Tuesday, April 26, 2011

Free Hacking News Letter

Free Hacking News Letter

Link to Learn How To Hack! Learn Ethical Hacking and Download Free Hacking Tools

SpyEye Trojan Latest Version Attacks Google Chrome and Opera Web browsers

Posted: 26 Apr 2011 07:09 AM PDT

SpyEye Trojan Latest Version Attacks Google Chrome and Opera Web browsers The latest version of the SpyEye trojan includes new capability specifically designed to steal sensitive data from Windows users surfing the Internet with the Google Chrome and Opera Web browsers. The author of the SpyEye trojan formerly sold the crimeware-building kit on a number of online cybercrime forums, but has recently limited his showroom displays to a handful of highly vetted underground communities. We...

Do you want to read more..Visit my site @ http://www.amarjit.info

Double Income with Speak Asia? SpeakAsia Survey Double Income Plan

Posted: 26 Apr 2011 08:12 AM PDT

Double Income with Speak Asia? SpeakAsia Survey Double Income PlanSOURCE: http://speakasiaonlinemoneyearning.blogspot.com/ Do you want to join us? We will add you in our power leg. Contact us: online.survey.incom3@gmail.com Mobile no:Mr.Navi 09464256908 SURVEY INCOME Please note that 1 reward point = $1 or Rs. 50 As soon as you complete your registration, you are immediately eligible for weekly surveys. These surveys will be shown to you every time you log in. As a standard panelist you...

Do you want to read more..Visit my site @ http://www.amarjit.info

Backtrack 4 Download for Windows VMWare & Torrents

Posted: 26 Apr 2011 01:40 AM PDT

BackTrack is a live CD Linux distribution that focuses on penetration testing. A merger of two older security-related distros — Whax and Auditor Security Collection — BackTrack bundles more than 300 security tools. BackTrack is based on the SLAX distribution (a live CD derived from Slackware) and runs a patched 2.6.20 kernel. It offers users both KDE and Fluxbox desktop environments.To start using BackTrack, download the ISO image and burn it to a CD. Insert the disc and boot your machine. Once...

Do you want to read more..Visit my site @ http://www.amarjit.info

Learn How to Enumerate the Username from the Known SID SID2USER

Posted: 26 Apr 2011 01:41 AM PDT

Certain RIDs are static. The SID2USER application is used to enumerate the username from a given SID regardless of what the account may have been renamed.Establish a NULL session and initiate a query against the target.From the directory containing the sid2user executable establish a NULL session. From a DOS prompt, type the following syntax: sid2user <\\Target IP Address> SID RIDThe computer name is optional with this utility. If none is given the local computer is used.User accounts...

Do you want to read more..Visit my site @ http://www.amarjit.info

Learn How to Enumerate the SID from the Username USER2SID

Posted: 26 Apr 2011 01:42 AM PDT

Every account on a Windows computer has a Security Identifier (SID). SIDs are static for the machine the user accounts are installed on. The USER2SID application is used to enumerate the SID from a given username. Once the SID has been identified the username can be enumerated regardless of what the user account has been renamed.First establish a NULL session. then type the following syntax in command prompt: user2sid <\\Target IP Address> account nameThe computer name is optional with...

Do you want to read more..Visit my site @ http://www.amarjit.info

Learn how to Report the RPC of Target using Rpcinfo

Posted: 26 Apr 2011 01:40 AM PDT

The rpcinfo application makes a Remote Procedure Call (RPC) to the target and reports the results.Attackers use the results to identify what ports/exploits to attack/use. From a Linux shell type the following with the syntax of: rpcinfo (Hostname)In this example, the target 192.168.11.123 has 5 RPC ports open.---Regards, Amarjit Singh

Do you want to read more..Visit my site @ http://www.amarjit.info

Detect Operating System of Target: Xprobe2

Posted: 26 Apr 2011 07:03 AM PDT

Countermeasures: IDS to detect UDP to port 32132, deny ICMP requests/reply.Description: The Xprobe2 application is used to identify the possible operating system (OS) of the target. An attacker uses this information to launch appropriate attacks for the results obtained. Remember thatall commands in Linux are case sensitive. Procedure: Uncompress, compile, create the Xprobe2 executable and execute against the target with the syntax of:Xprobe2 options Target IP ADDRESSFrom the Linux directory...

Do you want to read more..Visit my site @ http://www.amarjit.info

Learn How to Enumerate Hosts and Domains of LAN using Net Commands

Posted: 26 Apr 2011 01:40 AM PDT

The net commands are used to enumerate information from the Local Area Network (LAN). Once a NULL session has been established, any shares these hosts will be displayed as well.Create null session first as mentoined in old posts. Run the syntax: net From a DOS prompt, type the syntax: net viewThis technique only works on the LAN and not on the Internet. Type command syntax: net view /domainTo identify the hosts within each domain, the syntax would be: net view /domain:domain nameTo view the...

Do you want to read more..Visit my site @ http://www.amarjit.info

Learn How to Exploit User Information from Target usingDUMPSEC

Posted: 26 Apr 2011 01:40 AM PDT

Establish a NULL sessionOpen the DUMPSECFrom Report, Select Computer, enter the target IP address and click OK.The Dump Users as Table as shown as belowFrom Report, select Dump User as Column. Click Add until all items on the left are now on the right on the screen. Click OKThe results from the target will appear in the main window.Attention should be given to the "notes" section of the results as many Administrators place sensitive information in that block, including passwords.The DUMPSEC...

Do you want to read more..Visit my site @ http://www.amarjit.info

Learn How to Exploit Data from Target Computer using USERINFO

Posted: 26 Apr 2011 01:40 AM PDT

The USERINFO gathers the user information from the target. Some of the information enumerated is the user RID, privileges, login times, login dates, account expiration date, network storage limitations, login hours, and much more. An attacker uses this information for social engineering phase of an attack.Establish a NULL sessionFrom command prompt type the following syntax: userinfo \\Target IP Address Target UsernameResult with USERINFO are identical to the USERDUMP application. Both tools...

Do you want to read more..Visit my site @ http://www.amarjit.info

Learn How to Enumerate User Information from Target using USERDUMP

Posted: 26 Apr 2011 01:40 AM PDT

The USERDUMP application gather the user information from the target system. Some of the information which can be enumerated is the user RID, privileges, login times, login dates, account expiration date, network storage limitations, login hours, and much more.First establish a NULL session From a DOS prompt type the following syntax: userdump \\Target IP Address Target UsernameThe results reveal the following username Administrator details:The User ID is 500. (This tells us that this is indeed...

Do you want to read more..Visit my site @ http://www.amarjit.info

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

 
Vida de bombeiro Recipes Informatica Humor Jokes Mensagens Curiosity Saude Video Games Car Blog Animals Diario das Mensagens Eletronica Rei Jesus News Noticias da TV Artesanato Esportes Noticias Atuais Games Pets Career Religion Recreation Business Education Autos Academics Style Television Programming Motosport Humor News The Games Home Downs World News Internet Car Design Entertaimment Celebrities 1001 Games Doctor Pets Net Downs World Enter Jesus Variedade Mensagensr Android Rub Letras Dialogue cosmetics Genexus Car net Só Humor Curiosity Gifs Medical Female American Health Madeira Designer PPS Divertidas Estate Travel Estate Writing Computer Matilde Ocultos Matilde futebolcomnoticias girassol lettheworldturn topdigitalnet Bem amado enjohnny produceideas foodasticos cronicasdoimaginario downloadsdegraca compactandoletras newcuriosidades blogdoarmario arrozinhoii sonasol