Related Posts Plugin for WordPress, Blogger...

Cheat Point Blank 21122010 21 Desember 2010 Gen-X@n2. Black_Panther

Cheat Point Blank December 21, 2010 Gen-X @ n2. Black_Panther - Still with the customs of Point Blank Cheat Update December 21, 2010, now I will update Cheat Point Blank December 21, 2010 Gen-X@n2.Black_Panther.


Tips:

[*] MINIMIZE : INSERT[ON]
[*] MINIMIZE : DELETE[OFF]
[*] WALLSHOOT : F1[ON]
[*] WALLSHOOT : F2[OFF]
[*] BOMBERMAN : F3[ON]
[*] BOMBERMAN : F4[OFF]

F1 : KARAKTER ROBOT
HEADGER
BERET ASSAULT
F2 : KARAKTER ROBOT
HEADGER
BERET SMG
F3 : KARAKTER ROBOT
HEADGER
BERET SNIPER
F4 : KARAKTER ROBOT
HEADGER
BERET SHOTGUN

F5:RESET CHAR

F12 : SPION

NUM 0 : White Mask
NUM 1 : Black Mask
NUM 2 : Blue Russian Mask
NUM 3 : Kotiki Mask
NUM 4 : Desert Mask
NUM 5 : Flame Mask
NUM 6 : Dual Color Mask
NUM 7 : Iron Mask
NUM 8 : Target Mask
NUM 9 : Pumpkin Mask
INSERT: Jewel Pink Mask
HOME : Gold Mask
DELETE : Skull Mask
END : Jean Pierrot Mask

Cheat Point Blank 21122010 21 Desember 2010 Gen-X@n2.Black_Panther

Read More 0 Comment

Mounting Your TrueCrypt Volumes [Part 3]

This is next Step after Encrypting Ffile Containers and System

Mounting Your TrueCrypt Volumes

Now that you've made your TrueCrypt volumes, you may be wondering, well how the hell do I access these super-duper-highly-secure-and-encrypted volumes?

This depends on the type of drive you created earlier that you are trying to mount. We will run over the three different types.

Mounting an Encrypted File Container

The method is the same for mounting both hidden and normal volumes.

If you wish to mount either the public or hidden portion of a hidden archive, simply use the different password that you specified while creating your volume.

Open TrueCrypt and select the drive letter that you wish to mount your volume to.
Click "Select File" and navigate to the location that you have your file container at and select your container. Then click open.
Next click "Mount", with the drive letter you want your volume to be mounted as.
You will be prompted to enter your password, and load any key-files that you may have used. Leave the box "Cache passwords and keyfiles in memory" unchecked.
After loading any keyfiles, and/or entering your password, click OK.
You will now see your drive mounted under "My Computer" and TrueCrypt as the drive that you selected when you mounted it.
You may choose any available drive from letters A-Z.
It now act's like a normal drive. You can cut, copy, paste anything to and from the drive.
When you are done with the archive, you may dismount it.
Dismount the drive by ensuring that every process or location utilizing that drive is first closed to prevent damage to the volume.
Next, select the drive from TrueCrypt, and select Dismount. The drive will disappear from TrueCrypt and from My Computer

    Mounting a USB Drive or Encrypted Drive Partition
    There are two ways to use TrueCrypt with a USB/Flash Drive/External Hard Drive.
    Encrypt the entire drive so that there is no empty space left on it.
    - This is the method outlined earlier under "Encrypting a USB Drive or Encrypted Drive Partition".
    It will require you to have TrueCrypt installed on the computer that you are trying to mount the removable media to.
    Create an encrypted file folder large (or small) enough to fit onto the flash drive or external hard drive.
    - I am far more fond of this method. It allows you to actually have TrueCrypt on the removable device so that it's contents may be mounted wherever you are. I highly recommend this method over the first for removable storage.
    If using this method, the way to mount the drive is exactly the same as mounting an Encrypted File Container because, well, that's exactly what it is.

      If you have for some reason decided to encrypt your entire external hard drive or flash drive, then you will need to follow a slightly different set of instructions which is outlined below.

      Remember that for this way, you need to have TrueCrypt installed on the computer in order to mount the volume.
      Open up TrueCrypt, and this time, instead of clicking "Select File", click "Select Device".
      Have your device (USB/External HD) already connected to the computer.
      Next select your device from the list of available devices and partitions, then click OK.
      From here on out it is just like mounting a file container. If you initially created a hidden folder on your device/drive, you can enter a differnet password to get to that area of the drive.
      It will then become visible under TrueCrypt, and My Computer, as the drive letter that you specified for it when mounting.
      To dismount, make sure all folders and processes utilizing the drive are closed, then simply highlight the drive in TrueCrypt and select "Dismount".

        Mounting a System Partition or Entire System Drive


        This is the easiest drive to mount. Once you turn on the computer with the encrypted hard drive, you will be prompted to enter the password at a command line looking screen.

        Upon entering the correct password, your operating system will boot.

        If you wish to disable TrueCrypt in the task bar after booting your system, follow these steps:
        Open TrueCrypt, and under settings, at the top, select preferences.
        Uncheck the box "Start TrueCrypt Background Task" under "Actions to perform upon logon to windows"."
        Click OK and then Exit. Restart to see the changes take place. You will notice that TrueCrypt no longer is int he task manager, and that it is not running in the processes under Task Manager

          Useful Tips and Tricks
          Tip #1: When working with detected files, malware in particular, it can often times be frustrating when your Anti-Virus deletes the files that you are using.
          To avoid this problem, add an exclusion in your Anti-Virus as an entire drive letter, such as drive Z:\. Then create a TrueCrypt file container, and inside the TrueCrypt volume, keep all the files that are detected, along with all your hacking material.
          Mount this file container as that drive letter you added to your exclusions list in your AntiVirus.
          This keeps all of your sensitive files safe from prying eyes, and allows you to scan your entire computer for infections, with the TrueCrypt volume dismounted, without worrying about false positives.
          Nothing gets in, and nothing gets out, without your permission.
            Tip #2: Think about setting up a Virtual Machine that you do alot of your hacking from, and keep this in a TrueCrypt container.
            This will make it so that some of the temporary files, time, and system logs that Windows and other operating systems keep are never found, and there will be no evidence, or time log against you in case of a lawsuit.
            You can use your normal operating system, but you need to be good at deleting your logs using a secure deletion method.

              What does Hannibal recommend I do to enhance computer security and avoid getting in trouble?

              I recommend five main things.

              First, use a VPN + Socks/RAT proxy to Hide Your Ass and avoid being aprehended in the first place.
              Truecrypt is your second line of defense.
              And if you decide, your third line of defense is a hidden file container.

              Secondly, you must have whole drive encryption. I don't care if you have multi-booting operating systems or not, but whole drive encryption is a must!

              Third, I recommend that you keep everything that is hacking related or otherwise illegal locked inside a highly secure file container on your hard drive somewhere. Make this container as big as you need.

              Fourth, use a strong password! I'm talking dozens of characters long. I gave some hints earlier about how you can memorize a password of this length. DO NOT write it down.

              Lastly, if you are not going to reformat your entire hard drive, wipe the data, and start over with a clean slate, which I recommend - nothing beats a fresh reformat, then you need to wipe down the free space of your hard drive using a secure deletion method.

              How can I wipe the free space on my hard drive using a secure deletion method?
              Download CCleaner from this link.
              Install and run the software.
              Go to Options > Settings > "Secure Deletion" Change drop down box to Gutmann (35 passes).
              Click on Cleaner on the left hand side.
              Down at the bottom, under "Advanced", check the very bottom box, "Wipe Free Space".
              This, most likely is going to take a ton of time depending on your hard drive space and computing speed. Just be patient with it, this is very important.

                Read More 0 Comment

                Encrypting File Containers and System Drives [Part 2 before]

                Next Part After Complete Truecrypt Tutorial

                To start with, you're going to need to download and install TrueCrypt from this link. Simply select your operating system.

                If you are going to be encrypting a flash drive or external hard drive with TrueCrypt that you want to take with you wherever you go, and use the flash drive on computers that don't have TrueCrypt installed, you'll need a portable version of TrueCrypt that can be found here.

                It is a clean download link. If you don't trust me, don't download it, or scan it on VT.

                You can get it yourself by navigating to the directory you have TC installed to, and copying all the files in that folder to your flash drive or external HD.

                Simply copy the folder to your flash drive and you will be able to mount any file after opening TrueCrypt.exe

                There is another way to mount an encrypted flashdrive, but I'll go into that later.

                Creating an Encrypted File Container

                Use this method if all you want to do is create a file as big as you want with encrypted contents that can be stored anywhere, and then mounted as a drive letter through TrueCrypt.

