Tuesday, 29 March 2011

Dear System, Fuck You ! | Angry Hacker Rant version 1.1

Sometimes I regret that why I didn't studied in class 12. But then, I never wanted to waste my time studying good for nothing subjects which played no role in the career I chose to opt. I chose to be different and I took the beating. Period. Even today, the good for nothing competition gets selected and is well placed cuz it studied in a better college and had a better 12 percentage, damn system. How much role skill plays comes into light when you jump at the real market. And they say we don't have our own Taran King, rms, Knight Lightning, Flake, Krahmer and Jon Lech. Let me start with the dishonor I brought to my dad as I was not "bright enough" to score good in the subjects everybody excelled. Not that I wasn't bright enough, I was not fucking interested, period. Let me talk about having Singla, Prabhat and my comp teacher as being my only friends at that moment when my family itself turned my back on me cuz I never scored accordingly.. well..why don't I talk about the subjects I was pretty good at? Programming? English? Anything that was practical? Nopes.. I am talking about the whole fucking society treating me as an asshole as I was not good in competitive subjects. I cursed the God why the hell i was born in a country where the student cant choose the career himself and has to rely on unimportant factors that will crush any genuine moral left in him ? I literally swooned at the tech the US/German/Spanish hackers were playing with, the real masters of the security game, and I cried I might never be as good as them as they had the advantage of choosing their own destiny not to rely on fucking AIEEE for your interests and money making rat race. I didn't wanted to study PCM, okay, Physics is okay, but CM is not a choice for me. Prabhat liked it, now he is a genuine scientist and I appreciate that, but I like hardcore security and I don't see anything where a fucking Ethyl 2-methylbenzoate or integral calculus played any role in that unless i went postal into crypto algorithms (which at a later phase of my life , I did)  and biotech .

Alas...I never knew what went wrong.

What was my crime fuckers? Being able to digitally pwn Ur ass in circa 07?

That were the days i got a sudden revelation of some sort..screw the system.. I went into isolation. I vowed that I might be the underdog of the fucking Indian education system, but I am glad whatever I am doing, I am good at it and happy to do it with satisfaction. I wont let anything I faced to my next generation. They would have the right to be the best since their inception at their own choice and they will be the best in the field of their choice, be it soccer, rocket science, i don't care, but they will be happy. And God help you if they choose to be the hackers, you know it better.

Amen


Tuesday, 29 March 2011 by Lucky · 0

Monday, 28 March 2011

How to make Opera consume less memory | Opera memory hog gone

I love Opera..Its fast , its efficient, and web experts will agree with me that its the fastesthow to make Opera consume less memory | Opera memory hog gone browser to surf the internet.  Screw Internet explorer, i hate that , safari is too buggy and Firefox , though is good, but has its fair share of memory leaks problems which tend to increase with each new version. Yep..I tried Firefox 4, but as it turns out, it was too heavy for my taste and a lot of installed extensions were not supported, period. The response time increased as I opened a lot of tabs in it and hence, I finally decided to turn on to Opera 11.

I installed it in a jiffy and there we go. Smoother browsing experience and increased productivity :D but then I opened task manager and checked out the memory usage.

Image Name     User Name          CPU        Memory Usage

opera.exe      Administrator       10        430,024 K

Et tu Opera ?

damn..

but fear not..I manage to keep it in limits. Opera is a memory hog but turns out the memory problems are caused due to “Automatic RAM cache” management of Opera. So, here is how you can make opera consume less memory.

  • Open Opera
  • Press Alt + P
  • Go to History and choose memory cache 4 MB and Disk size to anything. Check on “Empty on Exit” and press OK.

 Check on “Empty on Exit” and press OK.

  • Once done, type

opera:config

in url bar and press enter.

  • After that scroll down to user preferences and expand it.
  • Find “Automatic RAM Cache” and disable it.

Find “Automatic RAM Cache” and disable it.

  • Once done, restart Opera.

Enjoy, Your opera will take much less RAM :)

 

cheers.

Monday, 28 March 2011 by Lucky · 0

Friday, 25 March 2011

Angry Hacker rant version 1.0

Yep..I do get angry. More angry than anything often now and then.

5 rules I abide -

  • I don't respect anyone at all who cant code and say they are hackers. They taint the word.

 

  • I respect anyone who has the guts to confess he is a skid but is willing to learn and code and contribute to the scene. Everybody was a skid once.

 

  • I am against anything related to defacements and exploitation if done using stolen/borrowed/any one else's code/shell/exploit/kernel patch. If its not your own, the defacement proves you are a skid and impotent.

 

  • Complimenting the 3rd point, if you don't know what an exploit does at core/you cant read its code and cant comprehend it to the lowest level, and you are still using it to your whims and fancy, again, you disgust me.

 

  • I hate anyone who ceases to pass any knowledge, the fool tries to hide his knowledge cuz he is afraid that it will create competition, the honest will reflect it to the fullest as he knows, the more he knows, the more he spreads, the greater the opportunities to create more creative code and thinking process.

Consider it my anger that NO knowledge sharing is done in any of the prominent Indian hacking forums out there, be it andhrahackers , indishell, hackers5, or anywhere. Same old stuff…leached from every possible where… The rest are not willing to share what they know due to their egos the size of Texas. At best you can go to garage4hackers , security xploded and can get your daily fix, or log into efnet/freenode and bitchx your daily fix of code and security.

