Free Hacking News Letter |
- True Story Behind Underground Hackers: Myth About Blackhat Hackers
- Linux vs MAC: Which is Better OS for Hackers
- Trojans and Backdoors : Working of Trojans
- What is Trojans or Trojan Horse: Backdoors & its Working
- How to spread a Trojan Horse: Methods to spread Trojan Horse on Internet
- How to make Trojan Horse FUD (Fully Undetectable): Trojans and Backdoors Wrappers
- Types of Trojan Horse: TROJAN HORSE Types
- THE TROJAN “HORSE”: Trojan Features & Trojan Working
- Trojan Horse Softwares & Tools: Download Free Trojan Horses
- Cyberwar & Cyber Terrorism: How to Guard?? By Dr. Ravi Bhatia
- How to Create Reverse WWW Shell - Covert channels using HTTP
- Cyber Children on the Rise: My kid is a HACKER
True Story Behind Underground Hackers: Myth About Blackhat Hackers Posted: 01 Apr 2011 04:57 AM PDT True Story Behind Underground Hackers: Myth About Blackhat Hackers Cyber war is nothing but an eye wash, actually speaking cyber war is a created hype by some old kids, in which one thinks himself a soldier and others as toy guns. And the computer as his Kingdome, little knowledge he possess is his wisdom, and tools he posses for hacking are his arms and ammunitions. The so called cyber war soldiers are living in their own imaginary world and each one of them thinks he is superior amongst them.... Do you want to read more..Visit my site @ http://www.amarjit.info |
Linux vs MAC: Which is Better OS for Hackers Posted: 01 Apr 2011 12:13 AM PDT Linux vs MAC: Which is Better OS for Hackers Now a days there is big discussions over the usages of Mac and Linux, specially the script kiddies are very much queries bout usages of Mac and contented Linux-on-Mac .Just Look Around you will notice the surge in use of Apple hardware and Mac OS X. Since it is based so solidly on Unix, yet with an attractive GUI on top, OS X has appealed to a broad range of programmers and technical writers; especially the kind who have no affection for the Wintel... Do you want to read more..Visit my site @ http://www.amarjit.info |
Trojans and Backdoors : Working of Trojans Posted: 01 Apr 2011 04:49 AM PDT Attacker gets access to the trojaned system as the system goes online By way of the access provided by the trojan attacker can stage attacks of different types.Trojans work similar to the client-server model. Trojans come in two parts, a Client part and a Server part. The attacker deploys the Client to connect to the Server, which runs on the remote machine when the remote user (unknowingly) executes the Trojan on the machine. The typical protocol used by most Trojans is the TCP/IP... Do you want to read more..Visit my site @ http://www.amarjit.info |
What is Trojans or Trojan Horse: Backdoors & its Working Posted: 01 Apr 2011 12:37 AM PDT We will begin with: Terms of reference for various malicious code Defining Trojans and Backdoors Understanding the various backdoor genre Overview of various Trojan tools Learning effective prevention methods and countermeasures Overview of Anti-Trojan software Learning to generate a Trojan programTrojans and Backdoors A Trojan horse is: An unauthorized program contained within a legitimate program. This unauthorized program performs functions unknown (and probably unwanted) by... Do you want to read more..Visit my site @ http://www.amarjit.info |
How to spread a Trojan Horse: Methods to spread Trojan Horse on Internet Posted: 01 Apr 2011 04:51 AM PDT Modes of Transmission ICQ IRC Attachments Physical Access Browser And E-mail Software Bugs NetBIOS (File Sharing) Fake Programs Un-trusted Sites And Freeware Software ICQ People can also get infected while chatting / talking / video messaging over ICQ or any other Instant Messenger Application. It is a risk that the user undertakes when it comes to receiving files no matter from whom or where it comes. IRC Here also, the threat comes from exchange of files no matter what they... Do you want to read more..Visit my site @ http://www.amarjit.info |
How to make Trojan Horse FUD (Fully Undetectable): Trojans and Backdoors Wrappers Posted: 01 Apr 2011 04:53 AM PDT Wrappers How does an attacker get BO2K or any trojan installed on the victim's computer? Answer: Using Wrappers A wrapper attaches a given EXE application (such as games or orifice application) to the BO2K executable. The two programs are wrapped together into a single file. When the user runs the wrapped EXE, it first installs BO2K and then runs the wrapped application. The user only sees the latter application. Wrappers are used to bind the Trojan executable with a legitimate... Do you want to read more..Visit my site @ http://www.amarjit.info |
