This Blog Is For Educational Purposes Only, I am NOT responsible in any way for how this information is used, Use It At Your Own Risk..

Our User's

Search

04 March 2012



Hey friends recently i make A tips how to trace facebook user or ur friend. this tips is easy  i try my best to simplify it. so read the post carefully.
 Ago some days Someone has sent me messages on Facebook from a fake account telling on my girlfriend. she called some of my friends fat and racist and threats on my album pictures. I have a feeling its one of the people i know. Can facebook trace the IP Address of this person to find out who the hell is this? I’ve sent a message to Facebook but they are slow responders. I need to know now. Please help! 

I often see these kind of messages, Someone calling you/your friends “fat” and “racist”? Big deal. It’s the Internet, the most public of public places. It’s completely your fault for adding some “random dude” that you don’t know. You must understand how web applications work.

Anyways here’s the way of doing it:

Now, open start -> select run -> type “CMD”

  • Now chat with your friend
  • and in CMD write “NETSTAT “
  • and it will show all the IP address connected with your IP address.


The Next Step is to Trace that user using his IP address.


To do so we will be using IP tracer service. Go to the below address and paste the IP address in the box that says “lookup this ip or website”. and it will show you the location of the user.

CLICK HERE

It will show you all the information about that user along with his ISP and a Location in the MAP. Now in the MAP Just click on “click for big ip address location” in the big picture you can actually zoom in. and try to recognize the area. If any serious matter just note down the ISP details in that page and contact them about the IP. they will respond you.


Other netstat commands:
-a 
Displays all connections and listening ports.
-e
 Displays Ethernet statistics. This may be combined with the -s option.
-n 
Displays addresses and port numbers in numerical form.
-p
 proto Shows connections for the protocol specified by proto; proto may be TCP or UDP.
-s 
option to display per-protocol statistics, proto may be TCP, UDP, or IP.
-r
 Displays the routing table.
-s 
Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the
-p
 option may be used to specify a subset of the default.
That's it.

Please Share The Article On Facebook And Other Social Networks To Help Us Little.

03 February 2012

IP Sniffing

An ethical hacker follows processes similar to those of a malicious hacker. The steps to gain
and maintain entry into a computer system are similar no matter what the hacker’s intentions
are.These are the five phases that hackers generally follow in hacking a system. The
following sections cover these five phases.

Phase 1—Reconnaissance

Phase 2—Scanning

Phase 3—Gaining Access

Phase 4—Maintaining Access

Phase 5—Covering Tracks





Passive reconnaissance involves gathering information regarding a potential target without
the targeted individual’s or company’s knowledge. Passive reconnaissance can be as simple as
watching a building to identify what time employees enter the building and when they leave.
However, it’s usually done using Internet searches or by Googling an individual or company
to gain information. This process is generally called
information gathering
. Social engineering
and dumpster diving are also considered passive information-gathering methods.


Sniffing the network
is another means of passive reconnaissance and can yield useful information
such as IP address ranges, naming conventions, hidden servers or networks, and other
available services on the system or network. Sniffing network traffic is similar to building
monitoring: A hacker watches the flow of data to see what time certain transactions take place
and where the traffic is going.


Sniffing is the use of a network interface to receive data not intended for the machine in which
the interface resides. A variety of types of machines need to have this capability. A token-ring
bridge, for example, typically has two network interfaces that normally receive all packets
traveling on the media on one interface and retransmit some, but not all, of these packets on
the other interface. Another example of a device that incorporates sniffing is one typically
marketed as a “network analyzer.” A network analyzer helps network administrators diagnose a
variety of obscure problems that may not be visible on any one particular host. These problems
can involve unusual interactions between more than just one or two machines and sometimes
involve a variety of protocols interacting in strange ways.
Devices that incorporate sniffing are useful and necessary. However, their very existence
implies that a malicious person could use such a device or modify an existing machine to snoop
on network traffic. Sniffing programs could be used to gather passwords, read inter-machine
e-mail, and examine client-server database records in transit. Besides these high-level data, lowlevel
information might be used to mount an active attack on data in another computer
system. 


