Slider 1 mini Slider 2 mini

Friday, April 5, 2013

Top 5 Pentration Testing Applications For You Android Smart Phone

Filled under:

In The Previous Post I Have Shared Top 5 Pentration Testing Operating System's Based On Linux But In This Post I Am Sharing Top 5 Pentration Testing Applications For You Android Smart Phone This Post Is Some What Linked To The Previous Post Because In this Post In Will Be Telling Pentration Testing Apps For Android Which Is Linux Based O.S :)) With Easy Tools Which I Am Also Using You Can See The Screenshot Of My Phone Below.

Note : You Phone Must Be Rooted To Use Them Properly ...

Lets Come On The Topic My List Starts With :

Top 5 Pentration Testing Applications For You Android Phone

shot_000001

1. dSploit : 

dSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device. Once dSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing ( with common protocols dissection ), real time traffic manipulation, etc, etc . This application is still in beta stage, a stable release will be available as soon as possible, but expect some crash or strange behaviour until then, in any case, feel free to submit an issue on GitHub.

2. Shark :

Traffic sniffer, works on 3G and WiFi (works on FroYo tethered mode too).To open dump use WireShark or similar software, for preview dump on phone use Shark Reader Based on tcpdump.

3. The Android Network Toolkit :

In the last Defcon conference a new tool has been released by a security researcher and the tool is called “The Android network toolkit”. The has been developed for penetration tester and ethical hackers to test any network and vulnerabilities by using their mobile phones. This toolkit contain different apps that will help any hacker to find vulnerabilities and possibly exploit it. The company behind the app is an Israeli security firm called Zimperium.

4. AnDOSid :

DOS or denial of service attack is very dangerous attack because it takes down the server (computer).AnDOSid allows security professionals to simulate a DOS attack (A http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones.AnDOSid is designed for security professionals only!

 5.Nmap :

Nmap (network mapper) is one the best among different network scanner (port finder) tool, Nmap mainly developed for Unix OS but now it is available on Windows and Android as well. Nmap for android is a Nmap apps for your phone! Once your scan finishes you can e-mail the results. This application is not a official apps but it looks good.

 

Posted By Unknown9:47 AM

Saturday, March 2, 2013

Express VPN Premium VPN Worth 13$ For Free

Hi Guys This Is DJ Alone... Today I'm Posting KEY For Express VPN...


Express VPN is a Premium VPN... U Had To Pay 13$ Every Month If U Want To Use That...
Express VPN


First Of All Download The Express VPN From Here...

http://www.mediafire.com/?w9l84ohy17539s2

Then Install It... & It Will Ask The KEY...

Download Its Premium KEY From BELOW Link & Enter It In EXPRESS VPN...

http://www.mediafire.com/view/?iviqjv6j2tijz1j

Working ScreenShot For Express VPN Taken On 3 Mar 2013...

If That Key Is Not Working For U...
Use This...
EQK9I206TKTYY7WEP6MYVHN


Hurry Download The Software & Key...

Note :- Key is Valid For One Month... But Expires Tomorrow So Download It & Use It...

Posted By आर्यावर्त11:15 PM

Real SQL V0.3

Filled under: ,


Here comes a post after a long holidays from blogging due to my exams. This is about one of my favs SQli scanner. Its called Real SQLi. Just found this so thought of posting here.
What is does is search through Google, using Google Dorks and tries each website for an SQL Injection Vulnerability and if it is successful it will return the vulnerable link to you!
This is the main GUI of the application and in later screenshots I will show you it's features.


Here is the search function and you can see it is returning a vulnerable URL
The search is complete and there were 3 vulnerable URLs found!

This is the save button making a .txt file of all the working links
Showing the contextual menu in the results box  

Download this from here : http://dl.dropbox.com/u/98292500/Real%20SQL.exe

...PROTOTYPE...

Posted By z0mb136:35 AM

Thursday, February 28, 2013

GO DADDY COUPON CODE - Buy Domain At 1.49 $

Hi Guys This is DJ Alone... I'm Sharing A Coupon Code For GODADDY.COM...

BY Using This Coupon U Can Buy .COM Domain In Only 1.49$ (91.36 INR.)

Just Go To GoDaddy.Com

Go Daddy Is The Most Famous Domain Provider... Best Domain Providers...




Use This Coupon Code...To Buy Domain at 1.49 $




LKSRTL149

This Code Is Expiring On 1 March 2013...

Posted By आर्यावर्त5:53 AM

Wednesday, February 27, 2013

What Is Socks ?

What is socks ???



