Welcome to XnonymouX Blog

Monday 26 November 2012

Protect Yourself Against Phishing

By on 22:23

This week, you may have heard about some new phishing websites that were created to look identical to authentic Facebook pages. Phishing is common across the Internet, but the security team at Facebook has been working to halt the spread of these latest malicious sites.

The fake sites, like the one below, use a similar URL to Facebook.com in an attempt to steal people's login information. The people behind these websites, known as "phishers," then use the information to access victims' accounts and send messages to their friends, further propagating the illegitimate sites. In some instances, the phishers make money by exploiting the personal information they've obtained.




When the latest phishing incident surfaced on Wednesday, we quickly blocked the fake links from being shared on Facebook to stop their spread. We've been removing these links from Walls and Inboxes across the site and resetting passwords for any of the compromised accounts we detect. This foils the bad guys, because the login information they collect will no longer work.



Working together

Since phishing is an Internet-wide issue, we also work closely with others in the online security industry to combat these threats. For example, when we find a new phishing site, we send the information to MarkMonitor, a company that adds these phony sites to blacklists. If you've ever visited a website and seen a red sign indicating that it was a "Web Forgery," you've probably seen their work. They also get the fake websites taken down by internet service providers (ISPs), which connect you to the Internet and host websites, and other companies that manage websites. This is what happened with one of the phishing sites involved in the most recent attack. Together, we've responded to over 1,400 phishing sites, including over 240 since the beginning of this year.



Detecting threats

In addition to working with others, we're always improving our own systems. We look at unusual activity on Facebook to detect threats to protect people on the site. For instance, when someone posts to their friends' Walls at a higher rate than usual, we flag the account as potentially compromised. Similar to online banking websites, we take a lot of precautions around your login. If we suspect that your account has been compromised, we ask for additional information to confirm your identity.

How you can help
To combat these threats, we need to your help, too. Protect yourself by always following a few key rules of thumb when you're online:
  • Use an up-to-date browser that features an anti-phishing black list. Some examples includeInternet Explorer 8 or Firefox 3.0.10.
  • Use unique logins and passwords for each of the websites you use.
  • Check to see that you're logging in from a legitimate Facebook page with the facebook.com domain.
  • Be cautious of any message, post or link you find on Facebook that looks suspicious or requires an additional login.
Become a fan of the Facebook Security Page for more updates on new threats as well as helpful information on how to protect yourself online.

Paypal Hacking

By on 22:05
Paypal Hacking

Disclamer : for educational purpose only ... thanks ...

This tutorial will help you to hopefully get software and possibly products for almost free.
It won't work on products because it sends the seller an email along the lines of "you have received $0.01 from (your paypal name) for (the product)" However this works great on automated software scripts where it detects that you gav
e a payment and emails you a link to download the software


Step 1: Download Tamper Data

You will need the Firefox extension Tamper Data for this to work.

Step 2: Finding your target

You need to find a place that supports paypal or paypal shopping carts

http://image.wetpaint.com/image/1/V7Zjl-uLHv7857f68pRGKA3886/GW505H57 )

Step 3: Start Tamper Data

Next we need to start Tamper Data up.
In Firefox menu go to tools then Tamper Data.
Once the window shown below pops up press Start Tamper

http://image.wetpaint.com/image/1/URkZhvILyTSVENifML6UOw17939/GW570H356 )

Step 4: Buy it!!

Now click add to cart.

The Tamper with request window will pop up. Click the Tamper button

http://image.wetpaint.com/image/1/V7Zjl-uLHv7857f68pRGKA3886/GW505H57 )

http://image.wetpaint.com/image/1/M9oMjU7opYKfX_bHQHutfQ9041/GW326H126 )

Step 5: Tamper with the data

Now for the most important part, modifying the post variables.
Find the parameter called amount and change the value to 0.01 because that is the lowest amount PayPal will process. Next mess with the parameter called no_shipping, if it is even there, until your shipping comes out free. When you are done click the OK button at the bottom of the window.

http://image.wetpaint.com/image/1/VjeYcyrogOkU8t99fa6I4Q23428/GW508H405 )

Trick to crack any software and run the trial version forever

By on 04:35

Are you using any trial version software which is just too awesome but nearing its expiry and unable to find ways to crack it?
trial Crack any software and run the trial version forever?
Here is a trick to crack any software and run the trial version forever just in a couple of minutes.

