FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Hacking

The Art Of Exploitation...

Ethical Hacking

Security Experts...Same Techniques To Make Hacker's Stuff Useless.

Black Hat Hacking

Dark Side Of Hacking... In Short Destruction Of Cyber Stuff.

Digital Stuff

All The Digital Stuff Is Under The Influence Of Cyber Attacks... Be Safe

Wednesday, November 2, 2011

How to Block Websites & Stop Downloading Using Proxy

This example will explain you “How to Block Web Sites” & “How to Stop Downloading”.
First, Configure Proxy.
 
/ip proxy 
set parent-proxy=0.0.0.0
set parent-proxy-port=0
set cache-administrator="webmaster"
set max-cache-size=none
set cache-on-disk=no
set max-client-connections=600
set max-server-connections=600
set max-fresh-time=3d
set always-from-cache=no
set cache-hit-dscp=4
set serialize-connections=no

Now, Make it Transparent
/ip firewall nat
a
dd chain=dstnat protocol=tcp dst-port=80 action=dst-nat to-addresses=
to-ports=8080

Make sure that your proxy is NOT a Open Proxy
/ip firewall filter
a
dd chain=input in-interface= src-address=0.0.0.0/0\
protocol=tcp dst-port=8080 action=drop

Now for Blocking Websites
/ip proxy access
a
dd dst-host=www.vansol27.com action=deny
It will block website http://www.vansol27.com, We can always block the same for different networks by giving src-address. It will block for particular source address.

We can also stop downloading files like.mp3, .exe, .dat, .avi,…etc.
/ip proxy access
a
dd path=*.exe action=deny
a
dd path=*.mp3 action=deny
a
dd path=*.zip action=deny
a
dd path=*.rar action=deny.

Try with this also
/ip proxy access
a
dd dst-host=:mail action=deny
This will block all the websites contain word “mail” in url.
Example: It will block www.hotmail.com, mail.yahoo.com, www.rediffmail.com
ENJOY BLOCKING…….

How Hackers Hack Your Website: Overview of Common Techniques

We hear the same terms bandied about whenever a popular site gets hacked. You know… SQL Injection, cross site scripting, that kind of thing. But what do these things mean? Is hacking really as inaccessible as many of us imagine — a nefarious, impossibly technical twilight world forever beyond our ken?
Not really.
When you consider that you can go to Google right now and enter a search string which will return you thousands of usernames and passwords to websites, you realize that this dark science is really no mystery at all. You'll react similarly when you see just how simple a concept SQL Injection is, and how it can be automated with simple tools. Read on, to learn the basics of how sites and web content management systems are most often hacked, and what you can do to reduce the risk of it happening to you.

SQL Injection

SQL Injection involves entering SQL code into web forms, eg. login fields, or into the browser address field, to access and manipulate the database behind the site, system or application.
When you enter text in the Username and Password fields of a login screen, the data you input is typically inserted into an SQL command. This command checks the data you've entered against the relevant table in the database. If your input matches table/row data, you're granted access (in the case of a login screen). If not, you're knocked back out.
The Simple SQL Injection Hack
In its simplest form, this is how the SQL Injection works. It's impossible to explain this without reverting to code for just a moment. Don't worry, it will all be over soon.
Suppose we enter the following string in a Username field:

