BSNL Hack for Free Internet

Here are the Steps to Perform 

Logic: the server has a major bug in it, by which it fails to block two simultaneous connections from the phone and establishes a connection with full internet working, Supported devices: all phones with multichannel gprs support.

For connection on your mobile phone:- 

(1) Make two connections like bsnlportal and BSNLPORTAL1 (names of profile don’t matter, u can keep one as billgates and shahrukhkhan lol..the basic purpose of names is to enable the user to differentiate between the two accounts)

(2) Select the application you got to have the full connection working on. Surpassingly “web” now just select “bsnlportal” profile and select a link like wap.cellone.in the page will get open, just press the red button such that the “web” application goes in the background.

Make sure that the gprs connection is still established with the web app. Two parallel lines on the top left of the screen will confirm this 

(3) Now open any other app that requires web connection like opera. Select BSNLPORTAL and open any other link like wap.google.com, u will get error –


The aim of using the other app is to perform multi-channel gprs,this is verified by seeing some dots on the pre-existing connection established by “web”

(step 2)


“Access denied. Technical description:
403 Forbidden - You are not allowed to communicate with the requested resource.”


(4) close opera and open web and open a site like esato.com

(5) if everything is done as said here then esato will load and voila! We have the whole internet!

For connection on pc. 

(1) Create a connection and enter the number to be dialed as *99***1# 

(2) enter the following string as extra initialization command 

(3) Now dial from pc, the connection will be established 

 (4) Pick the phone and open “web” open “wap.cellone.in” the phone shows error . 

(5) Close “web” and then from the browser open www.google.com and voila! The whole intenet is here settings for profiles


apn: celloneportal


ip: 192.168.51.163


port : 8080

leave other fields blank as they are of the least concern!
the browser settings on pc too go the same as mentioned above
Continue Reading...

Remotely Shutdown/Control your PC With Email or SMS

Hello to all Green Hackers !!!!

From a very long time I've heard about Remotely shutdown your PC with Mobile SMS and I also searched many techniques But all are too much tricky for simple user or Beginner.
One of my student find out a Cool Technique her name is Swati and she is also a Greenhackers this trick is really very easy and quick.


To perform this trick or control over your PC Remotely you required:-


(1) Tweet My PC : This is main utility Tool for Remotely control your pc. you can download this utility from HERE .

(2) Gmai Account : You can use your existing gmail account but i prefered make a new acciunt for that.

(3) Twitter Account : You can also use your existing account But i recomend new account.
 
 Note: If you use your Existing twitter account so you must set tweet private not public.

How to Use This Utility

(1) Simply you can Download TMPC Utility

(2) Install the application.

(3) Enter the required details.


How to Send Commands to the Remote Computer

Now that your basic configuration is done, it’s time to set up a posting method. You can use email, SMS, IM, web or any of the Twitter clients to send commands to the remote computer.

By Email: Associate you Twitter account with Posterous (auto-post) and all email messages sent to twitter@posterous.com will therefore become commands for the remote computer.

By SMS: If you live in US, UK, Canada, India, Germany, Sweden or New Zeleand, you can send associate Twitter with your mobile phone (see list of numbers) and then control your remote computer via SMS Text Messages.

By IM: Add the Twitter bot – twitter@twitter.com – to your list of Google Talk buddies and you can then send commands via instant message.

By Web: If you are on vacation but have access to an internet connected laptop, just log into the Twitter website and issue commands (e.g., shutdown or logoff) just as another tweet.


Here is the list of commands you can start doing using Tweet My PC

Note : Commands are no more case sensitive.

1.replies
2.physical memory
3.virtual memory
4.os
5.ip
6.Shutdown
7.standby
8.hibernate
9.screenshot
10.getprocesslist
11.kill
12.download
13.getfile
14.getfilelist
15.Custom Command

Now Control your Pc with TMPC utility
Stay with Us and Post ur Comments Suggestion@@@@
Continue Reading...

How to Recover DATA


Have you accidentally deleted your files from the Hard disk? Do you desperately want to recover them back? Well you need not panic! It is possible to recover the deleted files back from the hard disk (even after you have Shift+Deleted) provided you act as soon as you realize that the files are deleted and use the best deleted files recovery software.
In this post you will find a detailed information on how to recover the deleted files from your Windows PC.