When guys like (content suppressed) can start their own community and start commercializing the security scene for their own fucking profits, you know its time to back out. The real community n|u (null) stands out and is the only place where you can interact with some true hacker souls

The rest are fakes and I am glad I am not in touch with them. the real scene and some really good guys died 3 years ago.

Friday, 25 March 2011 by Lucky · 0

Google Android – what future holds

I was doing a presentation for my friend when I had deep thoughts about Google Android. I made a quick presentation to express my thoughts..These are my own independent thoughts and may or mayn't relate completely to the present market scenario. Forgive me for my inept mistake (if you find some) and praise me if you are amazed, in both cases i dont give a damn. Anyways.. you can have a look :)


In the mean time..
You can read my other Google android posts on Prohack which i covered as i got my own wildfire to mess with -

by Lucky · 0

Tuesday, 22 March 2011

HTC wildfire review | 5 must have Wildfire applications | Complete guide to HTC wildfire

A week before I bought HTC wildfire which is an entry level android smartphone. It sports quite a punch when compared to its competition and has a lot of features to keep you busy. I am doing an honest review so that you can make a choice when it comes to the end.

HTC wildfire is dubbed as the love child of Nexus one and HTC desire or Mini Desire. In some terms, it seems to be true. Its the successor to HTC tattoo and its a worthy one. The finishing is impeccable and much more professional so is the design as compared to tattoo. The phone is sturdily build however the screen is smudge prone. The phone has ARM6 528 Mhz processor on board with 384 MB ram. Its good for light weight gaming but is unable to render 3d games and play high def videos. The phone lags in its default HTC sense UI hence you are recommended to use some professional UI launchers like Go Launcher EX, Launcherpro and ADW. Bet the lag is attributed to CPU. Make sure your applications are compatible to them as my HTC music player crashed a lot more when I installed Launcher pro. Wildfire shines in the connectivity department.

HTC wildfire review | 5 must have Wildfire applications | Complete guide to HTC wildfire Everything is tightly integrated with social networking in mind. You can add contact, link it to facebook profile, email, twitter..and the best thing it supports real time status updates when someone calls you. Nice touch. Internet is smooth, however, again, the default browser is slow as compared to Opera Mini and skyfire browsers. The touch is nice, when compared to Samsung offerings and LG optimus one, the touch is much better and much responsive. The Wifi-GPS-Bluetooth bundle is good and I tested Google latitude over it which gave me quite accurate results. I do have problems with keypad, but then, i installed swype and the problem was gone. Camera is a 5 MP with flash and can take good-outdoor-bad-indoor pics, there is no protective cover but over all the flash and smile detection makes the day. The accelerometer is a bit slow when it comes to rotation but again, i will attribute it to the slow cpu. Overall, its a nice phone for an android starter and offers the best bang for your buck.

The phone has Froyo 2.2.1 and is unable to be rooted at the moment. Hence I am unable to provide you how it can be optimized when rooted and how it performs as a rooted toy. I am waiting for the next Unevoked/superoneclickroot update so that i can finally squeeze the juice out of my phone.

I do tested some penetration testing applications on it and you can read my post regarding them here.

Pros

  • Better touch
  • 384 MB ram
  • 5 MP camera with flash
  • Excellent connectivity,A must have for social-networking enthusiastic
  • Overall a Good bundle

Cons

  • Pricier as compared to the competition
  • low res screen
  • Could have had a much better cpu

 

An average android phone is incomplete without applications, I recommend these apps as a must have -

  • Launcher Pro – If you want to make your UI super smooth, this is the way to go.
  • GO SMS – the best sms application, even better than chomp sms.
  • SWYPE – tired of cramped keypad ? Try swype and all your worries will be gone.
  • Opera Mini the best cellphone bnrowser out there, if you want flash support, you can go with Dolphin and Skyfire though.
  • Bar Code scanner – A must have for every android phone. Get anyone from android app market.

 

My recco – buy it if you are tight on budget, its better than its counterparts if you are not into gaming and watching videos on your cellphones.

Tuesday, 22 March 2011 by Lucky · 0

Thursday, 17 March 2011

Wardriving with Android | Hacking Wifi networks with Android | Wifi Network Audit using Android | Wifu with android | Best wardriving applications on android

Hi friends.. I recently bought HTC wildfire and have been experimenting with it to the fullest. Wardriving with Android | Hacking Wifi networks with Android | Wifi Network Audit using Android | Wifu with android | Best wardriving applications on androidIts based on Android 2.2.1  Froyo and is unrootable till date using Unevoked, superoneclick root and z4root rooting applications, hence i am bit limited by the default manufacturer only functions. I nearly bricked my phone but it sprang back to life after some trys. On the topic though. I was actually quite interested in testing the wardriving capabilities of the device and hence on scrolling through the app market, I found some useful applications which I thought must share you with. Wardriving for me is a two step process -

G-mon

G-mon

G-mon is a powerful WarDriving scanner and GSM / UMTS Netmonitor and drive test tool. It scans for all WiFi networks in range & saves the data with GPS coordinates into a file on your sd card. You can create a kml file for Google Earth. It shows you the encryption, channel an signal strength. It shows all APs in range in a live map. I used it to collect lots of wifi data which I will be publishing soon.

