Friday, November 30, 2012

The Best Operating System for Hackers

There are a couple of things that are essential to any hacker’s walk of life. To name a few, there’s the ubiquitous flash drive for data transfer. You have the crossover cable for even faster data transfer. There’s the Wi-Fi antenna for high gain and strong amplification. Possibly, you might find a video capture card in the computer. Of course, there’s the ubiquitous laptop and desktop computer. But what software is on these computers? Undoubtedly, you will find at least two operating systems, most often Windows and Linux. But with Linux, there are several different distributions. Is there a specific one? With hackers and crackers, there is only one Linux distro out there. It is called Backtrack.


BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.

Regardless if you’re making BackTrack your primary operating system, booting from a Live DVD, or using your favourite thumb drive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.

BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tool collection to-date.

Back Track is quite possibly the most comprehensive Linux distribution of security tools. Both hackers and crackers can appreciate the features of this distribution. For black-hatters, it is an easy access to software that facilitates exploitations of secure system. For white-hatters, it is a penetration tester that finds holes in a security scheme. See, everybody wins!

Major Features

BackTrack features the latest in security penetration software. The current Linux kernel is patched so that special driver installation is unnecessary for attacks. For example, an Atheros-based wireless networking adapter will no enter monitor mode or inject packets without the MadWiFi driver patch. With BackTrack, you don’t need to worry about that. It’s just plug-and-play ready-to-go!

What’s great is that this Linux distribution comes Live-on-CD. So, no installation is needed. However, what you experience BackTrack, you will realize that it is a must to download this operating system and install it on your Laptop. At the very least, download the VMWare Virtual Appliance for Backtrack. Make sure you also install the VMWare Tools for Linux as well. Many features will still work in VMWare mode.
  • Based on: Debian, Ubuntu
  • Origin: Switzerland
  • Architecture: i386
  • Desktop: Fluxbox, KDE
  • Category: Forensics, Rescue, Live Medium
  • Cost: Free

Tools:

BackTrack provides users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to password crackers. Support for Live CD and Live USB functionality allows users to boot BackTrack directly from portable media without requiring installation, though permanent installation to hard disk is also an option.

BackTrack includes many well known security tools including:
  • Metasploit integration
  • RFMON Injection capable wireless drivers
  • Kismet
  • Nmap
  • Ettercap
  • Wireshark (formerly known as Ethereal)
  • BeEF (Browser Exploitation Framework)

A large collection of exploits as well as more common place software such as browsers. BackTrack arranges tools into 11 categories:
  • Information Gathering
  • Network Mapping
  • Vulnerability Identification
  • Web Application Analysis
  • Radio Network Analysis (802.11, Bluetooth, Rfid)
  • Penetration (Exploit & Social Engineering Toolkit)
  • Privilege Escalation
  • Maintaining Access
  • Digital Forensics
  • Reverse Engineering
  • Voice Over IP

Download and Documents:

Home Page
User Forums
Documentation
Download Mirrors

5 Alternatives to The Pirate Bay

With all this activity surrounding the DDOS attacks and the blocking of Swedish BitTorrent website The Pirate Bay in some countries, we decided to look the 5 best alternatives to the The Pirate Bay.

News surrounding The Pirate Bay is certainly a reminder that it’s great to have a back-up plan. Late last month, the UK High Court ordered all ISPs in the UK to block the site. Getting around such blocks is pretty trivial. Still, what happens when the site is DDOS attacked like what happened recently when an Anonymous defector allegedly attacked the site? Such a thing could theoretically disrupt your day-to-day downloading.
For something totally different, download LimeWire Pirate Edition
Here are the 5 best Pirate Bay alternatives
1. ISOHunt
A Canadian open BitTorrent website that has really withstood the test of time. Still around and still serving up torrents for everyone. This probably is one of the best true alternatives to ThePirateBay.
2. 1337x
Another open site, though younger by comparison. Has lots of different torrents to choose from and is one of the higher ranking sites as voted by our very own ZeroPaid readers.
3. KickAss Torrents
An open site with lots of torrents. Another site that has received high ratings by our readers.
4. BitWiki
A popular BitTorrent index and search engine.
5. Torrent Project
A Torrent search engine able to crawl through numerous sites and get both torrents and files inside each torrent.
Notable
5 Alternatives to The Pirate Bay

