Friday, July 15, 2011

What Are Dictionary Attack

Before I get into the example, you must first know what an FTP server is. FTP stands for File Transfer Protocol. FTP is a simple way to exchange files over the internet. If a hacker got FTP access to my website, he could delete/upload anything he wants on my server. An FTP address looks similar to a website address except it uses the prefix ftp:// instead of http://. I set up an FTP server on my computer so I could demonstrate. You can get Brutus athere.
1. First the hacker would choose a target. In this case it’s my home computer and the IP address for your home computer is 127.0.0.1 .
2. By going to ftp://127.0.0.1 I get a pop-up box asking for a username and password.

3. Next the hacker would launch a program similar to Brutus and attempt to crack the password.
4. In the target you put the IP address of the website and to the right select the appropriate option, which in this case is FTP.
5. The default port is 21 but some websites change this to make them a little more secure. If you find out that the port isn’t 21, you can find the right one by doing a port scan. We will get into this later in the book.
6. If you don’t know any of the usernames for the FTP server, then you will have to get a list of the most common usernames.
7. For a dictionary attack you will have to choose the pass mode Word List and browse and select the file containing your word list. You can get some good password lists at packetstormsecurity Below are examples of what a username and password list might look like.





8. Once you hit Start the program will attempt to connect to the server and begin to try all the possible combinations from your lists.
 


9. If you’re lucky, eventually it’ll get the right Username:Password combination. As you can see below, it got the correct combination of username – admin and password – password.


10. A smarter hacker would use a proxy when using a program like this. What a proxy does is cloaks your IP address by sending your connection request through another computer before going to the target. This is a smart idea because as you will see in the image below, Brutus leaves a huge log of your presence on the target server.


11. In place of the IP address 127.0.0.1 would be the hackers IP address. Footprints like these get a hacker caught and into a lot of trouble with the law.

Quick Heal AntiVirus Pro 2011 With Activation Keys


Quick Heal AntiVirus Pro 2011 (x86/x64) Incl. Keys
Quick Heal AntiVirus Pro protects your laptops and desktops and provides protection against malicious threats that can sneak into your system when you are browsing the Internet, checking mails, chatting, etc. Upon installation, it acts as a shield against viruses, worms, trojans, spywares and other malicious threats. It also provides security against new and unknown threats with Quick Heal's renowned DNAScan® Technology. It utilizes minimum system resources, thereby giving complete protection to your system without slowing it down.

AntiVirus
The powerful virus detection engine of Quick Heal AntiVirus Pro scans and removes viruses, worms, trojans and many other threats that may try to sneak into your system through removable drives, email attachments and Internet downloads.

AntiSpyware
Spyware is malicious software that is installed on the system without the user’s knowledge to gather personal information of the user and to monitor the critical information such as user name, passwords, bank account details, credit card details etc. The AntiSpyware feature blocks spywares before they get installed on your PC. It also protects your privacy by detecting and cleaning spywares, and blocking their activities of identity theft automatically.

AntiMalware
A new advanced malware scanning engine scans registry, files and folders at lightning speed to thoroughly detect and clean Spywares, Adwares, Roguewares, Dialers, Riskwares and lots of other potential threats in your system.

Anti-Rootkit
Detects and cleans rootkits proactively by doing deep system scan. Scans running processes, registry and file system for any suspicious rootkit activity that is kept hidden in the system.

USB Drive Protection
Malwares that spread by exploiting the autorun feature of removable devices are on the rise, and USB drives (memory stick, flash drive, portable hard drive) have now become carriers of autorun malwares. USB Drive Protection safeguards your system against such malwares by disabling the autorun feature.

Browsing Protection
The Browsing Protection feature protects your computer from threats occurring through malicious websites.

Self Protection
Self Protection feature protects Quick Heal files, folders, configurations and registry entries against malicious activities, and also from getting tampered.

Entertainment Mode
Suppresses prompts across all Quick Heal modules and reduces system load which makes activities like playing games, watching movies or presentations uninterrupted without compromising the security of the computer.

Firewall Protection
Firewall Protection feature works silently in the background and monitors network activity for malicious behavior to ensure their elimination before the malwares can reach the system. The method of detecting malicious network activity is done by Intrusion Detection System and the method of preventing malicious network activity is done by Intrusion Prevention System.

Quick Heal AntiVirus and AntiSpyware
* Check Mark and VB100% certified engine
* 100% protection from all the viruses in-The-Wild
* Daily automatic updates

DNAScan Technology provides
* Comprehensive future virus protection
* Automatic protection from new worms, trojans and bots
* Fastest detection rates

Emergency CD
Create your own emergency bootable CD that will help you to clean boot your Windows PC, scan and clean all the drives including NTFS partitions. This helps in cleaning badly infected PC from file infecting viruses which cannot be cleaned from inside Windows.