Before starting with the crack you should know how these trial version software are programmed. These software’s always comes with 1 month trial period after which they will expire. When these software’s are installed for the first time they make an entry of Installation Date, Time etc. in the Windows Registry. Whenever we run these software’s they compare the current system date and time with the installation date and time. Thus they make out whether the trial period is expired or not.
Manually changing the system date and time to an earlier date and time will not be the right solution. To over come this there is a simple tool “RunAsDate v1.11” which can be used.
RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date and time of your computer, but it only injects the date/time that you specify into the desired application.
Tips to Follow:
-  Download this utility and have it ready all time
-  As soon as you install any trial version software just note down the date and time of installation
-  Inject the expiry date and time in the RunAsDate tool. It is always safe you put in a date which is prior to your expiry date
runasdate Crack any software and run the trial version forever?
-  After expiry always run the such software’s using the RunAsDate tool. Thus the trial version software will run forever!!!
Note: After expiry don’t run such software’s directly else the crack will no longer work.
Download: RunAsDate
I hope this trick would be of great help for most of us… Try it out and put in your comments!!!

Sunday 25 November 2012

Steps to Determine Email Sender’s IP Address and Location

By on 22:10

This is the age of technology and today we use electronic mails more as compared to the old form of physical mails. When we receive an email from someone we can find out who is the sender of the email from the sender’s address but there is no field that can tell us what the location of the email sender is. Sometimes it becomes very important to determine the location of the email to check its validity as a person may be sitting in some country and claiming to be in another.


Thus it sometimes, is important to find out the approximate location (if not accurate) of the email sender. To be able to find out the location of the email sender we first need the IP address of the email sender or the IP route used by the email itself. Determining this is not very difficult and every different email service has its own way of finding this out. It can be like right clicking and checking the properties or the Full Headers.

If you are using Gmail primarily, then here is how to find the IP address of the sender and its location.


How to find the IP address of the Email sender in Gmail:


1. Open the email that you wish to find the IP address of.

2. From the drop down on right side, click the Show Original button



3. This will open a new window with lots of email information.

4. Now search for “Received: from”, you will see some IP address in the same line within square brackets like [XXX.XXX.XXX.XXX]




5. Now see for the last IP address of the page.
This will be the IP address of the sender or the route of the email used for delivery.

How to find the location of the email sender:

1. You can use the IP address noted above to find the location of the sender.
2. Visit this link, paste the IP in the Remote Address Field and click the Host Trace button.



3. Within few seconds, you would be able to see the location of the IP address on the Google Maps.
In the testing, I found this address to be more than approximation, if not accurate.
Note: Some email address might not be showing an IP address, this can be because they have protected their IP address from public display.

Saturday 24 November 2012

How to make remote file with ardamax keylogger

By on 04:09

Remote Installation
Remote Installation Wizard is used to create the installation package that will install the keylogger on the target computer once it is launched.
Note: this feature is available for registered user only. Please register your Ardamax Keylogger copy.
To create such a package, right-click the tray icon.
And select the Remote Installation item. It will start the installation package wizard.

Click the Next button to continue.

Appearance

This page is used to specify the general parameters of the installation package.
  • Installation folder on target computer - the folder the keylogger will be installed to on the target computer. You can select either the Windows folder or the system folder.
  • Additional components - components that will be installed together with the keylogger:
    • Log Viewer - the program for viewing logs.
    • Help file - help documentation.
    • Installation package builder - the component that makes it possible to create installation packages.
  • Append keylogger engine to file or another application - include a program or file that will be opened when this package is launched. Note: the extension of the installation file will be exe no matter what the extension of the included file is.
  • File path - the path to the file or program to be included. Click the Browse button to select the file.
Click the Next button to continue. You can use the rest of the pages to specify the parameters of the keylogger that will be installed on the target system.

Destination

This page is used to specify the advanced parameters of the package.
  • Installation package path - the path to the new installation package file. Click the Browse button to specify the path. Make sure that the specified location is available for writing and the name of the file has the exe extension.
  • Open the folder containing the installation package - open the folder with the installation package right after it is created.
  • Change Icon - change the package file icon. You can select any executable file with icons or a file with the ico extension.
Click the Next button to continue.

Finish

This page displays the summary information about the installation package being created.
Click the Finish button to finish creating the installation package.