Dell ships lightweight XPS 13 laptop with Ubuntu Linux

After months of experimenting, Dell took the wraps off a thin-and-light XPS 13 laptop with the Ubuntu Linux 12.04 LTS, an OS that is code-named Precise Pangolin.
The XPS 13 with Ubuntu was developed as part of an internal Dell project called "Project Sputnik." Over six months, Dell worked with the open-source community to develop tools, drivers and software for the OS to work on XPS 13, which has the frame of an ultrabook.
The laptop has an Intel Core i7 CPU, 8GB RAM and 256GB of storage. Priced at US$1549, it comes with one year of on-site support as part of the package. The laptop is now available in the U.S. and Canada, and will become available in other countries next year.
The XPS 13 laptop has a 13-inch screen. The company did not immediately provide the weight or battery life of the laptop.
Dell is already selling the XPS 13 ultrabook with Windows 8 starting at $999, making the Linux-based cousin much pricier. Dell mostly sells laptops with Windows, and ultrabooks with Linux are not yet available from PC makers.
The company has described the new XPS 13 with Ubuntu as a developer edition, but will sell the product to enterprises and consumers as well.
The XPS 13 with Ubuntu gives developers the "essentials they want while staying true to our core values of openness and affordability," said Nnamdi Orakwue, vice president of Dell Cloud, in an emailed statement.
Development of the laptop was led by Barton George, web vertical director at Dell. Working with Canonical and other open-source developers, Dell created the drivers and tools for the Linux OS to work on XPS 13.
The joint development effort has also led to some new features unique to the laptop. One is called the "profile tool," which enables developers to easily set up software development environments via quick access to tools for Ruby, JavaScript and Android in the github repositories.
Another feature on XPS 13 is the "Cloud Launcher" which Dell said allows for simulation of cloud environments on the laptop. The simulated environment can then be deployed directly to the cloud.
Dell has sold laptops and netbooks with Ubuntu Linux in the past, but the company has larger plans with XPS 13 and Ubuntu. Typically Dell provided install images of the Ubuntu OS, but has not collaborated with the open-source community on a wide scale.
The company is committed to open source, and development around Linux and the laptop will continue, Orakwue and George said in separate statements.
Agam Shah covers PCs, tablets, servers, chips and semiconductors for IDG News Service. Follow Agam on Twitter at @agamsh. Agam's e-mail address is agam_shah@idg.com

Thursday, November 29, 2012

No ‘Incredible Hulk 2′ Until After ‘The Avengers 2′

New Hulk Movie in 2015
Robert Downey Jr. and Chris Hemsworth return to theaters next year in Iron Man 3 and Thor: The Dark World, respectively. The following spring, Chris Evans suits up for Captain America: The Winter Soldier and after that, we boldly go where no moviegoer has gone before with Guardians of the Galaxy. All of this leads to the summer of 2015 where the heroes team-up once again in The Avengers 2, leaving Mark Ruffalo and his take on The Hulk with no headlining appearance of his own.
While Bruce Banner is the only character from The Avengers with a live-action TV show in development, he’s also the only super-powered member of the team not getting another solo movie. At least not anytime soon, according to Marvel President of Production, Kevin Feige.


Watch Episodes of Your Favorite Shows Online w Free TV App Today!
Since the first Iron Man launched Marvel Studios into what it is today, all of the talent signing up to join the franchise must do so with lengthy, multi-picture deals. Mark Ruffalo, taking over the role of Banner from Edward Norton, has a six-picture contract with the studio and will be back in a big way over and over again. When and in what stories then, can Hulk be implemented if The Incredible Hulk 2 isn’t in the cards, at least for Phase Two of the Marvel cinematic universe?
avengers wallpaper hulk
In chatting with MTV, Feige pondered the possibilities of seeing Hulk return with his own movie, even in an adaptation some of his more recent and outlandish story arcs from the books.
“I don’t think there’s a lot that we couldn’t do someday, as the cinematic universe continues to grow and expand and get as big as the comic book universe. ’Planet Hulk’ is a cool story. ‘World War Hulk’ is a cool story… I think there are pitfalls of continuity-overload, and mythology getting so dense that it almost collapses in on itself. It happens every few decades or so in the comics. Apart from that, I’d say everything is on the table.”
“Do I think Hulk can carry a movie and be as entertaining as he was in ‘Avengers’? I do believe that. I do believe he absolutely could. We certainly are not even going to attempt that until ‘Avengers 2. So there’s a lot of time to think about it.”
The Phase Two lineup for the next three years has already been set and the only film without a release date is Edgar Wright’s Ant-Man which has been teased as a possible third release for 2014, should Wright have time to shoot it after finishing The World’s End. That possibility is becoming less and less likely as Marvel Studios continues to demonstrate a hesitation towards the Ant-Man property. In chatting with Louis D’Esposito, Co-President of Marvel Studios, he made it it clear to me that the studio doesn’t want to put too much on their plate and stretch their resources thin. Translation: it’s possible that Ant-Man could be a second release alongside The Avengers 2 in 2015, the same year Marvel’s President of Consumer Products, Paul Glitter, previously said The Incredible Hulk 2 was planned for.
Mark Ruffalo (Bruce Banner) in The Avengers
It comes down to risk vs. reward and The Incredible Hulk was the lowest grossing film of all of the Marvel Studios self-financed productions to date. It made nearly the same money at the box office as Ang Lee’s Hulk did years before and for Marvel execs, it makes better business sense to continue expanding the franchise, using the characters that do sell to help launch others. It’s the same reason Black Widow and Hawkeye will never get solo spinoffs of their own.
Ruffalo absolutely nailed his performance in The Avengers, becoming a easy fan-favorite. That had a lot to do with the character’s supporting role, working off of the other heroes. Feige shares this same sentiment:
“Part of what’s fun about the way we played him in ‘Avengers’ is the ensemble quality of it. I think the pathos and humor, most importantly, that Mark and Joss brought to it showcased a different element of Hulk that’s there in the comics, and was always inherent in his character. But when he was so brooding in his other two films, he didn’t get to have that wry sense of humor that Mark did such an amazing job performing.”
So the question is, where will The Hulk show up next? Fans will be quick to point out that The Avengers ended with the heroes parting ways and Banner taking a spin in Tony Stark’s Acura, leading to the belief that they could show up together in Iron Man 3. Feige says a Hulk cameo in IM3 is not happening however, so take that for what you will.
Is Banner off seeking isolation from the world during the events of Phase Two or could be be enlisted as a member or consultant of S.H.I.E.L.D. who could show up in Captain America 2? He has to make an appearance somehere in the next two years before The Avengers 2, right?
Iron Man 3 releases May 3, 2013, Thor: The Dark World on November 8, 2013, Captain America: The Winter Soldier on April 4, 2014, Guardians of the Galaxy on August 1, 2014 and The Avengers 2 on May 1, 2015.

