12 April 2012

So friends do you want to activate IDM(Internet Download Manager) but without product key........................






Activate IDM or Internet Download Manager without Product Key.....................................................................

09 April 2012

Identify Phishing Scam And Complaint About It........................

Identify the Phishing Scam and report a crime and help Cyber Crime department................





Phishing is a form of social engineering technique used by hackers to gather sensitive information such as usernames, passwords and credit card details by posing as a trustworty person/organization. Since most online users are unaware of the techniques used in carrying out a phishing attack, they often fall victims and hence, phishing can be very effective.

With the dramatic increase in the number of phishing scams in the recent years, there has also been a steady rise in the number of people being victimized. Lack of awareness among the people is the prime reason behind such attacks. This article will try to create awareness and educate the users about such online scams and frauds.
Phishing scams usually sends an email message to users requesting for their personal information, or redirects them to a website where they are required to enter thier personal information. Here are some of the tips that can be used to identify various phishing techniques and stay away from it.

Identifying a Phishing Scam


1. Beware of emails that demand for an urgent response from your side. Some of the examples are:

You may receive an email which appears to have come from your bank or financial organization stating that “your bank account is limited due to an unauthorized activity. Please verify your account asap so as to avoid permanant suspension”. In most cases, you are requested to follow a link (URL) that takes you to spoofed webpage (similar to your bank website) and enter your login details over there.
In some cases, phishing emails may ask you to make a phone call. There may be a person or an audio response waiting on the other side of the phone to take away your credit cards details, account number, social security number or other valuable data.
2. Phishing emails are generally not personalized. Since they target a lagre number of online users, they usually use generalized texts like “Dear valued customer”, “Dear Paypal user” etc. to address you. However, some phishing emails can be an exception to this rule.
3. When you click on the links contained in a phishing email, you will most likely be taken to a spoofed webpage with official logos and information that looks exactly same as that of the original webpages of your bank or financial organization. Pay attention to the URL of a website before you enter any of your personal information over there. Even though malicious websites look identical to the legitimate site, it often uses a different domain or variation in the spelling. For example, instead of paypal.com, a phishing website may use different addresses such as:
papyal.com
paypal.org
verify-paypal.com
xyz.com/paypal/verify-account/

Tips to Avoid Being a Victim of Phishing


1. Do not respond to suspicious emails that ask you to give your personal information. If you are unsure whether an email request is legitimate, verify the same by calling the respective bank/company. Always use the telephone numbers printed on your bank records or statements and not those mentioned in the suspicious email.

2. Don’t use the links in an email, instant messenger or chat conversation to enter a website. Instead, always type the URL of the website on your browser’s address bar to get into a website.
3. Legitimate websites always use a secure connection (https://) on those pages which are intended to gather sensitive data such as usernames and passwords, account numbers or credic card details. You will see a lock icon in your browser’s address bar which indicates a secure connection. On some websites like paypal.com which uses an extended validation certificate, the address bar turns GREEN as shown below.





In most cases, unlike a legitimate website, a phishing website or a spoofed webpage will not use a secure connection and does not show up the lock icon. So, absence of such security features can be a clear indication of phishing attack. Always double-check the security features of the webpage before entering any of your personal information.

4. Always use a good antivirus software, firewall and email filters to filter the unwanted traffic. Also ensure that your browser is up-to-date with the necessary patches being applied.
5. Report a “phishing attack” or “spoofed emails” to the following groups so as to stop such attacks from spreading all over the Internet:
You can directly send an email to spam@uce.gov orreportphishing@antiphishing.org reporting an attack. You can also notify the Internet Crime Complaint Center of the FBI by filing a complaint on their website: www.ic3.gov.

Hacking Tools and its uses..............................

Here are some world's best hacking tool that a hacker uses...........





In this article I'll tell you some best tools for HACKERS. I have collect some best hacking tools for you. You can try all there tools and feel how HACKERS Hack with the help of this tool. All tools are for educational purpose please use it Ethically.




LIST OF Best Tools for HACKING :




Nessus


The “Nessus” Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix.

Acunetix Web Security Scanner
Acunetix WVS automatically checks your web applications for SQL Injection, XSS & other web vulnerabilities. Web application attacks, launched on port 80/443, go straight through the firewall, past operating system and network level security, and right in to the heart of your application and corporate data.

Wireshark
Wireshark is the world's foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network.

Snort
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.

TCP dump
TCP dump is the most used network sniffer/analyzer for UNIX. TCP Trace analyzes the dump file format generated by TCPdump and other applications.

Hping
Hping is a command-line oriented TCP/IP packet assembler/analyzer, kind of like the “ping” program (but with a lot of extensions).