                Method #1 does not have the "suitcase with a false bottom" effect talked about earlier that Method #2 does. But both have their advantages and disadvantages.

                Method #1: No Hidden Archive
                1. Open TrueCrypt after you have it installed. Then select "Create Volume".
                2. From the three choices, select "Create an encrypted file container"
                3. Click Next and then select "Standard TrueCrypt Volume".
                Click next again.
                4. Click "Select File" and navigate to the location on your hard drive where you want your volume to be, and specify a name for it.
                You actually have to give it a name, rather than just select a file. As you can see, I simply named mine "Volume 2", as I already have a Volume 1 that I use.
                You can move and re-name this after it is created.
                5. Make sure that the box "Never Save History IS Checked". And click next.
                6. Choose your encryption and hash algorithms.
                All methods are very strong and you're safe with them all. You can just leave them as the defaults (AES & RIPEMD-160).
                7. Enter the size of the volume that you wish to create.
                8. Enter your desired password. Ideally, make it longer than 35 characters.
                I don't recommend using keyfiles, because they can get deleted and you will be unable to recover the data in the archive.
                Just use a really good password consisting of uppercase, lowercase, special characters, and numbers.
                If you can't think of a password that is that long, try combining a few differnet passwords you may know, maybe a bank account number, some song lyrics, and keyboard configuration.
                Just basically anything that's going to get you to that length.
                This step is critical. Passwords are the biggest weakness.
                9. Next just move your mouse around randomly for as long as you have patience to do so, and then select format.
                10. Depending on the size of volume you chose to make, it may take a while to create a volume.
                11. That's it you're done!

                Method #2: File Container with Hidden Archive
                1. Open TrueCrypt after you have it installed, on the tabs at the top, select the drop-down menu "Volumes"
                2. Click "Create New Volume"
                3. From the three choices, select "Create an encrypted file container"
                4. Click Next and then select "Hidden TrueCrypt Volume". Click next again.
                5. Select "Normal Mode" from the two options available.
                You can experiment with Direct Mode if you wish, but it requires you to have a volume already made, that you wish to convert into a hidden archive.
                6. Click "Select File" and navigate to the location on your hard drive where you want your volume to be, and specify a name for it.
                You actually have to give it a name, rather than just select a file.
                The name and location can be changed after creation.
                7. Click next to begin specifying the options for the outer volume.
                This is the part of the volume that you are going to be giving up to someone in case something very bad happens.
                Ideally you should still use a strong password, and posssibly keyfiles to make it look legitimate.
                8. Next click "Open Outer Volume" and put in some documents that are somewhat sensitive that you may have a legitimate reason to hide.
                Examples of this could be your bank account statements, a text file containing your own passwords, documents outlining how to make explosives. Use your imagination.
                But make sure that whatever you put in there isn't going to get you in too much trouble, but that it still explains your purpose for using TrueCrypt.
                9. Click next. Now we begin to specify the settings for the hidden volume. It is important that you make this one stronger than the first with regards to password length etc.
                10. Next specify the space you wish your archive to fill.
                You are limited to the difference of the space between what you initially made your Outer Volume, minus the contents you put in your Outer Volume. e.g. (Outer Volume Space - Contents of Outer Volume = Max Space Available for Hidden Archive).
                So it's important to make sure that your Outer Volume is initially created with an adequate size for both your Outer and Hidden Volumes.
                11. Next enter your password and use and key-files that you may want for your Hidden Archive. If you still haven't got if yet, you need to use a separate password for both your Outer and Hidden Volumes.
                12. Depending on the size of volume you chose to make, it may take a while to create a volume.
                And then you're done!
                For instructions on how to mount and use your TrueCrypt file container see refer to the section "Mounting Your TrueCrypt Volumes"

                Encrypting a USB Drive or Drive Partition
                1. Insert the flash drive or connect the external hard drive to the computer.
                2. Open TrueCrypt after you have it installed, on the tabs at the top, select the drop-down menu "Volumes".
                3. Click "Create New Volume".
                4. Select "Encrypt a non-system partition/drive".
                5. Select whether you'd like to create a standard or hidden TrueCrypt volume.
                If you don't understand what these are, refer to an earlier section.
                For this demonstration, we will be creating a standard volume.
                If you are creating a hidden volume on a USB or system drive, the steps are the same as creating a hidden file container.
                6. Hit next, and then click "Select Device". This will bring up a list of all the drives attached to the computer.
                7. Select the drive or partition that you wish to encrypt from the list.
                8. Now there are two options at this step.
                If you have data on the drive that you wish to preserve, select "Encrypt partition in place" - it will take longer, but nothing will be deleted.
                This only works on NTFS Drives.
                Alternatively, if you don't really care about anything on the drive, or make a backup you plan on moving in, you can select "Create encrypted volume and format it" - This will delete all data on the drive!
                9. Next select your encryption methods.
                10. Enter your desired password.
                Ideally, make it longer than 35 characters.
                I don't recommend using keyfiles, because they can get deleted and you will be unable to recover the data in the archive.
                Just use a really good password consisting of uppercase, lowercase, special characters, and numbers.
                If you can't think of a password that is that long, try combining a few differnet passwords you may know, maybe a bank account number, some song lyrics, and keyboard configuration.
                Just basically anything that's going to get you to that length.
                This step is critical. Passwords are the biggest weakness.
                11. Next click "Format" a dialog box will appear notifying you that all data on the drive will be deleted. Click OK to continue formatting.
                12. Depending on the size of volume you chose to make, it may take a while to create a volume. And then you're done! 
                For instructions on how to mount and use your TrueCrypt volume, refer to the section "Mounting Your TrueCrypt Volumes"


                Encrypting a System Partition or Entire System Drive

                This is the method you would use if you are interested in full drive encryption. You will need to have TrueCrypt installed on your computer in order to do this. At this time, you are unable to run TrueCrypt in portable mode to encrypt your whole computer.

                We are also not going to go into hidden operating system's and duel boot setup's right now, as there are many YouTube video tutorials and articles online that outline this beautifully, and it is beyond the scope of this tutorial, as there are many possibilities.

                With the instruction below, you will simply learn how to encrypt your whole hard drive to be decrypted upon boot after the correct password is entered.

                Furthermore, if you decide that full drive encryption is not for you, you may decrypt it permanently, and also change the password if you desire.

                It is good advice to back everything up onto external hard drives before using this method in case something goes bad, and you loose your data, but it is not necessary.

                In my experience, you will not notice your computer speed reduced at all by encrypting your entire hard drive.

                1. Open TrueCrypt after you have it installed, and then click on "Create Volume".
                2. Select "Encrypt the system partition or entire system drive" and click next.
                3. Select "Normal" and click next. You are free to experiment with the any other options, but I recommend starting with a normal archive just to get your feet wet.
                4. Now when selecting which area to encrypt, I recommend you just select "Encrypt the whole drive".
                You may choose the other one but the setup will change a little, and it is more for those with multi-boot setups.
                5. Next it will ask you whether you want to encrypt the "Host Protected Area".
                I recommend that you do not encrypt this (e.g. select NO), but again it is up to you to know whether your computer manufacturer uses these areas to store data or not.
                So assuming you selected No, click next to continue.
                6. Next click Single-Boot. Unless you have multiple operating systems and decide you want the other's encrypted as well.
                The majority of users here probably only have a single boot system.
                7. Now choose your encryption and hash algorithms. As noted earlier, all methods are very strong and you're safe with them all. You can just leave them as the defaults (AES & RIPEMD-160). If you wish to research more on the methods, and come to a conclusion on which is best, feel free to do so.
                8. Choose the password that you will use every time your computer is turned on.
                Do NOT forget this password. EVER.
                If you decide to change this later, you may. Also note that key-files are not supported for full drive encryption.
                9. Next just move your mouse around randomly for as long as you have patience to do so, and then select next.
                10. You will now have to create a "Rescue Disk" for three reasons that are outlined in the TrueCrypt dialog box.
                Please read over these steps and become familiar with them.
                The rescue disk will basically allow you to boot your operating system from a disk to repair it if something becomes damaged.
                Even if someone, including you, finds this disk, they will be unable to boot the computer without knowing the password. So again, DO NOT forget your password.
                So select the location where you want the save the ISO, and name the file.
                11. You will now need to burn this ISO to a disc.
                If you are confused about how to do this, or need software, TrueCrypt has some links to free software that you can use here.
                I recommend ImgBurn for burning ISO files.
                It can be found for download here.
                12. Upon successfully burning the ISO file to the disc, you can click next, and TrueCrypt will verify that you have done it correctly.
                13. Now you will have to decide what kind of Wipe Method you want to use.
                Depending on you computer's speed, and your patience, you can choose a different wipe method over another.
                This step basically help's keep the data secure and unrecoverable.
                Of course I recommend the Gutmann 35-pass method, but this is not appropriate for everyone. However, I suggest that you at least use SOME method of wipe.
                Please note that you will still be able to use your computer if you decide to use the Gutmann or DOD methods, it will simply run in the background when your computer is started until it finally finished wiping and encrypting.
                Just as an example, I have a 1TB hard drive, and when encrypting it, I used the Gutmann method. It took almost 4 days of running it non-stop on 8GB of RAM and an i5 processor.
                14. After you have decided on a Wipe method, TrueCrypt will want to make sure everything is going to work properly in a System Encryption Pretest. Click Test.
                A dialog box will appear with instructions about what's going to happen, and what to do if something malfunctions.
                I recommend copying the contents of this to a text file and e-mailing it to yourself in case you need to read it from another computer.
                15. You will now have to restart your computer. Click "Yes" to restart.
                16. Upon booting up your computer, you will come to a black CMD screen which says "TrueCrypt Boot Loader 7.0a - Enter Your Password" etc.
                17. You will need to enter the password you chose here. It will then flash "Booting" across the screen and your operating system will be loaded like normal.
                18. Once your computer is booted, TrueCrypt will be loaded and it will tell you that the Pre-Test was completed successfully.
                Next click Encrypt to start encrypting. It will give you another dialog box pop-up. It is a good idea to copy this down in a text file and e-mail it to yourself like the last set of instructions.
                19. Now it will start encrypting your hard drive.
                Depending on whether you chose a wipe method or not, and how large your hard drive is, this can take anywhere from an hour or so all the way up to weeks before it completes.
                As explained earlier, you can still use your computer while this process works in the background.
                20. After it is done encrypting, TrueCrypt will now tell you that it has completed the encryption successfully. Hit "OK", and then finish.