Boot Time Scan
You can schedule a Boot Time Scan of your PC at next boot which will scan and clean all drives at boot time before Windows is completely loaded. This will help you in detecting and cleaning even the must cunning rootkits, spywares, special purpose trojans and loggers.

Download (Filesonic)
x86
http://www.filesonic.com/file/483671304/Quick.Heal.AntiVirus.Pro.2011.x86.part1.rar
http://www.filesonic.com/file/483671314/Quick.Heal.AntiVirus.Pro.2011.x86.part2.rar

x64
http://www.filesonic.com/file/483671294/Quick.Heal.AntiVirus.Pro.2011.x64.part1.rar
http://www.filesonic.com/file/482865311/Quick.Heal.AntiVirus.Pro.2011.x64.part2.rar

Mirror (Hotfile)
x86
http://hotfile.com/dl/113192724/6859b1a/Quick.Heal.AntiVirus.Pro.2011.x86.part1.rar.html
http://hotfile.com/dl/113192767/b386e4a/Quick.Heal.AntiVirus.Pro.2011.x86.part2.rar.html

x64
http://hotfile.com/dl/113192573/41b73cc/Quick.Heal.AntiVirus.Pro.2011.x64.part1.rar.html
http://hotfile.com/dl/113192646/34f96d3/Quick.Heal.AntiVirus.Pro.2011.x64.part2.rar.html

Mirror (Easy-Share)
x86
http://www.easy-share.com/1914513185/Quick.Heal.AntiVirus.Pro.2011.x86.part1.rar
http://www.easy-share.com/1914513186/Quick.Heal.AntiVirus.Pro.2011.x86.part2.rar

x64
http://www.easy-share.com/1914512800/Quick.Heal.AntiVirus.Pro.2011.x64.part1.rar
http://www.easy-share.com/1914513184/Quick.Heal.AntiVirus.Pro.2011.x64.part2.rar

CFW 6.39 ME-4


Neur0n, our man keeps the scene alive with almost daily updates. This time (L)CFW 6.39 ME-4 has been released by him. Custom Firmware 6.39 ME-4 is only for a hackable PSP 1000 (01g) and PSP 2000 (02g). Light Custom Firmware 6.39 ME-4 is for every PSP (including PSP 3000) except a PSPgo. Quote about LCFW6.39 ME-4 from neur0n:
Only work on 01g ,02g , 03g, 04g, 07g and 09g model.
05g (GO)is not supported.
–How to Install CFW 6.39 ME-4–
First, you need to install CFW or HEN in your PSP.
1. copy UPDATE folder at ms0:/PSP/GAME/.
2. Put 6.39 official update at ms0:/PSP/GAME/UPDATE/639.PBP .
3. Run installer from xmb.
– features of CFW 6.39 ME-4 –
Hold R trigger and turn on the psp, you can enter recovery menu.
Hold Home button and turn on the psp, you can Boot OFW.
-How to Install LCFW 6.39 ME-4–
Copy “installer” folder and “launcher” folder at “ms0:/PSP/GAME/”
– Preparation –
First. You need to install LCFW modules in your PSP.
1.Execute “639 installer” from XMB.
2.You can select these action:
Press x to install LCFW.
Press [] to uninstall LCFW.
Press R to exit.
After the action, PSP will rboot.
– Start LCFW –
1.Execute “639 launcher” from XMB.
2. enjoy :)
– How to enter RecoveryMenu? –
From LCFW:Execute “639 launcher” again.
From OFW :Execute “639 launcher” with hold “R”.
Changelog for both Custom Firmwares:
– Fixed a bug when enter suspend with VshMenu opened.
– Fixed MEdriver bug.
– Added BatteryConfig submenu in RecoveryMenu.
– Added Speed up MS option(beta


TeamViewer 5.0.8703 With Crack

TeamViewer is a simple and fast solution for remote control, desktop sharing and file transfer that works behind any firewall and NAT proxy. To connect to another computer just run TeamViewer on both machines without the need of an installation procedure. With the first start automatic partner IDs are generated on both computers. Enter your partner's ID into TeamViewer and the connection is established immediately. With over 100 million users TeamViewer is a standard tool to give support and assistance to people in remote locations. The software can also be used for presentations, where you can show your own desktop to a partner.