Install it from here

 

Wardrive

Wardrive

another fantastic wardriving app which stores scans in sqlite db on the sdcard and displays found networks around in the map.It Requires Google MAPS installed.

Install it from here

 

Wifi Analyzer

Wifi Analyzer

This app literally turns your android phone into a Wi-Fi analyzer!! It helps you to find a less crowded channel for your wireless router and allows to audit networks.

Install it from here

 

Once you get networks, you can then break them into it using Aircrack and backtrack.  Its easy and worth its salt :) . Here is a slice of my wardriving logs while i was in DTC bus :D

BSSID;LAT;LON;SSID;Crypt;Beacon Interval;Connection Mode;Channel;RXL;Date;Time
00:08:5C:EF:08:F0;28.56602;77.22951;Adiva;WpaPsk;-93;Infra;11;-92;2011/03/17;18:52:01
00:08:9F:81:8F:C4;28.56944;77.20531;Car0baR;WPA2;-96;Infra;6;-95;2011/03/17;18:58:30
00:0F:A3:6A:88:B8;28.56804;77.22473;sbi;Wep;-93;Infra;6;-91;2011/03/17;18:53:02
00:17:9A:09:D1:79;28.56813;77.22440;WebunivM;Wep;-93;Infra;6;-91;2011/03/17;18:53:05
00:18:02:87:02:8F;28.56845;77.22306;RT2561_6;Wep;-94;Infra;6;-93;2011/03/17;18:53:18
00:18:02:8E:32:5A;28.56885;77.21437;SrDDGA;WpaPsk;-91;Infra;6;-90;2011/03/17;18:55:31
00:18:02:92:A2:73;28.56955;77.20365;mtnlbb;Wep;-90;Infra;6;-89;2011/03/17;19:00:21
00:18:39:AA:5E:B8;28.56845;77.22306;Neeta;Wep;-89;Infra;11;-88;2011/03/17;18:53:18

at the end of the day, the moment that put a smile on my face was when i saw this as a network name near Delhi Cantt -

“You cant hack this Wifi dear neighbor”

It was a wpa2/psk secured network with static ip and mac filtering and the guy knew what he was doing :) Watching secured networks always makes my day.

Thursday, 17 March 2011 by Lucky · 0

Thursday, 3 March 2011

Comparison of Unified Threat Management Products – The guide to Unified Threat Management systems (UTMs)

Hi folks..this time I will be exploring the Unified Threat Management systems and comparing multiple Comparison of Unified Threat Management Products – The guide to Unified Threat Management systems (UTMs)UTM products in  the same. I would recommend you to read my previous posts on Unified threat Management systems to understand it fully -

for your convenience, I have created a pdf and have uploaded it to scribd and slideshare. You can read my full report below..

 

Stay gold..

 

Rishabh Dangwal

Thursday, 3 March 2011 by Lucky · 0

Monday, 28 February 2011

Unified Threat Management systems (UTM) – Single user UTMs vs Multi User UTM’s

In my last post, i blogged about UTM’s which got a fairly positive response over mail :) . Unified Threat Management systems (UTM) – Single user UTMs vs Multi User UTM’sUTMs can be simply expressed as Next generation Firewalls, have evolved specifically from conventional firewalls. The first firewalls were software firewalls which were itself evolved from software routers.

Later on as technology evolved, and hardware routers came into scene, hardware firewalls arrived which were nothing more than routers with packet filtering capabilities. Furthermore, the technology matured from basic packet filtering to a more complex control technology which included stateful packet inspection and finally to full application layer inspection devices (IEEE, 1997). Around the year 2000, VPN’s appeared and gained acceptance as the mainstream technology to connect networks securely, remotely. Firewalls followed closely by integrating VPN’s with Firewall which was the natural choice as enterprise solutions required both firewalls and VPNS.

Unified Threat Management systems (UTM) – Single user UTMs vs Multi User UTM’s

As the prices for bandwidth fell along with the cost of cryptographic hardware needed to encode and decode the traffic, the need for specialized hardware rose which may be used to accelerate the performance.

Unified Threat Management

In mid 2004, International Data Corporation (IDC) defined UTM platforms as to minimally include firewall, VPN, intrusion prevention and antivirus features. Touted as “Next Generation Firewalls”, we have two approaches to design the UTM’s since their inception.

  • Licensing and Integrating Approach (Multi vendor UTM)
  • In-house Development Approach (Single vendor UTM)

Unified Threat Management systems (UTM) – Single user UTMs vs Multi User UTM’s

The above figure illustrates the core architecture and development approach of developing UTMs

Licensing and Integrating Approach (Multi vendor UTM)

The first design approach tried to get the best of worlds by integrating specialized technologies from different security vendors. For e.g.:

Cyberoam UTM licenses Antivirus from Kaspersky, AntiSpam by Commtouch , both who specialize in Antivirus and AntiSpam technologies.

These UTM’s provided an integrated interface to manage all the integrated technologies in the easiest possible manner, while some others require specific management interfaces.