                Read More 0 Comment

                Tips Trick - Complete TrueCrypt Tutorial [Part 1]

                TrueCrypt Tutorial
                Authored By: Hannibal

                Introduction

                Why are you writing this tutorial?

                I have decided to put together a tutorial on this topic simply because I feel TrueCrypt is not being utilized by many, when it is really a no-brainer that almost everyone on this forum should be using it.

                I can't tell you how many times I've team-viewed with someone only to see a folder on their desktop titled "Hacking Sh!t", or "RAT"/"Cybergate".

                Look at your desktop and file folders right now.

                If you are one of these people that have any hack tools, other people's documents/passwords/logs/virtual machines on your computer which could get you in deep legal trouble, this tutorial is for you.

                Furthermore, the Cryptography, Encryption, and Decryption section is a fucking mess right now with everybody asking for and offering Crypt's. This is an attempt to clean it up.

                I have also seen some people asking questions about how to use TrueCrypt, yet haven't seen a proper and complete tutorial put together on the topic.

                What is TrueCrypt?

                TrueCrypt, for those who don't already know, is an encryption software for Windows 7/Vista/XP, Mac OS X, and Linux.

                It is basically a way of creating areas of your hard drive that are encrypted so that you can hide sensitive data and information there.

                Furthermore, you are able to encrypt your entire hard drive so that at boot, your computer will not be able to start without entering the correct password.

                This excerpt from TrueCrypt's website offers a more detailed explanation than I can provide:

                TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted or decrypted right before it is loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc).

                Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on the fly (in memory/RAM) while they are being read or copied from an encrypted TrueCrypt volume. Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on the fly (right before they are written to the disk) in RAM. Note that this does not mean that the whole file that is to be encrypted/decrypted must be stored in RAM before it can be encrypted/decrypted. There are no extra memory (RAM) requirements for TrueCrypt. For an illustration of how this is accomplished, see the following paragraph.

                Let's suppose that there is an .avi video file stored on a TrueCrypt volume (therefore, the video file is entirely encrypted). The user provides the correct password (and/or keyfile) and mounts (opens) the TrueCrypt volume. When the user double clicks the icon of the video file, the operating system launches the application associated with the file type – typically a media player. The media player then begins loading a small initial portion of the video file from the TrueCrypt-encrypted volume to RAM (memory) in order to play it. While the portion is being loaded, TrueCrypt is automatically decrypting it (in RAM). The decrypted portion of the video (stored in RAM) is then played by the media player. While this portion is being played, the media player begins loading next small portion of the video file from the TrueCrypt-encrypted volume to RAM (memory) and the process repeats. This process is called on-the-fly encryption/decryption and it works for all file types, not only for video files.

                Note that TrueCrypt never saves any decrypted data to a disk – it only stores them temporarily in RAM (memory). Even when the volume is mounted, data stored in the volume is still encrypted. When you restart Windows or turn off your computer, the volume will be dismounted and files stored in it will be inaccessible (and encrypted). Even when power supply is suddenly interrupted (without proper system shut down), files stored in the volume are inaccessible (and encrypted). To make them accessible again, you have to mount the volume (and provide the correct password and/or keyfile).

                Source: http://www.truecrypt.org/docs/

                Why should I use TrueCrypt?

                TrueCrypt is a must for anyone doing anything illegal or blackhat through the use of a computer.

                Even if you are not participating in blackhat activities, there are still a plethora of reasons, limited only by your own creativity, as to why you would want to use TrueCrypt.

                There is an interesting story going around about one individual that used TrueCrypt and avoided certain jail time because of it.

                For those that don't feel like reading it, basically the story is that this individual downloaded "maybe 30" CP images to see what it was like and ended up getting raided because of it. All of his computers were seized, and he was taken into custody.

                Upon analyzing his computer, they agents hit a dead end once they found that he had used whole drive encryption on all of his hardware.

                I'm sure there's more to the story that he has you believe about him not being involved in CP, but nevertheless, the story goes as follows:

                This isn't meant to be advertising for or against computer encryptions. Facts are, I encrypted my computer and it saved my life, my reputation and everything I have.

                In February 2004 my house was raided by the FBI. They came with the full van and armed agents. They rushed in, presented a warrant and mentioned they had proofs somebody here had downloaded child pornography. Now understand this: this isn't a whole child pornography is good / child pornography is bad story. I don't know if people who watch child pornography turn into pedophiles or not (I don't think they do). I am not saying what I did was good, or even legal.

                I had downloaded some child pornography. Not a lot of it, maybe 30 pictures. I am NOT sexually attracted to children and promptly deleted most of them. Since I had a large pornographic collection, there might have been a few I wasn't able to find, and delete. I never watched these pictures or masturbated to them. That being said, I accept my responsability of downloading them. One thing I should say: I downloaded them all in one day, without knowing it was actual pornography (i.e. downloaded a file that wouldn't indicate it contains child pornography).

                They promptly took my computer, my external external hard drive and my laptop. They took my parents' computer as well. I was detained for interrogation.

                And I was smart.

                The very first thing I said, even before the interviewer dropped his pen, is "I want my attorney." Note: I had no attorney. I was bluffing. The officer said "Sure," took a few notes, and asked me for a few details "to file the case." Yes, he tried to trick me into talking, or at least starting to talk. I immediately repeated: "I want my attorney." That is the ONLY thing I said. I wanted to yell at him "I DON'T GIVE A SHIT ABOUT YOUR FILE" but I did not.

                He eventually complied, asked for his details, at which point I said I did not have an attorney but was in the process of finding one. However, I wanted a public defender. They charged me with possession of child pornography, mentioning my computer as proof. Inside, I laughed a bit, knowing what was waiting.

                I was formally charged, set bail, paid it, and let out. And then began a quite dramatic - but funny - turn of events. When you file charges in my state, the defendant has the right to a speedy hearing AND, of course, a preliminary hearing. I expressed my rights fully (eventually hired an attorney, my public defender didn't do much).

                The police - and FBI - had one problem.

                My hard drives were all encrypted.

                Even my laptop was encrypted. Back home, I took care to properly destroy anything that could ever get me in trouble - even letters I wrote as a child. The police had rapidly checked for more evidence, but as they wouldn't find anything, they did not take the time to look for drugs, drugs equipment and other evidences for other crimes.

                Two weeks later I got a call from someone claiming to work for the FBI. Apparently they were unable to decrypt my hard drives and required my help. I told them to talk to my attorney. I was summoned in and the only thing I told them was "I want my attorney".

                They wanted the password

                -We know you encrypted your data. We even know which program you used. By law, you are required to decrypt the data.

                -I want my attorney.

                They complied, my attorney came (at high cost) and the situation was re-explained to him (I, of course, already told him the situation, and he recommended not helping them a damn). He told them they had no legal stand.

                They formely ordered me to decrypt my data, threatening to charge me with terrorism, and I refused one last time. I was jailed again for a night and new charges were pressed for obstruction (i.e. refusing to help on an investigation).