Today there exists hundreds of data recovery tools and softwares on the market which boast to recover 100% of all the deleted files back in the original condition. But in reality most of these softwares are neither effective nor capable of recovering your files back. So it is very much necessary to make the right choice of the file recovery software in order to recover deleted files back in the original condition.

I recommend the following softwares to recover the deleted files
You can Download this Software Click Here

Power Data Recovery is a risk-free and READ ONLY data recovery utility that helps you in recovering your all important data lost after accidental format, virus problems, software malfunction, file/directory deletion, or even a sabotage! It is an easy to use data recovery utility that examines your inaccessible hard drives for damages and corruptions and recovers the data back.


How to start?

You can launch the Power Data Recovery by double click "Power Data Recovery" icon on the desktop. You can also launch the application by going to:Now, you have to choose which kind of recovery you need.
Start > Programs > Power Data Recovery > Power Data Recovery
Just press "Undelete Recovery", or "Advanced Recovery", or "Deep Scan Recovery", or "Resume Recovery".


(1) Choose "Undelete Recovery" if you want to recover files that were intentionally (or accidentally) deleted.

(2) Choose "Deep Scan Recovery" Deep Scan using internal file format to search lost data. It provides you more powerful data recovery ability. It is very useful for you to understand why to choose this powerful option.

(3) Choose "Advanced Recovery" if you want to recover files on the re-format or damaged volume.

(4) Choose "Resume Recovery" if you want to resume the last recovery result.

NOTE: If you have lost partition or cannot find the volume you want to recovery in "Advanced Recovery" module, you should scan physical device to find the partition in Advanced Recovery module.

The software offers rich graphical support and incorporates advanced scanning methods to completely scan and recover deleted files from your hard drive. With this you can

@ Recover FAT16, FAT32, VFAT, NTFS, and NTFS5 file system partitions

@ Recover deleted documents

@ Recover deleted photos

@ Recover deleted music

@ Formatted Hard-Drive recovery

@ Recover files from USB Drives, CDs, DVDs and memory cards

@ Recover almost all the camera format files
 
 
How the File Deletion Process Works?

When you delete a file from your computer (or even from the recycle bin) the file is not actually deleted. Unlike what most people think, the file is not permanantly deleted or dropped from your hard disk. Let’s take an example of a book containing 50 pages. Suppose when you delete the page 25, assume that only the entry in the index which points to the page 25 is deleted and not actually the page 25 itself. Likewise when you delete a file from your hard disk, only the pointer which points to this file is removed and not actually the file itself. This file still exists intact and is 100% possible to recover it back in the original condition. In this condition the file becomes invisible and hence appears to have deleted.

Post Your Comments @@@@
Continue Reading...

Hack Ethernet ADSL Router



Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a noob hacker just like you. In this post I will show you how to exploit a common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.

Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in the Default username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default usernames and passwords.
Here is how you can do it.

Before perform this action you need the following tool.

Now follow these Steps :

Step 1. Go to http://www.whatismyip.com/. Once the page is loaded you will find your IP address. Note it down.

Step 2. Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.

Step 3. Suppose your IP is 123.237.233.134, you can set the range something as 123.237.232.0 to 123.237.234.255 so that there exists atleast 300-400 IP addresses in the range.

Step 4. Go to Tools->Preferences and select the Ports tab. Under Port selection enter 80 (we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.


 Step 5. Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image.



Step 6. Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password.

Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below.




If you do not succeed to gain access, select another IP from the list and repeat the step-5. Atleast 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

What can an Attacker do by Gaining Access to the Router Settings?
 
By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target user’s computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or play any kind of prank with the router settings. So the victim has to reconfigure the router in order to bring it back to action.
 
WARNING: All the information is just for education purpose only.Please don't use this information for illegal purpose.
 
Our motto is only that you can secure yourself from these types of attack . Always Change your default user name & password..
 
Stay with GREENHACKERS..
Post your Comments@@@@
Continue Reading...

RUN YOUR LIVECD DIRECTLY ON WINDOWS

Hello Friends....
Today I'm going Describe to you people how to run or emulate LiveCD simultaneously with your OS or without reboot your OS.
 
What is LiveCD
 
A live CD, live DVD, or live disc is a CD or DVD containing a bootable computer operating system. Live CDs are unique in that they have the ability to run a complete, modern operating system on a computer lacking mutable secondary storage, such as a hard disk drive. Live USB flash drives are similar to live CDs, but often have the added functionality of automatically and transparently writing changes back to their bootable medium.The term "live" derives from the fact that these CDs each contain a complete, functioning and operational operating system on the distribution medium.