' OR 1=1 double-dash-txt.png
The authorization SQL query that is run by the server, the command which must be satisfied to allow access, will be something along the lines of:
SELECT * FROM users WHERE username = ?USRTEXT '
AND password = ?PASSTEXT?
…where USRTEXT and PASSTEXT are what the user enters in the login fields of the web form.
So entering `OR 1=1 — as your username, could result in the following actually being run:
SELECT * FROM users WHERE username = ?' OR 1=1 — 'AND password = '?
Two things you need to know about this:
['] closes the [username] text field.
'double-dash-txt.png' is the SQL convention for Commenting code, and everything after Comment is ignored. So the actual routine now becomes:
SELECT * FROM users WHERE username = '' OR 1=1
1 is always equal to 1, last time I checked. So the authorization routine is now validated, and we are ushered in the front door to wreck havoc.
Let's hope you got the gist of that, and move briskly on.
Brilliant! I'm gonna go hack me a Bank!
Slow down, cowboy. This half-cooked method won't beat the systems they have in place up at Citibank, evidently.
citibankhack.png
But the process does serve to illustrate just what SQL Injection is all about — injecting code to manipulate a routine via a form, or indeed via the URL. In terms of login bypass via Injection, the hoary old ' OR 1=1 is just one option. If a hacker thinks a site is vulnerable, there are cheat-sheets all over the web for login strings which can gain access to weak systems. Here are a couple more common strings which are used to dupe SQL validation routines:
username field examples:
  • admin'—
  • ') or ('a'='a
  • ”) or (“a”=”a
  • hi” or “a”=”a
… and so on.
Backdoor Injection- Modules, Forums, Search etc.
Hacking web forms is by no means limited exclusively to login screens. A humble search form, for instance, is necessarily tied to a database, and can potentially be used to amend database details. Using SQL commands in search forms can potentially do some extremely powerful things, like calling up usernames and passwords, searching the database field set and field names, and amending same. Do people really get hacked through their search forms? You better believe it. And through forums, and anywhere else a user can input text into a field which interacts with the database. If security is low enough, the hacker can probe the database to get names of fields, then use commands like INSERT INTO, UNION, and so forth to get user information, change product prices, change account settings/balances, and just about anything else… depending on the security measures in place, database architecture and so on.
So you can have security locked down at the login, but poor security on other forms can still be exploited. Unfortunately this is a real worry regarding 3rd party modules for Web CMS products which incorporate forms, and for CMS products these 3rd party modules are often the weakest links which allows hackers access to your database.
Automated Injection
There are tools to automate the process of SQL Injection into login and other fields. One hacker process, using a specific tool, will be to seek out a number of weak targets using Google (searching for login.asp, for instance), then insert a range of possible injection strings (like those listed above, culled from innumerable Injection cheat-sheets on the Web), add a list of proxies to cover his movements, and go play XBox while the program automates the whole injection process.
Remote Injection
This involves uploading malicious files to inject SQL and exploit other vulnerabilities. It's a topic which was deemed beyond the scope of this report, but you can view this PDF if you'd like to learn more.
SQL Injection in the Browser Address Bar
Injections can also be performed via the browser address bar. I don't mean to have a pop at Microsoft, but when it comes to such vulnerabilities, HTTP GET requests with URLs of the following form are most often held to be vulnerable:
http://somesite.com/index.asp?id=10
Try adding an SQL command to the end of a URL string like this, just for kicks:
http://somesite.com/index.asp?id=10 AND id=11
See if both articles come up. Don't shoot your webmaster just yet if it's your own site and you get two articles popping up: this is real low-level access to the database. But some such sites will be vulnerable. Try adding some other simple SQL commands to the end of URLs from your own site, to see what happens.

Sunday, October 9, 2011

9 Alternative Ways To Access Blocked Sites

Is you school, college or office blocking you from getting on social network sites like Friendster, Facebook, Myspace, Bebo, Hi5, Orkut, etc? Here’s few ways you can bypass the restrictions and surf like normal, but please check with your local authorities before using them. We will not held any responsibility if you’ve breach the regulations of any.
Full list after jump.