DNSiff
DNSiff is a collection of tools for network auditing and penetration testing. dns sniff, file snarf, mail snarf, MSG snarf, URL snarf, and web spy passively monitor a network for interesting data (passwords, e-mail, files, etc.).

Ettercap
Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones)and includes many feature for network and host analysis.

Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 2500 potentially dangerous files/CGIs, versions on over 375 servers, and version specific problems on over 230 servers.

John the Ripper
John the Ripper is a fast password cracker, currently available for many flavors of Unix.
Open Ssh
  Open Sshis a FREE version of the SSH protocol suite of network connectivity tools, which encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks.
TripWire
Tripwire is a tool that can be used for data and program integrity assurance.
Kismet
Kismet is an 802.11 wireless network sniffer – this is different from a normal network sniffer (such as Ethereal or tcp dump) because it separates and identifies different wireless networks in the area.
SAINT
SAINT network vulnerability assessment scanner detects vulnerabilities in your network’s security before they can be exploited.

Cain & Abel
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, uncovering cached passwords and analyzing routing protocols.

Zenmap
Zenmap is the official Nmap Security Scanner GUI. It is a mulch-platform free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users.
Hope you like it. Suggestions are welcomed.

Download hacking books.........................

 Here are some hacking books that you like that books are recommend by me.... Today I'm posting 5 awesome all time best basics of hacking eBooks, this eBook are not free but don't worry in the end of the articles I'll show you a simple way to get any eBooks for FREE.....

1# The secret of Hacking 1 Edition : this book is awesome for those whom have 0 knowledge in hacking and want to learn hacking, its good start up for them. In order to get this book you have order this book from the official website of this eBook. but if you know How to do some tricky search you can get it from Google for FREE.
Have a look at the Content of this eBook


1. Introduction to real Hacking
2. Advanced Malware research
3. Windows Hacking
4. Password Hacking
5. Email Hacking
6. Web Application Hacking
7. Website Defacement Domain Hacking
8. Miscellaneous Hacking
9. Mobile Computer Forensic
10. VoIP Wireless Hacking
11. Vulnerability discovery Penetration testing
12. Advanced Hacking with Metasploit
13. Firewall, IDs Honey pot Hacking
14. Securing System Networks.


2# Social Engineering: The Art of Human Hacking , Kevin Mitnick the most famous all time best top 1 social engineers proved how social engineers dangerous and can Hack Human with the art of social engineering, as the book name implies this books reveal all the secret of social engineering. this is very interesting eBook rather then other because for computer hacking you need the computer device, Internet and a knowledge so you know what you are going to do. but for social engineering you don't need any of this, you need to learn how to manipulate people mind so they will do what you want to do from them. Download awesome eBook from direct link. 3# Dangerous Google - Searching For Secrets every hackers must have good skills of googling, you might heart it somewhere on internet that Google is a best friend of hackers, this will let you help to understand how google is best friend of every hackers. you may able get many paid stuff from google for free like eBooks, mp3, stock image, etc. main object of this eBook is "how to use google to find sources of personal and other confidential data. how to find information about vulnerable systems and web services. how to locate publicly available network device using google". Download this eBook from here 4# Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition Gray hat hacking book is something of advance users who might already have much knowledge of hacking or beginners, unlike other hacking book this book is helpful for ethical hackers in fixing security loophole, testing the black and white box, write malicious code, fixing exploit flaws in Linux n windows OS, penetration testing, VoIP and other web security, developing exploit code and let's see the topic of this eBook. Download this awesome book here.
  1. Develop and launch exploits using Back Track and Metasploit.
  2. Employ physical, social engineering, and insider attack techniques.
  3. Build Perl, Python, and Ruby scripts that initiate stack buffer overflows.
  4. Understand and prevent malicious content in Adobe, Office, and multimedia files.
  5. Detect and block client-side, Web server, VoIP, and SCADA attacks.
  6. Reverse engineer, fuzz, and DE-compile Windows and Linux software.
  7. Develop SQL injection, cross-site scripting, and forgery exploits.
  8. Trap malware and root kits using honeypots and Sand Boxed.


5# Hardware Hacking Have Fun While Voiding Your Warranty About this eBook some description of this eBook by the author "If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty!


This book is Gadget geeky eBook which help you to learn how to hack and repair yourself play-station 2, old mac computer,hacking apple iPod , Hard-drive, Home Theater PCs, Hack Wireless 802.11, Nokia 6210 modification, Operating system, Coding and many more. Get this awesome book from 
here.
Twitter Bird Gadget