Friday, September 21, 2012

What is TELNET ? & How to Use TELNET?


Telnet: the Number One Hacker Tool

In this Guide you will learn:
·         What is telnet?
·         How to telnet
·         How to get telnet accounts <begin11c.shtml>
·         Why you might not want to telnet <begin11c.shtml>
·         How to install a telnet server on your home Windows computer <begin11c.shtml>
·         How to turn off a telnet server on your home Linux computer <begin11d.shtml>
·         How to explore computers using telnet <begin11d.shtml>
·         Why not use a portscanner instead? <begin11f.shtml>
·         How to break into web sites using telnet <begin11f.shtml>
"Where do I type that command?" People ask that all the time when they read my early Guides to (mostly) Harmless Hacking. I wrote those guides back when the Internet was in its infancy and almost everyone in cyberspace used telnet. However, nowadays you might never even hear about telnet, much less use it, unless you are a hacker. So if you are still wondering about telnet, today is your lucky day.


What Is Telnet?
Telnet is a protocol that is most commonly used to log into a remote computer. It also is the single most powerful hacking tool on the planet. With just a telnet client program, you can:
·         send email
·         download source code from web sites
·         send unexpected input to webservers that can give you amazing and sometimes illegal results
·         give arbitrary input to many other services on Internet host computers
·         probe the services offered by servers, routers and even people's home computers.
How to Telnet
Don't know how to telnet? Click the easy telnet links at happyhacker.com and land in the middle of a real hacker wargame! This should work regardless of your computer operating system -- if you have an up to date browser, if your online service provider gives you a true Internet connection, and if your computer is able to telnet at all.
Did those links get you into a telnet session? Were you able to login to a remote computer? If yes, congratulations.
If not, how can you fix the problem? If no telnet program appeared on your monitor when you clicked these links, perhaps your browser is too ancient to allow telnet. Try installing the latest Netscape browser (<http://www.netscape.com/>). Or, perhaps your operating system does not include a telnet program. In that case, install or reinstall Windows 95 or 98. If you own a Mac, get the superb Mac OS X or Linux PPC (<http://www.linuxppc.com/>).
If a telnet program came up and failed to connect, possibly the computer you were trying to telnet into was down or just plain no longer in existence. Or, you may be using America Online (or a similar extremely poor online service). If so, your simplest solution may be to get a better online service provider. Determined to hack using AOL? See http://happyhacker.org/aol.shtml <../aol.shtml> for some ways to make AOL give you a true Internet connection.
OK, so you've managed to telnet for the first time. Presumably you don't want to limit yourself to telnet links on web sites. How do you telnet anywhere you want to go?
If you have Linux or any other type of Unix (BSD, SCO, Solaris, Sun OS, Irix, Ultrix, etc.) telneting is easy. Just bring up "console" or "shell" (or whatever your GUI calls the command line interface). At the prompt type:
telnet <hostname or IP address>
More on Telnet: the Number One Hacker Tool
Windows 2000 works pretty much like Unix. See Figure 1 for an example of a Win 2000 telnet login. Not shown on the screen was the command "telnet 10.0.0.10", which I gave at the Command (MS-DOS) prompt.
Figure 1: Telnet using Windows 2000
If you have Windows 95, 98 or NT, to telnet, bring up the MS-DOS prompt (Start --> Programs --> MS-DOS).