  1. Using IP Instead of URL

    This depends on the software/application used. Sometimes blocked sites are stored as a list of URLs (eg. www.yahoo.com, www.donwload.com,etc) and typing the IP instead of the URL might sometimes work. In a local computer, doing a ping domain.com command in Command Prompt (Mac users use Terminal) will return you the IP address. You can also do it online via www.whatsmyip.org
  2. Redirection with Short URL service

    Sometimes the URL you intend to browse might be ban, but converting them to another a shorter URL with short URL services might just help you to bypass the settings.
    Here’s 2 Short URL service we’ve previously mentioned – MooURL, SnipURL
  3. Google Cache

    Search engines like Google and Yahoo cache webpages and these cached pages are stored in search engines themselves, which likely will be added to the blocked list. Click on the ‘cache’ will bring you to a cache version of the page, as updated as how Google caches it.
    google cache 9 Alternative Ways To Access Blocked Sites
  4. Internet Archive – Wayback Machine

    Wayback Machine is a internet service that periodically keeps a copy of almost all websites in the Internet way from the date they’re started. Clicking on the latest copy of what Wayback Machine have should be somewhat similar to the real site. Another way to access blocked sites via caches.
    wayback machine 9 Alternative Ways To Access Blocked Sites
  5. Anonymous Surfing

    Some site allows you to take advantage of their proxy or domain to surf other sites as anonymous. Here’s 90+ proxy websites we’ve previously mentioned.
    More anonymous surfing services: 90+ Proxy Websites To Access Blocked Websites
  6. Use Proxy in Browsers

    There are tons of sites out there that distributes free proxies of almost any country. Here’s an example. Check out the following methods on how/where to insert proxies in your web browsers.
    Proxy Surfing – Firefox
    proxy firefox 9 Alternative Ways To Access Blocked Sites
    Under Advanced tab, select Network tab, then click inside Connection Settings. Select Manual proxy configuration, put proxy under HTTP proxy.
    Proxy Surfing – Internet Explorer
    proxy ie 9 Alternative Ways To Access Blocked Sites
    Go to Tools -> Internet Options. Select Connections tab. Click into LAN Settings, check Proxy Server. Insert your proxy URL inside Address.
  7. Bypass with Translations services

    Online translation services like AltaVista BabelFish, Google Translate allows you to translate a website from one language to another and display the translated results on their own page.The trick here is to enter the URL (website you’re blocked), retranslate it even if you don’t need to and let Google or AltaVista fetch you the content.
  8. Subscribe to RSS Feed

  9. This might not work for all sites, but if the site you intended to visit provides RSS feeds, you can subscribe and read it with a RSS reader, or have it regularly send the contents to your email
  10. Retrieve web pages via Email

  11. Web2Mail is a free service that sends websites you want to read right into your inbox. All you need to do is send an email to www@web2mail.com with the URL as subject title.

Saturday, October 8, 2011

Great Password Hacking

  • Install CAIN.
  • Now after installation start it.
  • go to the configure option in menu bar and in 'SNIFFER' tab choose 'start sniffer on startup' and in 'APR(Arp poison routing)' tab you can fake your ip and mac address .
  • Start sniffer by clicking a 'PCB' symbol next to the open button on the toolbar.
  • Now in the main pane go to 'Sniffer' and press the '+' button in the toolbar.
  • A window will popup select your range and select the 'All tests' option and click ok.
  • A list of available hosts is printed.
  • Now go to the APR tab in the lower part of the list pane.
  • Then go to DOS Prompt, type 'ipconfig /all' without 's and note down the ipaddress of the gateway.
  • Select the your target and the default gateway from the list and choose Start.
  • Let the app do its work. The whole communication is filtered/routed (sniffed) through your computer.
  • While you were ARP Poisoning if the target entered any password which was directed to the default gateway the password will be logged.
  • You can check the password in the PASSWORD pane.
NOTE:-
  • Do not misuse.
  • CAIN can be only installed if you have administrator on the system.
  • The local passwords will not be logged, only the passwords and usernames exchanged between the targets is logged.
  • If you have a switched network some exploits or a simple DoS attack on the device could make it behave like hub this activity is possibly detectable.
  • Anyway I am not responsible for any kind of harm by this tutorial.