Friday 23 November 2012

How to get free credit in Skype

By on 23:09

How to get free credit in Skype?



This is the easiest way to hack Skype Credit. Most methods of hacking Skype are very annoying. will be asked to complete surveys and make offers. or register on websites or newsletters. onlything you have to do in this method is to click a button, such as Facebook and get 60 minutes of conversation. That’s why this method is very simple. Now let’s see how we can use this trick to get Skype credit to our free Skype account.
Millions of people use Skype on computers and mobile phones to connect and communicate with each other. the freedom to make computer to computer or Skype-enabled mobile phones. but when you have to call landline or mobile phone, you do not have Skype installed, you must download the Skype call going. Basic way to get Skype credit is a payment method online. But now that you do not like. There are some trusted sites to get free credits, in this tutorial I will show you a site that offers free Skype Credit in minutes, records or other activities.
  • First you have to hide your IP address and assign a fake IP from US, Canada or England. because this Skype Credits offer valid only for those countries. i have used “Hide My IP” software in this tutorial video. you can use
>Hotspot Shield
>Ultra Surf
>Hide my IP
>Foxy proxy (Firefox addon) or any other proxy server
  • Now login to your facebook account
better stay login to facebook before you change your IP address. because if you have installed Facebook security features, you might get some troubles when sign in from an IP address fro different country.  After you logged in  go to this page and click like button  iFeelGoods Skype Credits offer 
  •  After clicking the like button they will give you a coupon code to get your Free Skype credits. now go to your Skype account and paste it on redeem option. Click below link to enter your Skype Credits coupon
https://secure.skype.com/account/voucher/redeem(Assign Skype Credits to my Skype Account)
Thats it..!!!

Angry Birds Space Theme for Windows 7 & Windows 8

By on 23:06

Angry Birds Space Theme for Windows 7 & Windows 8



angry-birds-space-theme-windows



After banging pigs in Angry Birds Space PC Version now its time to make your desktop angry by transforming it into a high definition Angry Birds home, where these birds will create some secret plans for banging those green ugly pigs muhaah! well this theme come with 10 high quality HD Wallpapers from Angry Birds Space.


So now this theme is available for both Windows 7 and 8, making your desktop fully colorful, setups for both are provided below you can download them.
Have fun guys and make sure to share these theme packs with all your friends so that they can also enjoy these and make their desktop colorful and angry too.

HTC wildfire 2.2.1 root to HTC wildfire Android 2.3 | Install Android 2.3 on HTC Wildfire | How to root Htc Wildfire 2.2.1

By on 23:01

HTC wildfire 2.2.1 root to HTC wildfire Android 2.3 | Install Android 2.3 on HTC Wildfire | How to root Htc Wildfire 2.2.1



Sometime ago I got an HTC Wildfire and was having loads of fun using it, but every time I wanted to do anythingHTC wildfire 2.2.1 root to HTC wildfire Android 2.3 | Install Android 2.3 on HTC Wildfire | How to root Htc Wildfire 2.2.1more  "creative" i was stopped by the binded nature of phone, hence i decided to root it (jailbreak it apple fellas) and get complete control over my device. Here, I am covering step by step guide to root HTC wildfire 2.2.1 and install Android 2.3 on HTC Wildfire.
To do the rooting you must have your Wildfire with S-OFF, HBOOT 1.02.0002 and Android 2.2.1 . You can check it by booting into HBOOT (power on your phone by holding the VOLUME DOWN + POWER button) .This method is strictly for the 2.2.1 owners. How you can turn the S-OFF is your headache, you can try the alpharev (ask the team if they can get you a 2.0 test version... :P) or you can wait for Unrevoked 3.33 or you can straight off go to market and hunt for XTC clip. Either way, try it and don't attempt to anything before you get S-OFF. Actually the notorious S-ON flag is the cause rooting wildfire is such a pain in the a**. 
I used to have this
Android 2.2.1
and I converted it into this :)