Download Here: http://www.mediafire.com/?dfaxeqz0lvk5u1d

FarmVille Hacks 2011

Earn money, Experience, harvest everything automatically, from trees to animal! and more, much more!
FarmVille is a farming social network game developed by Zynga. It is a clone of Farm Town, and is similar to older games such as Harvest Moon.Gameplay involving various aspects of farm management such as plowing land, planting, growing and harvesting crops, harvesting trees and bushes, and by raising livestock.
It is available as an Adobe Flash application via the social-networking website Facebook and Microsoft's MSN Games, and as an app for the iPhone,iPod Touch and iPad. It is currently the most popular application on Facebook, with ten percent of all users playing. The game is a freemium game, meaning there is no cost to play but players have the option of purchasing premium content.
With this FarmVille Hack u can Earn money, Experience, harvest everything automatically, from trees to animal! and more, much more!
How to install the program ?
Install the program, copy the another file (the one with a pig, its the crack) to the folder where you installed the program.Then wait around 24 hours and u see the magic of the hack.

Download farmVille Hack :--------

Cracking Zip Password Files


How to crack zip password files given below is best trick to crack Password for zip files..
Tut On Cracking Zip Password Files..



What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com.
FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a "wordlist", which is a text file that contains possible passwords. You can get lots of wordlists at www.theargon.com.).
FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you're not supposed to have. So like every tool, this one can be used for good and for evil.
The first thing I want to say is that reading this tutorial... is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase "check name.txt" often in this text. These files should be in FZC's directory. They contain more information about FZC.
FZC is a good password recovery tool, because it's very fast and also support resuming so you don't have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything - a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn't really matter, because in order to bruteforce a password with 32 chars you'll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.
FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don't require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.
Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait... and wait... and wait...and have good thoughts like "In wordlist mode I'm gonna get the password in minutes" or something like this... you start doing all this and remember "Hey this guy started with all this bullshit and didn't say how I can start a wordlist attack!..." So please wait just a little more, read this tutorial 'till the end and you can do all this "bullshit".

We need to keep in mind that are some people might choose some really weird passwords (for example: 'e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won't help you anymore. Instead, you'll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won't get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB's list and start using the Brute Force attack.
If you have some sort of a really fast and new computer and you're afraid that you won't be able to use your computer's power to the fullest because the zip cracker doesn't support this kind of technology, it's your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.

Now that we've gone through all the theoretical stuff, let's get to the actual commands.


--------------------------------------------------------------------------------
Bruteforce
--------------------------------------------------------------------------------


The command line you'll need to use for using brute force is:

fzc -mb -nzFile.zip -lChr Lenght -cType of chars

Now if you read the bforce.txt that comes with fzc you'll find the description of how works Chr Lenght and the Type of chars, but hey, I'm gonna explain this too. Why not, right?... (but remember look at the bforce.txt too)

For Chr Lenght you can use 4 kind of switches...

-> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords
-> You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars
-> You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght 32, even if you are crazy i don't think that you would do this.... if you are thinking in doing this get a live...
-> You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3 to passwords with 32 chars of lenght, almost like the last option...

For the Type of chars we have 5 switches they are:

-> a for using lowercase letters
-> A for using uppercase letters
-> ! for using simbols (check the Bforce.txt if you want to see what simbols)
-> s for using space
-> 1 for using numbers


Example:
If you want to find a password with lowercase and numbers by brute force you would just do something like:

fzc -mb -nzTest.zip -l4-7 -ca1

This would try all combinations from passwords with 4 chars of lenght till 7 chars, but just using numbers and lowercase.

*****
hint
*****

You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn't work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers.


--------------------------------------------------------------------------------
Wordlis
--------------------------------------------------------------------------------

Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I'm not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I'm going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too.
To start a wordlist attak you'll do something like.

fzc -mwMode number -nzFile.zip -nwWordlist

Where:

Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.
File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn't in the same directory of FZC you'll need to give the all path.

You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, the switche works like in bruteforce mode.
So if you something like

fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+

FZC would just start reading at line 50 and would just read with length >= to 9.

Example:

If you want to crack a file called myfile.zip using the "theargonlistserver1.txt" wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do:

fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50





--------------------------------------------------------------------------------
Resuming
--------------------------------------------------------------------------------

Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too).
To resume the bruteforce attack you just need to do:

fzc -mr

And the bruteforce attack will start from the place where it stopped when you pressed the ESC key.
But if you want to resume a wordlist attack you'll need to start a new wordlist attack, saying where it's gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you'll type

fzc -mw3 -nzfile.zip -nwwordlist.txt -f100

Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.


Well, it looks like I covered most of what you need to know. I certainly hope it helped you... don't forget to read the files that come with the program