Types of Trojan Horse: TROJAN HORSE Types Posted: 01 Apr 2011 04:50 AM PDT Various Trojan Genre Remote Access Trojans Password Sending Trojans Keyloggers Destructive Denial Of Service (DoS) Attack Trojans Proxy/Wingate Trojans FTP Trojans Software Detection Killers■ Remote Access Trojans These are the Trojans usually seen referred to in the media and hence gain high visibility because of their ability to give the attackers the power to do more things on the victim's machine than the victim itself, while standing in front of the machine. Most of these... Do you want to read more..Visit my site @ http://www.amarjit.info |
THE TROJAN “HORSE”: Trojan Features & Trojan Working Posted: 01 Apr 2011 12:35 AM PDT THE TROJAN "HORSE": Trojan Features & Trojan Working Trojan's are probably the most compromising of all types of attacks. Trojans are being released by the hundreds every week, each more cleverly designed that the other. In my studies I have found that Trojans are primarily responsible for almost all Windows Based machines being compromised. For those of you who do not know what Trojans are I'll briefly explain. Trojans are small programs that effectively give "hackers" remote control... Do you want to read more..Visit my site @ http://www.amarjit.info |
Trojan Horse Softwares & Tools: Download Free Trojan Horses Posted: 01 Apr 2011 04:52 AM PDT Tool: QAZ It is a companion virus that can spread over the network. It also has a "backdoor" that will enable a remote user to connect to and control the computer using port 7597. It may have originally been sent out by email. Rename notepad to note.com Modifies the registry key: HKLM\software\Microsoft\Windows\Current Version\Run Hacking Tool:Tini http://ntsecurity.nu/toolbox/tini It is a very tiny trojan program which is only 3 kb and programmed in assembly language. It takes... Do you want to read more..Visit my site @ http://www.amarjit.info |
Cyberwar & Cyber Terrorism: How to Guard?? By Dr. Ravi Bhatia Posted: 01 Apr 2011 12:18 AM PDT By Dr. Ravi Bhatia E-Mail-ravipbhatia28@rediffmail.com The world-wide web or the internet has become an omnipresent presence in the contemporary world. From sending and receiving messages to accessing services such as banking, booking rail or air tickets, to trading shares on stock exchanges, more and more people inhabit cyberspace with the aid of a computer. Science fiction writer William Gibson coined this term, which indicated his vision of a global computer network linking people, machines... Do you want to read more..Visit my site @ http://www.amarjit.info |
How to Create Reverse WWW Shell - Covert channels using HTTP Posted: 01 Apr 2011 04:54 AM PDT Reverse WWW shell allows an attacker to access a machine on your internal network from the outside. The attacker must install a simple trojan program on a machine in your network, the Reverse WWW shell server. On a regular basis, usually 60 seconds, the internal server will try to access the external master system to pick up commands. If the attacker has typed something into the master system, this command is retrieved and executed on the internal system. Reverse WWW shell uses standard... Do you want to read more..Visit my site @ http://www.amarjit.info |
Cyber Children on the Rise: My kid is a HACKER Posted: 01 Apr 2011 12:14 AM PDT Pune: The number of gaming sites for kids is fast growing in the Indian cyberspace. One of the most recent entrants is Disney, whose Club Penguin launched an Indian website to widen its virtual world where users waddle around as penguins. They can play games, chat and decorate their igloos. Club Penguin also actively promotes online learning by allowing its user base to create paper-mache artifacts, play memory card games and also encourages real-life interactions between children across the... Do you want to read more..Visit my site @ http://www.amarjit.info |
You are subscribed to email updates from Learn Ethical Hacking Download Free Hacking Tools Learn Hacking and Join Indian Cyber Army To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.