Monday, September 5, 2011

Facebook Password Hacking Software: Download Trojans & Keyloggers

How to Hack Facebook Account Passwords Using Trojans & Keyloggers

Here I am demonstrating using PRORAT trojan. You can also check the list of trojans & Keyloggers here which I have already posted few months back. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. I strictly recommend you to try these trojans & keyloggerson some testing system first.

Step-1: Download latest version of ProRat v1.9 Fix2. CLICK HERE to download. The ZipPass is : pro

STEP-2: Creating the ProRat server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".


STEP-3: Open Notifications. Select second option "Mail Notification". In the E-MAIL field you will see a mail
id: bomberman@yahoo.com. Remove this mail ID and give your own mail id here. You will receive a notification
email on this email id whenever you victim will be connected to internet from the infected system.

STEP-4: Open General settings. This tab is the most important tab. In the check boxes. here is a quick overview
of what they mean and which should be checked.

Key:

[ ] = dont check
[x] = check

[ ] Give a Fake Error Message. (when they open the file, it gives an error message.
[x] Melt server on install. (this will cause the server to ALWAYS connect to the internet when the victim gets
online)
[x] Kill AV - FW on Install. (this causes the anti-virus and firewalls to SHUT DOWN and stay off once installed
on the victim's computer.
[x] Disable Windows XP SP2 security center
[x] Disable Windows XP Firewall
[x] Clear Windows XP Restore Points
[ ] Dont send LAN notifications ( keeps other computers on the victim's network from knowing about you )
[ ] Protection for removing local server

In the Invisibility Box, check all 4 boxes.

STEP-5: Open Bind With File. You can bind your server\downloader server with a file that you want. You must
click on the ''Bind the server with a file'' button and then the file button will be activated. You can choose
a file to be binded with the server now. A good suggestion is a picture because that is a small file and its
easer to send to the people you need.

STEP-6: Open Server Extensions. I prefer using .exe files, because it is cryptable. Mostly crypters don't
support .bat/.pif/.com etc. So use .exe files.

STEP-7: Open Server Icon. You can select the one you want to use with the server from the small pictures on the
menu. You can use an icon from your computer also. Press the "Choose new icon" button.

STEP-8: After this, press "Create server", your server will be in the same folder as ProRat. A new file with
name "binded_server" will be created. Rename this file to something describing the picture.

[NOTE: PLS DO NOT OPEN THE FILE "binded_server" on your system.]

STEP-9: Sending this file "binded_server" to victim. You can send this trojan server via email, pendrive or if
you have physical access to the system, go and run the file.

From EMAIL, you can not send this file as it is because it will be detected as TROJAN OR VIRUS. Password protect this file with
ZIP and then email it. Once your victime download this ZIP file, ask him to unlock it using ZIP password. When
the victim will double click on the file, he will be in your control.

STEP-10: Connecting to the victim's computer. Once the server has been sent and the person has opened this ZIP
folder, they will now be infected with it. AND HAVE NO CLUE ABOUT IT!. On the top of the ProRat program you
will see a box in the upper left corner. Type in the victim's IP address and make sure the port is 5110. Now
press Connect. You should now see a pop-up box wanting to know a password. Remember the password you entered
while creating the server? that is what you need to type. By default, it is "123456" without quotes.

STEP-11: Check your email, (junk in needed), and find the “Your victim is online”. Copy and paste the IP
address onto ProRat where it says “IP:[127.0.0.1]“. Press CONNECT, DO NOT CHANGE THE PORT, if u did change it
back to 5110. Type in the password (default is usually 123456, it is in the email). Your done, now you can mess
with the buttons on the program. Especially the GIVE DAMAGE button. It will damage their pc by format, and will
make the computer useless.

Download latest version of ProRat v1.9 Fix2. CLICK HERE to download. The ZipPass is : pro

FAQ:

Q: Error message:Windows cannot access the specified deice, path, or file. You may not have the appropriate
permissions to access the item. What do I do?
A: Simple! Delete the ProRat program. Delete it. What happen was, your AV has altered the file. OR it could be m
alacious content. Either way, delete it. NEXT, remember the file you downladed? Un extract the file again and
re run. You will not need to remake a server file and such if it has been sent to the victim. Just open ProRat
and make sure your AV is shut off. Reconnect. There ya go.

Q: What operating systems are supported by ProRat?
A: Windows 95/95B
Windows 98/98SE
Windows ME
Windows NT 4.0
Windows 2000
Windows XP
Windows Vista

Q: When I have downloaded ProRat, my antivirus detect it as virus. What should I do?
A: Well, since RATs are hacktools, and all the hack tools are detected as viruses, ProRat is detected as virus
also. To download and install ProRat you will need to turn off your anti-virus.