Syria’s Internet shutdown leaves information void, may signal escalating war

Syria’s civil war went off­line Thursday as millions of people tracking the conflict over YouTube, Facebook and other high-tech services found themselves struggling against an unnerving national shutdown of the Internet.
The communications shutdown immediately evoked memories of similar action by Libya’s Moammar Gaddafi and Egypt’s Hosni Mubarak, and it sparked fears that President Bashar al-Assad could be preparing to take even harsher action against Syrian opposition forces, which have recently made significant advances in the battle against the government.

Map: How Europe voted on Palestine at the U.N., in 2011 and now

Map: How Europe voted on Palestine at the U.N., in 2011 and now
Since last year, nine European countries appear to have shifted toward greater support for Palestinian efforts at the UN. None shifted away.

The three big questions on Syria's Internet blackout

The three big questions on Syria's Internet blackout
Did web service go completely dark in the country because the military is planning something or as a reaction against rebel gains?

6 scathing highlights from the Leveson report

6 scathing highlights from the Leveson report
The British judge implicated the police, politicians and regulators in the 2,000 word report

Petraeus says he messed up ‘royally'

Petraeus says he messed up  ‘royally'
The former CIA director admitted his mistake and said he'd try to save his marriage
A Syrian official blamed the outages on technical problems. Analysts said it was far more likely that Assad had ordered the Internet and some cellphone connections switched off, although it was possible that a rebel attack had severed crucial cables.
Whatever the cause of the blackout, it was clear that the remarkable window into the war offered by technology had dramatically narrowed for Syrians on both sides of the conflict and the many outsiders following the story. Observers said it signaled the beginning of a dangerous new phase after 20 months of escalating conflict.
“In some ways, it’s a Cyclops stabbing itself in the eye,” said Joshua M. Landis, a Syria expert at the University of Oklahoma. “They’re turning the light out on themselves here, which is not good.”
The shutdown came amid scattered rebel gains Thursday and intensified fighting that shut down the Damascus airport. In Washington, meanwhile, officials indicated that the Obama administration was moving toward recognizing a newly formed opposition coalition as the legitimate representative of the Syrian people.
‘There will be panic’
The rising popularity of smartphones and the Syrian government’s sharp limits on the movements of independent journalists have made social media an especially vital source of information about the conflict. The abrupt loss of the technology has caused widespread fear, said Ammar Abdulhamid, a fellow at the Foundation for Defense of Democracies.
“Not everyone will have access” to news about the conflict, said Abdulhamid, who has close ties to Syria’s opposition. “There will be panic. There will be fear.”
Syrian rebel forces have many satellite phones. But the devices expose users to risk of detection by government forces, and there are not enough of the phones to keep millions of Syrians informed.
“Most of the activists, especially in Damascus, are relying totally on the local Internet services, which are delivered by the Syrian communication companies,” said Ahmed Radoun, an activist in Hama who works for an opposition news service. “They want to pressure the activists who rely on the Internet services from the local companies and to limit the news delivery to the TV channels and the news agencies we deal with.”
The government has shut down Internet services previously, as well, often in specific regions right before launching attacks. On at least two other occasions, the outages were national in scope.
Omar Abu Laila, a spokesman for the rebel fighters in the eastern city of Deir al-Zour, said communications have been down for so long there that the new disruptions will have no impact. “The communication outage did not affect us,” he said. “You should report that we’re happy the rest of Syria joined us.”

Yet, Thursday’s blackout — at 12:26 p.m. Damascus time, according to the Internet monitoring company Renesys — set off alarms worldwide. Among the worries: The only Syrian networks still routing traffic into the nation have a history of delivering malware to opposition activists, meaning that they almost certainly are controlled by the government.
Window into the conflict

Map: How Europe voted on Palestine at the U.N., in 2011 and now

Map: How Europe voted on Palestine at the U.N., in 2011 and now
Since last year, nine European countries appear to have shifted toward greater support for Palestinian efforts at the UN. None shifted away.