 

Advantages

Limitations

  • Combines the best of all worlds
  • Research and advancement dependent on different vendors, hindrance in optimization of individual applications
  • Less time required in development and deployment of a new UTM box
  • Again, the time is dependent on different security vendors
  • Single Management interface
  • The interface may not be adequate
  • Cost effective
  • If one of security vendor was compromised globally, the UTM was gone as the technology is outsourced

 

  • Cannot take full benefit of hardware acceleration resources due to multivendor technologies

 

  • Embedding of new technologies is difficult

 

In-house Development Approach (Single vendor UTM)

The second design approach is the more difficult out of two, which requires ground up development of a UTM device from scratch, and involves the provision of each security function natively. This was not flawless, each security function must pass a set of market guidelines and standards set by standalone security products effectively in order to be accepted. However, with time, the core functions provided by UTM platforms—firewall, intrusion prevention and antivirus—had matured since the onset of the UTM era, so building competent security functions was both possible and cost effective. Also, this approach had a better management interface as the platform incorporated all the technologies since inception.
 

Advantages

Limitations

  • Unified architecture from scratch
  • All the technologies may/may not be adequate as compared to their professional standalone counterparts
  • Research and advancement dependent on own pace, better optimization of applications
  • More time required in development and deployment of a new UTM box
  • Unified and Best management interface
  • High cost of development
  • In-house code fills security gaps and poses less threat of compromise.
  • Security through obscurity is not always a very good idea.
  • Can take full benefit of hardware acceleration resources, which leads to exponential performance gains

  • Embedding of new technologies is easier
 

 

In my next article I will be discussing more about UTMs. Please add your points so I can make it better.

Stay tuned.

Monday, 28 February 2011 by Lucky · 0

Saturday, 26 February 2011

Unified Threat Management Explained - An Introduction

Hi folks, as you know I am currently at Delhi, at Tulip Telecom, I got my hands on exotic network Unified Threat Management Explainedtechnologies which I  would like to share out with you. I am working along Amarjit Singh & the rules of the game are simple, he will create a security scenario while I will try to break it. Considering I am a bit novice in network technologies, it has been a highly learning experience with some really great hands on tech demos & real life scenarios. I will be explaining about Unified Threat Management (UTM) today which you can think of an all in one solution to an organizations security needs. Unified Threat Management devices are relatively new in the security appliance scenario & are in the phase of continuous evolution. UTM has attracted industry leaders like Juniper, Fortinet, Cisco, IBM, Intel, Cyberoam & there are a lot of UTM products to choose from. I am however working on the Cyberoam one & will be continuing my tests on it.
Unified Threat Management & me :)
A brief history
Earlier, the enterprise security scenario was divided into traditional firewalls & targeted applications like Antivirus, Anti spam & Intrusion Detection Systems.
Earlier...without UTM
However in 2004 , a new trend emerged which combined multiple security features into one single hardware platforms thereby eliminating the need of machine to machine protection.
Nowdays..with UTM
Since its inception, UTM’s are one of the fastest growing segment in the security appliance sector.
Why UTM ?
  1. UTM’s provide one stop solution for security needs of an organization.
  2. The integrated approach allows the administrator to worry about only one device, not the whole flurry of firewalls, antiviruses & IDS/IPS.
  3. Increase in blended attacks against organizations has led to older specialized protection devices/services obsolete.
  4. Cost effective , tell me one thing, which will be more costlier ? One decent firewall, site licenses of Antivirus, Anti spam, Anti phishing, IDS, IPS etc or a single UTM device with combined subscription costs ? The answer is the second one :)
  5. One stop reporting solution.
I guess that was all for now , in my next post, I will be explaining about the architecture of UTM’s & elaborate upon the technology.

Saturday, 26 February 2011 by Lucky · 0

Thursday, 24 February 2011

Catch me this Saturday at Delhi – Maipu Convergence India 2011

Hi friends, I am free this weekend :) & i believe most of you will be too. So, why dont you catch up with me at Catch me this Saturday at Delhi – Maipu Convergence India 2011Maipu Convergence India 2011 ?  I have been invited at Maipu Convergence India 2011 this weekend at Delhi, Pragati Maidan on Saturday 25 Feb 2011. If you want to join me, just drop an email at admin@theprohack.com / comment on this post, I will forward the invite to you so you don't have any problems there. I will be accompanied by fellow blogger & senior Amarjit Singh & we can have a look at new Maipu’s offerings & have a chitchat on security.

About Maipu

Maipu is the China’s best network solution providers & have been serving the international market for last 18 years. At Convergence 2011, Maipu will be showcasing the “New World, New Choice” for the business.

 

See you there :)

Thursday, 24 February 2011 by Lucky · 0

Monday, 21 February 2011

FREESCO – An Open Source Router

While I was messing with Routers & virtualisation products, I came across FREESCO which is an open alternative to  FREESCO – An Open Source Routing product routing products offered by Cisco, 3-Com, Accend, Nortel etc. While all of these companies offer products that are well made, the overhead and overall costs can be expensive.FREESCO is open source, stable, inexpensive, easy to use, extremely versatile and flexible ... and best of all, its is FREE.