Q: What should I do after I install my server?
A: After you install your server, you should spread it. Few years back I have installed my server manually on
1000's of cyber cafe in my city. I hacked almost the entire city cafe users secret information. This is the
best way. Go to nearest cyber cafe's and manually install your trojan server.

Q: I've created a server, but I don't see it in the directory. Why?
A: That's caused by your antivirus. The server is detected, and it won't let it. I suggest you to remove your
antivirus if you are going to use RATs.

Q: I've send my server to a friend on MSN, but he doesn't connect.
A: That's because he has an antivirus or firewall and it won't let him to connect in your RAT. To make it
FUD(Fully Undetectable), you should use a crypter.

Q: Is ProRat illegal?
A: No. ProRat is a legal RAT. The author of ProRat created his program for legitimate purposes. For example,
there are many legal activities. Parents can use keyloggers to protect their children from online abuse etc.
Some people use it for stealing passwords, credit cards and more but it's not a software which breaks the law,
but the person who uses it.

Q: Can ProRat be used for legitimate purposes?
A: Yes. You can monitor your children online activity.. to make sure they don't visit pornographic websites.
You can find out if someone uses your computer while you are away, ensure no one is accessing your personal
files while you are away and more.

Q: How do I make my server FUD?
A: You should use a binder or crypter. Also check the below links how to make trojan or keylogger fully undetectable from antivirus.
THIS TUTORIAL HAS BEEN CREATED WITH THE HELP OF AN UNDERGROUND HACKER flAmingw0rm. THANKS TO YOU MAN TO MAKE
THIS POSSIBLE.

Readers, we don't want any thing from you in return except a thanks. Pls comment here so that we can post
better contents and improve the stuff quality.

Saturday, September 3, 2011

Download Free Hacking & Security White Papers, Articles by cigital

White Papers

Software Assurance: Agile Testing (March 2008)
Agile testing enables clients to achieve improved coordination of their test resources with the agile development team by allowing automated tests to be developed in tandem with code development on the same set of requirements. The methodology employed eschews the concept of building automated tests after code has been released, unit tested, and manually tested. Instead, the test team creates automated tests in parallel with the code development team for the same set of requirements.

Software Assurance: Test Automation (March 2008)
Test automation enables clients to achieve improved productivity of their test resources, and to reduce the length of regression testing cycles while increasing test coverage. It complements and vastly improves the efficacy of existing manual testing and integrates with the overall testing effort. Instead of executing basic system tests time and time again, test resources can instead concentrate on: test case design, execution of test cases via the use of automated tests, as well as execution of remaining manual tests. These are tasks that best utilize a tester’s domain expertise and knowledge of test methodologies and practices. The Cigital offering for Test Automation covers all levels of test at the various phases of the SDLC, from unit level to sub-system and system level.

Training: the secret to ongoing compliance (July 2007)
Hundreds of thousands of companies around the world have collectively spent billions of dollars in response to the security- and privacy-related compliance mandates of the past 10 years. They have all increased staffing, upgraded physical security, deployed technology point solutions, rolled out new processes and digested hundreds of vulnerability and application scanner reports. So, why are data breaches and other security failures still a common occurrence?

How Now Software Security? (June 2006), by Gary McGraw, Ph.D.
Today, everyone seems to agree that we need to do something to address the security problem at the software level, and a number of companies are even starting to do something about it. It's still early days for software security, though, and it's a very good time to assess the state of the problem, how far we've come to address it, and how far we have to go. In general, we are very optimistic about the state the industry is in, especially considering the progress that leading software producers are making.

Software Security (June 2004), by Gary McGraw, Ph.D.
Software security is the idea of engineering software so that it continues to function correctly under malicious attack. Most technologists acknowledge this undertaking's importance, but they need some help in understanding how to tackle it. This paper aims to provide that help by exploring software security best practices.

And Many More.............................


Security Articles
  • You Really Need a Software Security Group (December 21, 2009)
  • BSIMM Europe (November 10, 2009)
  • Startup Lessons (October 22, 2009)
  • BSIMM Begin (September 24, 2009)
  • Attack Categories and History Prediction (August 25, 2009)
  • Moving U.S. Cybersecurity Beyond Cyberplatitudes (July 16, 2009)
  • Measuring Software Security (June 18, 2009)
  • Twitter Security (May 15, 2009)
  • Software Security Comes of Age (April 16, 2009)
  • The Building Security In Maturity Model (BSIMM) (March 16, 2009)
  • Nine Things Everybody Does: Software Security Activities from the BSIMM (February 9, 2009)
  • Top 11 Reasons Why Top 10 (or Top 25) Lists Don't Work (January 13, 2009)
  • Software Security Top 10 Surprises (December 15, 2008)
  • Web Applications and Software Security (November 14, 2008)
  • A Software Security Framework: Working Towards a Realistic Maturity Model (October 15, 2008)
  • Getting Past the Bug Parade (September 17, 2008)
  • Software Security Demand Rising (August 11, 2008)
  • Application Assessment as a Factory (July 17, 2008)
  • DMCA Rent-a-cops Accept Fake IDs (June 12, 2008)
  • Securing Web 3.0 (May 15, 2008)
  • Paying for Secure Software (April 7, 2008)
AND MANY MORE........................