Click "connect" then "remote system…". In the host name box place the host name or IP address of the computer to which you wish to telnet. Leave the Port and Term Type boxes alone for now.
Here is a really important point. Every day people email me complaining that some computer won't let them telnet into it. They ask what they are doing wrong. They aren't doing anything wrong:
·         Maybe the computer they are trying to reach no longer exists.
·         Maybe the computer they are trying to reach doesn't allow telnet logins. For example, whois.internic.net no longer allows telnet logins on port 23 (the default port). Click here to learn how to telnet into whois.internic.net on the right port for that particular server. <../whois.shtml>
·         Maybe a firewall is blocking them.
·         Or maybe they make a telnet connection and the remote computer asks for a user name and password they don't have. Then they email me asking for how to get a login name and password that will work.
Newbie note: The owners or administrators of any Internet host computer decide who gets user names and passwords. Believe it or not, about once a week someone emails me asking what user name and password their own online service provider has assigned them for a telnet login. That's why I'm telling people the obvious -- if you want to telnet into any computer, and you don't have a user name and password, you must ask the owner, administrator of tech support for that system for a user name and password. If they won't give that to you, they don't want you to have it!
You can go to jail warning: If you guess the user name and password, or use a computer breakin technique to get or create them, or if someone other than an owner or administrator or a legitimate user on that system gives you a user name and password, it is against the law to use them. Many computer criminals give out user names and passwords that they obtained illegally.
How to Get Telnet Accounts
OK, so you want to get legal user names and passwords so you can telnet into other computers. Here are some of the best ways:
·         See http://happyhacker.org/links2.shtml#shells <../links2.shtml> for organizations that will give you free shell accounts. You can telnet into these.
·         Ask Internet Service Providers for shell accounts. Some offer them, although most don't.
·         Set up a telnet server on your own computer (see instructions below). Yes, once you are running a telnet server, you can telnet from your computer back into your computer. Simply give the command "telnet 127.0.0.1".
·         Make friends with people who run Internet computers with telnet servers.
Why you May Not Want to Telnet
If you love your shell account server, don't ever, ever telnet or ftp into it. I recommend Ssh or Openssh for logging into remote computers? The telnet (and ftp) protocol is a "clear text" transmission. That means that computer on the same LAN as either You or your destination computer, or any computer on any LAN or network path through which your connection passes can steal your login name, password or anything else that goes across your connection. Ssh and OpenSsh encrypt all communications so no one can snoop on you.
How to Install a Telnet Server on your Windows Computer
Usually you can't telnet into a Windows home computer. The reason is, they aren't running telnet servers. Here's how to get a telnet server on your home Windows computers so your friends and you can telnet in and play.
For Windows NT, the Options Pack includes a primitive telnet server.
For Windows 95/98/NT and 2000, you also can install shareware or commercial telnet servers. Check out http://www.winfiles.com, or do a web search.
Of course installing a telnet server makes your computer vulnerable to all sorts of trouble from hackers. It's your funeral, don't come crying top me if a telnet visitor destroys your computer
How to Turn off a Telnet Server on your Unix-type Computer
If you go online with Linux or other Unix-type computer, a telnet server is the easiest way to ensure you get destroyed by a malicious hacker. Here's how to prevent this. On most of these, the file /etc/inetd.conf launches most of your servers. Edit the file to put a "#" in front of the line that has telnet in it and either reboot your computer or kill and restart inetd.
If your computer doesn't use inetd to launch services, you should be able to find telnetd under /etc/init.d.
Install ssh instead and only use that to log into your shell account.
How to Explore Computers Using Telnet
Even if a computer doesn't have a telnet server, there are lots of fun and even legal things to do to it using telnet. The easiest thing to do is extract "banners" from a victim computer. A banner is a message a computer will often give when you telnet to a port that is running an Internet server of some sort.
For example, most mail sending servers use port 25. To telnet to port 25 from Win 2000 or a Unix shell, simply type:
telnet <hostname or IP address> 25
Windows 95, 98 and NT make it a tiny bit harder.
A quick search of the Bugtraq archives at <http://www.securityfocus.com/>revealed horrid things a criminal could do to that Mercur mail server. Since I think it is more fun to be nice, I told someone at the company using this mail server about the problems. He invited me to vacation at his beautiful Swiss home, where he and his wife keep horses and take long trail rides in the Alps. Golly, that is much more fun than breaking into a computer!
Right about now some elite ueberhaxorz are probably reading this and saying "What a lamer Meinel is! We can do the same thing by running nmap."
They are right, you can learn the same things by running a port scanning program such as nmap (available at <http://www.insecure.org/>). However, I am quite careful about under what circumstances I run any port scanner. In order to get information on what programs are running on what ports, you must run a port scanner in a mode that will probably convince the owner of the victim computer that you are a criminal. He or she may persuade your online service provider to cancel your account.
The other reason to analyze computers using telnet is that you learn more. It's the difference between eating at McDonalds and learning how to cook.
How to Break into Web Sites Using Telnet
You don't have to use a web browser to access files on a web site. All you need to do is:
telnet <victimcomputer> 80
Or specify port 80 in a Windows telnet.
If you are using Windows 95/98/NT, whenever you are NOT logging into a telnet account, you should enable local echo. Otherwise whatever you type in (unless you are in a telnet account) will not show on the screen. To enable local echo, click Terminal --> Preferences --> Local Echo.
So how do you send stuff back to the webserver? Try this:
GET / HTTP/1.0
<your command here>
What kinds of commands can you send? The book Hackproofing Your Network <../bookstore/general.shtml> (by Ryan Russell of Securityfocus.com and Stance Cunningham) suggests a fun and harmless hack. Create and store a bogus cookie in the location on your web browser that stores cookies. (Find it by searching for the file "cookies.txt".) Name your bogus cookie something like "MyBogusCookie." Then telnet to the victim webserver and give something like this command:
GET / HTTP/1.0
User-Agent: HaveABogusCookieThisIsAJoke 123.4
Cookie: /; MyBogusCookie
The Überhacker! -- How to Break into Computers <../uberhacker/index.shtml> book details a number of serious attacks you can perform through sending funny input to a webserver. Basically, you need to learn how to write shell programs, and then find ways to get them to be run by the webserver. I'm not going to explain them here, however. These attacks, when carried out against a vulnerable webserver, are so easy that little kids could do them, and I don't want to be responsible for their behavior. It's much harder for little kids to get a hold of Russell's and my books than it is for them to read this GTMHH on the Happy Hacker website.
So are you dying to know what to send a webserver in order to break into it, without having to buy a book? Here are some hints. How to do this will depend on what webserver it is, what operating system it runs on, whether its security weaknesses have been fixed, and whether the web designer has used things such as Common Gateway Interface (CGI) or Server Side Includes (SSIs) that have weaknesses in them.
You will have to research these issues at Web sites that archive vulnerabilities and exploits such as <http://www.securityfocus.com/>and <http://packestorm.securify.com/>. You will need to study web site programming (HTML -- hypertext markup language, CGI and SSIs) and shell programming. You will need to learn webserver commands (documented at <http://www.w3.org/hypertext/WWW/markup/Markup.html>). You will have to use your brain and be persistent.
But at least if you come across a telnet exploit, now you know the answer to the question "where do I type that command?"

