Friday, 1. June 2012
WiFite v2 - linux
“WiFite is an automated wireless attack tool. It’s purpose is to attack multiple WEP and WPA encrypted networks at the same time. This tool is customizable to be automated with only a few arguments. It can be trusted to run without supervision. It was designed for use with pentesting distributions of Linux, such as Backtrack 5 R1, BlackBuntu, BackBox; any Linux distributions with wireless drivers patched for injection. The script appears to also operate with Ubuntu 11/10, Debian 6, and Fedora 16.”

Download in Terminal
wget -O wifite.py http://wifite.googlecode.com/svn/trunk/wifite.py
chmod +x wifite.py
python wifite.py

Permalink

 


Automatic Backup Manager
Automatic Backup Manager supports backing up from local as well as portable devices including external hard drives, USB devices, network, or any other storage device that is compatible with Windows. Automatic Backup Manager tool can be used by everyone no special sklls is required to run this tool.

Download full version FREE
http://www.algologic.in/dailysoftwaregiveaway/automatic-backup-manager-dsg.zip

Permalink

 


Tuesday, 29. May 2012
Micro Niche Websites - Make $100-$5000/mo in Autopilot
Creation of micro niche websites helps in building residual amounts and the process of creation is also simple. Latest trend in earning money online is integrating Google AdSense with micro niche websites. The difficulty in creation of AdSense with Micro niche is moderate.

Start with collecting the keywords and you can take the assistance of keyword search tools to find out the most often searched keywords which have a count lesser than 1000 searches per day and which can yield lesser than 55000 exact matching search results. The domain names have to be selected and also the domain extensions are to be chosen. .INFO and .Net are often preferred for micro niche websites.

A WordPress theme which is simple has to be installed on the selected domain name. Simple themes are preferable as too much shabby looking themes can create wrong impressions on the user or they may get diverted. Your website must have a better appearance hence use a header image or a favicon must be added to it. Articles within a range of 300 to 400 words must be written on your keywords. If the content is unique, it gives you more points by the bot and avoid copying the content or plagiarizing the content as it does not favor the search engine’s search.

New posts are to be added for every 5 days or at least repost the same content at predetermined time. Limited posts must b allowed and this limitation can be around 3 to 4 posts. Your website must load quickly , for this purpose and also to prevent the user from overwhelming by looking at the content of the main page, this limitation is suggested. Use back links with excellent quality. Don’t use back links with low quality as they may end up in spamming.

Few back links with good quality are better than having lots of bad quality back links to your website. Use a large box to place your AdSense, this prevents confusion and also helps in better appearance of the page also increasing the CRT. Several such sites usually in number of hundreds must be developed and an income of about $1000+ can be earned per successful site. Keep creating new content so as to invite large number of visitors and hence better Adsense revenue.

Micro Niche Websites already created a big Micro Niche Business in the Internet Marketing World. Its possible to make $1000+/mo in autopilot with Adsense through Micro Niche Websites. Just get the website, sit back and enjoy the earning.

Micro Niche Website Provider
http://www.micronichebusiness.net/

Permalink

 


Saturday, 19. May 2012
web-sorrow - Linux
A perl based tool used for checking a Web server for misconfiguration, version detection, enumeration, and server information. I will build more Functionality in the future. what is's NOT: Vulnerably scanner, inspection proxy, DDoS tool, exploitation framework. It's entirely focused on Enumeration and collecting Info on the target server

EXAMPLES:

basic: perl Wsorrow.pl -host scanme.nmap.org -S

look for login pages: perl Wsorrow.pl -host 192.168.1.1 -auth

CMS intense scan: perl Wsorrow.pl -host 192.168.1.1 -Ws -Cp all -I

most intense scan possible: perl Wsorrow.pl -host 192.168.1.1 -e -ua "I come in peace"

Download
http://code.google.com/p/web-sorrow/downloads/list

Permalink

 


ClubHACK Magazine May 2012
Contents:

Tech Gyan: Steganography over converted channels
Security and privacy have been a concern for people for centuries. Whether it is private citizens, governments, military, or business, it seems everyone has information that needs to be kept private and out of the hands of unintended third parties. Information wants to be free but it is necessary to keep information private. That need has come about because governments have sensitive information, corporations send confidential financial records, and individuals send personal information to others and conduct financial transactions online. Information can be hidden so it cannot be seen. The information can also be made undecipherable. This is accomplished using steganography and cryptography.
Legal Gyan: Section 66C – Punishment for identity theft
The term identity theft was coined in 1964. However, it is not literally possible to steal an identity so the term is usually interpreted with identity fraud or impersonation. Identity Theft is a form of stealing someone’s identity by pretending to be someone else typically in order to access resources or obtain credit and other benefits in that person’s name.
Tool Gyan: Kautilya
One liner about Kautilya – Kautilya is a toolkit which makes it easy to use USB Human Interface Device (like Teensy++), in breaking into a system. Now let’s understand what does that mean. First let’s understand Teensy++ (I will use Teensy for Teensy++ from now on). It is a USB HID which could be used as a programmable keyboard, mouse, joystick and serial monitor. What could go wrong? Imagine a programmable keyboard, which when connected to a system types out commands pre-programmed in it. It types faster than you and makes no mistakes. It can type commands and scripts and could use an operating system against itself, that too in few seconds. If you can program the device properly keeping in mind most of the possibilities and quirks it could be a really nice pwnage device.
Matriux Vibhag: How to enable WiFi on Matriux running inside VMWare
One of the most commonly asked question on Matriux forums and IRC is how to enable and work with WiFi on a Matriux instance running inside VMWare or any other virtualization software. This tutorial will take you step by step on how to do that. For this tutorial, I am running VMware® Workstation on a Windows 7 Enterprise N Edition which is my Host machine. The Matriux is (obviously) my guest operating system running “Krypton” v1.2. I am using a D-Link DWA-125 Wireless N 150 USB Adapter for this tutorial.
Mom’s Guide: HTTPS (Hyper Text Transfer Protocol Secure)
Hypertext Transfer Protocol (HTTP) is a protocol where communication happens in clear text. To ensure authenticity, confidentiality and integrity of messages Netscape designed HTTPS protocol. Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol (HTTP) with the SSL (Secure socket layer)/TLS (Transport layer security) protocol. It provides encrypted communication and secure identification of a network web server. HTTPS encrypts and decrypts the page requests and page information between the client browser and the web server using a secure Socket Layer (SSL). HTTPS by default uses port 443 as opposed to the standard HTTP port of 80. URL’s beginning with HTTPS indicate that the connection between client and browser is encrypted using SSL.
Code Gyan: Don’t Get Injected – Fix Your Code
When I began doing security review for web applications, one common issue that I encountered was ‘SQL Injection’. Developers used to pose several questions at me saying that their software is secure as they had followed several measures to mitigate this insidious issue. The main mitigation adopted was to use Stored Procedures or input validation. While this does reduce certain type of Injections, It doesn’t prevent all. In this article, I will explain what SQL Injection is and what one can do to prevent it.

Download
http://chmag.in/issue/may2012.pdf

Permalink

 


Sunday, 13. May 2012
BitCoin - 18,000 Bitcoins Stolen
It’s believed that at least 18,000 BTC ($90,000 or 68,000 EUR) have been stolen.
Many criticized the site’s owners for keeping such amounts of currency on hosted systems instead of using offline transactions and disconnecting the wallets from the trading infrastructure, especially after the Linode incident.
Zhou maintains that apart from the Bitcoins, the database was also stolen but the passwords was salted and encrypted using bcrypt. Zhou mentions that the stolen bitcoins are likely to be reimbursed by Bitcoinica in USD. This isn’t the first time Bitcoinica’s been broken into few months ago Bitcoinica’s bitcoin wallet which stored the funds were stolen due to a breach in Bitcoinica’s then webhost Linode.

Permalink

 


Saturday, 12. May 2012
Orion Browser Dumper
THis software is an advanced local browser history extractor (dumper), in less than few seconds (like for Browser Forensic Tool) it will extract the whole history content of most famous web browser, Actually Internet Explorer, Mozilla FireFox, Google Chrome, COMODO Dragon, Rockmelt and Opera.

Download
http://unremote.se/processdl.php?id=37

Permalink

 


Browser Forensic Tool
This software is an advanced local browser history search engine, in less than few seconds it will extract the chosen keywords of most famous web browser, actually Internet Explorer, Google Chrome, Mozilla FireFox, RockMelt, Comodo Dragon and Opera.
The program will attempt to find the keyword(s) in the history title and search, if the keyword is present or suspected to be, it will be display in the result list with his URL and Title.

Download
http://unremote.se/processdl.php?id=36

Permalink