3
or this =)
7
Anyways, here is how you can root HTC wildfire 2.2.1 and get htc wildfire Android 2.3
What you need ?
  • HTC wildfire with S-OFF , HBOOT 1.01.0002 , OS Froyo 2.2.1
  • USB Drivers (Download)
  • RUU Rom 2.1 / RUU_Buzz_HTC_WWE_1.14.405.2_R_Radio_13.45.55.24_3.35.15.31_release_130814_signed (Download)
  • Unrevoked 3.2 Test version (Download)
  • Cyanogenmod 7 (Download) and Google Apps (Download)
  • Time and Patience & last but not the least,
  • Balls of Steel
    Disclaimer
    I am not responsible if your phone gets bricked, by following the process you are voiding your warranty and significant damage may be caused to your device. 
    Its all for educational purposes only, if you are dumb enough to screw somewhere then I will be the one who will be laughing at you. 
    Software are unpredictable in nature, one may/may not act as predicted especially in case of rooting (personal experience). Hence my friend, tread carefully. 
    in short,
I AM NOT RESPONSIBLE FOR YOUR STUPIDITY.
Step 1 - Installing the USB drivers
Download USB drivers and extract them on desktop. Turn off your wildfire and boot into HBOOT by holding the VOLUME DOWN + POWER button. Connect your phone to your PC and it will show "drivers installing" or similar there for Android device. When prompted , install the drivers by going to device manager and browsing to the folder where you extracted the drivers. Once installed, disconnect and reboot your phone normally.
Now you need to install the Android bootloader interface. Connect it to your HTC wildfire to the PC and it will ask for drivers again, now go to device manager, click on unknown device,
click on update driver -> install from specific location -> No i will choose to install -> choose Android phone and click on adb interface -> click next -> when asked to install click on continue anyway, just install them.
Once done you will see your phone recognized as "Android bootloader interface". Now disconnect your phone and go into
settings -> applications - > development - > enable USB Debugging.
Congratulations, the first step is complete.
Step 2 - Downgrading from Android 2.2.1 Froyo to Android 2.1 Eclair
Download the RUU rom which is an original stock rom. Plug your phone into the PC and set it to "Charge through USB". Double click RUU rom .exe. Follow the on screen instructions and then let it install. Your phone will reboot into stock HTC 2.1 :) This will be the last time you will be seeing it though.
rom
The HBOOT version will be now 0.80.0002 (check it by powering on your phone by holding the VOLUME DOWN + POWER button)  Once done disconnect your phone.
Step 3 - Gaining root using UnrEVOked , get clockworkmod and set your phone free :)
Download the test version of unrevoked. Let me repeat, DO NOT USE UNREVOKED 3.32 as it will lead to CID errors or to be precise this error
"validation error backup cid is missing"
This may be caused as the 3.32 doesnot support HBOOT 0.82.0002. Hence You need specific test version of Unrevoked 3.2 to do the job. Download it, save it on desktop, and run it. Now connect your phone and the rooting will start. Once donw, you will have Clockworkmod recovery installed on your phone. Reboot your phone now (using the VOLUME UP/DOWN key for navigation and clicking using TRACKBALL, the POWER button takes you back in menus). Once rebooted, you will see the superuserapp in your phone and congratulations, your phone is successfully rooted :)
Step 4 - Installing Cyanogenmod 7 or Android Gingerbread 2.3.3
Download the Cyanogenmod 7 with google apps and save it on desktop, connect your phone as USB diskdrive and transfer both zip files on SD card. Once done, reboot your phone into ClockworkMod Recovery (booting by holding the VOLUME DOWN + POWER button and clicking on recovery)
Once the device boots into the ClockworkMod Recovery, use the side VOLUME buttons to move around, and either the POWER button or the TRACKBALL to select.
  • Select the option to Wipe data/factory reset.
  • Then select the option to Wipe cache partition.
  • Select Install zip from sdcard.
  • Select Choose zip from sdcard.
  • choose update-cm-7.0.0-buzz-signed.zip & Let it install.
  • Once done, Select Install zip from sdcard.
  • Select Choose zip from sdcard, choose gapps-gb-20110307-signed.zip
  • Once the installation has finished, to get back to the main menu by clicking the POWER button and select the Reboot system now option.
Congrats..The HTC Wildfire should now boot into CyanogenMod.
Finally rooted :)
Android terminal emulator running on superuser privileges
Enjoy Android 2.3.3 :)
Special thanks to Loveable Jerk

Cross Site Scripting(XSS) Complete Tutorial for Beginners

By on 22:45

Cross Site Scripting(XSS) Complete Tutorial for Beginners~ Web Application Vulnerability

What is XSS?
Cross Site Scripting also known as XSS , is one of the most common web appliction vulnerability that allows an attacker to run his own client side scripts(especially Javascript) into web pages viewed by other users. In a typical XSS attack, a hacker inject his malicious javascript code in the legitimate website . When a user visit the infected or a specially-crafted link , it will execute the malicious javascript. A successfully exploited XSS vulnerability will allow attackers to do phishing attacks, steal accounts and even worms. 

