Quantcast
Your Ad Here Os Configurations
Add to Google Reader or Homepage

Thursday, August 25, 2011

2500 backlinks in a 2 minutes

This is only for educational purpose not any other means 


First, lets discuss what is a static page. A static page is a page created especially, and automatically, for a certain reason to accomplish a certain purpose. Most of the static pages out there are monitoring websites that create pages showing information about the websites they monitored. These kind of pages hold a certain link building potential as they are easy to exploit and in mass they can do a great difference.

As you can see there are backlinks pointing toward this website; they might not be strong link juice but they are still crawled and considered by the Search Engines.

Why use static Page backlinks:
  • Great IP diversity
  • Automatic process
  • Natural looking
  • Can make a difference
  • Free
  • Easy and quick to create and set-up
  • permanent
  • Doesn’t raise suspicion

What Tool to use:

There are several websites that allow you to create hundreds/thousands of static pages and backlinks but the bestone so far I have been using is :


What this websites allows you to do is create 2523 pages that will have backlinks pointing to your website in only a moment. All that is required for you to do is fill a small box and add your URL and keywords and then select how much submissions you want.

The process will last around one hour, and all the pages will be created without you having anything to do except watch these links get created; Or spend that time on other SEM project.

On what website should you use this:

Static page link building should be used on any website as this method doesn’t raise suspicion from the search engines at all. In facts when I create a new website, this is the first real link building technique I use on the website. This gives a quick boost that often allows you to rank on page 1-2 very quickly and then start some more serious link building methods afterward.

There are some other very successful static page creating programs like scrapebox for exemple that can allow you to make ten of thousands of static page backlinks.



Click Here to Read more!

Live Hacking DVD

This is only for educational purpose not any other means

Live Hacking DVD is a new Linux distribution packed with tools and utilities for ethical hacking, penetration testing and countermeasure verification. Based on Ubuntu this ‘Live DVD” runs directly from the DVD and doesn’t require installation on your hard-drive. Once booted you can use the included tools to test, check, ethically hack and perform penetration tests on your own network to make sure that it is secure from outside intruders.

As well as the standard Linux networking tools like ping, wget, curl, telnet and ssh, the Live Hacking DVD has tools for DNS enumeration and reconnaissance as well as utilities for foot-printing, password cracking and network sniffing. It also has programs for spoofing and a set of wireless networking utilities.

The Live Hacking DVD is designed for ethical computer hacking, meaning that it contains the tools and utilities you need to test and hack your own network but using the tools and techniques that more malicious hackers would use.

The Live Hacking DVD is based on open source technology and uses the popular Ubuntu Linux distribution as its base. All the tools included can be freely found in either the Ubuntu repositories on from the Internet. The DVD is designed to be a platform to help IT security professionals (as well as those with a general interest in information security) to start, understand and conduct penetration tests and ethical hacking.


Application List

The Live Hacking DVD is packed with tools and utilities for ethical hacking, penetration testing and countermeasure verification. The DVD includes hacking tools for DNS, reconnaissance, foot-printing (gathering information about computers on the network), password cracking, network sniffing, spoofing (or masquerading) and wireless networking utilities.

Here is a list of the hacking tools you can find on the Live Hacking DVD/CD:

Reconnaissance (and DNS)
  • Dig – DNS lookup utility
  • DNSMap – DNS mapping is a mechanism which allows hosts on a private LAN to use DNS Services even if the address of an actual DNS Server is unknown.
  • DNSTracer – Trace DNS queries to the source
  • DNSWalk – Checks DNS zone information using nameserver lookups
  • Netmask – Helps determine network masks
  • Relay Scanner – This program is used to test SMTP servers for Relaying problems
  • TCPTraceroute – Traceroute implementation using TCP packets
  • Firewalk – Firewalk is a network auditing tool that attempts to determine what transport protocols a given gateway will pass.
Foot-printing
  • Amap – Performs fast and reliable application protocol detection, independent of the TCP/UDP port they are being bound to.
  • Curl – Get a file from an HTTP, HTTPS or FTP server
  • Fping – Sends ICMP ECHO_REQUEST packets to network hosts
  • Hping3 – Active Network Smashing Tool
  • HTTprint – A web server fingerprinting tool
  • Ike-Scan – IPsec VPN scanning, fingerprinting and testing tool
  • MetoScan – HTTP method scanner
  • Namp – The Network Mapper
  • Netcat – TCP/IP swiss army knife
  • P0f – Passive OS fingerprinting and masquerade detection utility
  • Zenmap – The Network Mapper Front End
Password Cracking
  • Chntpw – NT SAM password recovery utility
  • Rainbowcrack – Crack LM, MD5 and SHA1 hashes
  • THC PPTP Bruter – A brute forcing program against PPTP VPN endpoints (TCP port 1723)
  • VNCrack – Crack VNC passwords
  • John the ripper – A fast password cracker
  • Network Sniffing
  • DHCP Dump – DHCP packet dumper
  • Dsniff – Password sniffer
  • SSLDump – Dump SSL traffic on a network
  • Ntop – Displays top network users
  • Wireshark – Interactively dump and analyze network traffic
Spoofing (or Masquerading)
  • File2cable – Sends a file as a raw ethernet frame
  • Netsed – Network packet streaming editor
  • Sing – Send ICMP Nasty Garbage packets to network hosts
  • TCPreplay – Replay network traffic stored in pcap files
Wireless Networking Utilities
  • Aircrack-ng – Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured.
  • Kismet – Wireless sniffing and monitoring
  • THC Leap Cracker – The THC LEAP Cracker Tool suite contains tools to break the NTChallengeResponse encryption technique e.g. used by Cisco Wireless LEAP Authentication.
  • WEPCrack – WEPCrack is an open source tool for breaking 802.11 WEP secret keys.
  • WIDZ – Wireless Intrusion Detection System
  • Cowpatty – Brute-force dictionary attack against WPA-PSK
Miscellaneous
  • GDB – The GNU Debugger.
  • Hexdump – ASCII, decimal, hexadecimal and octal dump tool.
  • Hexedit – View and edit file in hexadecimal or in ASCII
  • Wipe – Securely erase files
  • Madedit -Text/Hex Editor