Domain Hijacking – How to Hijack a Domain



Domain hijacking is a process by which Internet Domain Names are stolen from it’s legitimate owners. Domain hijacking is also known as domain theft. Before we can proceed to know how to hijack domain names, it is necessary to understand how the domain names operate and how they get associated with a particular web server (website).

The operation of domain name is as follows
Any website say for example gohacking.com consists of two parts. The domain name(gohacking.com) and the web hosting server where the files of the website are actually hosted. In reality, the domain name and the web hosting server (web server) are two different parts and hence they must be integrated before a website can operate successfully. The integration of domain name with the web hosting server is done as follows.


1. After registering a new domain name, we get a control panel where in we can have a full control of the domain. 

2. From this domain control panel, we point our domain name to the web server where the website’s files are actually hosted.

For a clear understanding let me take up a small example.

John registers a new domain “abc.com” from an X domain registration company. He also purchases a hosting plan from Y hosting company. He uploads all of his files (.html, .php, javascripts etc.) to his web server (at Y). From the domain control panel (of X) he configures his domain name “abc.com” to point to his web server (of Y). Now whenever an Internet user types “abc.com”, the domain name “abc.com” is resolved to the target web server and the web page is displayed. This is how a website actually works.
What happens when a domain is hijacked

Now let’s see what happens when a domain name is hijacked. To hijack a domain name you just need to get access to the domain control panel and point the domain name to some other web server other than the original one. So to hijack a domain you need not gain access to the target web server.

For example, a hacker gets access to the domain control panel of  “abc.com”. From here the hacker re-configures the domain name to point it to some other web server (Z). Now whenever an Internet user tries to access “abc.com” he is taken to the hacker’s website (Z) and not to John’s original site (Y).

