Thursday 20 December 2012

How to Send Self-Destructing Sensitive Information to Someone via Email


NOTE: ONLY FOR EDUCATIONAL PURPOSE. IT IS TOTALLY ILLEGAL AND YOU WILL BE PUNISHED. SO DON'T TRY...

 Have you ever sent private information to someone, maybe a family member needed your credit card number, and then regretted that you had ever done it. This can all be solved with a self-destructing link





To get started head over to https://oneshar.es/ and click on the Create One Now button.

This will take you to a text box where you can enter the information you want to e-mail to someone.
You can go ahead and click on the Create Link button when your ready. Don�t worry your information is safe and is sent over an SSL Encrypted Line from your web browser to their servers.
This will give you a link that you can either manually copy to the Clipboard, or you can click the link which will automatically copy it to The clipboard.
Now you can draft your email as you normally would. You should add The link you were given in the last step somewhere in the email. It is Up to you as to whether you would like the recipient to know that the link self-destructs or not.
When the person received the email they can click on it to see the message you generated earlier.
However, if they refresh the page or try clicking on the link again they are not able to see the information.
The data is also stored in an encrypted form on their servers, and When someone views the unique URL that you send them; your encrypted The message is deleted from their system.



Posted: Taylor is  very own Microsoft Fan boy, he tries to make the world a Better place using technology due to his lack of super powers.

Wednesday 21 November 2012

What is Website Defacement?Case Study





Note: Only For Educational Only Purposes, Plz don�t try this on another website. I have not uploaded the full image due to security reasons. It is just a case study with an example.

What Is Website Defacement

 Website defacement is an attack on a website that Changes in the visual appearance of the site. These are typically the work of System crackers, who break into a web server and replace the hosted website With one of their own.







Terms:

[SQL] - Structured Query Language
[LFI] - Local File Include
[RFI] - Remote File Include
[XSS] - Cross Site Scripting
[RCE] - Remote Code Execution
[AFD] - Arbitrary File Download
[SCD] - Source Code Disclosure
[PCI] - PHP Code Injection



Defacement Techniques:

Domain Hack
FTP Protocol
IIS Vulnerable
Apache Vulnerable
Permission
Exploits
Script, Cookie, XSS
OS Vulnerable
Social Engineer
Hosting Control Panel
Forgotten Password
Trojan, Spy vs
SQL Injection
RFI

Tools for Web defacement:

         Hydra
         C99 Shell
         phpbb_defacer
         XSSShell039
         Etc


Website defacement archive Sites




Website Defacement case study?



To Use Brutus, c99.php shell we have to go through the following steps:

1. Firstly we need to Upload the c99.php shell file and Brutus
Application on the The particular system (server system) and then target the web application let say www.babaharinath.com And use the password from the commercial world list (a combination of Passwords) and set type =FTP and choose keep connected with web for unlimited Attempts.

After this, start Brut Force attacks.

2. After getting an ID And Password opens the Victim site in IE by typing
ftp.babaharinath.com and Then click on the file and Login as above ID and Password.

3. Now upload c99.php File in image or cgi-bin folder. After this again open IE and access http://www.babaharinath.com/image/c99.php

4. After this, choose index.HTML file and click on edit option and then change the content as per You wish.

5. Now with the help Of c99.php shell file we can upload new content html, delete whatever we want And even do anything in future without any password.



Posted By: Anshuman Kak 



Monday 12 November 2012

What is VOIP and How it helps in Caller ID Spoofing Attack?Detail


What is VOIP?


 Voice-over-Internet Protocol (VoIP) is a protocol optimized for the transmission of
Voice Through the Internet or other packet-switched networks . VoIP systems employ Session control protocols to control the set-up and tear-down of calls as well As audio codecs which encode speech allowing transmission over an IP network as Digital audio via an audio stream. Codec use is varied between different Implementations of VoIP (and often a range of codecs are used); some Implementations rely on narrow band and compressed speech, while others support High fidelity stereo codecs.






How VOIP works?


VoIP Converts the voice signal from your telephone into a digital signal that can Travel
Over The Internet. If you are calling a regular telephone number, the signal is then
Converted Back at the other end. Depending on the type of VoIP service, you can make a VoIP Call from a computer, a special VoIP phone, or a traditional phone. Wireless "Hot
Spots" In public locations such as airports, parks, and cafes allow you to connect to The
Internet, And may enable you to use VoIP service wirelessly. If your VoIP service
Provider Assigns you a regular telephone number, then you can receive calls from regular Telephones that don't need special equipment.

Advantages of Using VoIP

90% Cost Saving (cheap call rates)
Great voice quality
3 ways Call forwarding
Caller ID spoofing
Unlimited calling
Web calling
Free phone call services
Free Call Forwarding

Top Voip Companies:

www.callcentric.com

Free Calling sites:


Unlimited Calling Sites:



Call-ID Spoofing Attack

Caller ID Spoofing is the practice of causing the Telephone network to display a number
On The recipient's caller ID display which is not that of the actual originating Station; the
Term Is commonly used to describe situations in which the motivation is considered
Nefarious By the speaker. Just as e-mail spoofing can make it appear that a message came From any e-mail address the sender chooses, caller ID spoofing can make a call Appear to have come from any phone number the caller wishes.
The The above method is a bit complex; many Caller ID spoofing service providers also Allow
Customers to initiate spoofed calls from a web-based interface. Some providers allow
Entering The name to display along with the spoofed Caller ID number, but in most parts
Of The United States for example, whatever name the local phone company has associated with the spoofed Caller ID number is the name that shows up on the Caller ID display. Using a web-based spoofing service involves creating an An account with a provider, logging in to their website and completing a form. Most companies require the following basic fields:
1. Source number
2. Destination number
3. Caller ID number
When The user completes this form and clicks a button to initiate the call, the Source
Number Is first called. When the source number line is registered, the destination is Then
Called And bridged together.

Advantages:

Show any number on victim mobile number
Record Outgoing Calls
Listen to your calls online
Include recordings in the email
Download your recordings

Caller ID Spoofing sites:






Caller ID Spoofing Attack:

SignUp With 123spoof.com and purchase 60 minutes, after login with PIN number.




This A screen will appear. After that we put all details like our number, number two Call and
Show Caller id and click to place a call. Then call to access number of 123spoof.com
From your number....
.
.

Posted By: Anshuman Kak