Thursday, 28 November 2013

Linux Server Hacks


Linux Server Hacks

100 Industrial-Strength Tips and Tools


Linux Server Hacks

Network Security Hacks, 2nd Edition


Network Security Hacks, 2nd Edition

Tips & Tools for Protecting Your Privacy


Network Security Hacks, 2nd Edition

HTML5 Hacks


HTML5 Hacks

Tips & Tools for Creating Interactive Web Applications


HTML5 Hacks


Windows 8 Hacks


Windows 8 Hacks

Tips & Tools for Unlocking the Power of Tablets and Desktops


Windows 8 Hacks


QR Code
Download:Windows 8 Hacks

Linux Security Secrets and Solutions


Hacking Exposed Linux, 3rd Edition

Linux Security Secrets and Solutions


Hacking Exposed Linux, 3rd Edition

Hacking Exposed, 6th Edition


Hacking Exposed, 6th Edition

Network Security Secrets and Solutions


Hacking Exposed, 6th Edition
QR code - Hacking Exposed, 6th Edition
QR Code

Hacking Exposed Malware and Rootkits


Hacking Exposed Malware and Rootkits

Malware & Rootkits Secrets and Solutions


Hacking Exposed Malware and Rootkits

QR Code

Gray Hat Hacking, 3rd Edition


Gray Hat Hacking, 3rd Edition

The Ethical Hackers Handbook


Gray Hat Hacking, 3rd Edition

QR Code

Saturday, 2 November 2013

Google Search Tricks


  • Google Calculator:
    • Google search can be used as a calculator. It can calculate anything from the simplest math to the most complex equation. All you need to do is just enter the math in the search box and hit enter. You can use the following functions:
      1. + - Add
      2. - - Subtract
      3. * - Multiply
      4. / - Divide
      5. ^ - To the Power Of
      6. sqrt - Square Root of a Number



  • Dictionary Definitions:
    • You can define any word by entering “define:” following the word. For example define: ignoble
      Google will display a list of dictionary definitions for that word.

      [Image: define.png]

  • Search for a Specific Title:
    • Suppose you came across a great article which you really liked but unfortunately forgot to bookmark it then you can find it easily with the help of Google provided you know the title of the article. Here’s how you do it:
      Let’s say you read an article “Women talk three times as much as men” then you can search for it by typing “intitle: Women talk three times as much as men”

      [Image: intitlegoogle.png]

  • Google Converter:
    • Using this feature you can convert units like millimeter into inches, kilometers into miles, liters into ml, etc. You can do so by typing ‘25km in miles’ for converting km in to miles, ‘50litres in ml’ for converting litres into ml, and so on.

      [Image: convertor.png]

  • Google Currency Converter:
    • Google’s search has an inbuilt currency converter. It allows you to perform any currency conversion. All you need to do is just enter the conversion you’d like done into the Google search box and hit “Enter” or click the Google Search button. For instance: “1 USD in INR”

      [Image: currencyconvertor.png]

  • Weather Updates:
    • You can easily know the weather condition of a specific place. In order to find out, all you need to do is just enter the place name followed by “weather”. For ex: “london weather”

      [Image: weatherupdates.png]

  • Search on a Particular File Types:
    • There are various kinds of files available over the net. Searching for a specific file type isn’t really easy. But using this tip you can easily search for a specific file type.
      For instance if you want to search for a guide, let’s say a ‘Guide to Building a Successful IT Career’ in ppt format. You can make use of the “filetype:” function. So in order to search for the PPT version of the guide you can enter in search bar ‘Guide to Building a Successful IT Career filetype:ppt’

      [Image: filetypegoogle.png]

  • Search on a Particular Website:
    • If you want to search for something from a particular site using Google search then you can do so by using the “site:” feature. Here’s how you do it:
      Let’s say you want to search for cloverfield DVD on Amazon, you can do so by typing “cloverfield DVD site:www.amazon.com”

      [Image: sitesearch.png]

  • Get the Local Time anywhere:
    • Wanna know what time is it in London now? You can ask Google by typing “what time is it London” in the search bar. You can also enter “time (location)” without the quotes.