FREESCO is based on the Linux operating system. And incorporates many of the features of other Linux distributions into software that fits onto a single 1.44 meg floppy diskette. It is also possible to run it entirely from RAM, in which case no disk activity occurs after startup. FREESCO works on any IBM compatible PC (i386 compatible spec or higher) and can be optionally installed to a hard disk. In practice this means Intel 80486SX or better, with 12 MByte. Preferably more than 16 MByte to enable servers.With FREESCO, you can configure:

  • a simple bridge with up to 10 Ethernet segments
  • a router with up to 10 Ethernet segments
  • a dialup line router
  • a leased line router
  • an Ethernet router
  • a dial-in server with up to 10 modems (with multiport modems).
  • a time server
  • a dhcp server
  • a http server
  • a ftp server
  • a dns server
  • a ssh server
  • a print server (requires TCP/IP printing client software)

FREESCO also incorporates firewalling and NAT, which are resident within the Linux kernel, to help protect you and your network. All of these features can be used in conjunction with each other or individually.

Limitations

More recent versions of Linux software (e.g. Apache 2) are often not available for FREESCO because they are not compatible with FREESCO's kernel. Also, newer hardware (such as Gigabit Ethernet cards) may not be usable under FREESCO due to an absence of their drivers for the 2.0.x Linux kernel. FREESCO does not at present support load-balancing.Also, FREESCO does not support USB.

Monday, 21 February 2011 by Lucky · 0

Saturday, 19 February 2011

GNS 3 Tutorial – Basic Router password Configuration

Hi folks..I have started my first steps into Cisco, & would be sharing my small experiments in it. untitledActually , this time I am  covering the basics using GNS3 which is a powerful open source network simulator to simulate a simple topology of 2 routers with their basic configuration & commands. I assume you have worked with GNS3 or atleast know how to load IOS & make a simple topology..

So, firstly download GNS3 & install it. Get IOS images from and load them (if you are really not sure of this step, mail me, I will expand the basics more)

The topology I created is this -

GNS 3 Tutorial – Basic Router password Configuration

2 routers connected via gigabit . What we will be doing is -

  1. Set router password.
  2. Set telnet password
  3. Set Console Password
  4. Encrypt All passwords.
  5. Set Ip Address of routers.

Anyways, I start by right clicking on R2 router.

Connected to Dynamips VM "R2" (ID 7, type c7200) - Console port

To get into privilege mode, type this command.

R2>en

To configure router, type this command ..

R2#conf t
Enter configuration commands, one per line.  End with CNTL/Z.

To set router password & encrypt all passwords type these commands

R2(config)#enable secret router2
R2(config)#service pass
R2(config)#service password-encryption

Now to set console & its password type these commands

R2(config)#line console 0
R2(config-line)#password console
R2(config-line)#login
R2(config-line)#exit

Now to set telnet (vty/virtual terminal) & its password type these commands

R2(config)#line vty 0 4
R2(config-line)#password telnet
R2(config-line)#login
R2(config-line)#exit

Once done, you can now configure the interface by typing these commands

R2(config)#int g1/0
R2(config-if)#desc ROUTER LAN 2 GIGABIT INTERFACE
R2(config-if)#ip address 192.168.1.20 255.255.255.0
R2(config-if)#no shut
R2(config-if)#
*Feb 19 19:56:42.035: %LINK-3-UPDOWN: Interface GigabitEthernet1/0, changed state to up
R2(config-if)#
*Feb 19 19:56:42.035: %ENTITY_ALARM-6-INFO: CLEAR INFO Gi1/0 Physical Port Administrative State Down
*Feb 19 19:56:43.035: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/0, changed state to up
R2(config-if)#end
*Feb 19 19:56:47.723: %SYS-5-CONFIG_I: Configured from console by console
R2#

Once done, you can see the configuration by typing -

R2#show running-config
Building configuration...

Current configuration : 932 bytes
!
upgrade fpd auto
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname R2
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$trNZ$uNTgBIA1QG43/4YEB29lf/
!
no aaa new-model
ip cef
!
!
!
!
no ip domain lookup
!
multilink bundle-name authenticated
!
!
!
archive
log config
  hidekeys
!
!
interface FastEthernet0/0
no ip address
shutdown
duplex half
!
interface GigabitEthernet1/0
description ROUTER LAN 2 GIGABIT INTERFACE
ip address 192.168.1.20 255.255.255.0
negotiation auto
!
no ip http server
no ip http secure-server
!
!
!
logging alarm informational
!
!
control-plane
!
!
gatekeeper
shutdown
!
!
line con 0
exec-timeout 0 0
password 7 070C2E425D061500
logging synchronous
login
stopbits 1
line aux 0
stopbits 1
line vty 0 4
password 7 06120A2D424B1D
login
!

!
webvpn cef
!
end

R2#

If done properly, it will look like more or less the same I have pasted above. Also, as you can see, all the passwords are encrypted. In the similar way you can configure Router 1. Make a note os passwords, I have kept quite simple passwords just to demonstrate the configuration. Please keep secure passwords , read my article on how to create secure passwords.

I hope you enjoyed this simple guide, till next time.

Saturday, 19 February 2011 by Lucky · 0

Friday, 18 February 2011

Bypass squid ? Any ideas ?

Hi folks..
I am in a fix nowadays, I m inside a secure network which is protected by squid on port 8080 & blocks all the generic ports by default like ftp one. Since I have created a program which uses ftp (a covert program actually) it wont work on the scenario when you are behind an Intranet protected by squid nat-ted by routers (Maipu/cisco plus I am dead sure the firewall is a stateful one) .
Any ideas ? Also, I cant use a static IP program / VPN tunnels as they wont work. Cant launch a mass scale cdp based attack on the network as its an official one. Any ideas on fooling squid ?