Click Here to Read more!

Wednesday, August 24, 2011

WiFi (WLAN) Hacker - Cracks Wep key

This is only for educational purpose not any other means

AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. 802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous security flaws. Most damning of these is the weakness described in " Weaknesses in the Key Scheduling Algorithm of RC4 " by Scott Fluhrer, Itsik Mantin and Adi Shamir. Adam Stubblefield was the first to implement this attack, but he has not made his software public. AirSnort, along with WEPCrack, which was released about the same time as AirSnort, are the first publicly available implementaions of this attack.

AirSnort requires approximately 5-10 million encrypted packets to be gathered. Once enough packets have been gathered, AirSnort can guess the encryption password in under a second.


Click Here to Read more!

Speed Up Your File Manager with DropIt

This is only for educational purpose not any other means 

We all use the file manager nearly every day to view, move and sort files/folders. Admittedly, the file manager is limited in its functionality, and doesn’t allow much for batch processing of files, or matching of patterns in file or folder names. So what if we turbocharged our standard file manager? We would have DropIt!

DropIt is a small Windows app that floats on your desktop, allowing you to drag and drop files and folders for batch processing. From their site:
You can configure DropIt to do 9 different actions to your files and folders (Move, Copy, Compress, Extract, Rename, Open With, List, Delete and Ignore), filtering files by name, extension, location, size and/or date. You can even save sets of patterns in profiles and associate a profile to each desired folder, to scan monitored folders at a defined time interval.

This software boasts a host of other features, such as logging, multi-language and Unicode support, password protection, and much more.

FEATURES

 - Process files and folders manually with Drag-and-Drop
 - Process files and folders automatically with Folder Monitoring
 - Filter files and folders by name, extension, location, size and/or date
 - Move, Copy, Compress, Extract, Rename, Open With, List, Delete, Ignore actions
 - Collect patterns in different profiles and assign an image to each one
 - Support also Context-Menu, Send-To and Command-Line
 - Support automatic software update
 - Support encryption to protect your profiles with a password
 - Support internal, system and custom environment variables
 - Support log file creation to verify sorting operations
 - Support for Unicode filenames
 - Available with Multi-language interface
 - Available in both installer and portable versions




Click Here to Read more!

Password Safe

This is only for educational purpose not any other means

KeePass Password Safe is a free, open source, light-weight and easy-to-use password manager for Windows. You can store your passwords in a highly-encrypted database, which is locked with one master password or key file.






Click Here to Read more!

Monday, August 22, 2011

SQLmap 0.9 Released – SQL Injection Tool

This is only for educational purpose not any other means


Introduction:
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

New Features:
  • Rewritten SQL injection detection engine
  • Support to directly connect to the database without passing via a SQL injection, -d switch
  • Added full support for both time-based blind SQL injection and error-based SQL injection techniques
  • Implemented support for SQLite 2 and 3
  • Implemented support for Firebird
  • Implemented support for Microsoft Access, Sybase and SAP MaxDB
  • Added support to tamper injection data with –tamper switch
  • Added automatic recognition of password hashes format and support to crack them with a dictionary-based attack
  • Added support to fetch unicode data
  • Added support to use persistent HTTP(s) connection for speed improvement, –keep-alive switch
  • Implemented several optimization switches to speed up the exploitation of SQL injections
  • Support to parse and test forms on target url, –forms switch
  • Added switches to brute-force tables names and columns names with a dictionary attack, –common-tables and –common-columns.
Demo:

Click Here to Read more!

BackTrack 5 Released


This is only for educational purpose not any other means 

The BackTrack Dev team has worked furiously in the past months on BackTrack 5, code name “revolution” – they released it on May 10th. This new revision has been built from scratch, and boasts several major improvements over all our previous releases. It’s based on Ubuntu Lucid LTS – Kernel 2.6.38, patched with all relevant wireless injection patches. Fully open source and GPL compliant.


New in Version 5 :
  • Based on Ubuntu 10.04 LTS
  • Linux kernel 2.6.38 (with wireless injection patches)
  • KDE 4.6
  • GNOME 2.6
  • 32-bit and 64-bit support
  • Metasploit 3.7.0
  • Forensics mode (a forensically sound instance)
  • Stealth mode (without generating network traffic)
  • Initial ARM image of BackTrack (for Android-powered devices)



Click Here to Read more!