In this case the John’s domain name (abc.com) is said to be hijacked
How the domain names are hijacked

To hijack a domain name, it’s necessary to gain access to the domain control panel of the target domain. For this you need the following ingredients

1. The domain registrar name for the target domain.

2. The administrative email address associated with the target domain. 

These information can be obtained by accessing the WHOIS data of the target domain. To get access the WHOIS data, goto whois.domaintools.com, enter the target domain name and click on Lookup. Once the whois data is loaded, scroll down and you’ll see Whois Record. Under this you’ll get the “Administrative contact email address”.

To get the domain registrar name, look for something like this under the Whois Record. “Registration Service Provided By: XYZ Company”. Here XYZ Company is the domain registrar. In case if you don’t find this, then scroll up and you’ll see ICANN Registrar under the “Registry Data”. In this case, the ICANN registrar is the actual domain registrar.

The administrative email address associated with the domain is the backdoor to hijack the domain name. It is the key to unlock the domain control panel. So to take full control of the domain, the hacker will hack the administrative email associated with it.

Once the hacker take full control of this email account, he will visit the domain registrar’s website and click on forgot password in the login page. There he will be asked to enter either the domain name or the administrative email address to initiate the password reset process. Once this is done all the details to reset the password will be sent to the administrative email address. Since the hacker has the access to this email account he can easily reset the password of domain control panel. After resetting the password, he logs into the control panel with the new password and from there he can hijack the domain within minutes.

How to protect the domain name from being hijacked

The best way to protect the domain name is to protect the administrative email account associated with the domain. If you loose this email account, you loose your domain.. Another best way to protect your domain is to go for private domain registration. When you register a domain name using the private registration option, all your personal details such as your name, address, phone and administrative email address are hidden from the public. So when a hacker performs a WHOIS lookup for you domain name, he will not be able to find your name, phone and administrative email address. So the private registration provides an extra security and protects your privacy. Private domain registration costs a bit extra amount but is really worth for it’s advantages. Every domain registrar provides an option to go for private registration, so when you purchase a new domain make sure that you select the private registration option.

How to Spoof an Email Addresses?

If you want to send email from your friend`s email address then you can use following services. keep in mind that it`s not actually send email from your friend`s mail address ,but the person who receive email  see your friend`s email address in sender

www.hoaxmail.co.uk

anonymailer.net 

emkei.cz

Above all emkei.cz  is my favourite because it provide some advance option like email-header, reply to,cc etc.

You can also send from your cmd ,but for that purpose you need S.M.T.P server name  of your I.S.P. so use above services only for fun .

Thursday, September 20, 2012

Hacking News & Cyber Updates: 20th Sept 7 PM

Cybercrime on the rise in Bangladesh
Khabar South Asia
In February of this year, a cyber war broke out between hackers
in Bangladesh and India, resulting in the temporary disruption of
some important websites in both countries including the prime
minister's office in Bangladesh. The logo of the Bangladesh ...
See all stories on this topic »
Computer programmer charged with hacking Toyota website,
causing crash of ...

The Republic
A computer programmer from central Kentucky who once did
contract work for Toyota has been charged with hacking into
and damaging computers used by the automobile maker. The
FBI filed a federal criminal complaint against Ibrahimshah
Shahulhameed ...
See all stories on this topic »
POS Hacking Exposes Security Holes
NACS Online
PRINCETON, NJ – Details revealed in court following the
apprehension of two hackers who hit point-of-sale devices at
100 shops and retailers expose POS security vulnerabilities,
Bank Info Security reports. The attacks compromised
Internet-connected POS ...
See all stories on this topic »
Beware: Tony Baez's e-mail hacked
Milwaukee Journal Sentinel (blog)
But he's in Puerto Rico and his e mail was hacked, said Aldira
Aldape, his executive assistant. She said he's sending out
messages to ignore the bogus e mail. In the fake e mail the
writer claims "we were attacked by four armed robbers on our way back ...
See all stories on this topic »
Japanese government sites allegedly hacked by the Chinese
The Next Web
The Chinese-Japanese islands clash has taken a new turn;
an online war may have just erupted. Japan appears to be the
 victim, but that's just assuming the country's Internet elite
doesn't decide to hit back. At least 19 Japanese websites, including ...
See all stories on this topic »
Windows Secrets Newsletter website hacked
Ghacks Technology News
It recently became known that the Windows Secrets Newsletter
website got hacked. The attacker managed to brute force an
administrator account to gain access to the site. Using the
account, the hacker planted malicious code on the site to get access to...
See all stories on this topic »