                Fast-forward a week, I get a formal plea bargain. Ten years as a sex offender, six years probation, if I recognized guilt for possession of child pornography. The other charge would be drop. Quite a good deal, huh? My public defender STRONGLY told me to accept as the conviction rate was "nearly 99%". My attorney told me to invoke my 5th amendment and refuse any cooperation.

                Fast-forward to the preliminary hearing. The judge has to decide whether or not there is enough evidence to prosecute me. He asks for the investigator, who explains the situation, and for the forensic expert. To make a short story, they mention my IP clearly downloaded child pornography. Looks like I'm finished.

                Except for one thing. It has been so long between the download and the raid it was hard to prosecute me on the IP address alone. The record were old, incomplete, poorly filed. My attorney did a good job making the forensic expert admit "mistakes were possible."

                Then came my turn. The expert told the judge they could not find any trace of child pornography because my hard drives were encrypted. He said it was a clear proof I "was hiding something probably worse" at which point he was promptly stopped by my attorney (speculation is not accepted in court). The judge agreed. The expert closed his statement by saying that I had not only encrypted my hard drives, but external drive and laptop.

                Then came my turn. The judge summoned me, asked me a few questions, and finally asked: "Why did you encrypt your hard drive?" Think fast. What could I reply!!!

                "For safety and privacy, your honor. In case of theft."

                "Why do you refuse to decrypt your data?"

                The $1,000 question (note: this is not exactly what was said, just how I recall it). What can I say? Quick, a word with a lawyer. Then, the genius answer:

                "Your honor I would like to invoke my 5th amendment" "Alright".

                Oh, the irony of 5th amendment. If you don't invoke it, you have to incriminate yourself. If you do invoke it, you indirectly admit guilt. Of course that can't be used against you, but whatever.

                There were a few more statements, and eventually the prosecution had nothing. The judge took a moment to think, then said two words that would change my life. "Case dismissed" due to "lack of evidence". I was ecstasic.

                The prosecution party was furious. They closed the file. The judge was about to end the audience when I said:

                "Your honor, they still have my computer. I want it back!"

                "You just had a criminal case dimissed."

                "It's my stuff. I want it back"

                "Very well. Your town's police department has 30 days to give you your material back. Audience finished".

                I was very happy. I felt I added to the insult with that last request. The prosecution party couldn't believe it, after all that work.

                I got my stuff back and it took me a full month before I dated to open my computer again. I was afraid they put a bug or would still try to harass me or incriminate me. I feared they were waiting for me to decrypt me to charge me again. I waited one whole month, then decrypted the file - saved the files I wanted to keep then formatted it all, writing random 0's and 1's.

                So this is it. TrueCrypt certainly saved my life, reputation and money. Without it, there is no doubt the police would have found the pictures, and convicted me. I would be on the same registery as rapists and pedophiles - all this for a mistake of mine. But encryption - and refusing to give up despite the threats of being charged with a much more serious crime - kept me free.


                Is using TrueCrypt illegal?

                In some countries, the use of encryption of any kind is illegal. This includes TrueCrypt.

                If you happen to live in one of these countries, are being charged with a cyber crime, and they find any encrypted contents on your hard drive, you can bet you're in for a rough time.

                They will physically beat the shit out of you and torture you into providing them with the password or key-files to the volume.

                Furthermore, it can even be illegal for you to transmit encrypted files from one country to another.

                I urge you to check up on the laws in your country and ensure that the methods outlined below are actually legal in your country and you're not just digging yourself a bigger hole.

                If you live in the United States, TrueCrypt is legal, and the passwords for your archives are protected under the 5th Amendment.

                If you live in a country where it is illegal, there are things you can do to use TrueCrypt a bit more safely.

                One example is to use a Hidden Archive. This is basically like a suitcase with a false bottom.

                One password - the one you would give to authority's if interrogated and tortured - will open the archive and display certain contents, while the second password will open the same archive but display different contents.

                However, this doesn't change the fact that using encryption is illegal.

                Disclaimer

                I take no liability for consequences of using this tutorial - including hard drive failure, loss of data, and legal action of any kind.

                Do not post or repost this tutorial in part, or in it's entirety on Hack Forums, or any other forum!

                Although I have striven to provide complete accuracy, this information is provided "as is" with no warranty.

                Read More 0 Comment

                Auslogics BoostSpeed 5.0.4.235 + Crack

                Screen Shots:







                AusLogics BoostSpeed - the ideal solution to keep your PC running faster, cleaner and error-free. It's a powerful, all in one system performance and Internet optimizer suite.

                Being the best companion for Windows operating system, it's improving your Internet connection and optimizes your Windows system and other software.

                This results in a performance boost in both Internet connection and systems - without any new hardware, any hardware tweak, and without restricting your system's stability.

                With the help of AusLogics BoostSpeed you can tune up your Internet connection to its maximum performance regardless of its type.

                AusLogics BoostSpeed supports dial-up modems, cable modems, ISDN, DSL, T1, T3 and other types of connections.

                AusLogics BoostSpeed is a software that helps you to speed up your PCard intenet connection.

                Here are some key features of "AusLogics BoostSpeed":

                · Be notified when your system can be optimized;
                · Improve Internet connection performance with Internet Optimization Wizard;
                · Tweak every aspect of your Internet connection manually;
                · View connections statistics, bytes sent/received and traffic by graph;
                · Optimize Internet Explorer, Mozilla, Opera browser;
                · Increase your Windows performance, optimize system memory;
                · Optimize Microsoft Office components;
                · Optimize ICQ, MSN Messenger, Outlook Express and Norton SystemWorks;
                · Stop banner ads with Banner Killer;
                · Check your system for possible optimizations in one go!

                Requirements:

                · CPU: Pentium 120 MHz
                · RAM: 32 Mb (64 Mb recommended)
                · HDD: 10 Mb (+5 Mb when using Live Update)

                Limitations:

                · 15 days trial
                · The 'More Advice' function in 'Syatem Advisor' module is not available
                · The 'File Recovery' function is not available
                · All the 'Registry Maintenance' and 'Speed Up Internet' features are not available
                · Cannot use the 'Erase History' function

                What's New in This Release:

                Disk Cleaner and Track Eraser now load a lot faster
                · deleted the "Cleanup prefetch" category in Windows XP, because it used to slow down all further Windows boots
                · Registry Defrag: significantly improved defragmentation error processing. Now the program gives easier and more detailed explanations of why defragmentation could not be completed
                · Registry Cleaner: fixed bugs in the obsolete key search algorithm
                · Integrator: improved scheduler
                · Internet Optimizer: improved Opera optimization
                · System Advisor: improved some advice functionality
                · System Information: fixed a bug that caused the program to freeze when gathering information about a computer
                · Disk Defrag: improved single file and folder defragmentation algorithm functionality
                · applied various interface improvements
                · corrected localization mistakes

                Virus Scan :

                AhnLab-V3 - 2010.09.05.00 - 2010.09.04 - -
                AntiVir - 8.2.4.50 - 2010.09.03 - -
                Antiy-AVL - 2.0.3.7 - 2010.09.03 - -
                Authentium - 5.2.0.5 - 2010.09.04 - -
                Avast - 4.8.1351.0 - 2010.09.05 - -
                Avast5 - 5.0.594.0 - 2010.09.05 - -
                AVG - 9.0.0.851 - 2010.09.05 - -
                BitDefender - 7.2 - 2010.09.05 - -
                CAT-QuickHeal - 11.00 - 2010.09.03 - -
                ClamAV - 0.96.2.0-git - 2010.09.05 - -
                Comodo - 5970 - 2010.09.04 - Heur.Packed.Unknown
                DrWeb - 5.0.2.03300 - 2010.09.05 - -
                Emsisoft - 5.0.0.37 - 2010.09.05 - -
                eSafe - 7.0.17.0 - 2010.09.01 - -
                eTrust-Vet - 36.1.7835 - 2010.09.03 - -
                F-Prot - 4.6.1.107 - 2010.09.01 - -
                F-Secure - 9.0.15370.0 - 2010.09.05 - -
                Fortinet - 4.1.143.0 - 2010.09.04 - -
                GData - 21 - 2010.09.05 - -
                Ikarus - T3.1.1.88.0 - 2010.09.05 - -
                Jiangmin - 13.0.900 - 2010.09.05 - -
                K7AntiVirus - 9.63.2442 - 2010.09.04 - -
                Kaspersky - 7.0.0.125 - 2010.09.05 - -
                McAfee - 5.400.0.1158 - 2010.09.05 - -
                McAfee-GW-Edition - 2010.1B - 2010.09.05 - -
                Microsoft - 1.6103 - 2010.09.05 - -
                NOD32 - 5423 - 2010.09.04 - -
                Norman - 6.05.11 - 2010.09.04 - -
                nProtect - 2010-09-05.01 - 2010.09.05 - -
                Panda - 10.0.2.7 - 2010.09.04 - -
                PCTools - 7.0.3.5 - 2010.09.05 - -
                Prevx - 3.0 - 2010.09.05 - -
                Rising - 22.63.05.01 - 2010.09.04 - -
                Sophos - 4.57.0 - 2010.09.05 - -
                Sunbelt - 6833 - 2010.09.05 - -
                SUPERAntiSpyware - 4.40.0.1006 - 2010.09.05 - -
                Symantec - 20101.1.1.7 - 2010.09.05 - -
                TheHacker - 6.5.2.1.364 - 2010.09.05 - -
                TrendMicro - 9.120.0.1004 - 2010.09.05 - -
                TrendMicro-HouseCall - 9.120.0.1004 - 2010.09.05 - -
                VBA32 - 3.12.14.0 - 2010.09.03 - -
                ViRobot - 2010.8.31.4017 - 2010.09.04 - -
                VirusBuster - 12.64.17.1 - 2010.09.04 - -



                Read More 0 Comment

                How Hide your Virus in a Picture File Is New Method

                Items Needed:

                * Any Icon Changer
                * A Binder
                * A Brain

                1) Create your virus. We shall call it 'server1.exe' for now.