Hi Guys This Is DJ Alone... In This Post I Will Tell U...

What is Socks ???


SOCKets or SOCKS-Proxies (=Secured Over Credential-based Kerberos Services) are very similar to HTTP Proxy Server. The main difference is that they have the capability to redirect all traffic (Web, FTP, POP3, Torrent…) through a Proxy Server while HTTP-Proxies only redirect HTTP (Port 80) requests.

SOCKS-Proxies have a wide range of benefits but the most important is that they provide complete anonymity and protects all your traffic (including DNS-requests). This means that the remote server will only see the SOCKS-Server IP (Internet Protocol) instead of the real IP you got from your Internet Service Provider. Hence, absolute anonymity is evident.


But why generally use a Proxy or is it better to surf without one?

1. To hide your real identity/IP-Address

2. Unblock websites (some countries/ISP's block websites or social networks like facebook, twitter, youtube)

3. Bypass your proxy at school or work

4. Very useable for SEO-Programs

A few SOCKS Proxies even support the SMTP-Port (25) which allows you to send the Emails anonymously.

If you want to extend your Anonymity you can chain different kind of proxies together.

Examples:
SOCKS Proxy > HTTP Proxy > CGI Proxy
SOCKS Proxy > HTTP Proxy
HTTP Proxy > SOCKS Proxy
SOCKS Proxy > CGI Proxy

There are a few programs to run your own SOCKS-Proxy-Server like: SS5, WinSocks, OpenSSH, Dante, Sun Java System Web proxy, Free Cap and Freeproxy.

The benefit of using public a SOCKS5 List instead of a private server is that you get a wide range of IP-Addresses and servers from all over the world which hides you identity even more.


How to use socks(Fire fox)  ???

Firefox is the most powerfull and extendable browser in the world. So how to use socks with Firefox 3, is it hard to configure and use? No, it easy.

Run Firefox

Go to Tools  → Options


Click Advanced and choose Network, then Settings
Choose Manual proxy configuration and place IP address to SOCKS Host, port to Port

After that choose SOCKS v4 for 4 version of socks or SOCKS v5 for 5 version of socks...



Click OK

Enjoy using socks in Firefox

For comfortable socks switching and configuring you can use FoxyProxy extension for Firefox...

Posted By आर्यावर्त6:41 AM

What Is Carding ? Carding Tutorial

Hi Guys This Is DJ Alone...
In this tutorial , i will teach you the terms “carding” , “scamming” , “cvv2″ etc. I’ll also tell some tricks for sites such as ebay.com , ebay.co.uk , actually just ebay

 let’s start with explaining the term “CARDING”

 Chapter 1 : Introduction and Tips.

 Carding , or scamming as other people would say , is an art. It’s basically ordering items from the Net (cellphones , laptops, PDA’s , TV’s ,……) without actually
 paying for it . or at least , not paying with your own money

 Now you’ll all be wondering how we do this stuff.
 Well , most sites accept credit cards as a payment form . These credit cards can be obtained from mIRC or from public forums , which i won’t display here
 due to security reasons.

 For the dummies : a creditcard is a 16 digit number which can be used to pay , some sort of bank card.

 There are different types of creditcards :

 Visa
 Mastercard(MC)
 American Express (AMEX)
 Discover
 Novus
 JCB

 When you obtain a creditcard , you have to recognise the type .

 A card starting with a 4 is a Visa , with a 5 is a Mastercard , with a 3 (15 digits long) is an Amex , with a 6 is Dicover/JCB.

 Some sites might ask for a CVV2 , this is the tree digit verification code on the back of the card.
 Mostly this is also pasted on the forum or mIRC channel.

 Note : Amex has a 4 digit verification code , and for discover 000 can be used.

 Now there are some tips and tricks when you want to order something .

 * Look for a site with a shitty layout , they’ll probably have a shitty security and are “cardable” (this means you cane asily get stuff from the site )
 * Try to use Discover or Amex , these cards are less involved with chargebacks etc and most merchants (payment processors) won’t verify these cards , instead of visa and
 mastercard , which have alot of chargebacks.
 * Don’t use a store in your own country , especially not big ones . Ebay.co.uk is one of the best cardable sites if you have the right techniques..

 When ordering , sites will ask for a billing adress and a shipping adress.
 The billing adress is the adress listed on the creditcard , the shipping adress is your adress or a drop adress , a so called “delivery adress”.

 As you might have noticed , i oftenly mentioned ebay as a site to buy goods from.
 But ebay doesn’t use an instant paying service , they offer online paying services such as Paypal and Auctionpayments.com .
 These sites gladly accept all types of creditcards , from all over the world .