The three big questions on Syria's Internet blackout

The three big questions on Syria's Internet blackout
Did web service go completely dark in the country because the military is planning something or as a reaction against rebel gains?

6 scathing highlights from the Leveson report

6 scathing highlights from the Leveson report
The British judge implicated the police, politicians and regulators in the 2,000 word report

Petraeus says he messed up ‘royally'

Petraeus says he messed up  ‘royally'
The former CIA director admitted his mistake and said he'd try to save his marriage
The Syrian civil war has played out with unnerving intimacy for viewers of YouTube. Shaky videos delivered images of dead children, the bloodied walls after a massacre and, just this week, the fiery streak of an opposition missile destroying a government helicopter.
Analysts said the image of that attack, which highlighted the opposition’s rising military capabilities, may have prompted Assad to cut off communications after months of allowing information to flow with relative freedom.
The government had reason to do so. Its forces used the Internet for some routine communications. Easy access to the Web also helped the government spy on opposition forces, which relied on such technology to communicate. Social media sites, meanwhile, were popular with civilians, and continued access to the sites lent a veneer of normalcy in Damascus, the capital.
Yet most blamed Assad for the Internet shutdown. The main telecommunications cables are controlled by the government-owned Syrian Telecommunications Establishment, and all of the country’s Internet providers and cellphone companies rely on the data it provides. Shutting down the flow of information, analysts say, is easy.
“It’s a sign that the regime is going to take its gloves off,” said Andrew J. Tabler, a senior fellow and Syria expert at the Washington Institute for Near East Policy. “They’re going to make sure they’re the only ones who can communicate, or at least they are going to try.”
Opposition forces, however, have grown savvy at distributing images from the fighting to keep their cause visible to the world. Rebels operating near international borders, such as with Jordan, Turkey or Lebanon, have access to cellphone signals emanating from those countries. Governments backing the Syrian opposition have sent thousands of satellite phones to the rebels; the U.S. State Department says it has sent 2,000 pieces of communications equipment, which could assist in distributing videos even if the Internet remains shut down.
“Syria is going to be an excellent test” of such initiatives, said Andrew McLaughlin, a former top policy official at Google who also worked as a White House technology adviser. “People have been preparing for this day. . . . I’ll be glued to my screen for the next 24 to 48 hours to see if that did any good.”

Dehghanpisheh reported from Beirut.

Syria's internet cut off amid increased fighting

Rebels and forces loyal to Syria's president Bashar al-Assad are locked in a fierce battle just outside the capital Damascus. At the same time, internet and telecommunications links in the country have been cut. Both the Assad regime and rebel forces are blaming each other for the outage.


TRANSCRIPT:

ASHLEY HALL: Rebels and forces loyal to Syria's president Bashar al-Assad are locked in a fierce battle just outside the capital Damascus.
The fighting has cut access to the international airport, and two airlines have stopped flights to the Syrian capital.
At the same time, internet and telecommunications links in the country have been cut.
Both the Assad regime and rebel forces are blaming each other for the worst communications blackout in 20 months of conflict.
It's making it much more difficult to get accurate information about the situation in Syria.
Nonetheless, Timothy McDonald reports.
(Sound from rockets firing)
TIMOTHY MCDONALD: Amateur video uploaded by activists, shows what appears to be MiG warplanes firing rockets on the city of Homs.
Like many others that have emerged since the start of the Syrian conflict, it can't be independently verified.
For the opposition, the internet has played a vital role in documenting the war and pressing the case for international support.
For the time being, that appears to have stopped.
Jim Cowie from the US internet monitoring company Renesys told the BBC that internet traffic has stopped entirely.
JIM COWIE: It's as if the Syrian internet fell off a table and stopped working. It's very unambiguous, it is a complete withdrawal of all the internet connected resources in the country.
TIMOTHY MCDONALD: The apparent shutdown follows fighting in Damascus, which has forced the closure of the international airport. Emirates and EgyptAir stopped flights to the Syrian capital.
US officials say the rebels are making gains, but the war hasn't yet shifted decisively in their favour. US State Department spokeswoman Victoria Nuland blames the Syrian government for the shutdown, and says it's quite a revealing move.
VICTORIA NULAND: And it just again speaks to the kind of desperation of the regime as it tries to cling to power.
TIMOTHY MCDONALD: One IT expert says the government may have calculated that it was worth shutting down the internet, even though it makes its own communications more difficult too.
Professor Matt Warren is the chair of information systems at Deakin University.
MATT WARREN: It may be that they've made a decision that they're actually losing the perception war, and it's more advantageous for them to control the flow of information rather than resistance organisations being able to disseminate information, you know, widely to the world.
So it could be that form of assessment as well that the Syrian government feels is actually in their best interests to have a greater control, you know, over internet communications.
TIMOTHY MCDONALD: Shutting down the internet has been a government tactic in other places too. During protests in Egypt last year, the government there tried similar tactics.
In response, engineers at Google and Twitter organised a voice-to-tweet service to help protesters work around the shutdown.
Syria's opposition too, has other ways of getting the word out. The US has provided around 2,000 communications kits to the opposition.
Victoria Nuland says they're not affected.
VICTORIA NULAND: They are all designed to be independent from and able to circumvent the Syrian domestic network precisely for the reason of keeping them safe, keeping them secure.
TIMOTHY MCDONALD: Also, satellite communications aren't affected, and the opposition can always get footage out the old fashioned way - by taking it over the border.
Still, Professor Warren says the government probably will gain a tactical advantage, because military communications are likely to be unaffected.
MATT WARREN: They would have their own independent communication systems not linked to the internet, so a lot of their equipment and technology historically has been supplied to them by Russia. So it means that they would have their own independent communication network, independent of the internet.
But what may be an issue actually for the resistance is mobile communications because, as we've seen with ad-hoc movements that have developed, mobile communications are actually a very effective way for people to sort of keep in touch.
So again, it may be that some of these strategies are going to impact the resistance organisations more than the government forces.
TIMOTHY MCDONALD: Syria's minister of information denies that the government is responsible, and instead blames terrorists for the countrywide outage.
He says engineers are working to repair what he said was a fault in the main communications and internet cable.
ASHLEY HALL: Timothy McDonald.