                2) Get any picture file you want to distribute.

                3) Bind the 'server1.exe' and your picture file with any binder, we'll call the binded file 'virus1.exe'.


                3b) I reccomend Easy Binder 2.0, which comes with a bytes adder and a icon extractor, aswell as some really good packing options. I've uploaded it, virus free, to: http://www.mediafire.com/?igjy4dnn0zb < This will be caught by your AV as "Binder/Kit". It is not a virus, it is a binder than is not undectable. If you don't wish to use it, that's fine, find your own.

                4) Be sure you have 'Hide common extensions' unchecked in your Folder Options.


                5) Change the 'virus1.exe' to '%Picturename%.jpeg - %Email/Web Address%.com'. For example, we'll call it 'HPIC_119.jpeg - test@test.com'.


                .com works the same as .exe, except fewer people actually know that's what it really is.

                6) If you plan on distributing your virus via MSN, please skip to 7. If you plan on distributing your virus via file upload sites, please skip to 8.

                6b.) I reccomend Icon Extractor V3.8 FULL with Serial


                7) You will now need to change the icon from that ugly box. Find the picture you added to the file, and make it an icon. How? Find one of the various online Picture to Icon converters. Once your picture is a .ico, use your Icon Changer program to change the icon of the file to the .ico you just made from the picture. When you send it to people on MSN, it will show a small box of the picture inside.


                8) You will not need to change the icon from that ugly box. Using your Icon Changer program, find the .jpeg icon, and change the ugly box to the .jpeg icon.


                9) Conclusion. Your file will now look like a legit picture to 9/10 people. Some people do know that .com is an extension, but the average computer user will not see any difference, and will download it without hesitation.

                I have never come across a tutorial that explains how to do this, and found this out after hours of online searching. If there is another tutorial, all credits to them, my mistake.

                Credit tips to: Far

                Read More 0 Comment

                How to Hack Websites & Servers from Scratch!!! Step by Step Tutorial for Beginners [Part 2]

                TEMPORARY STOPPING POINT OF GRAMMATICAL EDITING

                There are various scanner tools, e.g. nmap, superscan, and many more. There are various scan methods, some are stealthy, others are not.

                Before i talk about various scanning methods, let me explain to you about TCP connections basics. When you scan your target using TCP communication, there are six TCP flags can be utilized during packet transmission(packets get transmitted during scanning process). A flag will indicate whether the sent packets are syn, ack, fin, urg, psh, or rst packets. These packets sets you in a position on how you want to communicate with the remote host. You can get different info depending on the flag you choose for the scanning.

                TCP establishes three handshakes, syn, syn-ack, ack. What are they?
                When you scan your target using TCP communication, you send a syn packet(syn request), and then target sends you back an ack packet with syn packet. Now, you send an ack packet to the target. So now both machines establish the connection well, like they have made a well established tunnel for a proper guaranteed communication without losing any packets during communicating with each other. A hacker can get caught easily if he uses this method to hack other systems illegally.

                Hackers use non-standard combination of these six flags, which gives them info that are not normally available to the public.

                Have you heard about syn flood?
                syn flood is done by utilizing three handshake by sending "syn" request to the target, so the target receives a syn request and send an a syn-ack back to the originator(you). You ignore the target syn-ack request - when you ignore it, then the three handshakes is not completed, this is called half open TCP connection - In theory, when the target sends you syn-ack, the target allocates some RAM on its machine.

                The amount of RAM on the target machine must be open until it gets response (ack packet) back from you because till now only two handshake has been made,so the TCP connection process is not completed yet. However, there is always a time limit for the RAM to be opened, so if 30 secs passed by & the target did not get the ack from you, the connection will abort(failed TCP handshake - timeout) & RAM will be deallocated.

                The idea here is to send hell alot of packets in few secs so in 30 secs, you can send 40 million packets(lets say one packet size is 1kb) which is heavy on the RAM since the RAM might not have enough memory to carry 40 million packets. Therefore, you force the target to make half open TCP connection attempts, so definitely the target machine will stop responding to legitimate request. In other words, if you send 40 million syn requests to that remote host, it's going to allocate a hell of a lot of ram for those requests. After a while, it's going to eat up all of the ram. Thus, target system goes down. This is called syn flood attack.

                In short, syn flood attack makes the system (i.e. the IP stack or kernel) chokes on the memory allocations (or simply runs out of memory) or the target application (i.e. web server) chokes on the processing load. You got it? Or not yet?! Syn flood is an old technique i just mentioned it here for illustration purposes.

                General Information: these days, SYN floods are used to make systems inaccessible. They have a limited number of half open connections, you use them all, and they can't accept any more SYNs. But again, modern software throws away old SYNs once the limit is reached. Note that different systems will behave differently.

                If you interested in learning more about syn flood, visit
                http://tools.ietf.org/html/rfc4987

                Lets talk about the most common TCP Scan types. There are full scan, half open scan, stealth scan, Xmas scan, and ack scan.

                full scan: this completes 3 way TCP. it is the most effective & gives more accurate results. However, it is not safe and easily traced and detected.

                half open scan: it is the second most effective scanning method, only uses first part of the handshake to get syn-ack but does not send 3rd part (ack) back to the remote host. The idea here is if the remote replies back to you after you have sent syn request, this means the port - we sent the syn to - must be open.

                stealth scan: the idea here is to scan ports randomly(not in sequential order) & reduce the speed of scanning. If you scan all port from 1 to 65536 in sequence, your more visible to be detected, and usually scanning happens so fast, which is unusual since regular program does not connect to port that fast, so this can make it easier to be detected. Therefore you have to scan ports randomly & reduce the speed of scanning. To avoid IDS, you should not use full connection scan with stealth scan, you can use half-open scan(syn). syn is considered a stealth scan. In fact, syn scan is called syn-stealth scan, or you can use Xmas scan with stealth scan which helps you to evade detection, things like that! you get my point i guess.

                Xmas scan: uses fin, urg, and push flags which are used to bypass some firewalls. Xmas scan works with UNIX system, it does not work with Windows system.

                ack scan: this helps you evading IDS not to get you detected. You send only an ack packet to your target, your target won't know how to deal with it since there was no handshake. Thus, ack scan causes open ports in your target machine to return a reset packet(rst), rst packet gives you a hint that the port or service is not filtered between point A and point B, which usually firewal resides in between! Since the port replied you with rst packet this means there is no firewall between A(your machine) & B(port or service on the target machine) and rst packet also gives you an insight that the target port is open ;-). If there is a firewall, your ack packet would not reach to the target port & because of that you won't get any rst packet. In addition, rst packet helps you indentify what system is running on the remote host.

                These are the most common method of scans, there are hundreds of scanning methods! nmap allows you to set your own custom scan type e.g. instead of sending ack flags only, you can send ack flag and rst flag together and see what you get back from target ...

                OK! we have talked about how TCP scanning works in general. Now, i will be talking about UDP & ICMP Scanning ... UDP and ICMP connections most of the times are blocked at the firewall level & even at the host level in some cases. We are going to scan on hosts & ports that respond via UDP. When you scan your target via UDP, there are many problem will occur during that process e.g. you can scan over the ports via UDP, assume you scanned port 1, and port 1 is closed, then host will send ICMP unreachable back to you, which gives an insight that port is closed because you didn't get any UDP response back from target! Making sense,right? Unfortunately, we will never get a response back from target to ensure you that port is open!