 Chapter 2 : Ebay , Paypal.com

 Ebay

 As you will probably know , ebay.com is an online auction site where goods can be sold and bought by people over the world.
 This site is one of the most visited shopping sites , because of its large variety of goods and prices , which can be lower then store prices.

 Now the question is : how to contact the seller and arrange the fraudulent deal.

 Well , to contact the seller you will need an ebay buyer account.This means you have to register yourself at www.ebay.com , and do NOT use your real information , because
 they will ask you to provide a creditcard and that one has to match with the adress on the card , so just use the cardholder’s info.
 Also use a valid email adress , a yahoo or hotmail one for example , because you have to confirm your registration , and also the seller(s) will reply to you on that email adress.

 If you see an item and you want to buy it , first ask the seller a question.
 A question which will work well is the following one :

 Hi there,
 i am from USA and i am interested in purchasing this item from you .
 i would like to pay this item with my paypal
 But the item is a gift for my cousin in Belgium
 can you gift wrap the package and calculate shipping costs for 2-3 days delivery?
 please reply me with a total price and your paypal adress.

 With this message i received alot of items , including cellphones , a PDA , shoes , a laptop , software, etc.

 Paypal

 Now i will (finally) explain the meaning of the word Paypal.

 Paypal.com us an online payment method , which is used by alot of ebayers , and can be funded by bank transfers or creditcards (whoohoo)

 All you need for this is a USA cvv2 (see chapter 1) and a valid email adress.

 Visit www.paypal.com & click on Register/Sign up.
 Fill in the form with the creditcard info (name , adress, city, state, zipcode , country , etc) and the email adress you are using for Ebay.
 On the bottom of the page they will ask you to pick 2 security questions and give an answer on those questions , in case you forget your password.
 Pick any random question and fill it in with random info , paypal cannot verify it .
 After you have signed up , go to your email inbox & click on the paypal email .
 Inside you will find a link which you’ll have to click in order to confirm the registration. You’ll visit a page which will ask you to confirm your paypal password.
 Fill it in, click on submit , and paypal will ask you to add a bank account. We aren’t interested in this , so click on Skip.
 Then you’ll see your account overview. In the left menu , click on Add a Credit Card.
 On that page it’ll ask you the cardholder’s name , the ccnumber , type of creditcard (see chapter 1) , the expiry date and the Cvv2 (cfr. Chapter 1)
 If all information is valid , click on Submit and hopefully you’ll get a message saying : you have succesfully added a creditcard . Blablablaa…….
 If you are unlucky , you’ll get one of the following errors :

 * This creditcard has already been assigned to another paypal account , please use a different card.(no explenation needed)
 * You have entered an invalid or partial credit card number (cc number is incorrect)
 * Your card has been declined because we could not verify the 3-4 digit code on the back of your card . (cvv2 is invalid)
 * This card has been declined by your bank issuer . (card is invalid)

 After you have successfully added a card , look in your email inbox for some replies from sellers which will contain a full price for the item.
 Go to your paypal account, click on Send Money.Fill in the recipient (seller’s paypal email) , the amount , and pick Auction Goods (non Ebay)
 on the next page create a item number (10 digits maxium) , and a buyer ID (johndoe4852 for example). As auction site , select Other.
 Then click on Continue , it’ll bring you to a new screen to confirm the information you entered.
 As funding source , you’ll see that the credit card is selected .
 On bottom you ‘ll see that paypal automatically selects the credit card adress as shipping adress. Leave this indicated like this , it’ll give the transaction a very legit look.
 Then click on Confirm and hope for the best . If your purchase was succesfull , you’ll get a message saying you’ve sent cash or you paid for an online auction.
 Then return to your paypal account & Log Out . Go to your inbox , tell the seller the money has been sent and provide the shipping adress in the email.
 Also ask him to mail you back once the package is shipped...

Credits To :- LNXROOT.NET

Posted By आर्यावर्त5:54 AM

Monday, February 18, 2013

Get Usename & Password Database By Google

This Tutorial Is about Finding Username, Passwors, Databases with Google
so lets Start ...  


1- open Google.com

2- Enter This Dork 
  • filetype: This "pdo_mysql" (pass | passwd | password | pwd)   
See the Search Results Almost 10,900
If you did nt find this type results then click on 2-3-4.....30 pages. finally you'll find many websites...

Now Click on site, You will got all datbase of website,

Posted By आर्यावर्त8:18 AM