Free Hacking & Security White Papers and Articles by cgisecurity

TOPICS ARE:
  • Socket Capable Browser Plug-ins Result In Transparent Proxy Abuse
  • Crafting a Security RFP
  • Building a Web Application Security Program, Part 8: Putting It All Together
  • Article: Security Assessment of the Internet Protocol
  • MD5 considered harmful today: Creating a rogue CA certificate
  • Software [In]security: Software Security Top 10 Surprises
  • Oracle Forensics Part 7: Using the Oracle System Change Number in Forensic Investigations
  • Article: What the NSA thinks of .NET 2.0 Security
  • Whitepaper: Bypassing ASP .NET “ValidateRequest” for Script Injection Attacks
.........And many more

Download Free Hacking & Security Corsaire White Papers, Presentations and Articles

In keeping with transparent approach to sharing knowledge, Corsaire invests time writing white papers in order to help share best-practice principles and proven information security techniques.

This posts includes the latest technical white papers that have been placed in the public domain.

Friday, September 2, 2011

Download Free Hacking & Security Foundstone White Papers

Organizations must protect their most valuable digital assets in an intelligent, measurable way. For this reason, Foundstone’s network security experts offer intelligent strategies that simplify security while fortifying the enterprise.

Foundstone white papers clarify the complex world of digital security and demonstrate how organizations can proactively monitor, manage and mitigate risk.

Download Foundstone white papers on a range of vital security issues and market trends.


TitleDescriptionDownload
.NET White Paper
Overview of the security architecture of Microsoft’s .NET Framework.
Download Now
.NETMon™ White Paper
.NETMon monitors the .NET common language runtime enabling detailed analysis of how the .NET framework enforces security controls.
Download Now
2007 Top 10 Malicious Code Trends
Details the trends that were observed in the evolution of malicious code over the course of 2007
Download Now
802.11 Attacks
Provides a step by step walkthrough of popular wireless attacks
Download Now
AJAX Security White Paper
Check out our Presentation on Ajax Security from the Rich Web Experience.
Download Now
ASP.NET Forms Authentication
This article describes limitations of the FormsAuthentication.SignOut method, and provides more information about how to ease cookie reply attacks when a forms authentication cookie may have been obtained by an malicious user.
Download Now
AJAX Storage White Paper
A look at AJAX applications using Flash "cookies" (shared objects) and Internet Explorer User-Data Persistence to store data out side of the standard browser cache.
Download Now
CookieDigger™ White Paper
CookieDigger helps identify weak cookie generation and insecure implementations of session management by web applications.
Download Now
Corporate Incident Response Plan White Paper
Whether your company needs to comply with new legislation, defend against financial loss, protect its corporate reputation - or a combination of the three - it is crucial that you have a comprehensive incident response plan.
Download Now
Data Loss Prevention Program
Safeguarding Intellectual Property
Download Now
Foundstone SSLDigger™ - The Need for Strong SSL Ciphers
SSLDigger is a tool to assess the strength of SSL servers by testing the ciphers supported. Some of these ciphers are known to be insecure.
Download Now
Foundstone Hacme Books User Guide
The Hacme Books application simulates a ‘real-world’ eCommerce bookstore and was built with known and common vulnerabilities to teach application developers, programmers, architects and security professionals how to create secure Java software.
Download Now
Foundstone SiteDigger™ 2.0 - Identifying Information Leakage Using Search Engines
Learn how to use search engines and Foundstone SiteDigger to identify accidental exposure of confidential information including financial records, passwords, and personal information via your Web site.
Download Now
Foundstone Hacme Bank™ User and Solution Guide
User and Solution Guide for Foundstone's Hacme Bank security application training tool.
Download Now
Got Citrix? Hack It! Presentation
Presentation deck used by Shanit Gupta at Shmoocon 2008
Download Now
Hacking the Kiosk: Managing the Risk of Public Information Systems
Find out how to identify threats and uncover common vulnerabilities in kiosks
Download Now
How Virtualization Affects PCI DSS
Part 1: Mapping PCI Requirements and Virtualization
Download Now
How Virtualization Affects PCI DSS
Part 2: Review of the Top 5 Issues
Download Now
IIS Lockdown and URLScan
Foundstone Review of Microsoft's IIS Lockdown and URLScan tools.
Download Now
Insecure Trends in Web Technologies
A Review of Insecure Implementations of Rich Internet Applications
Download Now
ISA Server SP1 Audit White Paper
Provides an overview of a security assessment conducted by Foundstone of Microsoft’s ISA Server 2000 after the addition of the Service Pack 1 (SP1).
Download Now
Java Client Side Application Basics: Decompiling, Recompiling and Signing
Java Web Start is a mechanism for program delivery through a web server. These programs are initiated by the client’s web browser, deployed, and ultimately executed independently on the system.
Download Now
Key Components of a Risk-Based Security Plan
How to Create a Plan That Works
Download Now
Managing a Malware Outbreak
Sality - A Case Study
Download Now
Microsoft System Architecture 2.0
Foundstone Security Review of Microsoft Systems Architecture 2.0 (MSA 2.0).
Download Now
Microsoft/Foundstone IP SEC
Using Microsoft Windows IPSec to Help Secure an Internal Corporate Network Server.
Download Now
Mobile Application Security Testing
Methodology, tools and techniques for testing mobile applications.
Download Now
Passive Host Characterization Presentation
Matthew Wollenweber Presentation at ShmooCon 2008
Download Now
Remote Forensics System White Paper
The Remote Forensics System application facilitates data acquisition, storage, and analysis in a forensically sound and efficient manner. The application was created by graduate students at Carnegie Mellon University in collaboration with Foundstone. The software is also available for download.
Download Now
Securely Registering Applications
Learn how to securely register applications that are automatically initiated. Intro to Foundstone free tool - DIRE
Download Now
SecureUML
Describes the SecureUML Visio template which is a custom Unified Modeling Language (UML) dialect to help system architects build roles based access control systems (RBAC).
Download Now
Security Training – Why It Benefits Your Organization and How to Make Your Case to Management
This whitepaper explores the reasons why you should invest in Information Security training, and how to present a case to company management.
Download Now
Socket Hijacking
Discusses the socket hijacking vulnerability, the impact of the vulnerability and what it takes to successfully exploit the vulnerability
Download Now
Software Security: Going Beyond the Development Phase
Find out why securing software from the start is important
Download now
Validator.NET™
Validator.NET enables developers to programmatically determine user input locations that could be potentially exploited by hackers and provides proactive steps to build data validation routines which are loaded into a protection module.
Download Now
Virtualization and Risk
Virtualization and Risk - Key Security Considerations for your Enterprise Architecture
Download Now
Wireless Intrusion Detection System
This paper presents an overview of the Whiff Intrusion Detection System, which was developed during the summer and fall of 2002 by a team of graduate students majoring in Information Security and Assurance at Carnegie Mellon University.
Download Now
Writing Effective Policies Part 1: Dissecting an Email Use Policy
The goal of this whitepaper is to outline the characteristics of an effective policy and explain clearly how to write an effective policy by showing both correct and incorrect examples.
Download Now