                Thats how UDP call works, send the packet & forget it. Lets say we come across port 21, and 21 is open, then port 21 on target machine will not reply back to you because UDP does not give you the guarantee the delivery packets during communication process, it just send the packet and forget, unlike TCP which guarantees the delivery of packets with no loss or corruption. Since we didn't get reply back, then we can assume the port 21 is open *OR* maybe port 21 is closed and ICMP reply got lost somewhere so we didn't get it! A general rule, when you don't get a reply you assume port is open.

                Some high professionals security person purposely configure ports to not to respond a UDP scanning. ICMP scanning is as same as UDP. ICMP scanning is noisy & can be picked by IDS very easily because ICMP sends random several pings to the network instead of a single host(ICMP scanning does a 'ping scanning' - sends ICMP packets - to the whole network instead of a single host). After you finish ICMP scanning, based on the replies you get back from the live hosts, then you can determine that your target network is listening for ICMP traffic and you might to do some exploit based on that. Unfortunately, there aren't alot of ICMP exploits going around, so you are just going to use ICMP for network enumeration, you just do it to see what hosts are up, host A is up , host B is up & host C is up, they are replying for my ICMP. Thus, this let us know these 3 hosts are running on the targeted network and potentially can be a target for us. IDS's are always listening for network scans & alot of network scanners provide a support for ICMP scanning, but do not have a way to make it stealthy! Therefore, ICMP can turn on the IDS alert which tells the security person there is somebody scans your whole network.

                nmap is a great tool that is very popular, it is usually used to scan networks, hosts, ports, and does alot of other stuff. It is very intrusive tool and considered a hacking tool. Using nmap against systems you dont own or dont have permission to scan can be considered illegal. Lets see examples of some scanning method!

                Example of ICMP Scanning(-sP) - this is called ping scan

                nmap -v -sP xx.xxx.xxx.xx > filename

                nmap: represents the program we are running which nmap.
                -v: for increased verbosity, which means bring me extra details of the targeted system. (Optional - as far as i know)
                -sP: the flag that determines the scanning method.
                x's: target IP address.
                > filename: output the results to the newly specified filename. In other words, save results in a file (Optional)

                This above command shows you the systems that are up and running, so this shows what available to us on the targeted network. As a result, you will get simple info that shows you there are number of IP addresses that responded to ping request - Note: there could be alot more machines out there that are not responding to ICMP scanning.

                Lets see an example of UDP scan, UDP scan not so speed.

                nmap -v -sU xx.xxx.xxx.xx

                Results of UDP scan(-sU) give more info than ping scan(-sP). Keep in mind there could be hundreds of other ports are listening on the system which simply don't respond to UDP connection.


                Useful sources relates to scanning methods via nmap:
                http://www.nmap-tutorial.com/pdf/nmap-tutorial.pdf
                http://www.petri.co.il/port-scanning-with-nmap.htm

                ALRIGHT, now you have a good basic understanding about scanning! Next, i will be talking about fingerprinting! So keep learning :-)

                Now lets get deeper! By now we have determined what nodes are running up on the network. So we are ready to gather large info on those live systems we discovered in the previous steps. Ok! now you need to discover what services (application) are running on your target's host. Every (or at least many) port has a service running on it. For example, web server usually are running on port 80. What we have to do is scan ports, see what kind of services(applications) are running on them, try to grab the versions of the services, this will help you to determine the OS as well. This is called 'Port & Service Enumeration(fingerprinting)'. We have to do this step to understand what potential vulnerabilities your target has & how to exploit them.

                Assume after we have scanned our target system, we found our target runs "IIS 5.0 Server" on "port 80". Based on the scanning result, you can say the targer server is running IIS 5.0(IIS is set of Internet-based services, IIS is the second most popular web server - IIS is a Microsoft product), it is known IIS 5.0. has too many vulnerabilities & IIS 5.0 runs on Windows 2000, which Windows 2000 by itself has hundreds of vulns.

                In other words, lets scan ports and services, and do OS fingerprinting, lets identify services on those live host in our target network. Once we know what services are running and what OS are running then we can start exploiting these services! - 'ping/port/service' scans are frequently run together using the same tool.

                NOTE: identifying ports & services is the most critical part in hacking ... PERIOD

                OS fingerprinting is used for determining OS type and version, then we exploit vulns. that resides into the OS. When you fingerprint a target, your targets' OS can be known from the TCP/IP stack, so fingerprinting happens on TCP/IP stack. Why? Because each OS has a unique implementation of TCP/IP, so TCP/IP stack is implemented differently from OS to OS, so an exact same query sent to one machine the respond of the result will be different than the other machine. Therefore, based on the response this can help the scanner determines the OS of the target, because every OS has its own unqiue response when you do OS fingerprinting request.

                When you do a default install of OS, certain services will be installed by default, services that are needed for that OS to work properly, e.g. ports
                137,138,139,and 445 which all combined together to produce Win 2000 OS or above. Another example, a combination of 139 and 445 can determine a certain version of windows such as Win XP or Win 2003, there are lots of ways to determine OS. Another example, if you see a service MS SQL is running on a certain port, you can determine the target OS is not in *nix family, it is in a Win family cause the target is running a Microsoft sql product. Thus, we can say port enumeration or service enumeration can help you in determining OS.

                There tons of popular scanners out there:
                SuperScan - Works good on Win OS.
                Nmap - Works on *nix & Windows, *nix version is much more stable than Win version.

                Most scanners offer full, half, stealth, and UDP scans.

                You are goning to spend most of your time scanning your target machine to know whats available there, so you can exploit the vulns & penetrate the system. Therefore, you have to do some exploration on scanning methods & decide which method of scanning you feel more comfortable with...

                Lets see an example of enumeration style scanning. Just keep in mind, this can be considered hacking! Make sure you do to your system, not somebody's else.

                This is kind of a stealth scan:
                nmap -v -sS -A -sV xx.xxx.xx.xx > filename

                This above request gives you very specific details about your target. sV is for version information identification. Check out the manual to know what these flags do - type "man nmap" to see the manual...

                Alright, after we have fingerprinted services & OS, now its the time to check for various vulns against application(services) & OS running on the target system. This is called vulnerability assessment. To do vulnerability assessment, you can use the tools available, such as nessus. Nessus is free vulnerability assessment, huge database, its the best assessment tool.

                Lets scan vulns on the target system. Lets say target system is win 2000 SP1 IIS 5.0, nessus goes back to its database and check the vulns for win2000 & IIS 5.0. If there is vulns not discovered, vulnerability assessment tool actually can't catch it. However, if nessus couldn't find matching vulns for the target system, it will let you if the system can have some security issues or not. Such tools are considered as Automated Vulnerability Assessment Tools. You have to know about the target system OS so you can do vuln assessment on it. There are vuln assessment OS specific, e.g. MBSA tool(only scans Win OS).

                NOTE: you can do vulnerability assessment manually, this depends on you and your skills. By doing it manually, you can discover vuln. that nobody knows about it, and you can use it for your own use. It is a powerful and very discrete.

                After we determined what systems & what services contain vulnerability, then we can exploit it(means take a chance of this vulnerability to achieve what you want).

                common vulnerabilities out there are:

                OS vulnerabilities
                Webserver vulnerabilities
                Database vulnerabilities
                TCP stack vulnerabilities
                Application vulnerabilities


                Malwares, viruses, trojans, can be used to exploit vulnerabilities.

                There are several automated vulnerability scanners, such as Nessus, Nikto. Security websites is a good resource for vulnerabilities as well, e.g.
                bugtraq, CVE(Common Vulnerabilities and Exposures) sites, etc. Another good source to find vulnerabilities is hacker web sites.

                Lets talk about the tools:

                *Nessus - this is a great vulnerability assessment tool. However, in alot of cases it will perform exploits to see if the OS or service is actually vulnerable or not.

                *Metasploit Framework - this is not vuln assessment tool. It is an exploitation tool, it contains hundrands of exploits helps you to exploit the system by using a nice selection of tools.

                I will explain shortly about the common vulns...

                OS Vulns: OS exploits are used to gain access to the system. OS exploits can used for DoS attacks too. watch the video tutorial. Most OS holes exist from default configuration, services and applications.

                Webserver Vulnerabilities: webservers are the most trageted section. All people contact the webserver, thus you never know the hacker than a normal user. Webservers examples, Apache, IIS, and Tomcat. After you exploit the vulnerability in your target webserver, you can gain many different things, such as root access(the gist), website defacement, DoS(put the server down), theft or alteration data on server, or further penetration into the network.
                Webserver is a great place to start when you want to do a penetration test!

                Database Vulnerabilities: those software vendors who create databases applications such as SQL, Oracle, etc - they dont have security in mind, they care more into effeciency and how to make it easy for the users to handle with the database. They care about making their customers happy without giving that much attention in security issues!