Syria: Internet and mobile communication 'cut off'

The internet has been cut off and mobile phones have been disrupted in Syria, monitoring firms have said.

Networking firm Renesys said the country's connection protocols were unreachable, "effectively removing the country from the internet".

Local reports suggested that the internet had been down since early afternoon, and that telephone lines were only working intermittently.

The Syrian government has blamed "terrorists" for the disconnection.
"The terrorists targeted the internet lines, resulting in some regions being cut off," Syria's minister of information told a pro-government television station.
According to activists, it has been known for similar communication cuts to occur in isolated areas before military operations.

Amnesty International has described the reports as "very disturbing".
Renesys, a US-based company which tracks internet connectivity worldwide, said on its blog: "In the global routing table, all 84 of Syria's IP address blocks have become unreachable."
According to its systems, access was disconnected at 12:26pm local time (10:26 GMT).
'Started to dive'
 
Another US firm, Akamai, also confirmed it was unable to connect with Syria's internet.
Activists were using satellite phones to make contact with the outside world, Reuters reported.
Search giant Google noted that Syrians were unable to access any of its services including YouTube. The video sharing website is a popular place for activists to upload footage from the country.
Psiphon, a Canadian company that produces advanced computer systems for circumventing censorship systems, told the BBC that its monitoring showed the number of people connecting from within Syria had "started to dive" from around midday local time.

Psiphon's system - which requires specialised software - has throughout November been seeing 13-15,000 log-ins per day.
Akamai web traffic Monitoring firm Akamai posted this graph showing level of net activity in Syria
However, at the time of the reported outage, none of its users were able to get online.
Syria has previously seen large outages in July and August this year, each lasting less than an hour and only affecting targeted areas.

During the uprising in Egypt, four major internet service providers were cut off in the country during mass protests against the then-President Hosni Mubarak.
Breaking connections
 
Egyptians quickly found ways around the blocks, and Google introduced a "speak-to-tweet" service which allowed people to connect to Twitter via the telephone.

In Libya, internet blackouts were common in areas that were at the time still controlled by Colonel Gaddafi.

The exact method being used to cut off the internet in Syria is unknown, one security expert said, but there are clues.

"It looks like they are using the same approach as Libya did," explained Rik Ferguson, vice president of security research at Trend Micro.

"Requests for Syrian addresses are simply timing out - so it's likely to be 'blackholing' or even breaking connections physically by cutting cables or switching things off."

Black-holing is a tactic which involves sending internet traffic into a dead end - rather than its intended destination.

More on This Story

Syria conflict

DarkComet V4.2 RAT TUTORIAL


If you are not new to RATs, you should have heard the word DarkComet. Because DarkComet is such a great tool for hacking remote computers. It has several features that many RATs do not have. I have explained the basics of RATs and Setting up Extreme RAT in my previous articles. So before proceeding into this article, you must understand the basics of RATing. So please go through those articles first. You can read them from here.



In this article i am going to show you how we can hack remote computers using DARKCOMET RAT. Here, some steps are same as Extreme RAT tutorial . But i will repeat all the steps to avoid confusion. So lets move on.

Things you require

1) DARK-COMET RAT

This is the RAT you are going to use. You can get it from HERE.

2) No-ip.biz  account

As our IP-Address is dynamic(in general), we need to make it static.

3) DUC client

We can automatically update our dynamic IP-Adress, by installing DUC client.

4) VPN (If you are behind a router)

We must enable our router to allow us to connect to a remote PC. So we need to port forward.
Instead of port forwarding we use a VPN(Virtual Private Network).
You can use Proxpn.

Procedure:

Step 1:

First you need to create an account in www.no-ip.com

Step 2:

After creating an account, login with your account and create a host. You can do this by just following the steps.

Goto this link, and login. Then follow the steps as shown in the picture.


Finally click “Create Host”.

Step 3: Setting up your server.

First install Dark-Comet RAT on your PC and run it. It opens a window as shown below.


