Showing posts with label news. Show all posts
Showing posts with label news. Show all posts

Thursday, 18 October 2012

How to Regain Access to your Hacked Facebook Account Easily

crackthesecurity | 00:48 | | | | | Be the first to comment!

Step 1

Visit http://www.facebook.com/hacked.

Step 2

Click My Account Is Compromised as shown in below screenshot

Step 3

Now enter your Email,Phone Or Username and Click on Search

And now identify your account & now click on continue without entering the password and then you will be redirected to another page as show in Step 4.

Step 4

Now choose your option to reset your password....

Read More...


Saturday, 6 October 2012

How to Hide a folder without any third party Software

crackthesecurity | 04:51 | | | | Be the first to comment!


To Hide:
Rename any folder with extension
{645FF040-5081-101B-9F08-00AA002F954E}
For eg,
If u’ve a folder with name “abc”
press F2,
then type,
abc.{645FF040-5081-101B-9F08-00AA002F954E}
and Press Enter.

To get back to its original form :
Make a new batch file with any name and type
ren abc.{645FF040-5081-101B-9F08-00AA002F954E} abc
and save it as abc.bat
Read More...


How to access blocked sites or country restricted sites

crackthesecurity | 04:17 | | | Be the first to comment!
Stealthy allows you to instantaneously get and setup a working proxy from a click of a button.
If you are worried about the permissions required by the extension check out this certificate: http://www.softpedia.com/progClean/Stealthy-for-Chrome-Clean-215173.html
Does your country/company blocks you out of facebook, youtube or others?

Stealthy is the solution for you.

  • Hide your IP address for your privacy online.
  • Access all content privately without censorship; bypass firewalls.
It provide the proxies, so you don't have to bother searching for lists that usually don't work. The extension automatically selects and sets up tested proxies from the cloud.

The term Stealthy refers to military aircraft that can penetrate into enemy territory undetected by radar. In a way, that’s what this browser extension does.

Some organizations and governments block access to web pages, and certain online services are not available in all countries. With Stealthy, users can make themselves undetectable, and thereby able to bypass the censorship.

This can be tremendously important in countries like China or Iran, where regimes censor the Internet. But even in countries like Germany, many people cannot watch music videos on YouTube because of a licensing dispute with GEMA. With Stealthy installed, this is not an issue, as you can get a foreign IP address and play the videos without issue.

Once installed, a small stealth aircraft icon will be appear in your navigation bar. The color is red by default, indicating Stealthy is off. After clicking on it, Stealthy automatically searches for an appropriate proxy, sets up your browser, and turns the icon green, meaning you are now in Stealth mode.

How does it works:
The extension works by placing an icon on the upper right part of your browser, after installation Stealthy will be off by default, you will need to turn it on. With the click it switches between ON (green icon) and OFF (red icon), in the (unlikely) case that the proxy assigned to you doesn't work or is too slow you should turn Stealthy off and on again in order to get a new one.
Configuration:
This is the preferences window, you access there by clicking on the small arrow in the right side of Stealthy's icon.

Yo can chose between uses:

  • Normal use for achieve anonymity
  • Pretend that you are in the US
  • Use a service that requires you to be in an specific country by providing the country code.
You can also chose the behavior on start-up:
  • Leave it as it was previously set
  • Automatically set it Off
  • Automatically set it On.
The last option cleanup your network settings in case you lost connectivity to internet, or Stealthy refuses to work
 
 


Read More...


Friday, 5 October 2012

How to Access Data of a Password Protected User in Windows XP

crackthesecurity | 08:12 | | Be the first to comment!
Steps :


1. Boot the machine from Windows XP bootable CD.

2. At the setup screen, select R to repair using Recovery Console.

3. Now the console program will prompt you to select the Windows folder 
(eg. C:\WINDOWS) where the Windows is installed (you need to enter a 
number from the list of folders shown to you).

4. Type 'HELP' (without single quotes) and press enter for available 
commands. This is like a DOS program, but some features are not 
available

5. Change the current directory to the user's directory where you want to backup.

6. Type 'CD "C:\Documents and Settings\USERNAME"' (without single quotes) and press enter. 

7. Now the current directory will change to "C:\Documents and Settings\USERNAME".

8. Now change the directory to Desktop by entering 'CD Desktop' (without
 single quotes) and press enter to go to the desktop folder.

9. Type 'DIR' (Without single quotes) and press enter, you will be liwted all the available files in Desktop.

10. Type 'COPY a.doc D:\BACKUP' (without quotes) and press enter, where 
a.doc is a file available in Desktop and the folder D:\BACKUP available 
to copy the files.