                TCP Stack Vulnerabilities: this is not a common used method to hack systems. Google it!

                Application Vulnerabilities: some examples of application vulnerability, buffer overflow, weak authentication mechanisms, poor data validation(the most common one), and poor error checking.

                ALRIGHT, to discover these vulnerabilities on the target machine you need to do vulnerability assessment. This can be done in two ways, manually or automatically. Manually means you try to discover a vuln. by yourself which eventually you will have vuln. that nobody else knows it & you can use it for yourself or publish it to security sites. Automatically means you rely on a tool that searches for vulns in the target machine, this tool has a database full of vulns. so this 'tool' will only inform you the vulns found in the target machine by relying on 'its' database. We are going to talk about auto vulnerability assessment. The most common & wonderful tool is Nessus, its free open source code!

                Alot of common sense comes into play when analyzing vulns, for example you do not look for a database vulnerability in a webserver, things like that. Another resources, OVAL - gives you a good and basic foundation of vulns assess. methodology, FrSIRT - keeps track of vulns and make exploits of these vulns, you can join a paid subscription and then browse vulns avaialbe in their database and download exploits this is a good source for hacking or security, and websites for posting exploits such as milw0rm, hacking sites.

                Lets have a closer look at nessus tool, nessus is client/server architecture. The process of setting it up is cumbersome. Nessus have about 9000 plugins, therefore it takes time to peroform the assessment. Results can be reviewed in a report. The report includes the vulnerabilities found on the target machine with a short description about the vulnerability.

                Note: you can enable several plug-ins in plugin tab. You can specify range of ports through scan options. To specify the target, you should go to the target tab.

                Once we have done the vulnerability assessment, and knew what vulnerabilities exit. We start gathering exploits of the found vulnerabilities to penetrate the system.

                Lets talk about penetration and access! After all information we have gathered previously, its the time to break the system with the exploits you have.

                Its the time to stop gathering information and start breaking into system. The ultimate goal is to gain the highest level of permissions. Try to use undiscovered techniques and methods. Think out of the box!

                Some of exploits that enable penetration are:

                *Buffer overflows
                *Stack exploits
                *Web vulnerabilities
                *Services/apps that allow unauthenticated access.

                Aside from the standard methods of penetration, lets see an penetration methods, here are some examples:

                *SQL Injection - ability to change queries in the application before its sent into database.

                *Application Error Handling - this can result DoS. Probably one of the most common vulnerability you can find in corporate arenas.

                *Directory Traversal - browse directories you should not be able to do so on.

                *Malformed Packets - one of the more difficult methods of penetration, requires very extensive knowledge of how TCP packets are assembled and disassembled. But once you get used to it, its probably the most effective ways of hacking.

                *Bypassing Access Controls - password cracking is most common means of accessing systems.

                *Social Engineering - i guess you know what it means.

                *Sniffers - take passwords right off the wire, alot of protocls and application such as http & ftp communicate parrwods over the wire in plain text.

                *Session hijacking - it is similar to sniffers, but you don't gain a password because we take off the entire session, hijack the slave's session & act as you are him.

                Usually when you get passwords, you get it encrypted, or hashed or hidden in some way or another. Password cracking can be done in several ways, examples:

                *Brute Force Attack
                - Every password, can and will be broken by brute force attack. It is about the time. Depends on the size of the password.

                *Dictionary Attack - less effective than brute force, relies on list of words or phrases.

                *Hybrid Attack - combination of different tools. It is a combination of effectivence of brute force and dictionary attacks & often using other attack mechanisms, such as cryptanalysis attack (one of the hybird attack).

                You should know that when you do sniffing, you often get usernames & passwords in plain text. However, you can get encrypted passwords from sniffing as well. You will need to use of the cracking techniques discussed above. Sometimes cracking an encrypted passwords can take secs, hours, days, months, or even more!!!

                There is a great software called "Cain & Abel", it sniffs passwords from the wire, cracks it, etc. Once you install it, go to sniffers tab, then move to the found passwords in cracker tab to see what you have got! There is lots to it. You should know these techniques as a security person cause if you don't know it, a black hat will take care of it.

                Now, assume we already have hacked the system. We will try to do different things, such as getting the root, etc. Penetration & compromise got some differences in the meaning. Hacking into system does not mean you have compromised(taking the full control - take over) the system. After you penetrate the system, you can grab the session between client and server, e.g. you keep listening on login sessions, so when the remote user login to google, the session be dropped to you, once you get the session, the remote user won't be able to get into his account he/she will see at page goes blank(disconnected), so he/she may think its a problem in a connection, thus he/she tries to login again & everything works fine! BUT you already got his session, you won't have to go through login page when you want to see his/her email inbox, cause its already among the whole session you have taken.

                Another way to do this, lets say the attacker has compromised the user's system, thus the attacker can let the session drop on his machine, then he takes the session, reads and saves it. After that, he redirects the user to the server, this step will make everything works ok like nothing wrong happen.

                Lets see an example of the above explained steps, after attacker installs "Cain & Abel" application, he moves to "attack base system" & click the sniffer button at the top & click the yellow button(APR Poisoning Button) besides the sniffer button. This APR Poising button trick the attacked system to talk to the attacker instead of normally who it talks to. For testing purposes, go and add various system addresses(IP's) to the list. Let say one of the user amongst those targeted IP's logon into 'google', at the authentication process you will notice varies pieces of info comes to you. You are gathering info by getting into the middle of the communication process. Now view the files you have got in the list, you can see among the lines the username & password of the users' 'google' account in plain text! So how dangerous this can be to your privacy :-/! So be careful....


                Once the hacker gains access to the system. He aims for admin(root) access. He moves up from guest level, to user level, up to root level. Owning the box, means take the system & prevent the admin from controlling the system, as well as preventing other hackers from getting in. So you hackers usually move on from the regular level, to the admin level so they can have full control. A hacker needs privilege escalation to compromise the system well. Some exploits allow buffer/stack overflows to obtain admin access. All it takes is a guest user, then a hacker can perform exploitations locally & there he goes to the root.

                At this point, we did everything up to owning the box. Now our goal is to protect our access. Thus, we want to maintain our access to that hacked system, so we can use it later. You can maintain a system by using such tools, backdoor accounts, backdoor software programs, rootkits, etc. These tools help you maintain access. Some hackers own the box close all other accounts except his account, so the security person shut the system down, reformat the system and start over again.

                By doing this, hacker account will be gone. Once we ensure we have maintained our access to the system, then we want to expand ourselves to other parts of the network. Remember, if you do not do this on your own network, somebody else will take care of it. If he does, i do not think you will be too happy! Once you got an access, and could maintain it successfully. You want to prevent detection or loss of access. There are several methods to maintain access, such as rootkits, OS exploits, erase tracks, install trojans that make you access backdoor, enable null sessions (webmaster usually go to the registry & disable null sessions to keep that vuln. from being exploited, webmasters usually do it once & do not get back to it. You can go there & enable it - NOTE: by enabling null sessions you can give other hackers a chance to hack too), and many more.

                There different ways of system compromise, system compromise usually depends on your goal, examples of system compromising are root access(ultimate goal), data access/theft, DoS, and many more. Keep in mind, compromised systems can be detected after a while.

                Now after a hacker breaks into the system, he tries to portect what he has hacked & erase his tracks. During the attack process try not to be detected so the webmaster don't shut the server off, as well as do not forget to erase your tracks, e.g. you dont want the webmaster to see lots of failed logon in the log files, so you erase tracks to prevent future detection. Typically, get in the network as a shadow or ghost.

                There are many method to evade those IDS so they don't cut off your attack stream. Common methods for evading defenses might be by fragmenting packets(some programs do that e.g. fragroute), port redirectors, encoders(change the flow, the look, and feel of various traffics to pass firewall). After you get in and deceive defenses, you want to go to the log files and erase your tracks. Remember: sometimes you get in a user account then you get into a root by changing permissions of the user account, so you have to remember to set this user permissions back to as it was, things like that - you know what i mean, put yourself in a hackers shoe. Don't delete the whole log files, this can make the security person more suspicious. We want to leave everything as it was so nobody can get a feel that an intruder was here.

                To be safe, you should know where your actions are recorded, delete log files and other evidences that can get you caught, steganography(google it), and evading IDS & firewalls. All actions are recorded in some place on the system or the network. Assume IDS detects you, what do security persons do? Usually when you get detected, they may cut off all the ways for you so you don't get a chance to penetrate, they probably going track you down, or they may decide let you go but watch you the entire time.