Comments are welcome, details will be provided on program & network on request

Plus, don't expect me to reverse engineer the source code & create a custom exploit, don't have much time, don't have that patience. I might do as well, only if I am convinced that there is no other way. In the mean time, I am here for your valuable suggestions & ideas.

Friday, 18 February 2011 by Lucky · 0

Wednesday, 16 February 2011

Scan files online using 40+ antivirus software at Virustotal

6Ever wanted to scan a suspicious looking file using multiple antivirus software ? This happened to me recently, as I stated in my last post that I upgraded my  sadsd Ubuntu linux to Lucid Lynx and installed Oracle Virtual Box over it. I later installed Windows XP as a virtual operating system and thought it might be better if I would install an antivirus program on it. However, as I moved my antivirus program and some other files from my USB drive, I had a gut feeling that things are just not right. So..a bit of googling landed me at Virustotal.com which allows to scan a file using multiple antivirus software, and it does what it says perfectly :)
Virustotal main website - theprohack.com
The site is extremely easy to use, I uploaded a file over it and it took less than a minute to generate results.
I uploaded a file over it and it took less than a minute to generate results - theprohack.com
The file was found positively ID’ed by it and one antivirus triggered a positive result from a scan of 41 antivirus.
one antivirus triggered a positive result from a scan of 41 antivirus. - theprohack.com
Pros
  1. Extremely fast scanning
  2. Scanning using 40+ antivirus
  3. complete detail about the file is provided
Cons
  1. Cant scan my whole PC :(
  2. Can only scan one file at a time
  3. 20 MB file limit (that means I cant scan heavy executables like that of Adobe Photoshop and Burnout Paradise)

Overall, it saved my day and is worth having a look at it . You can visit it here

Like This post ?  You can buy me a Beer :)


Posted by XERO. ALL RIGHTS RESERVED.

Wednesday, 16 February 2011 by Lucky · 0

Tuesday, 15 February 2011

Project 64 – The best Nintendo 64 emulator

Project64 is a Nintendo 64 emulator which at first seemed to have popped up out of nowhere.Project64 is a Nintendo 64 Project 64 – The best Nintendo 64 emulator - More emulator articles @ PROHACKemulator for the Windows platform that was first released in 2001. It employs a plug-in system to allow other developers to implement their own software.It is a great, free Nintendo 64 emulator which can emulate a lot of the commercial n64 roms out there. Emulator meaning that Project64 creates an environment on your PC under which real N64 software can run and be played in much the same way as it would be on the original hardware system. Yep,that means you can play Nintendo 64 games on your PC at the comfort of your home. Of course you have to obtain the rom images of games,either dump them yourself,or remember,google is your best friend [;)] .
Project 64 is a very good emulator, probably the best Nintendo 64 emulator available, plays nearly every N64 game, every game I've tried has worked with a few errors.There are a couple of games with some emulation glitches, but this does not makes them unplayable.The Project 64 emulator promises to replicate directly the graphics that you would obtain when running an actual N64 with a television.
Download Project 64 – The best Nintendo 64 emulator
The emulator also comes with a built in cheat editor , which can help increase the longevity of games (obviously by cheating :P ,also it includes inbuilt cheats for many games.. how cool is that ?).Project64 is the closest thing you’ll get to the N64 without actually buying the console itself and it performs better than other Nintendo emulators.
Project64 is currently still under constant development and the last official release was on 1 April 2005 . Since then we are eagerly waiting for a new release.
You can download the version 1.6 from Project 64 Site  or by clicking here .

Posted by XERO . ALL RIGHTS RESERVED .


Tuesday, 15 February 2011 by Lucky · 0

Sunday, 13 February 2011

Resolve “Setup did not any hard disks drive” error while installing XP over a laptop

One of the most popular topics among our readers is installing Windows XP on your new laptop that comes with Windows 7 / vista computer - sometimes for compatibility reasons, but also because a lot of people just don't like 7 very much.
The problem that people keep running into left and right is getting to the point where XP starts to install and getting the message "Setup did not find any hard disk drives installed in your computer". This error happens because your new computer has a storage controller that isn't supported natively in XP, usually an SATA (Serial ATA) controller.
“Setup did not any hard disks drive”
If you don't have a floppy drive in your computer (who does anymore), then you'll need to use a process called slip-streaming to integrate the storage drivers into your XP installation CD.
It should go without saying that this is an advanced topic, so proceed with caution.
Creating a Custom XP Install
We'll use a software called nLite to create a new XP install cd, so you'll first need to download and install it. Once it starts up, you'll be prompted for your Windows installation, so you'll want to click the Browse button.
Resolve “Setup did not any hard disks drive” error while installing XP over Vista
First you'll be prompted for the "Windows installation", which really means your XP install CD. Find it and select the root of the installation, and then click OK to go to the next dialog.
Resolve “Setup did not any hard disks drive” error while installing XP over Vista
Next you'll be prompted on where you want to save the temporary files used during the slip-streaming process. I chose to create a new directory and called it XPISO, but you can put it wherever you'd like. I just recommend to use a new directory.
Resolve “Setup did not any hard disks drive” error while installing XP over Vista