Now click on the + button which is at left bottom corner as shown below.


 It opens a small window showing you the port number. Click on “listen” button.


Then it disappears, don’t click the “listen” button again. Now click on “edit server” button at the bottom of the window as shown in the figure. 


It opens a new window with huge amount of options. First lets move on to the main settings. You can set a password to use when listening connections. You can see the default password by checking “security password” and “show chars” in the fillowing picture.


Now we need to set up our “network settings”. Clearly follow the steps here. You need to give your domain name you got from no-ip.com
It looks like yourdomain.no-ip.biz


 We came to the funniest part of our RAT setup. Here you can choose your icon. DarkComet is providing us some beautiful icon. So that our victim can easily believe us. Just follow steps  shown in the figure. It is self explanatory.





You can bind your server file with a PDF or Image. So when the victim clicks it, it opens the PDF file and the victim will not be able to suspect you. You can follow the steps as shown in the figure.


Finally click on “Build Server” button. It creates a new server file in the same directory where your dark-comet files are stored.

You are done. your server file looks like this. 


Now give your server file to your vicyim by any means. When  he clicks the server file, he will be connected to your computer. 


Now you can do anything you want. You can see him with his web cam, downloading files and many more. Just move around the options and play with him. I put two screenshots of how it looks like when you get access to his computer.



Using RATs on remote systems without their permission is illegal. This article is for educational purpose only. Dont do anything illegal. I will not be held responsible for that.

Hope you enjoyed this article. If you have any doubts or suggestions, feel free to leave your comments.

Keylogger Tutorial

Keylogger Tutorial


Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.


 About keyloggers

key loggersA keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a keylogger will reveal the contents of all e-mail composed by the user. Keylogger is commonly included in rootkits.

A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.

There are other approaches to capturing info about what you are doing.

    * Some keyloggers capture screens, rather than keystrokes.
    * Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.

A keyloggers might be as simple as an exe and a dll that are placed on a machine and invoked at boot via an entry in the registry. Or a keyloggers could be which boasts these features:

    * Stealth: invisible in process list
    * Includes kernel keylogger driver that captures keystrokes even when user is logged off (Windows 2000 / XP)
    * ProBot program files and registry entries are hidden (Windows 2000 / XP)
    * Includes Remote Deployment wizard
    * Active window titles and process names logging
    * Keystroke / password logging
    * Regional keyboard support
    * Keylogging in NT console windows
    * Launched applications list
    * Text snapshots of active applications.
    * Visited Internet URL logger
    * Capture HTTP POST data (including logins/passwords)
    * File and Folder creation/removal logging
    * Mouse activities
    * Workstation user and timestamp recording
    * Log file archiving, separate log files for each user
    * Log file secure encryption
    * Password authentication
    * Invisible operation
    * Native GUI session log presentation
    * Easy log file reports with Instant Viewer 2 Web interface
    * HTML and Text log file export
    * Automatic E-mail log file delivery
    * Easy setup & uninstall wizards
    * Support for Windows (R) 95/98/ME and Windows (R) NT/2000/XP
 Tools:

Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.
This invisible spy application is designed for 2000, XP, 2003, Vista and Windows 7.
  • Security - allows you to protect program settings, Hidden Mode and Log file.
  • Application monitoring - keylogger will record the application that was in use that received the keystroke!
  • Time/Date tracking - it allows you to pinpoint the exact time a window received a keystroke!
  • Powerful Log Viewer - you can view and save the log as a HTML page or plain text with keylogger Log Viewer.
  • Small size – Ardamax Keylogger is several times smaller than other programs with the same features. It has no additional modules and libraries, so its size is smaller and the performance is higher.
  • Ardamax Keylogger fully supports Unicode characters which makes it possible to record keystrokes that include characters from Japanese, Chinese, Arabic and many other character sets.
  • It records every keystroke. Captures passwords and all other invisible text.
Other Features:
  • Windows 2000/2003/XP/Vista/Windows 7 support
  • Monitors multi-user machines
  • Automatic startup
  • Friendly interface
  • Easy to install
 
Download Ardamax Keylogger (1.94Mb)


Perfect Keylogger for Windows 98/2000/XP/Vista and Windows 7

The latest, improved and most stealth version of Perfect Keylogger is now available only after purchase. To protect the product from abuse and improve its quality for the registered users, we no longer offer the trial version of the latest builds. The localized versions of Perfect Keyloger and 64-bit version are also available after purchase. The last public version is still available
, but keep in mind that it's not the latest and may be flagged by security software.

