Connect With Me In Facebook

Welcome to DefendHackers, If u want to Apply for a Blogroll as a Author , With h4ckfreak Mail me @ suren.click@gmail.com

Mark Zuckerberg tells 8th graders “there’s no shortcuts” and to make friends

By h4ckfreak

Saturday, March 6, 2010

Sniffers - Tool and Softwares: Network Sniffers

Sniffers - Tool and Softwares: Network Sniffers   SMAC is a Windows MAC Address Modifying Utility that allows users to change MAC address for most Network Interface Cards (NIC) on the Windows 2000, XP, and 2003 Server systems. This is irrespective of whether the manufactures of the cards permit the change. It must be noted that SMAC does not burn a new address on the hardware and the new MAC addresses the user change will sustain from reboots..SMAC has 2 modes of operation: [WBEM ON] and [WBEM OFF]. If the "Windows Management Instrumentation (WMI)" service is running, it will be running on [WBEM ON] mode. Otherwise, it is on [WBEM OFF] mode. The [WBEM ON] mode shows more information. The tool also allows the user to log and track SMAC activities.SMAC...

How to hack FTP Servers: Locate Anonymous FTP Servers using FTPScanner

How to hack FTP Servers: Locate Anonymous FTP Servers using FTPScanner FTPScanner: The FTPScanner application will locate FTP servers that allow Anonymous connections to occur. These servers must be using the default FTP port of 21 in order for the scanner to detect the server. The biggest concern with FTP is that the data be sent unencrypted (also known as clear text). An attacker that intercepts this clear text can easily read all data within the communicati...

How to scan a target for open ports and services using Netcat, SuperScan, Strobe

How to scan a target for open ports and services using Netcat, SuperScan, Strobe Netcat: The netcat application has many uses; one is the ability to scan a target for open ports and services. Another utility, cryptcat, is almost identical except that it operates with encryption.From a DOS prompt, type the following with the syntax of:Other useful commands for NetcatThe –v option instructs netcat to run in verbose mode, allowing you to see the progress of the scan.The –r option instructs netcat to randomize local and remote ports in an attempt to elude any intrusion detection systems.The –w2 option instructs netcat to wait 2 seconds...

Anonymizers- Make your web surfing anonymous

Anonymizers- Make your web surfing anonymous Anonymizers are services that help make your own web surfing anonymous. The first anonymizer developed was Anonymizer.com, created in 1997 by Lance Cottrell. An anonymizer removes all the identifying information from a user's computers while the user surfs the Internet, thereby ensuring the privacy of the user.Many anonymizer sites create an anonymized URL by appending the name of the site the user wishes to access to their own URL, e.g.:http://anon.free.anonymizer.com/http://www.yahoo.com/After the user anonymizes a web access with an anonymizer prefix, every subsequent link selected is also automatically accessed anonymously. Most anonymizers can anonymize at least the web (http:), file transfer protocol (ftp:), and gopher...

Bypassing Firewall using Httptunnel http://www.nocrew.org/software/httptunnel.html Httptunnel creates a bidirectional virtual data path tunneled in HTTP requests. The requests can be sent via an HTTP proxy if so desired. This can be useful for users behind restrictive firewalls. If WWW access is allowed through a HTTP proxy, it's possible to use httptunnel and telnet or PPP to connect to a computer outside the firewall. Here is how htc sends data to the destination: 1. Open TCP connection to hts 2. Send HTTP POST with a large Content-Length 3. Send TUNNEL_DATA packets until POST Content-Length would be exceeded. 4. Send TUNNEL_PADDING packets to exactly satisfy Content-Length - 1 5. Send TUNNEL_DISCONNECT (1 byte) 6. Close TCP connection 7. Go to step 1 Here is how htc gets data from the destination. 1. Open TCP connection to hts 2. Send HTTP GET 3. Wait for response from hts 4. Read TUNNEL_DATA, then TUNNEL_PADDING, TUNNEL_DISCONNECT packets 5. Close TCP connection 6. Go to step 1 Tunnel creation and destruction This can be useful for users behind restrictive firewalls. If WWW access is allowed through a HTTP proxy, it's possible to use httptunnel and, say, telnet or PPP to connect to a computer outside the firewall.

Bypassing Firewall using Httptunnel http://www.nocrew.org/software/httptunnel.htmlHttptunnel creates a bidirectional virtual data path tunneled in HTTP requests. The requests can be sent via an HTTP proxy if so desired. This can be useful for users behind restrictive firewalls. If WWW access is allowed through a HTTP proxy, it's possible to use httptunnel and telnet or PPP to connect to a computer outside the firewall.Here is how htc sends data to the destination: Open TCP connection to hts Send HTTP POST with a large Content-Length Send TUNNEL_DATA packets until POST Content-Length would be exceeded. Send TUNNEL_PADDING packets to exactly satisfy Content-Length - 1 Send TUNNEL_DISCONNECT (1 byte) Close TCP connection Go to step 1Here is how htc gets data from the ...

HTTPort - Bypass an HTTP proxy

HTTPort - Bypass an HTTP proxy http://www.htthost.com/HTTPort allows you to bypass an HTTP proxy, which is blocking you from the Internet. With HTTPort you may use the following software (just a sample list, not limited to !) from behind an HTTP proxy: e-mail, IRC, ICQ, news, FTP, AIM, any SOCKS capable software, etc. etc.The basic idea is that you set up your Internet software in such a manner, that it considers your local PC to be a remote server it needs. This is where HTTPort enters. It intercepts connection from this software and runs the connection through the proxy - this is called a tunneling. Your software should use TCP/IP. HTTPort does not work with UDP/IP. There are two ways you can set up your software for use with HTTPort: If your software uses a...

Ultra Surf: Bypass firewall and proxies–World’s best bypass technology

Ultra Surf: Bypass firewall and proxies–World’s best bypass technology what exactly it is? It is the flagship software product from UltraReach Internet Corp. for Internet anti-censorship. It enables users inside countries with heavy Internet censorship to visit any public web sites in the world safely and freely. it enables users to browse any website freely just the same as using the regular IE browser while it automatically searches the highest speed proxy servers in the background.What does it means??100% freedom to have 100% information in most secure way.It means no matter where you are you can access 100% free version of internet...

How to bypass a Keylogger: How to fool a Keylogger

How to bypass a Keylogger: How to fool a Keylogger These days Agents spy on u everywhere, in college, at work, maybe a trojan virus on your home PC which keylogs your paswords and mails it to someone else. If u think u r being logged, try this: Whenever u have to type a password, never type the complete password in one go, ie, if your password is WINDOWS, u should type NDOW, then move cursor to start of the password field using the mouse ONLY, then type WI, then move cursor to end using the mouse and type S. This way the logger will record your keystrokes as ndowwis instead of WINDOWS. Additionally you can also use spaces with you passwords as spaces are not readable. Use 2-3 spaces after or in the end (as prefix) for all your passwords. Gmail, yahoo and so many other services...

How to access blocked websites and How to protect your privacy online: Download Loki Network VPN Client Free here

How to access blocked websites and How to protect your privacy online: Download Loki Network VPN Client Free here Loki Network Project is free VPN service and SSL based free VPN server. It is an opportunity to protect your private data (IP address, e-mail/FTP/HTTP passwords, web-sites visited, uploaded/downloaded files and etc...) and bypass certain Internet access limitations you may have at your location.An example, free Public Loki VPN Service allows you:Protect your data from being intercepted by various network sniffers in your LAN segmentSafely bypass traffic interception and analyses on corporate, ISP or even country level firewallBypass...

Pages 381234 »