Lite will copy all the necessary files off the XP installation and into the temporary folder. When it's done, you'll see all the information on which version it is.
Resolve “Setup did not any hard disks drive” error while installing XP over Vista Resolve “Setup did not any hard disks drive” error while installing XP over Vista
Hit the next button until you come to this screen, where you can select what options you want. Select "Drivers" and then "Bootable ISO".
Resolve “Setup did not any hard disks drive” error while installing XP over Vista
Hit the next button until you get to the screen for selecting drivers. If you click the Insert button, you can choose between adding a single driver or adding a folder of drivers. Since we'll just be loading a single driver, you can choose that option, but you might want to first read the section below about finding drivers for XP.
Resolve “Setup did not any hard disks drive” error while installing XP over Vista Resolve “Setup did not any hard disks drive” error while installing XP over Vista
Browse to the directory where you extracted the driver files, and then select Open. Note that it doesn't really matter which of the *.inf files you choose, because it will select all files in the folder anyway.
Resolve “Setup did not any hard disks drive” error while installing XP over Vista
nLite will prompt you to select your driver. If you don't know which exact one it is, you can either use Device Manager in Vista to find the exact model, or you can just select all of them. Just be careful not to select a 64-bit driver if you are using 32-bit, or the wrong OS version.
Resolve “Setup did not any hard disks drive” error while installing XP over Vista

I would recommend including both Storage and Network drivers, as those are the most common drivers that are missing in XP.
Resolve “Setup did not any hard disks drive” error while installing XP over Vista
Once you proceed to the next screen, now we can finally finish the process. You can choose to directly burn the cd here, or you can select Create Image to create an ISO file that you can burn to a CD using whatever burning tool you have.
Note: If you chose to create an ISO, make sure to use the "Make ISO" button before you click Next.
Resolve “Setup did not any hard disks drive” error while installing XP over VistaResolve “Setup did not any hard disks drive” error while installing XP over Vista



At this point you can burn the ISO image to a CD, and then start your XP installation process.
Finding Drivers for XP
The best place to search for drivers for your hardware is at the manufacturer's support website. The only problem is that almost every manufacturer seems to distribute their drivers in floppy disk image form, even though the computer they are for doesn't have a floppy drive. Guess nobody has alerted them to get with the program.
We can still extract the drivers using an application called WinImage. Let's run through a quick example… Here you can see the Intel SATA controller driver for my HP computer.
Resolve “Setup did not any hard disks drive” error while installing XP over Vista
I downloaded and ran the executable, which extracted a file called f6flpy32.exe into a temporary directory. Don't bother trying to run this one, because it'll just prompt you for a floppy drive.
Resolve “Setup did not any hard disks drive” error while installing XP over Vista
So how to get the drivers out of this file? There are a few options that you can try, depending on how the manufacturer packed the files.
  • You can use Winimage to extract them, which is a shareware software, but you can use it during the trial period for free.
  • You can try and use WinRar to extract the file. In many instances this will extract a *.flp file, which you can mount in a VMware virtual machine or potentially with some ISO mounting software.
  • Some drivers will allow you to automatically extract into a directory. You'll have to try it and see what happens.
  • Other methods? If you've got other ideas, leave them in the comments and I'll add them to this list.
Here's the list of files that Winimage can handle, which is quite a lot.
Resolve “Setup did not any hard disks drive” error while installing XP over Vista
Start WinImage and then open the file, and you should see the contents. Just extract them to a folder, preferably with a useful name so you can remember it later.
Resolve “Setup did not any hard disks drive” error while installing XP over Vista
Happy Installation…

Required Downloads

Copyright 2008 How to geek – source .All rights reserved .

Sunday, 13 February 2011 by Lucky · 0

5 Wrong ways to check empty strings

It is one of the common mistake that people compare a string with “” or String.Empty in VB.Net or C# to find its empty. Here are few examples.
// C# Wrong Ways
  1. if ( s == “” )
  2. if ( s == string.Empty )
  3. if ( s.Equals(”") )
  4. if ( s.Equals ( String.Empty)
  5. if ( string.Equals(s,”")
  6. if ( string.Equals ( s,String.Empty ))
So what’s the correct way to do it ? Check for length too.
// [ C# ] Correct Way
if ( s.Length == 0 )

by Lucky · 0

Thursday, 3 February 2011

Reverse Engineering & Basics of Assembly – Part 2

Last time I covered registers in my Reverse Engineering series & I will be continuing with Flags this time.Reverse Engineering & Basics of Assembly – Part 2If you are  reading this article as a starter / for the first time & have missed the last one, I highly recommend you to read the previous one to get an idea of what is going on. Even you have read the last one; I would recommend one fresh read to continue as reversing needs dedication & clarity of thinking. The series is newbie friendly; you just need to follow it carefully. Ah well...Coming back to the topic...

A matter of FLAGS




A flag is a true/false, on/off or open/closed indicator or in layman terms, it’s a Boolean variable. Consider it as a traffic light signal where green means ‘OK’ to go & red means ‘STOP’. A flag is a single bit field that indicates the status of something, stores a binary value with an assigned meaning. On a modern 32 bit wintel CPU, the flag register is 32bit large. And to tell the truth :P there are 32 different flags & you need to know about each of them. Just kidding...In reversing, you will mostly mess with only 3 Flags
  • Z-Flag,
  • O-Flag
  • C-Flag.
These flags will be telling you how the code is executing, the jumps, loops & stuff.