Download Perfect keylogger

The rise of the netflix hackers

In less than 10 years, Netflix has grown into a $700 million DVD rental powerhouse, shipping more than 1.5 million DVDs a day to its base of 6.3 million subscribers. But the very systems that have made Netflix so successful -- everything from its sophisticated recommendation engine to a profit-maximizing formula that determines which subscribers get movies first -- have proven irresistible to hackers, who are constantly looking for new ways to crack, manipulate and reverse-engineer the company.
Mike Kaltschnee
Photo: Michelle McLaughlin
Case in point: Just weeks after Netflix took its first, long-awaited steps into the digital delivery arena by rolling out its Watch Now instant viewing feature, which allows users to stream some movies and TV shows over the internet, one hacker claims to have figured out how to bypass the mechanism that tracks and limits a subscriber's viewing time.
The hacker, who calls himself Livesunkept, told Wired News in an instant messenger interview that Netflix stores a subscriber's minutes on the user's own PC, in cookies and browser cache files. Livesunkept discovered he could pause a movie a few minutes into playback, then wait until it was completely downloaded, unplug his network adapter and watch the film offline. When he was done, he'd clear his cache and cookie files before plugging back in, keeping Netflix from knowing he'd watched more than the initial few minutes of the film.
Steve Swasey, Netflix's director of corporate communications, says the company's instant viewing team investigated the hack and found no evidence that it worked, but Livesunkept claims he successfully repeated the process five times before Netflix quietly closed the loophole last week, following Wired News' inquiries.
His crack is just the latest carried out by a small and ingenious subset of the Netflix subscriber base that specializes at poking and prodding at the company. But despite appearances, most of these hackers are just trying to maximize their Netflix experience, and have no interest in ripping off the company, says Mike Kaltschnee, founder of the website Hacking Netflix -- a hub for Netflix tinkerers.
"I'm all about paying for content, and I'm not interested in teaching people how to steal from Netflix," Kaltschnee says. "What I am interested in is helping people learn how the company works."
Netflix is famous for pioneering the flat-rate subscription model of movie rentals that allows customers to hold on to a DVD rental indefinitely, with no late fees. The company offers 10 different rental plans: the cheapest, at $5 a month, allows a customer one DVD at a time, with a limit of two per month. The most expensive, at $48 a month, lets customers have up to eight movies at once, with no monthly limit.
Customers add the movies they want to see to an online queue, and DVDs from that list are shipped from Netflix distribution centers as they become available. Mailing costs in both directions are paid for by the company, and each time a customer returns a DVD, a new one from his or her queue is sent.
That seemingly simple arrangement has spawned a wealth of user innovations. Subscribers have incorporated RSS feeds of their Netflix queues into their blogs. A developer wrote a PERL module to screen-scrape and export subscriber movie ratings from the site. Others have built quick browser hacks to search engine that indexes movies in the Netflix catalog by year, filling a gap in Netflix's own search capability. A Pittsburgh software engineer built an online fee calculator that tabulates a subscriber's effective rental costs per movie based on their rental patterns and subscription plan.
Not all hacks require loads of technology know-how: One user discovered that he could view his Netflix queue through his Bank of America portfolio page, an easy-to-set-up aggregator for bank and e-mail accounts that BOA offers free to its account holders. And around the country, film fans have set up movie swaps with other local Netflix subscribers, allowing them access to additional films without waiting for the company to mail them out.
It was the hackers who first uncovered Netflix's secret "throttling" technique -- a controversial inventory allocation practice that favors new and infrequent users, and results in delays and reduced availability for heavier movie watchers. Under pressure, Netflix modified its terms of service to acknowledge the practice in January 2005. ("If all other factors are the same, we give priority to those members who receive the fewest DVDs through our service," the TOS now reads).
Hackers have tried a variety of techniques for manipulating the Netflix queuing system, including closing their accounts and opening new ones every few weeks, or timing returns so that movies arrive back at Netflix the same day that new releases are mailed from the company's distribution facilities. The merits and efficacy of these techniques have been debated ad nauseum by subscribers on sites like Hacking Netflix.
Shawn Morton, a 36-year-old product development manager from Louisville, said he began looking for a way to get movies faster after noticing that titles showing long wait times in his queue were shipping immediately to coworkers with trial memberships. He discovered that removing all movies from his queue except those with an expected "long" or "very long" ship time caused the DVDs that remained to ship immediately. His technique was widely adopted in the Netflix hacking community, though with mixed reports of success. And like many Netflix hacks, the trick stopped working about two weeks after it became public.
"I wasn't trying to harm Netflix with any of this," Morton says in his e-mail interview. "I was simply trying to demonstrate that there are limits to the company's 'unlimited' service."
Similarly, Livesunkept says he was motivated by a desire to make Netflix aware of vulnerabilities in its offering. "It wasn't so that people would get free movies," he writes. "I did it so that (Netflix) would fix it."
Netflix claims to appreciate the work of hackers.
"We have some fanatical followers out there, and we're open to their feedback," Swasey says, "especially if it helps us improve the service." As proof of this, he cites the Netflix prize, which will award $1 million to whoever can come up with an algorithm that improves the effectiveness of the company's movie recommendation engine by 10 percent. To give contestants something to work with, the company released an anonymized dataset of 100 million movie rankings from half-a-million NetFlix subscribers, scrubbed of personally identifying information.
But even that contest has led to a hack. Last November, two researchers from the University of Texas released a paper (.pdf) demonstrating that users represented in the dataset could be easily unmasked, if they've also posted movie ratings to a public site, like IMDb. The ratings of less-popular films, coupled with the dates they're rated, form a kind of movie-preference fingerprint that can be used to make matches, the researchers concluded.
Netflix's Swasey calls the claim "interesting, but absolutely without merit," but Arvind Narayanan, one of the authors of the paper, says he's got the numbers to back it up. "Simply removing names does not ensure that data will remain anonymous. And the implications stretch far beyond the world of Netflix."
It's the kind of feedback that executives at Netflix would probably prefer to hear a bit less of, but if past history is any guide, people will keep challenging the company -- every step of the way.