      [Image: londontime.png]

  • Remove Unwanted Search Results:
    • Suppose you wanted to search a Harry potter book review but you ended up in getting reviews of the movie rather than the book. Well in this case you can make Google to exclude the movie results from the search. You can do so by adding “-movie” at the end of the term. For instance: “Harry potter Chamber of secrets -movie” This will give search results excluding the movie- The chamber of secrets.

      [Image: excludeunwantedresults.png]

  • Search for URL's:
    • You can even search for URLs in Google search.For instance: “Women_talk_three_times_as_much_as_men”. You can also use “.” “-” instead of “_“. The search will bring up results with the URLs containing the above words entered.

      [Image: urlsearch.png]

  • Track Flight Status:
    • You can also track a particular flight status. All you need to do is just enter the airline and flight number into the search box and hit enter. You’ll get the arrival and departure time of the flight right inside Google’s search results.

      [Image: flightstatus.png]

  • Search Google Groups by the Subject Line:
    • You need to be in the google groups search page before attempting this query; otherwise it might not work correctly. Using the “insubject:” function you can search google groups by the subject line. For instance “insubject:windows xp fast shutdown”

      [Image: insubject.png]

  • Find Related Sites:
    • Suppose you find an interesting website and you would like to find some other alternative to this site then you can do so by using “related:” function. For instance if you want to search an alternative for google.com you can do so by entering “related:www.google.com”

      [Image: relatedsites.png]

  • Find Links to a Specific URL:
    • You can find the webpages which have a link to a specific URL using the “link:” function. This is really great as it will help you if you own a website, you can easily find out the pages linking to a page in your site. To use it, you need to enter the whole URL after “link:”
      For instance “link:http://www.cnn.com”
      Well that’s it for now, hope you liked them. If you know more feel free to mention them here.

      [Image: linkstopage.png]

  • Whois Lookup Service:
    • You can also search for information on a particular domain name. Just type in “whois domain.com” and hit enter. You’ll get to see the creation and expiry dates of the domain.

  • Suggests Words, Phrases and their Results:
    • This is really helpful if you aren’t able to spell a particular word or you would like to know the results a particular word would contain when searched.

Malware

hi guys,
a small guide on malware ...

What is Malware?

Malware is short for Malicious software, and simply is any software designed to damage or disable computers and/or computer systems.
Some of the most common types of malware (many of which can be found on HF) are Viruses, Worms and Keyloggers.

The History of Malware
I did not and do not claim to have made this image.


Types of Malware:

Virus
A virus will, most often, appear in a .exe format and when executed will insert or install its self into a certain area(s) of a computer, these areas would now be considered "infected". Once the computer is infected the virus can now perform any task that it has been tasked to do. A virus will almost always perform harmful opperations such as stealing or corrupting data. Viruses can also carry other Malware such as Keyloggers. One reason that a virus can be hard to remove is that they often replicate themselves and install clones into other areas of the victims computer, meaning, if one virus is found there is bound to be the exact same one somewhere else in the system.

Now, there are different types of virus which I will briefly explain here:

Boot-Sector Virus: This is a virus that is stored in The Master boot Record. What this means is the virus will run almost instantly after BIOS. Because of this the virus is instantly loaded into memory and can from there control the computer.

File Deleting Virus: This is a virus that is designed to break the computer. It will delete key parts of the operating system, rendering it unusable.

Macro Virus: This is a virus that is written using a Macro programming language like VBA. this allows the virus to be stored in a file such as an excel spreadsheet and transfered from system to system this way.

Polymorphic Virus: This is a virus that can change their code every time they infect a different system, this makes it near impossible for an anti-virus to detect them and gives spreading methods almost endless possibilities.

Armored Virus: These are viruses that are designed to be hard to break, designed to be hard to locate and sometimes even have the ability to fight back an anti-virus. Some people consider that by cripting a virus it is an armored one.

Retrovirus: This is a virus that will actually try to attack and disable an anti-virus application. Some people call this an anti-anti-virus. Some destroy the anti-virus and some disable it.