Sniffing: How It Is Done
In a shared media network, such as Ethernet, all network interfaces on a network segment have
access to all of the data that travels on the media. Each network interface has a hardware-layer
address that should differ from all hardware-layer addresses of all other network interfaces on
the network. Each network also has at least one broadcast address that corresponds not to an
individual network interface, but to the set of all network interfaces. Normally, a network
interface will only respond to a data frame carrying either its own hardware-layer address in
the frame’s destination field or the “broadcast address” in the destination field. It responds to
these frames by generating a hardware interrupt to the CPU. This interrupt gets the attention
of the operating system, and passes the data in the frame to the operating system for further
processing.
Note Esniff.c is a simple 300-line C language program that works on SunOS 4.x. When
run by the root user on a Sun workstation, Esniff captures the first 300 bytes of each
TCP/IP connection on the local network. It is quite effective at capturing all
usernames and passwords entered by users for telnet, rlogin, and FTP.
TCPDump 3.0.2 is a common, more sophisticated, and more portable Unix sniffing
program written by Van Jacobson, a famous developer of high-quality TCP/IP
software. It uses the libpcap library for portably interfacing with promiscuous mode
network interfaces. The most recent version is available via anonymous FTP to
ftp.ee.lbl.gov.
NetMan contains a more sophisticated, portable Unix sniffer in several programs in
its network management suite. The latest version of NetMan is available via
anonymous FTP to ftp.cs.curtin.edu.au in the directory /pub/netman.
EthDump is a sniffer that runs under DOS and can be obtained via anonymous FTP
from ftp.eu.germany.net in the directory /pub/networking/inet/ethernet/.


Sniffing: How It Threatens Security


Sniffing data from the network leads to loss of privacy of several kinds of information that
should be private for a computer network to be secure. These kinds of information include the
following:
# Passwords
# Financial account numbers
# Private data
# Low-level protocol information

The following subsections are intended to provide examples of these kinds
Avoiding Transmission of Passwords


The most glaring security hole beyond simple loss of privacy is the opportunity for a sniffer to
gather passwords. The best way to deal with this problem is simply not to transmit cleartext
passwords across the network. Simply transmitting an encrypted password that could be
captured and replayed by a sniffer is also not acceptable. Several different methods are in use to
provide this kind of protection:


# The rlogin family of protocols
# Using encrypted passwords
# Zero knowledge authentication





The rlogin Family of Protocols


The rlogin protocol, originally used with Unix-to-Unix terminal sessions, uses end-to-end
mutual trust to avoid the transmission of any form of password. The protocol requires that the
server trust the client to authenticate the user. The user places a file on the server indicating
what combinations of username and hostname may connect to a particular account on
machines using the server. The user may connect from these without presenting any further
credentials such as a password.


Using Encrypted Passwords
Another solution is to use encrypted passwords over the network. You must use caution,
however, when simplifying this technique. Even with encryption, a sniffer can still record the
encrypted password and decipher the encrypted password at his or her leisure. One way around
this is to use an encryption key that involves the current time. If the sender and receiver are
closely synchronized, the sniffer must replay the encrypted password within one tick of the two
machines’ shared clock. If the sender and receiver are widely separated, however, this technique
becomes less practical and effective because shared clocks will lack sufficient time resolution to
prevent an attacker from using a quick replay. One way around this lack of close synchronization
is to set a limited number of attempts at typing the password correctly.


Zero-Knowledge Authentication


Another mechanism for secure authentication without passwords is zero-knowledge proofs.
Networks that use this system have a client and a server that share what is in essence a very
long sequence of digits. When the client connects to the server, the server queries the client
about a set of digits in a small set of positions in the sequence. Because the number of digits in
the sequence is very long, knowledge of a few digits by a sniffer is not sufficient. The server
will query for a different set of positions each time the client connects.


Employing Encryption for Entire Connection/Session


Public key cryptography can manage the authentication process to prevent password sniffing
but is not practical for entire terminal sessions or TCP/IP connections. Public key cryptography
is sometimes called asymmetric because different keys are used for encryption and
decryption with no practical way to compute one key from the other key. Classical, symmetric
techniques are much more computationally simple and practical for entire sessions. Just as
public key cryptography can be used to authenticate a user, it can also be used to solve the key
distribution problem of a symmetric encryption technique. Each sender receives the key
electronically with the key encrypted by a public key technique. Thus, the key cannot be
sniffed and used to decrypt the rest of the session.
One such mechanism employing the RSA public key encryption algorithm is the secure socket
layer (SSL) that is being promoted for use with the Web. Because the entire contents of a TCP
connection are encrypted, you can send credit card numbers over the Internet without
worrying that someone will intercept them at one of the many routers between the user’s Web
browser and the merchant’s Web site. You can use SSL as a layer on top of TCP for any server
that might otherwise use raw TCP.