11. As in step 7,8,9,10 you can backup other folders like "My Documents", "My Music", etc.

12. Note that you cannot use wildcards for COPY, i.e. you cannot copy 
all the files in a folder at once. You must copy one file by one.

Any data which has not backed up will be permanently deleted when you re-format the hard drive, so make sure you back up any thing you want to keep.

Read More...


Tuesday, 2 October 2012

Destroy Websites with Asteroids Shooting Game JavaScript

crackthesecurity | 01:41 | Be the first to comment!
  1. Simply Drag tthe below image to your bookmarks bar for using it on any website anytime
  2. Now just visit any website which you wanna play with and click the link or paste the JavaScript.
  3. Now it time to play
    just use arrow keys ← ↑ → ↓ and Space key to shoot at objects.


OR
Simple click the Below Image

Read More...


Tuesday, 8 May 2012

Apple update to OS X Lion exposes encryption passwords

crackthesecurity | 08:43 | | | Be the first to comment!

Apple's had a rough time lately on the security front. Last month it was caught out having delayed the release of a security update for Java, resulting in more than 600,000 Macs being recruited into a botnet. Now a quality assurance mistake can cause OS X users' FileVault encryption passwords to be exposed.

On Friday, David Emery posted to an encryption mailing list disclosing this flaw in the latest OS X Lion security update, 10.7.3, which was released in February.

It appears that a debug option was accidentally left enabled in FileVault, resulting in the user's password being saved in plain text in a log file accessible outside of
the encrypted area.FileVault password in plain text

Anyone with access to the disk can read the file containing the password and use it to log into the encrypted area of the disk, rendering the encryption pointless and permitting access to potentially sensitive documents. This could occur through theft, physical access, or a piece of malware that knows where to look.

To my knowledge, this only applies to users of Snow Leopard who used the FileVault encryption option for their home directories. It does not impact users of FileVault2 who have turned on Apple's full disk encryption, nor does it impact users who did not upgrade from Snow Leopard.

The best course of action is to implement a full disk encryption solution like Sophos SafeGuard for Mac or Apple's included FileVault 2.

                  FileVault 2 upgrade option

Additionally, vulnerable users who do not encrypt their Time Machine backups risk replicating this log file to their backups, which could mean long-term storage of their unencrypted password.

This proves a very important point when it comes to encryption. While choosing a secure algorithm is important, it's rarely the most important factor. How products store, manage and secure keys and passwords is the most common failure point in assuring data protection.

This incident demonstrates the importance of implementation over technical arguments like key strength and password complexity. That Apple promises AES encryption doesn't mean anything if it chooses to store your password in an accessible log file.

Let's hope Apple is able to fix this problem quickly. However, the possibility that the plain text password has been backed up and the difficulty of ensuring both copies and the original plain text password are securely erased means retrieval could still be possible even after the fix is applied.

Once Apple users receive and apply the fix, they would be well advised to consider this password compromised, change it and ensure it is not used on any other systems.
Read More...


iPhones, Android devices hot targets among 50,000 network attacks on California university

crackthesecurity | 08:09 | Be the first to comment!
Almost 50,000 separate network attacks each week take aim at the California State University, San Bernardino, and the latest trend is seeing attackers go after students' Google Android and Apple iPhone mobile devices.

"It's everything you can imagine," says Dr. Javier Torner, who is responsible for coordinating information security on the campus attended by 17,000 students. "[We've got] big bandwidth, 600Mbps of traffic, and it's everything from scans to SQL injections to brute-force attacks."

University information technology staff operate both open-source and commercially available intrusion-detection systems to monitor the incessant barrage, which originates mainly from the U.S., Russia and China, some of it automated, some not. Some attacks pound away day and night against university websites, trying to break in through them in order to get to another part of the network or post malware.

"They're trying to target our websites, and then going after mobile devices connected to a website," says Torner, the information security officer. He notes a large number of students now connect to the websites through their mobile Apple and Android tablets and smartphones, which outnumber traditional computers or Macs. So it's not surprising attackers are gunning for iOS and Android devices, and sometimes they succeed in compromising Web pages.

Android devices have a reputation for being more vulnerable to malware, but Apple iOS devices -- even ones that students themselves haven't "jailbroken," eliminating Apple's security -- also have been compromised through what appears to be Web-based malware, says Torner. "In Web pages, the payload now is more directed against mobile devices," he says.

