class=&quot;embed-youtube&quot; style=&quot;display: block; text-align: center;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
With Copic, you can add pictures to your iPhone contacts, phone call  log and SMS message screens. A nice touch for browsing through your  messages quickly. You can see a demo of Copic in the video above.&lt;br /&gt;
&lt;h3&gt;No More Lockscreen&lt;/h3&gt;&lt;span class=&quot;embed-youtube&quot; style=&quot;display: block; text-align: center;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
If you want to skip the slide to unlock feature, you can turn on this  app and it will automatically unlock your phone to the home screen when  you press the power button.&amp;nbsp;Unfortunately, you still see the  unlock&amp;nbsp;screen&amp;nbsp;for a second, but it beats&amp;nbsp;sliding&amp;nbsp;to unlock for some  users.&lt;br /&gt;
–&lt;br /&gt;
When you can Jailbreak the iPhone 4S, you will be able to search for  these apps and hacks in Cydia. If you have a jailbroken iPhone 4, you  can get to using them right now.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/5252741202308429068/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/18-reasons-to-jailbreak-iphone-4s.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/5252741202308429068'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/5252741202308429068'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/18-reasons-to-jailbreak-iphone-4s.html' title='18 Reasons to Jailbreak the iPhone 4S'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8354165089554309826.post-3842686097685750000</id><published>2012-05-17T09:28:00.000-07:00</published><updated>2012-05-17T09:28:19.028-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Iphone"/><category scheme="http://www.blogger.com/atom/ns#" term="Mobile Tricks"/><title type='text'>iPhone 4S Jailbreak Finally Released</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;a href=&quot;http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/2012/01/Absinthe-iPhone-4S-Jailbreak.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Absinthe iPhone 4S Jailbreak&quot; border=&quot;0&quot; class=&quot;size-full wp-image-91639&quot; height=&quot;380&quot; src=&quot;http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/2012/01/Absinthe-iPhone-4S-Jailbreak.jpg&quot; title=&quot;Absinthe iPhone 4S Jailbreak&quot; width=&quot;508&quot; /&gt;&lt;/a&gt;Rejoice iPhone 4S and iPad 2 owners. Today you can finally jailbreak  the iPhone 4S and iPad 2 thanks to the A5 Jailbreak Dream Team.&lt;br /&gt;
The new &lt;strong&gt;&lt;a href=&quot;http://greenpois0n.com/?p=173&quot;&gt;Absinthe Jailbreak tool&lt;/a&gt;&lt;/strong&gt;  allows you to perform a untethered jailbreak on the iPhone 4S and iPad  2. This covers all models of Apple’s latest phone and tablet, and works  on the newest iOS 5.0.1 software release.&lt;br /&gt;
&lt;strong&gt;READ: &lt;a href=&quot;http://www.gottabemobile.com/2012/01/20/iphone-4s-jailbreak-how-to-jailbreak-the-iphone-4s/&quot;&gt;How to Jailbreak the iPhone 4S and iPad 2&lt;/a&gt;.&lt;/strong&gt;&lt;br /&gt;
By joining forces, pod2G, The Chronic Dev Team and the iPhone Dev  Team were able to get around a number of Apple walls and locks to free  your iPhone 4S and iPad 2.&lt;br /&gt;
The new tool is called Absinthe, and is&amp;nbsp;only available for the Mac, but Windows and Linux versions are coming.&lt;br /&gt;
&lt;div class=&quot;wp-caption aligncenter&quot; id=&quot;attachment_91639&quot; style=&quot;width: 518px;&quot;&gt;&lt;div class=&quot;wp-caption-text&quot;&gt;Jailbreak the iPhone 4S with Absinthe.&lt;/div&gt;&lt;/div&gt;You can download the Absinthe iPhone 4S and iPad 2 jailbreak tool  from greenpois0n.com, but be warned that you may have trouble getting to  the page due to high demand. Keep&amp;nbsp;trying&amp;nbsp;and you will&amp;nbsp;eventually&amp;nbsp;get  in.&lt;br /&gt;
I am in the process of jailbreaking my iPhone 4S as I share this  news, and will soon walk you through the iPhone 4S jailbreak process.  This will take place on a Mac, but should be very similar on Windows.&lt;br /&gt;
Before you jailbreak, be sure to read these &lt;strong&gt;&lt;a href=&quot;http://www.gottabemobile.com/2011/11/14/5-reasons-you-shouldnt-jailbreak-your-iphone-4s/&quot; title=&quot;5 Reasons You Shouldn’t Jailbreak Your iPhone 4S&quot;&gt;5 concerns&lt;/a&gt;&lt;/strong&gt;, and know that we aren’t responsible if you break your iPhone or iPad.&lt;br /&gt;
If you are OK with these cautions, go ahead and jailbreak your  device. I look forward to hearing about your favorite jailbreak apps and  jailbreak tweaks.&lt;br /&gt;
If you wish to thank the dream team of iPhone hackers, you can donate to a joint fund that will be split between the members.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://null-sec.blogspot.com/feeds/3842686097685750000/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://null-sec.blogspot.com/2012/05/iphone-4s-jailbreak-finally-released.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/3842686097685750000'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8354165089554309826/posts/default/3842686097685750000'/><link rel='alternate' type='text/html' href='http://null-sec.blogspot.com/2012/05/iphone-4s-jailbreak-finally-released.html' title='iPhone 4S Jailbreak Finally Released'/><author><name>SecurityVoid</name><uri>http://www.blogger.com/profile/05628711947842649444</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>