HACK IP SECURITY  

Thursday, June 4, 2009

HACK IP ADDRESS ANONYMITY

I have found one software which hide your IP address every time and give you a new IP address

by creating a Tor Network…….

If u have Mozilla then it works very fine

http://www.torproject.org/download.html.en

Here is link for Windows and MAC OS ……….So download it according to your requirement .

After that to easily turn on and turn off “TOR” .. You can install Firefox add on from here :

https://addons.mozilla.org/en-US/firefox/addon/2275

then restart firefox….After that you will see at right bottom corner that your tor addon for

mozilla is installed…now when u want to hide your IP or want to surfing anonymously Turn on or

turn off by clicking on this.

You can check your ip address here

http://www.whatismyip.com/

AddThis Social Bookmark Button

ENCRYPTION TOOLS  

GnuPG / PGP

Secure your files and communication w/advanced encryptionPGP is the famous encryption program by Phil Zimmerman which helps secure your data from eavesdroppers and other risks. GnuPG is a very well-regarded open source implementation of the PGP standard (the actual executable is named gpg). While GnuPG is always free, PGP costs money for some uses.


Download:-ftp://ftp.gnupg.org/gcrypt/gnupg/gnupg-1.4.9.tar.bz2


Stunnel
A general-purpose SSL cryptographic wrapperThe stunnel program is designed to work as an SSL encryption wrapper between remote client and local (inetd-startable) or remote server. It can be used to add SSL functionality to commonly used inetd daemons like POP2, POP3, and IMAP servers without any changes in the programs' code. It will negotiate an SSL connection using the OpenSSL or SSLeay libraries.

Download:-http://www.stunnel.org/download/stunnel/win32/stunnel-3.10.exe


OpenSSL
The premier SSL/TLS encryption libraryThe OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and open source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation.

Download:-http://www.openssl.org/source/openssl-1.0.0-beta2.tar.gz

AddThis Social Bookmark Button

INTRUSION DETECTION  

Snort

Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more.

Snort uses a flexible rules language to describe traffic that it should collect or pass, as well as a detection engine that utilizes a modular plugin architecture. Snort has a real-time alerting capability as well, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages to Windows clients using Samba’s smbclient.
Snort has three primary uses. It can be used as a straight packet sniffer like tcpdump(1), a packet logger (useful for network traffic debugging, etc), or as a full blown network intrusion prevention system.

Download:-www.snort.org



Burp intruder

Burp intruder is a tool to facilitate automated attacks against web-enabled applications. It is not a point-and-click tool: using burp intruder effectively requires a detailed knowledge of the target application, and an understanding of the HTTP protocol.

Burp intruder is highly configurable and can be used to automate a wide range of attacks against applications, including testing for common web application vulnerabilities such as SQL injection, cross-site scripting, buffer overflows and directory traversal; brute force attacks against authentication schemes; enumeration; parameter manipulation; trawling for hidden content and functionality; session token sequencing and session hijacking; data mining; concurrency attacks; and application-layer denial-of-service attacks.

Download:-http://portswigger.net/suite/burpsuite_v1.2.01.zip

AddThis Social Bookmark Button

NET BIOS HACKING  

For this tutorial, I used Microsoft’s Windows XP Home Edition OS
What is it?

NetBIOS Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.

How can this be of useful to me?
Most people don’t even know, but when they’re on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.

What do I need?
Windows OSCain and Abel
CODE
(
http://www.oxid.it/downloads/ca_setup.exe)

So first off we need to find a computer or the computer to hack into.
So if your plugged in to the LAN, or connected to the WAN, you can begin.
Open up Cain and Abel. This program has a built in sniffer feature.
A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, And then click the blue cross

AddThis Social Bookmark Button

LINUX HACKING TOOL  

Tuesday, June 2, 2009

NMAP

Feature:- I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (”Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source. Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results.





Squid

Feature:-My Personal Favorite , This is a Great transparent proxy server for Linux platforms. It comes Free with several popular Linux Distributions.

Download URL:- It comes with various popular Linux distributions




AddThis Social Bookmark Button

SUDOSH | HELPFUL FOR AUDITS - WHERE SUDO RIGHTS GIVEN TO USERS  

Sunday, May 31, 2009

SUDOSH


sudosh is a filter and can be used as a login shell. sudosh takes advantage of pty devices in order to sit between the user’s keyboard and a program, in this case a shell.
sudosh was designed specifically to be used in conjunction with sudo or by itself as a login shell. sudosh allows the execution of a root or user shell with logging. Every command the user types within the root shell is logged as well as the output.
This is different from “sudo -s” or “sudo /bin/sh” because when you use one of these or a similar method instead of sudosh to start a new shell then this new shell does not log commands typed in the new shell to syslog, only the fact that a new shell started is logged.If this newly started shell supports commandline history then you can still find the commands called in the shell in a file such as .sh_history but if you use a shell such as csh that does not support command-line logging you are out of luck.sudosh fills this gap. No matter what shell you use, all of the command lines are logged to syslog (including vi keystrokes.)
Sudosh records all keystrokes and output and can play back the session as just like a VCR using sudosh-replay.




AddThis Social Bookmark Button

Design by Amanda @ Blogger Buster