Connect With Me In Facebook

Welcome to DefendHackers, If u want to Apply for a Blogroll as a Author , With h4ckfreak Mail me @ suren.click@gmail.com

Mark Zuckerberg tells 8th graders “there’s no shortcuts” and to make friends

By h4ckfreak

Sunday, March 21, 2010

How to scan a target for open ports and services using Netcat, SuperScan, Strobe

How to scan a target for open ports and services using Netcat, SuperScan, Strobe Netcat: The netcat application has many uses; one is the ability to scan a target for open ports and services. Another utility, cryptcat, is almost identical except that it operates with encryption. From a DOS prompt, type the following with the syntax of: Other useful commands for Netcat The –v option instructs netcat to run in verbose mode, allowing you to see the progress of the scan.The –r option instructs netcat to randomize local and remote ports in an attempt to elude any intrusion detection systems.The –w2 option instructs netcat to wait 2...

How to Identify CGI Vulnerabilities using TCS CGI Scanner

How to Identify CGI Vulnerabilities using TCS CGI Scanner The TCS Common Gateway Interface (CGI) Scanner application is designed to find targets that have vulnerable CGI Script errors. These errors are normally due to systems that have not been patched or updated. Click to highlight the default target of htpp://www.tpp.ru and click on the at the top left of the application to delete the current target. On the gray bar along the top left of the application, enter the IP address or hostname of the target and click on the gray-colored arrow to insert the new target. Repeat this process for multiple targets. The TCS CGI Scanner is now...

IP Spoofing Attack

IP Spoofing Attack Internet Protocol i.e IP addresses are unique and used for digital data communication for internet. Any mailing system or website technology works on the same principle of digital communication. IP SpoofingEvery computer connected to Network have its unique IP address. When Person A sends an email  to person B, The mail is assigned with the header which contains the IP’s of sender and Reciver so that mail can go to the same person B and not to some one else. Now in a private network for security reasons limited mails are accpeted from reserved IP’s. In Simple word only internal communication can be worked. Person...

How To Crash Small Websites (NOOB FRIENDLY)

How To Crash Small Websites (NOOB FRIENDLY) Ok so your friend or your enemy has made a little shitty website for whatever maybe a private server or anything.. And your feeling devious and want to crash it . TOOLS: >>Port Scanner<< >>rDos<< >>HotSpotSheild Proxy!<< Step One: First we need to find the websites IP Adress. This is very easy todo. Ok so say they URL is http://www.yoursite.com ok now that you have your URL open Up Cmd todo this press Start>Run>cmd Once you have CMD open you type ping http://www.yoursite.com press enter and you will get the ip of the website. (YOU MUST...

Easy way to trace a ip

Easy way to trace a ip Ohk.. finally after learning a lot from HF finally i am contributing.... Most of you might be knowing this trick ... but still World is full of ppl who dont know many things ..including this... so without further Ado lets start.. use this link... http://rpgcrime.com/send.swf?msg=themain...email=xxxx where xxxxxx= ur email now this link is quite obvious that it is for ip tracing .. so to conceal it we will use link shortner http://sturly.com here you can get a new link for the same and you can name it anything like pics ... so the new link u will get will be like http://sturly.com/pics now use your social engg tricks to name links and make the person click them. ip of the person will be sent instantaneous...

Backtracking EMAILs

Backtracking EMAILs Tracking email back to its source: Twisted Evilcause i hate spammers... Evil or Very Mad Ask most people how they determine who sent them an email message and the response is almost universally, "By the From line." Unfortunately this symptomatic of the current confusion among internet users as to where particular messages come from and who is spreading spam and viruses. The "From" header is little more than a courtesy to the person receiving the message. People spreading spam and viruses are rarely courteous. In short, if there is any question about where a particular email message came from the safe bet is to assume the "From" header is forged. So how do you determine where a message actually came from? You have to understand how email messages are put...

Open | Close Ports

Open | Close Ports With the spread of Hackers and Hacking incidents, the time has come, when not only system administrators of servers of big companies, but also people who connect to the Internet by dialing up into their ISP, have to worry about securing their system. It really does not make much difference whether you have a static IP or a dynamic one, if your system is connected to the Internet, then there is every chance of it being attacked. This manual is aimed at discussing methods of system security analysis and will shed light on as to how to secure your standalone (also a system connected to a LAN) system. Open Ports: A Threat to Security? In the Netstat Tutorial we had discussed how the netstat -a command showed the list of open ports on your system. Well,...

Pages 381234 »