Example :Let us imagine, a hacker has discovered XSS vulnerability in Gmail and inject malicious script. When a user visit the site, it will execute the malicious script. The malicious code can be used to redirect users to fake gmail page or capture cookies. Using this stolen cookies, he can login into your account and change password.
It will be helpful for understanding XSS , if you have the following prerequisite:
  • Strong Knowledge in HTML,javascript(Reference).
  • Basic Knowledge in HTTP client-Server Architecure(Reference)
  • [optional]Basic Knowledge about server side programming(php,asp,jsp)

XSS Attack:
Step 1: Finding Vulnerable Website
Hackers use google dork for finding the vulnerable sites for instance  "?search=" or ".php?q=" .  1337 target specific sites instead of using google search.  If you are going to test your own site, you have to check every page in your site for the vulnerability. 

Step 2: Testing the Vulnerability:
First of all, we have to find a input field so that we can inject our own script, for example: search box, username,password or any other input fields.


Test 1 :
Once we found the input field, let us try to put some string inside the field, for instance let me input "BTS". It will display the  result .

Now right click on the page and select view source.   search for the string "BTS" which we entered in the input field.  Note the location where the input is placed.

Test 2:
Now we are going to check whether the server sanitize our input or not.  In order to do this , let us input the <script> tag inside the input field. 
View the source of the page . Find the location where input displayed place in previous test.

Thank god, our code is not being sanitized by the server and the code is just same as what we entered in the field. If the server sanitize our input, the code may look like this &lt;script&gt;. This indicates that the website vulnerable to XSS attack and we can execute our own scripts .

Step 3: Exploiting the vulnerability
Now we know the site is somewhat vulnerable to XSS attack.  But let us make sure whether the site is completely vulnerable to this attack by injecting a full javascript code.  For instance, let us input <script>alert('BTS')</script> .

Now it will display pop-up box with 'BTS' string. Finally, we successfully exploit the XSS .  By extending the code with malicious script, a hacker can do steal cookies or deface the site and more.

Types of XSS Based on persisting capability:
Based one Persistence capability, we can categorize the XSS attack into two types namely Persistent and Non-Persistent.

Persistent XSS:

The Persistent or Stored XSS attack occurs when the malicious code submitted by attacker is saved by the server in the database, and then permanently it will be run in the normal page.

For Example:   
Many websites host a support forum where registered users can ask their doubts by posting message  , which are stored in the database.  Let us imagine , An attacker post a message containing malicious javascript code instead.  If the server fail to sanitize the input provided, it results in execution of injected script.  The code will be executed whenever a user try to read the post. If suppose the injected code is cookie stealing code, then it will steal cookie of users who read the post. Using the cookie, attacker can take control of your account.


Non-Persistent XSS:

Non-Persistent XSS, also referred as Reflected XSS , is the most common type of XSS found now a days. In this type of attack, the injected code will be send to the server via HTTPrequest.  The server embedd the input with the html file and return the file(HTTPResponse) to browser.  When the browser executes the HTML file, it also execute the embedded script.  This kind of XSS vulnerability frequently occur in search fields.

Example:
Let us consider a project hosting website.  To find our favorite project, we will just input the related-word in the search box .  When searching is finished, it will display a message like this "search results for yourword " .  If the server fail to sanitize the input properly, it will results in execution of injected script.

In case of reflected XSS attacks, attacker will send the specially-crafted link to victims and trick them into click the link. When user click the link, the browser will send the injected code to server, the server reflects the attack back to the users' browser.  The browser then executes the code .

In addition to these types, there is also third  type of attack called DOM Based XSS attack, i will explain about this attack in later posts.

What can an attacker do with this Vulnerability?
  • Stealing the Identity and Confidential Data(credit card details).
  • Bypassing restriction in websites.
  • Session Hijacking(Stealing session)
  • Malware Attack
  • Website Defacement
  • Denial of Service attacks(Dos)
Disclaimer:
This article is intended for educational purpose only.