Hackers leak passwords from popular private torrent
\tracker

Afterdawn.com
"RevTT is hacked by Afghanistan Hackers!!!" The torrent tracker
 was founded 6 years ago and is one of the larger private trackers.
Private trackers require registration for access, usually via invites
from other established users. Site staff as less ...
See all stories on this topic »

We need 400000 skilled people to address cyber security:
Gulshan Rai

Business Standard
We track sites that are hacked and try to get in touch with all
the parties that report to us. According to our mandate we try to
 help them, study the logs, look into the vulnerabilities that have
been exploited and consider what needs to be done. We ...
See all stories on this topic »Android Hacked via NFC on the Samsung Galaxy S 3
By Emil Protalinski
Security researchers participating in the Mobile Pwn2Own contest
at the EuSecWest Conference in Amsterdam today demonstrated
how to hack Android through Near Field Communication (NFC).
The 0day exploit was developed by four ...
The Next Web
iPhone 4S hacked to gain unauthorized access to photos
and ...

By Jake Smith
Two clever minds during a Pwn2Own contest were able to hack
a fully patched iPhone 4S to gain a slew of information from the
device, reported ZdNet. The hackers, Joost Pol and Daan Keuper,
 were able to find vulnerability in WebKit that ...
9to5Mac
iPhone 4S hacked at Pwn2Own thanks to Safari flaw –
Cell Phones ...

By Ryan Whitwam
Even the iPhone is not invulnerable to security flaws.
Geek.com
2NE1′s CL hacked Dara's Twitter?
By elliefilet
Fans and netizens commented, “I was shocked because I thought
Dara's Twitter was hacked only two days after she made it”, “I was
worried you were really hacked”, “It's so cute that Park Bom looked
at all the mentions”, and “It's funny ...
allkpop

Tuesday, September 18, 2012

How To Hide Your Digital Identity Online - The Last Hope


Eat yourself up before someone else eats you. Proving this adage right we have done this rough research on being anonymous online. I doubt anyone can be more silent than this. Read out to find out. If you still get knocked then hard luck.
Feedback Appreciated!!!






How To Be Anonymous Online

Download Link [SLIDES] :
How To Hide Your Digital Identity Online

Download Link [PAPER] :

http://www.docstoc.com/docs/130377721/How-To-Hide-Your-Digital-Identity-Onlin

Contact :
Facebook - https://www.facebook.com/h4nDs0m3.dEviL
Twitter - @chintan_gurjar



Pocket TV Is a Mini Android Computer in an HDMI Dongle

Pocket TV Is a Mini Android Computer in an HDMI Dongle

Introduction

Over a billion people have access to the internet and use it on a regular basis. In such a scenario, it is inconceivable that any new technology or gadget could go unnoticed and not receive much attention. While it hasn’t gone unnoticed, the Pocket TV has surely not picked up as much heat as is expected of a major technological development. Developed by a startup company using crowdsourcing, Pocket TV has the potential to be the next breakthrough in modern consumer gadgetry.

It is quite surprising that the people paid nearly $100,000 of their own money to fund the creation and development of the gadget, yet many people are still unaware. The device is still in the testing phase and it will be some time before it is launched in the market for the general public. Till then, consumers have the option to buy the test version which is available for around $100. All of the features are included but the version still lacks the finishing touches of a completed product.

What’s It All About?

Surely the information available about Pocket TV is enough to arouse interest in the consumers. Yet, until the date it is launched, there is anticipation about how the makers plan to promote it. So, what does Pocket TV do?