The Z-Flag/ Zero Flag:
The Zero Flag is your best buddy in cracking & is most commonly used in reversing. It can be either set (1) or cleared (0) by several opcodes when the last instruction that was performed has 0 as net result. Take it as an example, you compare 2 values -
ABC = 1010 & XYZ=1010
If the comparison was success & the values are matched & we get 1 as result (lets suppose), then if Z flag was initially having value of 0, it will be set to 1. Converse is also true.

The O-Flag/Overflow Flag:
Contrary to Z flag, Overflow flag is quite less used in cracking. It is set to 1 when the last operation has cleared the most significant bit or has changed the highest bit of the register that gets the result of an operation. For example let’s suppose:
EAX holds the value 6FFFFF & we increase EAX by 1 & we get 700000, which will set the O-Flag as the operation has changed the highest bit of EAX
The C-Flag/Carry Flag:
The flag which you will use the least, the C-Flag (Carry flag) is set, if we add a value to a register, so that it gets bigger than FFFFFFFF or if you subtract a value, so that the register value gets smaller than 0.

Now you know your way around flags, we will be continuing with Memory basics, segments, stack & instructions in the coming issue.


Like this post ? "Join AlertPay"

(This is a series in which I will be describing what I learnt from tuts by lena51,orc,icezillion. True credits goes to them only.)

Thursday, 3 February 2011 by Lucky · 0

Wednesday, 2 February 2011

Bing copies Google results - Google caught Bing red handed

In an amazing post by Danny Sullivan , which details how Bing watches what people search on Google, Bing copies Google resultscopies it & uses  the information to improve its own results. Of course Microsoft denies it.. but what was novel was the spy hunt by Google to caught Bing red handed. It all started with “tarosorraphy”  which is a medical term for a rare surgical procedure on eyes, which was Googled in the summer of 2010 & was quirky enough to get Google’s attention. They corrected it , but what was peculiar was that Bing displayed the first correct result of Google without even a correction of spelling. As the official Google blog states -
Google returned the correct spelling—tarsorrhaphy—along with results for the corrected query. At that time, Bing had no results for the misspelling. Later in the summer, Bing started returning our first result to their users without offering the spell correction (see screenshots below). This was very strange. How could they return our first result to their users without the correct spelling? Had they known the correct spelling, they could have returned several more relevant results for the corrected query.
google
bing

The cycle continued with Bing displaying all types of unusual queries from Google. The Google started a hypothetical experiment to catch Bing in the act. This involved Google to insert 100 synthetic queries with random results in the Google search engine & then testing whether they appear in the Bing results or not. For example – “delhipublicschool40 chdjob” they inserted a credit union website link.
delhipublicschool40
Then they issued fresh laptops with IE8 installed with toolbar & searched for them. And voila, the results started to appear in Bing, which confirms the suspicion that -
  • Internet Explorer 8, which can send data to Microsoft via its Suggested Sites feature
  • The Bing Toolbar, which can send data via Microsoft’s Customer Experience Improvement Program



which as Google states is a cheap imitation & encourages to use Google as a primary search provider.
Those results from Google are then more likely to show up on Bing. Put another way, some Bing results increasingly look like an incomplete, stale version of Google results—a cheap imitation.
Also, they expect to have a fair competition.. with Microsoft..
So to all the users out there looking for the most authentic, relevant search results, we encourage you to come directly to Google. And to those who have asked what we want out of all this, the answer is simple: we'd like for this practice to stop.

Like this post ? "Join AlertPay"

source

Wednesday, 2 February 2011 by Lucky · 0

Friday, 28 January 2011

Paypal closes its doors to India – Alertpay, the second choice…

Paypal dropped bomb on the Indian online entrepreneurs who use their servies for online transactions.Paypal Terrified :( A run through  Paypal's official announcement sates that starting this march 1st, you will not be able to receive payments that exceed $500 per transaction. Also, you won’t be able to keep any money in your PayPal account,all the money shall be transferred to your Indian bank account within 7 days.Rubbing salt to the injury, the final blow comes as you will not be able to purchase goods using your Paypal account. You can read the official story here Paypal closes its doors to India – Alertpay, the second choice…

If you want to transfer money, then you need to transfer your money from your credit card to the paypal account. Guess they have gone nuts as pissing of a whole subcontinent of customers is not a very good idea. I already packed my stuff to move on to Alertpay, its convenient & it gives me money too :) You too can earn money using it. 

Sign up by clicking the button below..

Earn money with AlertPay

 

Why Alertpay ?

  • Its convenient than Paypal.
  • If you have a Paypal account already (like me), nothing is lost in getting an Alertpay one :)
  • I cant trust Paypal anymore.. neither you should.
  • More flexible..

A gentle advice :  Move on to Alertpay before Paypal backstabs you.. click here to join Alertpay..

 tmpphpWdQEfG

 

Like this post ? "Join AlertPay"

Friday, 28 January 2011 by Lucky · 0

All Rights Reserved by Pro Hack . Copyright 2008 - 20011. Template by Bloggermint .