23 December 2011

How to break Linux root password

Well cracking the linux password is not a very difficult job when u login by root you can do that directly by 
[-]#passwd
he will ask u to type your new unix password ,enter the new unix password.
then he will ask u to retype password ,do the same
u can break any unix account password by this method
for "root" u don't need to write username of root while using "passwd" command,ucannot break password of root by any normal user.

now suppose u r administrator and u forgot ur password then on boot loader screen 
press "E"
then edit first line of boot loader and type
........................................... 1 and press "b" to boot from single user mode
then it will throw u to shell prompt
sh....#
then use "passwd "command to change the password of root
sh....#passwd
now he will ask u to type ur new password,and retype it 
after doing this use reboot command and start the system in runlevel 3 or five and type your 
new root password..

18 December 2011

How To Prevent & Remove Facebook Malware or Virus

Problem:- My friend on facebook left me a wall post with a link to a video and i clicked on the link and ever since then ive been having trouble logging into facebook and my friends have been getting emails saying that i wrote on their wall but i didnt and my friends have also been getting wall posts by me with a link to free ringtones and i didnt send that is there anything i can do to fix it?


Solution:- STEP 1: SCAN COMPUTER FOR INFECTIONS

1. The most important thing you can do is make sure you know what you’re up against. Run these online scanners to help figure out what is infecting your system:
-http://housecall.trendmicro.com/
-http://www.pandasecurity.com/homeusers/s…

1A. clean up using internet options [ XP & Vista are the same ]
delete cookies/history/temp files from internet options general page

2. cookie management [ XP & Vista ]
start--control panel--internet options--privacy--advanced--override
select:
allow 1st party cookies
BLOCK 3rd [ tracking ] party cookies


3. clean up windows folders

empty prefetch and temp file folders
start--control panel--[ XP & Vista ] 
local disk drive (c) [ XP ]
O.S. (c)--windows [ Vista ] 
temp folder-- 
[ XP ] file,[ Vista ] organize
XP & Vista
select all
press delete key on keyboard

STEP 4. TURN OFF SYSTEM RESTORE

now go OFFLINE and power back up under SAFE MODE.
while booting up,press f-8 key till you get SAFE MODE utility selection

XP 
1. Turn off Windows System Restore Points:
a. Right Click on My Computer
b. Click Properties
c. Click System Restore Tab
d. Check the box next to: Turn off System Restore on all Hard drives
i. Malware can sometimes be restored from previous restore points, this will help the removal process run more smoothly
2. Click Apply and OK

Vista:
start--control panel--performance,information & tools
open disk clean link--select O.S. (c)--
select more options--
select system restore and shadow copies
--select clean up


STEP 5: 
REMOVE PROGRAMS [ XP ] ADD/REMOVE PROGRAMS/-/[ VISTA ] PROGRAMS & FEATURES


GO TO ADD/REMOVE PROGRAMS [ XP ] TO CLEAR KNOWN MALWARE

1. Before scanning the computer you can remove certain malware programs from the Add/Remove Programs list in the Control Panel in Windows XP
2. Open the Start Menu and select Control Panel
3. In the Control Panel, select Add or Remove Programs
4. Look through the list for anything suspicious
5. Search http://www.google.com for any program you are not sure about.
6. Uninstall and follow the directions on any program that you decide to remove.

VISTA

control panel
default programs
programs & features
click program to highlight
select uninstall

you should always look in your all programs list for the program's uninstall file,failing that:

step 6. DELETING PROGRAMS FROM WINDOWS FOLDERS [ XP ]
start--my computer--local disk drive (c)--windows--programs
delete program
start--my computer--local disk drive (c)--windows--temp folder
click file--choose select all
press keyboard delete key
start--my computer--local disk drive (c)--windows--prefetch folder
same as above
start--your username--documents--downloads or desktop folder
delete program

VISTA HOME PREMIUM:
start--my computer--O.S.(c)--windows--programs
delete program
start--my computer--O.S. (c)--windows--temp folder
click file--choose select all
press keyboard delete key
start--my computer--O.S. (c)--windows--prefetch folder
same as above
start--your username--documents--downloads or desktop folder
delete program


step 7. CLEAN UP USING DISK CLEAN [ VISTA ]

START--CONTROL PANEL--PERFORMANCE,INFORMATION & TOOLS
OPEN DISK CLEAN
SELECT o.s. (c)
CLICK OK
CHECK ALL BOXES WITH A NUMBER TO IT'S RIGHT
CLICK DELETE FILES
CLICK OK
Download, install, and run CCleaner:
in list to left,do NOT check COOKIES or you'll lose them!
-http://www.ccleaner.com/

XP
1. Open the Start Menu, mouse over All Programs> Accessories> System Tools> and select Disc Cleanup
a. Select C Driver and click OK
b. Check any boxes listed here
c. Click OK and Yes
2. Download, install, and run CCleaner:
in list to left,do NOT check COOKIES or you'll lose them!
-http://www.ccleaner.com/

step 8. CLEANING UP THE TASKBAR
XP HOME & VISTA PREMIUM

right click start
select properties
select taskbar
select customize
select always hide or show

step 9. edit the registry:

VERY TRICKY AND DANGEROUS! NOT FOR BEGINNER OR RUBE!!