This tallies with an observation made by analysts at Lookout Mobile Security last week that it has spotted for the first time websites that have been hacked to deliver malicious software to devices running Android in a drive-by download. Symantec last week said it has seen Android drive-by downloads since last November but that they have been limited. Drive-bys have been a common form of attack against PCs for quite a while, and now appear to be widening to mobile.

California State University, San Bernardino, operates an open-source SNORT intrusion-detection system, and has added the commercially available MetaFlows sensors to gain extra functionality in analyzing IP flows, Torner says. The dual monitoring systems lets the university run comparative analysis. Sometimes university students working on degrees in information assurance join forces with IT staff in hands-on training projects for this.

Torner says the experience in intrusion-detection monitoring shows that within just a few hours of software vulnerabilities being made public by vendors or others, attackers will start going after any possible weakness, especially Web holes. "They're trying to find an opening," he says. This makes the task of updates and patching critical.Occasionally an attacker or malware gets through and tries to go after university computers. There are about two or three incidents each month.
Read More...


SonicWall stands tall in SSL decryption testing

crackthesecurity | 08:04 | Be the first to comment!
If one of the main advantages of a next-generation firewall is application and protocol identification and control, then SSL decryption is a basic requirement. We looked at the SSL decryption capabilities of the next-generation firewalls to see how well they would be able to discover applications, protocols, and URLs hidden within encrypted connections.

When SSL decryption is in place, the firewall performs a "sanctioned man-in-the-middle attack." This means that the firewall intercepts the SSL connection and performs a man-in-the-middle attack to decrypt the contents. Because the attack is done with the permission of the enterprise, it's called "sanctioned.''

This requires that the enterprise have a private certificate authority that is trusted by all users behind the firewall, and that the certificate authority can issue a "signing" certificate. The signing certificate is loaded into the next generation firewall, and for every SSL connection, the firewall generates a new certificate in real-time and uses it to secure the SSL connection between the end-user and the firewall, replacing the original certificate. The firewall then secures the connection using the original certificate. Because the firewall is stacking together two encrypted connections, it can see the traffic, unencrypted.

The only next-generation firewall we tested that did a good job of SSL decryption was SonicWall. With two check boxes, we were able to enable SSL decryption and then apply the next-generation firewall features to the traffic. Four more check boxes enable anti-virus, anti-spyware, intrusion prevention, and content filtering on the SSL traffic. The configuration, including loading our own certificate authority certificate, was simple and fast, and the decryption worked. Additional features we were looking for, such as the ability to exempt traffic from decryption by IP address, user group, or certificate common name (such as "www.bankofamerica.com" or "www.kaiserpermanente.org") were no problem.

We also tested that the SonicWall system could pass through certain errors to clients, such as a self-signed certificate (SonicOS figured that one out) or a certificate that was revoked by the issuer (not detected by SonicOS), and discovered that there is still some work to be done.

The story was not nearly as good with the other firewalls. Check Point's Security Gateway has a more elaborate and better thought-out configuration system with more bells and whistles. For example, with the Security Gateway you could exempt all domains in a certain category (such as financial services) from being inspected. The Security Gateway also passed all of our SSL validation checks, detecting revoked and self-signed certificates just fine. However, the Security Gateway can only inspect HTTP traffic on known SSL ports. This means that an application that runs over non-standard ports won't be inspected, and neither will any application that uses a different protocol — such as email, instant messaging, or file transfer.

Fortinet's FortiGate did a better job at covering more protocols, handling HTTP, SMTP, POP3, FTP, and IMAP running over SSL, but only on known ports. Fortinet's engineers told us that the SSL decryption is linked to their anti-virus transparent proxy system, which is what kept it from running across more ports. But what FortiGate made up for in coverage, it lost in configuration controls. There's no way to exempt traffic from decryption except by IP address, and the FortiGate let through both self-signed and revoked certificates, making two invalid web sites look as if they were well-secured, even when it was configured to block invalid SSL certificates.

We were also disappointed in the SSL decryption capabilities of the Barracuda NG Firewall. Unlike other next-generation firewalls, the NG Firewall requires you to explicitly configure HTTP clients (no other protocol is covered) to use the HTTPS proxy on the NG Firewall. This means that if the client can get through the firewall without using the proxy or send the traffic over any other port, it won't be able to apply next-generation controls or IPS signatures to the encrypted traffic, even if the traffic goes through the NG Firewall. Barracuda's engineers told us that this limitation will be lifted in Version 5.4.

Overall, the results were disappointing, since only one product, SonicWall SonicOS, supported what we considered basic functionality. This suggests that the products are still evolving rapidly to meet the requirements for this new product category and that the PR and marketing are moving a bit faster than the engineers.
Read More...