But you can Emulate these LiveCD/DVD/Iso Image/LiveUSB with the help of  MobaLiveCD




MobaLiveCD is a freeware that will run your Linux LiveCD on Windows thanks to the excellent emulator called "Qemu".

MobaLiveCD allows you to test your LiveCD with a single click : after downloading the ISO image file of your favorite LiveCD, you just have to start it in MobaLiveCD and here you are, without the need to burn a CD-Rom or to reboot your computer.




MobaLiveCD key features:

(1)   No need to burn the CD-Rom anymore.

(2)   You can use the right-click menu for an easy and fast start.

(3)   Program without installation that you can start from an USB stick.

(4)   A clear and easy to use interface.

(5)   Light and portable application, packaged in a single executable of 1.6MB only

So Now Onwards first Test your Downloaded Live ISO image then wirte to it on DVD or CD.
@@@@
Continue Reading...

TEST YOUR ANTIVIRUS

Hello GreenHackers ..

I've found a new way to test your Antivirus. So I'm sharing this process with you.
 


Have you ever Think how to test your Antivirus software to ensure it’s proper working?

Well...Here is a quick and easy way to test your antivirus. The process is called EICAR test which will work on any ANTIVIRUS.

This Process was developed by European Institute of Computer Antivirus Research (EICAR).

This Process can be used by People, Companies and Antivirus Programmers to test the proper functioning of the ANTIVIRUS/ANTIMALWARE Software without having to deal with the real computer Virus which can cause Damage to the computer.

To Test your Antivirus follow these Steps...

1. Open a notepad (New Text Document.txt) and copy the following code exactly onto it, and save the notepad. 
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

2. Rename the file from New Text Document.txt to New Text Document.com

3. Now Scan this New Text Document.com file from you Antivirus.

If the Antivirus is Working properly on your computer, then it should generate a warning and immediately delete the file upon scanning. Otherwise you may have to re-install another Antivirus.

NOTE: Most antivirus will pop-out a warning message in the Step-1 itself

You can also place the New Text Document.com file in a ZIP or RAR file and run a scan on it so as to ensure whether your Antivirus can detect the test string in the compressed archive.

Any Antivirus when scanning this file will respond exactly as it will do for a genuine Virus/Malicious code. This test will cause no damage to your computer even though the Antivirus will flag it as a malicious script. Hence it is the safest method to test the proper functioning of any Antivirus.

Be Secure @@@@
Continue Reading...

Seven Social Network Attacks



Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.


This book (Seven Deadliest Social Network Attacks) identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, what are the risks of the attack, and how to defend against the attack. Seven attacks were chosen: denial of service, war dialing, penetration testing, protocol tunneling, spanning tree attacks, man-in-themiddle, and password replay.
These are not mutually exclusive; you can exploit the spanning tree protocol, for example, to launch a denial-of-service (DOS) attack. These were chosen because they help illustrate different aspects of network security; the principles on which they rely are unlikely to vanish any time soon, and they allow for the possibility of gaining something of interest to the attacker, from money to high-value data. 







The following skills are uncovered in this book

Chapter 1 (Denial of Service) :- Illustrates how even sophisticated networks can be crippled by a determined hacker with relatively few resources.

Chapter 2 (War Dialing) :- Illustrates how a hacker can circumvent the hardened security perimeter of a network to access “softer” targets.

Chapter 3 (Penetration Testing) :- Discusses the various tools and techniques used for penetration testing that are readily available to both the defenders and the attackers.

Chapter 4 (Protocol Tunneling) :- Presents a method for deliberately subverting your network perimeter to “tunnel” prohibited traffic into and out of your network.

Chapter 5 (Spanning Tree Attacks) :- Discusses the “layer 2” network responsible for knitting together your switches, routers, and other devices into a reliable network and illustrates one way in which to exploit the weak security of this layer.

Chapter 6 (Man-in-the-Middle) :- Discusses a very common attack pattern and just what an attacker can accomplish once he or she has inserted himself or herself into your data stream.

Chapter 7 (Password Replay) :- Focuses on the security of passwords and other static security measures and how an attacker can use various techniques to gain unauthorized access.

