Hack Ethernet ADSL Router



Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a noob hacker just like you. In this post I will show you how to exploit a common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.

Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in the Default username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default usernames and passwords.
Here is how you can do it.

Before perform this action you need the following tool.

Now follow these Steps :

Step 1. Go to http://www.whatismyip.com/. Once the page is loaded you will find your IP address. Note it down.

Step 2. Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.

Step 3. Suppose your IP is 123.237.233.134, you can set the range something as 123.237.232.0 to 123.237.234.255 so that there exists atleast 300-400 IP addresses in the range.

Step 4. Go to Tools->Preferences and select the Ports tab. Under Port selection enter 80 (we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.


 Step 5. Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image.



Step 6. Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password.

Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below.




If you do not succeed to gain access, select another IP from the list and repeat the step-5. Atleast 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

What can an Attacker do by Gaining Access to the Router Settings?
 
By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target user’s computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or play any kind of prank with the router settings. So the victim has to reconfigure the router in order to bring it back to action.
 
WARNING: All the information is just for education purpose only.Please don't use this information for illegal purpose.
 
Our motto is only that you can secure yourself from these types of attack . Always Change your default user name & password..
 
Stay with GREENHACKERS..
Post your Comments@@@@
Continue Reading...

RUN YOUR LIVECD DIRECTLY ON WINDOWS

Hello Friends....
Today I'm going Describe to you people how to run or emulate LiveCD simultaneously with your OS or without reboot your OS.
 
What is LiveCD
 
A live CD, live DVD, or live disc is a CD or DVD containing a bootable computer operating system. Live CDs are unique in that they have the ability to run a complete, modern operating system on a computer lacking mutable secondary storage, such as a hard disk drive. Live USB flash drives are similar to live CDs, but often have the added functionality of automatically and transparently writing changes back to their bootable medium.The term "live" derives from the fact that these CDs each contain a complete, functioning and operational operating system on the distribution medium.

But you can Emulate these LiveCD/DVD/Iso Image/LiveUSB with the help of  MobaLiveCD




MobaLiveCD is a freeware that will run your Linux LiveCD on Windows thanks to the excellent emulator called "Qemu".

MobaLiveCD allows you to test your LiveCD with a single click : after downloading the ISO image file of your favorite LiveCD, you just have to start it in MobaLiveCD and here you are, without the need to burn a CD-Rom or to reboot your computer.




MobaLiveCD key features:

(1)   No need to burn the CD-Rom anymore.

(2)   You can use the right-click menu for an easy and fast start.

(3)   Program without installation that you can start from an USB stick.

(4)   A clear and easy to use interface.

(5)   Light and portable application, packaged in a single executable of 1.6MB only

So Now Onwards first Test your Downloaded Live ISO image then wirte to it on DVD or CD.
@@@@
Continue Reading...

TEST YOUR ANTIVIRUS

Hello GreenHackers ..

I've found a new way to test your Antivirus. So I'm sharing this process with you.
 


Have you ever Think how to test your Antivirus software to ensure it’s proper working?

Well...Here is a quick and easy way to test your antivirus. The process is called EICAR test which will work on any ANTIVIRUS.

This Process was developed by European Institute of Computer Antivirus Research (EICAR).

This Process can be used by People, Companies and Antivirus Programmers to test the proper functioning of the ANTIVIRUS/ANTIMALWARE Software without having to deal with the real computer Virus which can cause Damage to the computer.

To Test your Antivirus follow these Steps...

1. Open a notepad (New Text Document.txt) and copy the following code exactly onto it, and save the notepad. 
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

2. Rename the file from New Text Document.txt to New Text Document.com

3. Now Scan this New Text Document.com file from you Antivirus.

If the Antivirus is Working properly on your computer, then it should generate a warning and immediately delete the file upon scanning. Otherwise you may have to re-install another Antivirus.

NOTE: Most antivirus will pop-out a warning message in the Step-1 itself

You can also place the New Text Document.com file in a ZIP or RAR file and run a scan on it so as to ensure whether your Antivirus can detect the test string in the compressed archive.

Any Antivirus when scanning this file will respond exactly as it will do for a genuine Virus/Malicious code. This test will cause no damage to your computer even though the Antivirus will flag it as a malicious script. Hence it is the safest method to test the proper functioning of any Antivirus.

Be Secure @@@@
Continue Reading...

Seven Social Network Attacks



Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.


This book (Seven Deadliest Social Network Attacks) identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, what are the risks of the attack, and how to defend against the attack. Seven attacks were chosen: denial of service, war dialing, penetration testing, protocol tunneling, spanning tree attacks, man-in-themiddle, and password replay.
These are not mutually exclusive; you can exploit the spanning tree protocol, for example, to launch a denial-of-service (DOS) attack. These were chosen because they help illustrate different aspects of network security; the principles on which they rely are unlikely to vanish any time soon, and they allow for the possibility of gaining something of interest to the attacker, from money to high-value data. 







The following skills are uncovered in this book

Chapter 1 (Denial of Service) :- Illustrates how even sophisticated networks can be crippled by a determined hacker with relatively few resources.

Chapter 2 (War Dialing) :- Illustrates how a hacker can circumvent the hardened security perimeter of a network to access “softer” targets.

Chapter 3 (Penetration Testing) :- Discusses the various tools and techniques used for penetration testing that are readily available to both the defenders and the attackers.

Chapter 4 (Protocol Tunneling) :- Presents a method for deliberately subverting your network perimeter to “tunnel” prohibited traffic into and out of your network.