                Where are your actions recorded & what things can let security person knows that you hacked his system? they are recorded in log files for various applications(e.g. IIS & Apache log files), file access times(note: there are tools for hackers that allow you to modify file access time), windows registry entries, hacker tools left behind (be aware of the residual configuration you have left behind - make sure you set all the configurations back to as it was), OS performance stats, IDS, proxy servers(make sure how you send and receive data. If you are going to use proxy server, set up a permanent tunnel through the proxy to the remote host that is compromised), and firewalls(usually very rich with logs).

                There are various types of IDS, IDS can set anywhere in the network. There are network based IDS, host based IDS, and application based IDS.

                Deleting evidences of your hack is extremely difficult, it requires you have a very high knowledge of the system you are trying to compromise(all the prior steps we did, such as scanning, foot printing, etc will be handy to compromise the system). It is easy to cover the known log files, such as web logs, firewall, IDS logs, etc. However, it is important to know how the default logs work. Highly skilled hackers, study the target well & take the time in fingerprinting & footprinting everything properly. It may take him up to one week before he hacks the target, but when he penetrates his job is done more smoothly & quietly. Unlike, the other ones who are just using some tools to break the system as fast as possible without studying the target well.

                It is possible to delete log files! It is simple but usually requires admin access. Some files/logs may be deleted automatically with reboot. Don't delete log files, it brings up suspicion. If you do so, the security person can indicates very clearly that a hacker broke into the system.

                Most common way of hiding your tracks is by using a rootkit. Rootkit is set of tools used by an attacker after the attacker gets the root-access to system. Rootkits conceals(to keep from being observed) attacker activities on the hacked system. Once rootkit set on the system, its practically impossible to rid of it because rootkit uses technology, called "hooks", that usually most of the time embed itself into various components of OS & effectively the OS going to be a toaster when the rootkit is all set and done. Security person has to rebuild his machine when rootkit is detected after we properly investigate it.

                Steganography its about hiding a file into another file. Like hiding a malware into a normal software which makes it difficult for firewall or AV to detect the malware. Thats the basic concept of Steganography. There are alot of tools out there allow us to hide files inside another files.

                You can evade IDS & firewalls by using random slow stealth scanning technique so traffic goes unnoticed, this takes longer to scan but makes detection more difficult. Try to use non-standard techniques, think outside the box.

                Remember: not everyone out there is a security expert. To secure your system well, you need to put yourself in a hacker set of mind.

                By now, you have learned the basic methodology that hackers use to break into the system. Anyhow, lets take a closer look on hacking techniques, such as encryption, sql injection, sniffers, and many more.

                Encryption: files can be encrypted in a storage. Communication channels can be encrypted as well, communication channel encryption encrypts the entire communication path, so all traffics sent and received are encrypted, e.g. SSL technology encrypts the entire communication path. There are many ways hackers get away of encrypted traffic & get info in not encrypted form. If you are using your own encryption method, you always should test your encryption for crackability before you use it officially.

                Sniffers: sniffers is a common tool used by hackers. Sniffers listens on any traffic that goes through the wire of the target system, listens ins and outs traffics. Promiscuous mode is a mode that is listening for any traffic that goes through the wire. Standard promiscuous mode sniffer is a basic technique. There are more advanced techniques other than promiscuous mode. Sniffing enables the attacker to pick up a plain text, and other sensitive data that goes 'from' or 'to' the target. Sniffers record captured traffic, then after you sniff you can go offline & start analyzing that captured traffic. Popular sniffers are ethereal, etherape, ettercap, and network monitor(for Win OS only - not so effective).

                Wireless Hacking: this is a new technology & starts taking place nowadays. Easy to setup, but not frequently secured since not many people understand the security configuration, so they decide not to set it up or set it up poorly. There are various tools that detect wireless networks, popular war driving software are Netstumbler, Airsnort, Airopeek, Kismet, and many more. What is war driving? google it!

                SQL Injection: sql injection is a technique that allows an attacker to steal a valuable database information. This attack relies on poor data validation and poor error checking.

                Buffer Overflows: buffer overflow is common, the cause of buffer overflow is poor coding. Buffer overflows might be noticed while coding. Buffer overflow happens when the programmer does not clearly define boundaries on buffers or variables. We use out of bound data to insert malicious code or execute command on the remote host. Buffer Overflows can cause programs to freeze or lockup, can cause machine to crash, or let you use exploits & leads you to compromise the system. To build buffer overflows, you need a good programming skills, good knowledge of stack and buffer vulns.

                You need to have the ability to research, analyze vulns & apply the exploit to achieve what you want. Buffer overflow is a very common & hard to produce an application with no buffer overflows at all. There is nothing programmers can do about it, they just need to write the code with security mind of set. If unexpected buffer overflow appears later by chance, programmers will have to fix it. Programmers should test their code from vulnerabilities as much as they can before they publish the application.

                Rootkits: it is a common hacker technique. Rootkit is malicious program that replaces components of OS. It does a stealth job. Rootkit requires root permission, so you can install it. Linux rootkits are common & you can find them everywhere, unlike Windows. It is very hard to detect a rootkit because it embeds itself so deeply into the target system. Removing rootkit from a system is very hard too, if the security person tries to remove the rootkit out of the system, he will destroy the system since the rootkit is embedded so deeply into the system(into components of OS). The good solution is to format the whole system & install it again.

                Spoofing: the word spoofing defined as making yourself appear as somebody else. Examples of spoofing, you can spoof an IP address and make yourself appear to be somewhere else, MAC addresses, and emails(very simple to spoof, you send an email to somebody by changing the headers, and things like that). Spoof usually relies on poor implementation of TCP/IP itself or poor implementation of applications. Tools that are used for spoofing differs from one platform to another. Example of the tools, IP spoofing utilities, MAC address modifiers, etc. Spoofing is more into using your skills rather than using a tool.

                Denial of Service (DoS): DoS is very common. The ultimate idea is to prevent legitimate users from using the system. Running DoS is very simple, you don't gain anything from doing DoS. Hackers do it to threat companies, things like that. Many methods/level of DoS attacks exist. Examples of some ways of to DoS, ping of death, Windows size overflow, smurf, teardrop attacks, and many more. There are lots of different ways to do it!

                Web Hacking: web hacking is the most popular attacks. It is based on hacking individual sites, servers, or components based on the website. First step a hacker takes is, enumerate services(applications) on target machine, and then determine what webserver software(apache, IIS, etc) is running on the target system. After that, the hacker exploits against vulns. found in the target system. It will be easier to hack if the hacker knows the version of the service/software running.

                A webserver attack leads to deeper penetration on the network(move into the target's internal network). Popular attack methods are xxs(cross-site scripting), IIS DLL vulnerabilities(IIS is very commonly exploited), directory traversal, unicode attack, and many more.

                What is Unicode attack?
                here is quick rough description about Unicode attack, lets say you want to pass space into a URL. If you put a space in URL, webserver will not take your URL, webserver will consider the url is invalid. Thus, if you want to put spaces among the URL, you should put the number 20 in a place of the space(number 20 represents the space), so when the URL goes to the webserver, the webserver says Ok! thats a valid URL, lets process it and so it does. Unicode attack uses this technique in a non-standard(bad way) way to attack the webserver. Thats a quick explaination about unicode attack.

                I'm already about to finish this tutorial, i will just talk about popular tools in a brief manner. I will start with namp.

                Nmap is the most popular hacker tool outhere. Linux command line nmap works better and is supported better. Nmap comes with ping utility, port scanning utility, service enumeration & OS fingerprinting.

                SuperScan is a windows based tool developed by foundstone Inc. Its easy to use it & a good tool for Windows.

                Nessus is used for vulnerability assessment. It is an open source software kit, with commercial version available as well. Nessus uses client/server architecute. Server will be installed on a central location. Nessus comes in GUI & command line interface. Nessus uses database that carries latest current exploits for all types of OS & application. Databases in nessus are called plug-ins, hundrends of vulnerability plug-ins exist and are updated daily to include latest exploits. Nessus requires high level of knowledge to use the tool very effeciently. You can go out to the web and download an exploit and then add it to the database. Nessus can take quite long time to do vulnerability assessment.

                Finally, the information in this tutorial have been gathered from various types of sources, and then i wrote the tutorial in an organized manner from scratch as well as i added some stuff & clarified many parts.

                After you have read this tutorial, i recommend you to search and learn about Windows Null Sessions, it is the most critical flaws associated with Windows OS, and google about DNS zone transfers!

                This tutorial is a good guide for you that gives you an insight on how to start & different techniques that hackers use and how they are used. I hope you have enjoyed this tutorial & helped you in someway or another. I'm not supporting any illegal activities. This tutorial for people who wants to know how hackers think, what steps they take to break into systems & how they do it, so people can have an insight on how to protect themselves against intruders.



                ***This tutorial is made for educational purposes only***

                Read More 0 Comment

                Copyright © Amazing.