This book is intended to provide practical, usable information. However, the world of network security is evolving very rapidly, and the attack that works today may (hopefully) not work tomorrow. It is more important, then, to understand the principles on which the attacks and exploits are based in order to properly plan either a network attack or a network defense. The authors chose the contents of this book because we believe that, underlying the attacks presented here, there are important principles of network security. The attacks are deadly because they exploit principles,assumptions, and practices that are true today and that we believe are likely to remain true for the foreseeable future.

Continue Reading...

USB OVER NETWORK

SHARE YOUR USB OVER NETWORK
You can easily share an external USB drive or a printer over a network.Lab instruments, scanners, cameras, card readers, bar code scanners, PDAs, USB keys and others are usually considered to be non-shareable. Thus, normally you need to move your USB devices from one computer to another. Sometimes, though, this is not an easy task, especially when you need to use a device that is physically located in another building or even another city.


USB is the standard interface used by most modern computer devices today. But, USB was
designed to connect electronic peripherals only to a single computer.Previously, the only way to share a non-shareable device was to buy an expensive hardware USB switch. A hardware switch takes up space, consumes power and is often quite expensive.USB Over Network is a revolutionary software solution from FabulaTech. No need to move devices from one computer to another, and no need to buy expensive hardware switches. You can access a USB device connected to a remote computer from your computer via a LAN or the Internet as if it were physically plugged into your own PC.The program consists of a "Server" and a "Client". You should install the Server on the computer to which the device you want to share is physically connected. You can install the Client on all PCs from which you need to access the shared device.USB Over Network is easy to install and use. It supports a wide range of USB devices. This software will not require you to have any special knowledge and will install easily right out of the box.Share your USB device without risk of losing it! Access remote instruments without leaving your chair!
Access remote USB devices everywhere. I mean Everywhere!
An end-to-end USB over IP strategy to share and access any USB over local network or the Internet.USB OVER NETWORK is a new and powerful solution which enables work with the remote USB devices over a local network or the Internet as if they were connected directly to your local PC. Developed for both Windows and Linux, it delivers fast operation and responds to any user needs.
Challenge:

Usually, when you need to use any USB device (like scanner, flash-memory, etc) you plug it into USB port of your computer. But for all that, the device is accessible only for the computer it is plugged into. And what if someone else needs to use the same USB device?
Common time and money-consuming actions:
(1) You can unplug USB device from your PC and give it to another user.
Disadvantages: according to different circumstances, not always there is a possibility to give USB device to another user, even for a while.
(2) You can allow another user to work with that device on your PC.
Disadvantages: not always there is a possibility to allow someone else to work with that USB device on your PC (especially if another user is in the another office, city or country).
(3) It is possible to purchase the same USB devices additionally.
Disadvantages: additional USB devices could be purchased but it depends on the cost of the device and quantity required.

Solution
FabulaTech has resolved this problem in a different extraordinary way by implementing the USB IP strategy.USB over Network which allows working with remote USB devices over a local network or the Internet.

All you have to do is to install USB over Network Server on the PC where USB devices are plugged in. USB over Network Client must be installed on the PCs you want to give access to those very USB devices. That's all. Now any user which has installed USB over Network Client can work with remote USB devices as if they were connected directly to his local PC.
Quick Instruction
(1) Download USB OVER NETWORK.

(2) Install USB over Network Server on the computer to which USB devices are connected.(3) Install USB over Network Client on the computers, from which access to remote USB devices is needed.
NOW ENJOY USB SHARING@@@
POST YOUR COMMENTS AND SUGGESTION @@@
Continue Reading...

MONITOR YOUR EMPLOYEES & STUDENT

Hello Green Hackers !!!!
Today I'm going to tell you how to monitor activities of our Student / Employees.
This Software is dedicated for the Administrator/Owner of any Training Institiute or Company to Monitor the activities of their Employees or Students.



Net Monitor for Employees Professional allows you to see screens of computers connected to the network. This way you can observe what your employees are doing! Additionally, you have the ability to take control of a remote computer by controlling the mouse and keyboard. You can record remote computers screens even when you are not monitoring them. When your employees need instructions, you can show them your desktop. To increase your efficiency the console now include several tolls that can be executed on all or just selected remote computers. When you need attention you can send a message to employees and/or lock the remote computer.





What are the major benefits of using Net Monitor for Employees Professional ?

