Connect With Me In Facebook

Welcome to DefendHackers, If u want to Apply for a Blogroll as a Author , With h4ckfreak Mail me @ suren.click@gmail.com

Mark Zuckerberg tells 8th graders “there’s no shortcuts” and to make friends

By h4ckfreak

Monday, December 19, 2011

Basics of Arbitary File Upload

As the name suggests Arbitrary File Upload Vulnerabilities is a type of vulnerability which occurs in web applications if the file type uploaded is not checked, filtered or sanitized. The main danger of these kind of vulnerabilities is that the attacker can upload a malicious PHP , ASP etc. script and execute it. The main idea is to get the access to the server and execute desired code. for example an Attacker who have gained access to such kind of vulnerability can upload a malicious shell script and further can control the machine to execute desired commands, which would lead to a full compromise of the server and the victim’s server...

Basics of LFI and RFI Attacks

Local File Inclusion ( LFI ) is a method of including files on a server through a Modified Special HTTP request. This vulnerability can be exploited using a Web Browser and thus can be very easy to exploit. The vulnerability occurs when a user supplied data without sanitizing is provided to an ‘inclusion type’ (like , include() , require() etc.) . Mostly these attacks are accompanied by Directory Transversal attacks which can reveal some sensitive data leading to further attacks. Now that’s quite a bit of theory there let’s have a look on a sample vulnerable application. Demonstration [Proof of Concept] I have created a pair of...

Basics of XSS, How the Logic Works

Cross Site Scripting also known as XSS is a popular type of Client Site Attack, It is a type of attack which occurs in Web-Applications and allows an attacker to inject desired client-side scripts into Web-Pages viewed by others. Types of XSS This attack is mainly of 2 types Non-Persistent This type of attack is carried out by injecting some client side code in a Vulnerable URL. Now further the Attacker can spread this URL and send it to his/her victims by means of some social engineering etc , on clicking these links the Victims Unknowingly executes the injected code , Which in turn can result in Cookie stealing , Privacy...

Obfuscating PHP

I must say that hiding or obfuscating is not the most effective ways of security but it’s still effective to keep a Script Kiddy confused about what actually you are using in your server. As an example - Server may use vulnerable version of PHP, with a public exploit released at some underground markets, Most of the time a simple automated exploit is released to help the “Point-Click-Hackers” (Script Kiddies). Now all they have to find is which Version of PHP you are using and if it is vulnerable, Point the exploit, launch it and own your system. In these cases obfuscating can really help you a lot. By PHP obfuscation you...

Tuesday, December 13, 2011

The GREAT FIRE"WALL" Of China

...

Monday, December 12, 2011

Hack Passwords Using iStealer

There are diffirent way's to steal passwords. I want to be able to steal passwords from cookie files with 1 click, well what do you know it exists! It's a cookie stealer called iStealer ( 6.0 is newest version ). It steals every cookie password from the slave's browser, and shows it to the attacker. So if you do it correctly you will have hotmail, netlog, facebook, WoW, rapidshare and other passwords from lots of people in no time. I'll set one up, and will go thru all the details. Prepare yourself 1st Download iStealer 6.0 ( link is at the bottom of the thread ) 2th Disable your virusscanner, this is because your antivirus sees the...

Types Of Port Scanning , Reference

Port numbers are 16-bit unsigned numbers and can be broadly classified into three categories. Port 0-1023 is "well known ports", 1024 - 49151 are "registered ports" and 49152 - 65535 is "dynamic or private ports". One problem with port scanning is that it is effortlessly logged by the services listening at the scanned ports. This is because they detect an incoming connection, but do not receive any data, thereby generating an application error log. To scan UDP ports, an empty UDP datagram is sent to the port. If the port is listening, the services will send back an error message or ignore the incoming datagram. If the port is closed,...

Wednesday, November 23, 2011

Most Security Proffesional Has ASPERGER Syndrome, Even Adrian Lamo Has it

Last month Adrian Lamo(Who is Adrian Lamo), a man once hunted by the FBI, did something contrary to his nature. He says he picked up a payphone outside a Northern California supermarket and called the cops. Someone, Lamo says, had grabbed his backpack containing the prescription anti-depressants he’d been on since 2004, the year he pleaded guilty to hacking The New York Times. He wanted his medication back. But when the police arrived at the Safeway parking lot it was Lamo, not the missing backpack, that interested them. Something about his halting, monotone speech, perhaps slowed by his medication, got the officers’ attention. An ambulance...

Friday, October 21, 2011

Create a User Acc Using Bash Script in Linux

These two scripts are very important for the system admin who regularly works with mail servers and somehow forgets to backup his system username and password! Let’s say somehow we lost the usernames and passwords of the mail server. In this case the admin has to manually create all the users and then change the passwords for all the users. Tedious job. Let’s make our life easier.  Before we jump in , For those who dont who kno what Bash file and how to create that ? click the link for refrence  Bash Guide First create a file which contains all the user name. Something like this: INFILTRATOR SUREN GREY HAT WILL MATHEWS jOSHUSA pHIL Risab...

Linux Commands For Beginners

This short guide shows some important commands for your daily work on the Linux command line. archOutputs the processor architecture. $ archi686catOutputs the contents of a file. $ cat lorem.txtLorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum. cdChange...

INSTALLING LAMP on Ubuntu 11.xx Tutorial

LAMP is short for Linux, Apache, MySQL, PHP. This tutorial shows how you can install an Apache2 webserver on an Ubuntu 11.10 server with PHP5 support (mod_php) and MySQL support. I do not issue any guarantee that this will work for you! 1 Preliminary NoteIn this tutorial I use the hostname server1.example.com with the IP address 192.168.0.23. These settings might differ for you, so you have to replace them where appropriate. I'm running all the steps in this tutorial with root privileges, so make sure you're logged in as root: sudo su 2 Installing MySQL 5First we install MySQL 5 like this: apt-get install mysql-server mysql-clientYou will...

Monday, October 17, 2011

Mark Zuckerberg Uses Android Phone Finally

If his recent Facebook activity has to be believed, than Facebook’s founder and CEO might have just ditched his iPhone for Android. It was only last month when Mark made the headlines for switching to iPhone (it was 3GS, not iPhone 4) from BlackBerry. But the experience wasn’t all that great as he posted about his frustrations with the device, citing poor battery life, and phone calling quality. He also said that he will get the new iPhone 4 and see if that solves all his problems before switching to Android. Mark Zuckerberg Profile on Facebook, June 2010And now according to his recent Facebook activity, it looks like he has finally gone...

Pages 381234 »