Keylogger
As the name suggestes, a Keylogger is a type of Malware that will log the keystrokes of the victims computer. This is most often done without the victim knowing and can be used to steal sensitive information (mainly passwords) from the computer. Previously, keyloggers would save the keystrokes to a file, hidden on the victims computer and later upload them somewhere. However, with the ever expanding world of Malware it is now possible to have your keystrokes broadcasted live to the attacker.
Worm
The main trait of a computer worm is its ability to spread to an almost endless amount of computers. Worms are designed to spread without the need of human interaction. Lots of worms are created to spread and not neccissarily harm the infected, however, disuption in the form of network traffic can be achieved. Worms can be used to harm a computer system, they can delete data or make the infected computer accessable and controlable by the original worm creator.
Adware
Adware is a type of malware that will force the infected computer to display and view adverts in order to give the advert publisher more revenue. Recently with the boom of PPD websites a form of malware, which is considered by some to be adware, "Survey Lockers" have been introduced which lock down someones computer and force them to complete a survey in order to re-gain access.
Spyware
As the name suggests, Spyware is designed to spy and gather information on someone. Spyware can be delivered in the form of a virus or worm and can aid an attacker in identity theft or steal other information such as credit card details and other financial information.
Ransomware
Ransomware is a type of malware which will restrict a users access to his/ her computer. It will then demand a ransom to be paid in order for the system to be unlocked. Some ransomware will encrypt files and some will simply lock the system and display an on screen message. Ransomware is distributed like most other malicious software, through files or worms. Even if the victim pays the ransom, ransomware will often infect the computer with a worm or a RAT so that the ransomware operator still has access to the computer even after it has been unlocked.
Trojan Horse
A trojan horse is a hacking program that gains access (often administritive privliges) to a computer because it is disguised as a legit file. Trojan horses are normally used to give the attacker access to the system and use it as part of a botnet. trojan horses do not attempt to inject themselves into other files or programs.
Dialers
This is not so popular now because few homes run off a dial up connection. A system that is on a dial up connection could be infected with a malicious dialer and foced to call premium rate numbers. Exploits in a computers operating system will allow these premium malicious dialers to be installed. They are very hard to remove.

Preventing Infection
Certain steps can be taken to ensure that you do not become infected with a malicious piece of software.
The first thing is to use common sense, if someone sends you a random file (specially .exe) and tells you to open it because it "gives you free money" don't open it, it is almost certainly malware.
The next tip would be to make sure that you have a repuable and strong anti-virus. You don't even need to spend TONS of money microsoft security essentials is a perfect free anti-virus.

Removing Malware
The best way to attempt to remove Malware quickly is as follows:
1. Download Malware Bytes Setup. (do not setup)
2. Run Computer in Safe Mode.
3. Delete Temp Files.
4. Install Malware Bytes.
5. Perform Malware Bytes scan.

This will normally find and remove most types of malware. This does not always work though, and if it doesn't then the malware could be FUD (explained in next section) the best thing to then do would be use someone who knows what they are talking about, use an anti-malware and malware removal expert. The HJT team on HF (when active) would be perfect.

Malware Concealment
Attackers go to great efforts in order to make their Malware undetectable. A commonly used phrase, and something that all attackers aim for is a piece of Malware becoming FUD (fully undetectable) meaning that no anti-virus program can detect or remove it.

A .exe file uses lines of instruction known as offsets. A anti-virus contains a database of offsets that are similar to or are commenly used in malware. Anti-Virus will check programs to see if they contain these common offsets. Anti-virus will also use common behaviour detection to detect programs that are performing malicious commands.

Attackers can use crypters to, firstly, cover up the offsets and cover them again using algorithms. This makes it very hard or sometimes impossible for anti-virus to detect the malicious software. When executed, the crypted file will decrypt itself and run itself in memory to bypass the behaviour detection in anti-virus.

Another tool that attackers use is File Binders. People these days are getting more aware of malware and now know not to trust, for example, .exe files. A file Binder will bind one file to another meaning that a .exe could be hidden in a word document, or even a photo. One tip I would give is to always check the size of files, make sure nothing is unordinary.

Famous Malware
Here is a list of some of the most famous malware:
STUXNET: This was a worm that would target industrial control systems,
often large ones such as power plants and dams and would allow the attacker to take control of these systems.
I Love You: This was another worm that would be distributed via an email titled:
I love you. It would then have the ability to spread itself via emails of the infected and IRC.
Melissa: This was another piece of Malware that would spread via email once opened.
The creator recieved a 20 month jail sentence because it cost the US government $8,000,000,000 to fix.
Nimda: This was another worm, and it was one of the fastest spreading ever.
It targeted admins of computer networks and websites who it would then distribute from (spell Nimda backwards)