*   For monitoring and recording your employees activities on a remote computers
  For preventing internet browsing on remote computers
  For starting and stopping applications and processes on remote computers.
*   For monitoring students in the classroom to achieve better discipline or, just to assist them when they are in trouble (by using the remote control feature).
*   For administrating all computers just from one location – your computer.
*   For presenting your screen to students.
*   For locking students computers while they are waiting for further instructions or assignments.
*   Helping your students by showing your desktop to them.
*   Turning off, restarting, .... remote computers with one click.
*   Schedule remote computers desktop recording to AVI files
*   Execute several actions on all remote computers with on click
*   Block internet access

Enjoy With Us....
Share your Ideas...



Continue Reading...

PORT FORWARDING

What is Port Forwarding



In General Sense:

I'll first explain port forwarding in a general sense. Imagine your computer is a human and imagine one port as the mouth, and the data is the food. You can close or open your mouth (port) to eat that food (data) and transfer that food into another location in your body. Same goes for your ear (another port) where it recieves sound, and so on.
The use of port forwarding is to be able to transmit data from an outside world to your computer. This allows an external user to communicate with your computer via a specified port number. Normally you do not want to do this because it can leave your computer vulnerable to attacks but in special cases that you do need this, it will prove very useful.

In Technical sense:

Port forwarding or Port Mapping commonly refers to the change of destination address and/or port on the packet with subsequent regular routing in a network address translator gateway to reach a host within a masqueraded, typically private, network based on the port number on which it was received from the originating host. It may also refer to replaying the packet or stream through a secondary socket (e.g. like rinetd) to reach its intended destination.
The technique is used to permit communications by external hosts with services provided within a private local area network (LAN).


Purposes:

Port forwarding allows remote computers (e.g., public machines on the Internet) to connect to a specific computer within a private LAN.
Port forwarding can also be used within a single machine.
Port forwarding is necessary for a standalone computer if any of the following conditions are true:

*   The computer is using a shared IP address.
*   Internet Connection Sharing is enabled.
*   A router is being used with network address translation (NAT) enabled.
 
How is Port Forwarding Configured
 
Simple Port Forwarding
 
 
 
Simple Port Forwarding is a tool that makes it easier to manage the port forwarding settings in your router. You can add new port configurations manually or select from a range of pre-configured ports for many popular applications and apply the settings directly to your router configuration. The program interfaces with the web interface of your router and basically automates the process of navigating to the correct page and entering the values. It is compatible with a wide range of routers, including most Netgear, D-Link and Linksys models as well as some other manufacturers. Simple Port Forwarding also includes additional features that allows you to set a static IP address, test your port forwarding settings, manage Windows Firewall port exceptions and access to online help and guides.
 
 
 
 
Continue Reading...

MALTEGO { Forensics and Intelligence Application & Information Gathering Tool }

Maltego is an open source intelligence and forensics application. It allows for the mining and gathering of information as well as the representation of this information in a meaningful way. Coupled with its graphing libraries, Maltego, allows you to identify key relationships between information and identify previously unknown relationships between them. It is a must-have tool in the forensics, security and intelligence fields!


What does MALTEGO do?
Maltego is a program that can be used to determine the relationships and real world links between :


* People
* Groups of people (social networks)
* Companies
* Organizations
* Web sites
* Internet infrastructure such as: Domains, DNS Names, Netblocks and IP Addresses
* Phrases
* Affiliations
* Documents and files




These entities are linked using open source intelligence.

* Maltego is easy and quick to install – it uses Java, so it runs on Windows, Mac and Linux.
* Maltego provides you with a graphical interface that makes seeing these relationships instant and accurate – making it possible to see hidden connections
.
* Using the graphical user interface (GUI) you can see relationships easily – even if they are three or four degrees of separation away.
* Maltego is unique because it uses a powerful, flexible framework that makes customizing possible -As such, Maltego can be adapted to your own, unique requirements.


Limitations
The Community Edition is limited in the following ways :
* A 15second nag screen
* Save and Export has been disabled
* Limited zoom levels
* Can only run transforms on a single entity at a time
* Cannot copy and paste text from detailed view
* Transforms limited to 75 per day
* Throttled client to TAS communication


You can download Maltego Community Edition here:

Maltego Community Edition For LINUX
Maltego Community Edition For WINDOWS
Continue Reading...