By the looks of it, it sounds like it is a gadget that enables you to watch TV on pocket sized gadgets. Well it is not. If you were thinking it was, you couldn’t be more wrong. In fact, it is quite the contrary. The device has the ability to transform your ordinary TV into a smart TV, while enabling you to operate it like an Android device. Sounds too good to be true, doesn’t it? It may sound fantastical but it has been made and soon you will be hearing all about it.

You might still be apprehensive about installing the device in your television. After all, the Dish Latino Dos channel is very popular and people love watching their favorite shows on the big screen. That being said, regardless of the fact that the Dish Latino Dos channel is very popular, it does not enable you to use Smart TV on your television set.

Basically, Pocket TV is a dongle that connects to the HDMI port of your television set. All of the modern television sets have an HDMI port so that shouldn’t be much of a problem for you. Some people are put off by the fact that a mere dongle is offering them such great entertainment options. That is the reason why everyone who has used Pocket TV is so enthusiastic about its prospects. It is a great offer for you in a small package.

The dongle connects to your television and the Android environment begins loading on the screen. You can then begin accessing all the features and functions that have made Android devices a raging success over the past few years. But how is that possible?

Thanks to the geniuses working at Infinitec, the company that has developed Pocket TV, you get to use the Android operating system 4.0 out of a dongle. It isn’t a mere dongle. It is a full-fledged computer with a 1 GHz processor inside it. Ever heard of such a dongle? Bet you didn’t!

All of this adds to the fact that you can enjoy all of the features that people normally associate with smartphones and computers. You can browse the web, download content, stream videos, use social media websites and listen to music all on your television set. If you thought your TV was outdated and you need an upgrade, think again. All you need to do is buy the Pocket TV dongle and your TV will be transformed into a smart TV within minutes.

Conclusion

Without a doubt, the Pocket TV is the most exciting development in the tech industry over the past couple of years which hasn’t come from an industry giant. The mere fact that it has been designed, developed and created by a startup speaks volumes of the industry’s growth since the turn of the millennium. So, just wait patiently for the launch of the gadget and buy it as soon as you possibly can.

Career in Penetration Testing: What Would a Penetration Tester Do?

IT, cyber, and network security are huge fields in today’s world. As more and more information becomes available and is stored online, there becomes a bigger need than ever before for security of that information. The world needs highly skilled individuals that can protect the infrastructure of networks and systems.

What Would a Penetration Tester Do?

The job of a penetration tester is to find exploits, weak points, or holes in computer systems and software. This would include trying to break into a system in order to find out where the vulnerabilities are. Running a number of tests is required in order to do this. Running these tests and filling out assessments and reports of is a very important aspect of the job. This allows pen testers to report what they have discovered so that any issues can be resolved.

Pen testers do get to use their imagination and creativity when coming up with their own tests to run on systems. Sometimes pre-determined tests will be run, but a lot of the time it will be required to come up with and run custom ones. This does allow the pen tester to get creative and have a little fun when coming up with tests, but also requires skill and technical knowledge to implement.

A penetration tester does hold a significant amount of responsibility. It is their job to run formal tests on web-based applications, networks, or any other computer systems. The security of servers, networks, and systems lies in the hands of the penetration tester. Areas of specialty include wireless networks, databases, software, company websites, and more. Pen testers may be required to work in multiple areas, but may also specialize in just one single area.

Career and Salary

All this responsibility that a pen tester holds does not come without reward. Salaries for IT consultants range from about $55,000 - $88,000 per year. Entry level will be closer to the lower end of the salary of course, but there are plenty of opportunities for advancement. Demand is good for IT consultants with skills in penetration testing. Working in government positions offers a slightly lower salary range of about $52,000 - $87,000 per year. With demand in both the private and public sectors, job outlook seems good for individuals interested in penetration testing.

Technology is constantly becoming a bigger and bigger part of society and demand for security of online information is only increasing.

Want to learn more about careers in penetration testing? Visit the TrainACE penetration testing class for more info. TrainACE also provides IT security classes in many other areas such as CEH, CHFI, cloud security, and more. Visit the main information security page here.

Guest post by Alan Rosinski