XP HOME & VISTA:

press windows key [ 4 part flag ] + letter R
enter
regedit

there are 4 key sections to check:

hkey_classes_root
check the list for program--delete

hkey_current_user
check for program--delete
click software--get program--delete
click microsoft--get program--delete

hkey_local_machine
check for program--delete
click software--get program--delete
click microsoft--get program--delete

hkey_users
click default
click software
click microsoft--get program--delete


STEP 10: MALWARE REMOVAL TOOLS

1. Trojans, Worms, Key Loggers, Viruses, and Spyware are all very difficult to remove with just a single program. That is why it is recommend to run several programs to aid in the removal process. I recommend running each of the following programs listed below in order. Not all the programs are freeware and require purchase, you don’t have to run that program but I recommend looking into it if the results come back with your computer still being infected. Still, after all the freeware programs have run through your computer should be clean of any infection.
NOTE: It is recommend to run these programs in Safe Mode for the best results!
2. Freeware – AVG Anti-Spyware: I’m not a huge fan of the AVG Antivirus but I’ve found that their Anti-Spyware does have a good kick to it. It can find a lot of the obscure malware programs some of the others might miss.
http://free.grisoft.com/
3. Freeware – Spybot: This one gets a lot of advertising bots and other malicious programs.
-http://www.safer-networking.org/en/index…
4. Freeware – Ad-Aware 2007: Just because, does a great job finding cookies and small time malware.
-http://www.lavasoftusa.com/software/adaw…
5. Freeware – Spyware Terminator: Although you might have almost cleaned out the complete infection it doesn’t hurt to run this guy to double check your work.
-http://www.spywareterminator.com/
6.Spyware Blaster: This is a powerful utility that helps to block potential spyware problems from browsers and websites.
http://www.javacoolsoftware.com/spywareb…
7. Arovax: anti hijacker [ Opera/-/I.E./-/Firefox ]
get them here
http://browseraddons.friendpages.com

while there,get Firefox and the Firefox security extensions:
1] LinkChecker
2] Dr Web
3] finjan
4] BlockSite

STEP 11: SCAN COMPUTER FOR INFECTIONS

1. Once more I recommend going to the online scanner just to be sure that you were able to remove all the malware infections:
-http://housecall.trendmicro.com/
-http://www.pandasecurity.com/homeusers/s…

STEP 12: TURN ON SYSTEM RESTORE

XP
1. Turn on Windows System Restore Points:
a. Right Click on My Computer
b. Click Properties
c. Click System Restore Tab
d. Uncheck the box next to: Turn off System Restore on all Hard drives
2. Click Apply and OK

Vista
new restore point:
start--control panel--back up and restore
create restore point
create restore point on selected disk
click create
apply ok



STEP 13: SYSTEM RECOVERY

1. In a worst case scenario if the following steps do not clean your system,try using system restore 
follow the same steps you followed to turn off S.R. but instead,click create new restore point

2. in a VERY worst case,use your recovery or re install disk to re install windows..

16 December 2011

Facebook Timeline: How To Enable It With One Click


Easy Method, No Editing:


  • Go here.
  • Click “Get Timeline.” There. It’s enabled, but not published yet.
  • Click “Publish Now.” You’re done..

Still Easy, Edit Before Anyone Sees It:


1. Be sure you’re logged into your Facebook account.
2. Go to the About Timeline page.
3. Click on “Get Timeline.”
4. Scroll down on your timeline and edit or remove any items you don’t want shown. Do that by holding your cursor over the upper right of the item you want to edit, and then make your choice on the drop-down list.
5. From that list you can change the date of the item, add a location, hide it from the timeline, delete the post altogether, or report it/mark it as spam.
6. If you’d like to “feature” any of the posts, click on the star icon to the left of that pencil icon, and that item will be expanded all the way across the page, made larger for all your friends to see.
7. Once you’re satisfied with all the edits you’ve made, either go back to the top of the Timeline and click “Publish Now,” or do nothing and it’ll be automatically published on December 22.