METASPLOIT: Penetration Testing Resources

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. This project initially started off as a portable network game and has evolved into a powerful tool for Penetration Testing, Exploit Development, and Vulnerability Research.
The Framework was written in the Perl scripting language and includes various components written in C, assembler, and Python. The widespread support for the Perl language allows the Framework to run on almost any Unix-like system under its default configuration. A customized Cygwin environment is provided for users of Windows-based operating systems.

What is Metasploit Framework ?
Metasploit provides useful information and tools for penetration testers, security researchers, and IDS signature developers. This project was created to provide information on exploit techniques and to create a functional knowledgebase for exploit developers and security professionals.
The Metasploit Framework is both a penetration testing system and a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.
What does "Metasploit Framework" do ?
The framework consists of tools, libraries, modules, and user interfaces. The basic function of the framework is a module launcher, allowing the user to configure an exploit module and launch it at a target system. If the exploit succeeds, the payload is executed on the target and the user is provided with a shell to interact with the payload. Hundreds of exploits and dozens of payload options are available.
How To Use Metasploit Framework ?
Step 1:
You can Download Metasploit Framework from Here , as per your desired O.S.
Step 2:
Open Msf Console and type show exploits



Step 3:
Choose any exploits and Type use exploit name
Note: exploit name is choosen by you
Step 4:
Now you enter in exploit now type show payloads
Step 5:
Choose any payloads as per your Target and Type set PAYLOADS payload name
Note: payload name is choosen by you
Step 6:
Now you enter in payload now Type show options
Step 7:
Set all options one by one.and after that Type exploit to perform exploit.
IMPORTANT NOTE: YOU CAN SEARCH MORE EXPLOITS SIMPLY OPEN YOUTUBE.COM AND SEARCH FOR METASPLOIT. HERE YOU CAN FIND LOTS OF EXPLOIT IN VIDEO FORMAT.
METASPLOIT FRAMEWORK IS BUILT IN TOOL OF BACKTRACK
METASPLOIT FRAMEWORK IS NOT FOR SCANNING PURPOSE ITS ONLY USE FOR EXPLOIT. YOU CAN USE NMAP FOR SCANING OF REMOTE SYSTEM FOR I.P. ADDRESS AND OPEN PORT.
Continue Reading...

Phishing Tutorial:Step By Step Explained


What is Phishing ?

In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites
, auction sites, online payment processors or IT Administrators are commonly used to lure the unsuspecting. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake.


How To Do Phishing ?

STEP 1:Firstly U Must Signup For A Free Web Hosting Service Like:
www.freehostia.com
www.ripway.com etc.....


And Register A Domain Or Subdomain.
After Getting Your Signup Done, You Have Your Own Subdomain Like For Instance You Registered With Freehostia,
Then Your Domain Is Like "Www.Yourname.Freehostia.Com"

STEP 2:
Now Login To Your Freehostia Account And Go To "File Manager" In The Freehostia Control Panel.
STEP 3:Now what you have to do is, go to your domain folder like "yourname.freehostia.com" and create a seperate folder in that directory.with the name of the site, for eg. Gmail , if you want to phish a gmail account!

STEP 4:
Now click here to Download and extract the file "phishers created by jafar.rar" to your desktop. And then open your "gmail" folder. You'll find two files there viz. "jafar.php" & "index.htm" (each phisher folder contains same files)


STEP 5:
Now upload "jafar.php" & "index.htm" to the "gmail" folder you created inside "yourname.freehostia.com"


So when you're done with the uploading part, the link to your gmail phisher is "www.yourname.freehostia.com/gmail/index.htm".

STEP 6:
Congrats!! That is your gmail phisher!! Now all you have to do is copy the link to the phisher file i.e. "www.yourname.freehostia.com/gmail/index.htm"

And send it to the victim you want to hack! When he/she'll open that link, it'll be directed to your gmail phisher and when he/she logins that page
He/she'll be redirected to the original "gmail" website and you'll get the password in the "jafar.txt" file which will be created in the gmail folder. You created in your freehostia domain and the path to that file will be "www.yourname.freehostia.com/gmail/jafar.txt" !


IMPORTANT NOTE:
CHANGE YOUR FREEHOSTIA DIRECTORY PERMISSION TO 755 SO THAT NO ONE CAN
VIEW YOUR PERSONAL FILES EXCEPT THE PHISHER!!

**HAPPY PHISHING**.
Continue Reading...