Friday, October 7, 2011

Download Hackers Best Tools - Hacking Tools

In this article I'll tell you some best tools for HACKERS. I have collect some best hacking tools for you. You can try all there tools and feel how HACKERS Hack with the help of this tool.  All tools are for educational purpose please use it Ethically. 



LIST OF Best Tools for HACKING :
The “Nessus” Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix. 

 Acunetix WVS automatically checks your web applications for SQL Injection, XSS & other web vulnerabilities. Web application attacks, launched on port 80/443, go straight through the firewall, past operating system and network level security, and right in to the heart of your application and corporate data.

Wireshark is the world's foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. 

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.

 TCPdump is the most used network sniffer/analyzer for UNIX. TCPTrace analyzes the dump file format generated by TCPdump and other applications.

 Hping is a command-line oriented TCP/IP packet assembler/analyzer, kind of like the “ping” program (but with a lot of extensions).

 DNSiff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.).

 Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones)and includes many feature for network and host analysis.

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 2500 potentially dangerous files/CGIs, versions on over 375 servers, and version specific problems on over 230 servers.

 John the Ripper is a fast password cracker, currently available for many flavors of Unix.

 OpenSSH is a FREE version of the SSH protocol suite of network connectivity tools, which encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks.

 Tripwire is a tool that can be used for data and program integrity assurance.

 Kismet is an 802.11 wireless network sniffer – this is different from a normal network sniffer (such as Ethereal or tcpdump) because it separates and identifies different wireless networks in the area. 

SAINT network vulnerability assessment scanner detects vulnerabilities in your network’s security before they can be exploited. 

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations,  uncovering cached passwords and analyzing routing protocols. 

Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users.

Basic Setup Of Hacker Lab

An approach to introduce people with the truth of HACKING". In this article we discus how can we setup a lab for HACKING practice. Firstly a hacker need 3-4 system to practice but for basic we work on 2 systems like me for basic with Wired or Wireless Internet connection. I personally have two systems and 1 laptop.
So guys ready to experience the LAB of HACK for your own hope you like it  very much and please send us feedback.

My Lab
          Requirements for HACKING LAB 
  • System 
Firstly you have a system with minimum configuration. 
  1. 240+ Hard Disk
  2. i3 Processor
  3. 2GB RAM
  4. Wi fi Enable.
  •  Virtual PC Emulator
A virtual PC emulator is needed since I assumed you don't have multiple PC's to setup your lab, even if you have it I would prefer to advice you to use a Virtual PC Emulator.
You can prefer "Oracle's Virtual Box" && "VM-Ware".
VM-Ware have several advantages over Virtual Box, virtual box is just good to go. 
  • Online Storage
I personally think if you want a hacker lab you need online storage. 
you can log into DROP BOX && CLOUDO.
  • Live CD
Hackers work on different platform so its very easy to make several live CD to work on it without consuming time on installation.   Make you own live cd of BACK TRACK, UBUNTU, REB HAT etc.
  • IP hiding tools and MAC spoofing
As we discus previous we have to use IP hiding tools and change our MAC address time by time. 
Related Post ::   
  • Static IP
Hackers always need static IP for work but in Indian its cost very high to purchase & i think HACKER never pay for any thing so for alternative you can use different things to resolve this.
  • High Speed Internet
If you think GPRS or DIAL UP is good enough to teach you hacking then you are wrong. I recommend you to use broadband connection like BSNL, CONNECT etc for high speed Internet.
  • Web Cam
  • Speaker and Mic
  • Wireless Router
  •  HACKING Tools 
Related Post :: 

Download Magic Password Stealer

Be very carefull with this software.. it is a trojan.. and if u want to use this u hav to disable your antivirus and then open it and set it properly and then it will create a file and that file u should not open.. u hav to send it to your frnd and the password will be sent to you when he opens it.. and if u do something wrong your own password will be sent to you.. and next time please dont ask for hacking softwares.. thnx.

password - 123456
username - samjohny4u

Download Magic Password Stealer from HERE
Enjoy :D