Chapter 5 (Spanning Tree Attacks) :- Discusses the “layer 2” network responsible for knitting together your switches, routers, and other devices into a reliable network and illustrates one way in which to exploit the weak security of this layer.

Chapter 6 (Man-in-the-Middle) :- Discusses a very common attack pattern and just what an attacker can accomplish once he or she has inserted himself or herself into your data stream.

Chapter 7 (Password Replay) :- Focuses on the security of passwords and other static security measures and how an attacker can use various techniques to gain unauthorized access.

This book is intended to provide practical, usable information. However, the world of network security is evolving very rapidly, and the attack that works today may (hopefully) not work tomorrow. It is more important, then, to understand the principles on which the attacks and exploits are based in order to properly plan either a network attack or a network defense. The authors chose the contents of this book because we believe that, underlying the attacks presented here, there are important principles of network security. The attacks are deadly because they exploit principles,assumptions, and practices that are true today and that we believe are likely to remain true for the foreseeable future.

Continue Reading...

USB OVER NETWORK

SHARE YOUR USB OVER NETWORK
You can easily share an external USB drive or a printer over a network.Lab instruments, scanners, cameras, card readers, bar code scanners, PDAs, USB keys and others are usually considered to be non-shareable. Thus, normally you need to move your USB devices from one computer to another. Sometimes, though, this is not an easy task, especially when you need to use a device that is physically located in another building or even another city.


USB is the standard interface used by most modern computer devices today. But, USB was
designed to connect electronic peripherals only to a single computer.Previously, the only way to share a non-shareable device was to buy an expensive hardware USB switch. A hardware switch takes up space, consumes power and is often quite expensive.USB Over Network is a revolutionary software solution from FabulaTech. No need to move devices from one computer to another, and no need to buy expensive hardware switches. You can access a USB device connected to a remote computer from your computer via a LAN or the Internet as if it were physically plugged into your own PC.The program consists of a "Server" and a "Client". You should install the Server on the computer to which the device you want to share is physically connected. You can install the Client on all PCs from which you need to access the shared device.USB Over Network is easy to install and use. It supports a wide range of USB devices. This software will not require you to have any special knowledge and will install easily right out of the box.Share your USB device without risk of losing it! Access remote instruments without leaving your chair!
Access remote USB devices everywhere. I mean Everywhere!
An end-to-end USB over IP strategy to share and access any USB over local network or the Internet.USB OVER NETWORK is a new and powerful solution which enables work with the remote USB devices over a local network or the Internet as if they were connected directly to your local PC. Developed for both Windows and Linux, it delivers fast operation and responds to any user needs.
Challenge:

Usually, when you need to use any USB device (like scanner, flash-memory, etc) you plug it into USB port of your computer. But for all that, the device is accessible only for the computer it is plugged into. And what if someone else needs to use the same USB device?
Common time and money-consuming actions:
(1) You can unplug USB device from your PC and give it to another user.
Disadvantages: according to different circumstances, not always there is a possibility to give USB device to another user, even for a while.
(2) You can allow another user to work with that device on your PC.
Disadvantages: not always there is a possibility to allow someone else to work with that USB device on your PC (especially if another user is in the another office, city or country).
(3) It is possible to purchase the same USB devices additionally.
Disadvantages: additional USB devices could be purchased but it depends on the cost of the device and quantity required.

Solution
FabulaTech has resolved this problem in a different extraordinary way by implementing the USB IP strategy.USB over Network which allows working with remote USB devices over a local network or the Internet.

All you have to do is to install USB over Network Server on the PC where USB devices are plugged in. USB over Network Client must be installed on the PCs you want to give access to those very USB devices. That's all. Now any user which has installed USB over Network Client can work with remote USB devices as if they were connected directly to his local PC.
Quick Instruction
(1) Download USB OVER NETWORK.

(2) Install USB over Network Server on the computer to which USB devices are connected.(3) Install USB over Network Client on the computers, from which access to remote USB devices is needed.
NOW ENJOY USB SHARING@@@
POST YOUR COMMENTS AND SUGGESTION @@@
Continue Reading...

MONITOR YOUR EMPLOYEES & STUDENT

Hello Green Hackers !!!!
Today I'm going to tell you how to monitor activities of our Student / Employees.
This Software is dedicated for the Administrator/Owner of any Training Institiute or Company to Monitor the activities of their Employees or Students.



Net Monitor for Employees Professional allows you to see screens of computers connected to the network. This way you can observe what your employees are doing! Additionally, you have the ability to take control of a remote computer by controlling the mouse and keyboard. You can record remote computers screens even when you are not monitoring them. When your employees need instructions, you can show them your desktop. To increase your efficiency the console now include several tolls that can be executed on all or just selected remote computers. When you need attention you can send a message to employees and/or lock the remote computer.





What are the major benefits of using Net Monitor for Employees Professional ?

*   For monitoring and recording your employees activities on a remote computers
  For preventing internet browsing on remote computers
  For starting and stopping applications and processes on remote computers.
*   For monitoring students in the classroom to achieve better discipline or, just to assist them when they are in trouble (by using the remote control feature).
*   For administrating all computers just from one location – your computer.
*   For presenting your screen to students.
*   For locking students computers while they are waiting for further instructions or assignments.
*   Helping your students by showing your desktop to them.
*   Turning off, restarting, .... remote computers with one click.
*   Schedule remote computers desktop recording to AVI files
*   Execute several actions on all remote computers with on click
*   Block internet access

Enjoy With Us....
Share your Ideas...



Continue Reading...