Thursday, September 1, 2011

Google New policy change for Backlinks: Reorganizing internal vs. external backlinks

Today we’re making a change to the way we categorize link data in Webmaster Tools. As you know, Webmaster Tools lists links pointing to your site in two separate categories: links coming from other sites, and links from within your site. Today’s update won’t change your total number of links, but will hopefully present your backlinks in a way that more closely aligns with your idea of which links are actually from your site vs. from other sites.


You can manage many different types of sites in Webmaster Tools: a plain domain name (example.com), a subdomain (www.example.com or cats.example.com), or a domain with a subfolder path (www.example.com/cats/ or www.example.com/users/catlover/). Previously, only links that started with your site’s exact URL would be categorized as internal links: so if you entered www.example.com/users/catlover/ as your site, links from www.example.com/users/catlover/profile.html would be categorized as internal, but links from www.example.com/users/ or www.example.com would be categorized as external links. This also meant that if you entered www.example.com as your site, links from example.com would be considered external because they don’t start with the same URL as your site (they don’t contain www).


Most people think of example.com and www.example.com as the same site these days, so we’re changing it such that now, if you add either example.com or www.example.com as a site, links from both the www and non-www versions of the domain will be categorized as internal links. We’ve also extended this idea to include other subdomains, since many people who own a domain also own its subdomains—so links from cats.example.com or pets.example.com will also be categorized as internal links for www.example.com.

image

If you own a site that’s on a subdomain (such as googlewebmastercentral.blogspot.com) or in a subfolder (www.google.com/support/webmasters/) and don’t own the root domain, you’ll still only see links from URLs starting with that subdomain or subfolder in your internal links, and all others will be categorized as external links. We’ve made a few backend changes so that these numbers should be even more accurate for you.
Note that, if you own a root domain like example.com or www.example.com, your number of external links may appear to go down with this change; this is because, as described above, some of the URLs we were previously classifying as external links will have moved into the internal links report. Your total number of links (internal + external) should not be affected by this change.