5 Killer Tricks to Get the Most Out of Wireshark


Wireshark has quite a few tricks up its sleeve, from capturing remote traffic to creating firewall rules based on captured packets. Read on for some more advanced tips if you want to use Wireshark like a pro.
We’ve already covered basic usage of Wireshark, so be sure to read our original article for an introduction to this powerful network analysis tool.

Network Name Resolution

While capturing packets, you might be annoyed that Wireshark only displays IP addresses. You can convert the IP addresses to domain names yourself, but that isn’t too convenient.

Wireshark can automatically resolve these IP address to domain names, although this feature isn’t enabled by default. When you enable this option, you’ll see domain names instead of IP addresses whenever possible. The downside is that Wireshark will have to look up each domain name, polluting the captured traffic with additional DNS requests.

You can enable this setting by opening the preferences window from Edit -> Preferences, clicking the Name Resolution panel and clicking the “Enable Network Name Resolution” check box.

Start Capturing Automatically

You can create a special shortcut using Wirshark’s command-line arguments if you want to start capturing packets without delay. You’ll need to know the number of the network interface you want to use, based on the order Wireshark displays the interfaces.

Create a copy of Wireshark’s shortcut, right-click it, go into its Properties window and change the command line arguments. Add -i # -k to the end of the shortcut, replacing # with the number of the interface you want to use. The -i option specifies the interface, while the -k option tells Wireshark to start capturing immediately.

If you’re using Linux or another non-Windows operating system, just create a shortcut with the following command, or run it from a terminal to start capturing immediately:
wireshark -i # -k
For more command-line shortcuts, check out Wireshark’s manual page.

Capturing Traffic From Remote Computers

Wireshark captures traffic from your system’s local interfaces by default, but this isn’t always the location you want to capture from. For example, you may want to capture traffic from a router, server, or another computer in a different location on the network. This is where Wireshark’s remote capture feature comes in. This feature is only available on Windows at the moment — Wireshark’s official documentation recommends that Linux users use an SSH tunnel.
First, you’ll have to install WinPcap on the remote system. WinPcap comes with Wireshark, so you don’t have to install WinPCap if you already have Wireshark installed on the remote system.
After it’s isntalled, open the Services window on the remote computer — click Start, type services.msc into the search box in the Start menu and press Enter. Locate the Remote Packet Capture Protocol service in the list and start it. This service is disabled by default.

Click the Capture Options link in Wireshark, then select Remote from the Interface box.

Enter the address of the remote system and 2002 as the port . You must have access to port 2002 on the remote system to connect, so you may need to open this port in a firewall.

After connecting, you can select an interface on the remote system from the Interface drop-down box. Click Start after selecting the interface to start the remote capture.

Wireshark in a Terminal (TShark)

If you don’t have a graphical interface on your system, you can use Wireshark from a terminal with the TShark command.
First, issue the tshark -D command. This command will give you the numbers of your network interfaces.

Once you have, run the tshark -i # command, replacing # with the number of the interface you want to capture on.

TShark acts like Wireshark, printing the traffic it captures to the terminal. Use Ctrl-C when you want to stop the capture.
Printing the packets to the terminal isn’t the most useful behavior. If we want to inspect the traffic in more detail, we can have TShark dump it to a file that we can inspect later. Use this command instead to dump traffic to a file:
tshark -i # -w filename

TShark won’t show you the packets as they’re being captured, but it will count them as it captures them. You can use the File -> Open option in Wireshark to open the capture file later.
For more information about TShark’s command line options, check out its manual page.

Creating Firewall ACL Rules

If you’re a network administrator in charge of a firewall and you’re using Wireshark to poke around, you may want to take action based on the traffic you see — perhaps to block some suspicious traffic. Wireshark’s Firewall ACL Rules tool generates the commands you’ll need to create firewall rules on your firewall.
First, select a packet you want to create a firewall rule based on by clicking on it. After that, click the Tools menu and select Firewall ACL Rules.

Use the Product menu to select your firewall type. Wireshark supports Cisco IOS, different types of Linux firewalls, including iptables, and the Windows firewall.

You can use the Filter box to create a rule based on either system’s MAC address, IP address, port, or both the IP address and port. You may see fewer filter options, depending on your firewall product.

By default, the tool creates a rule that denies inbound traffic. You can modify the rule’s behavior by unchecking the Inbound or Deny checkboxes. After you’ve created a rule, use the Copy button to copy it, then run it on your firewall to apply the rule.

Do you want us to write anything specific about Wireshark in the future? Let us know in the comments if you have any requests or ideas.