Showing posts with label ftp. Show all posts
Showing posts with label ftp. Show all posts
Free backup utility for windows and lunix
Saturday, August 27, 2011 // by Hacking Beast Editor //
Labels:
Cyber News,
Cyber Security,
exploit,
ftp,
softwares,
tech news,
technology,
tips and tricks
//
0
comments
Areca Backup is one of the few backuputilities that I’ve seen that runs on both Windows and Linux operating systems. Like most backup utilities you can choose what files you want to backup and where you want to send them to, which includes backing up the files to an FTP/SFTP server. You can also have the the backup zipped to help save some space.
Here are some of the features the developer highlights:
- Archives compression (Zip & Zip64 format)
- Archives encryption (AES128 & AES256 encryption algorithms)
- Storage on local hard drive, network drive, USB key, FTP, FTPs (with implicit and explicit SSL / TLS) or SFTP server
- Source file filters (by extension, subdirectory, regular expression, size, date, status, with AND/OR/NOT logical operators)
- Incremental, differential and full backup support
- Support for delta backup (store only modified parts of your files)
- Archives merges : You can merge contiguous archives into one single archive to save storage space.
- As of date recovery : Areca allows you to recover your archives (or single files) as of a specific date.
- Transaction mechanism : All critical processes (such as backups or merges) are transactional. This guarantees your backups’ integrity.
- Backup reports : Areca generates backup reports that can be stored on your disk or sent by email.
- Post backup scripts : Areca can launch shell scripts after backup.
- Files permissions, symbolic links and named pipes can be stored and recovered. (Linux only)
Areca Backup Homepage (Windows/Linux; Freeware)
The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!XSS vulnerability in Bing.com Maps
Wednesday, August 24, 2011 // by Hacking Beast Editor //
Labels:
Cyber News,
Cyber Security,
defacements,
exploit,
ftp,
hackers news,
hacking,
knodledge,
servers,
tech news,
tips and tricks,
tools,
vulnerability
//
0
comments
A Security Researcher has exposed and founded a XSS vulnerability in www.bing.com . The Bing Maps can be hacked because the application fails to properly perform adequate boundary checks on user-supplied data.An attacker can exploit this issue to execute arbitrary code in the victim's browser.
The reflected XSS vulnerability is a variant of a cross-site scriptingflaw: it occurs when the data provided by the attacker is exectued bythe browser, and then displayed on "normal" pages returned to otherusers in the course of regular browsing, without proper HTML escaping. Aclassic example of this is with online message boards where users areallowed to post HTML formatted messages for other users to read.
Vulnerability Link : Here
The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!Protect your online identity !
// by Hacking Beast Editor //
Labels:
captcha,
Cyber News,
Cyber Security,
exploit,
ftp,
hackers news,
hacking,
keylogger,
knodledge,
New Releases,
tech news,
technology,
tips and tricks,
vulnerability
//
0
comments
If you hack websites or hack into computers or any other thing online , then you need to protect your online identity . you all are familiar with IP address . It is a Internet Protocal address it is like your online address like your home address . If u have hacked any email,website,pc and if u have not protected your ip or if u don't have hide your ip then you can be easily traced . Don't worry you can be anonymous online just by using a simple website ..
You can be safe online by using Hide My Ass

First your IP was like this by using www.whatismyip.com

But after using Hide My Ass server our IP is

This method 100% works you can also buy superb! VPN from the website and can also creat anonymous emails.
The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!Paki Hacking ToolKit v 1.0
Tuesday, August 23, 2011 // by Hacking Beast Editor //
Labels:
Cyber News,
Cyber Security,
database,
ddos,
defacements,
exploit,
ftp,
hackers news,
hacking,
indishell,
keylogger,
New Releases,
shell codeing,
softwares,
tech news,
tips and tricks,
website hacking
//
0
comments
MD5 TOOL
Email Spam
SQL Tool
Encryption & Decrypter
ASCII Art
Ping Web
Google Dorks Scanner
Requirements
•Require .Net framwork 4.0 to run this application.
•And it will be run on All Microsoft Operating systems
•Minimum requirement Windows Xp
•Don't remove any file inside RES folder
Download Here
The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!University of Colombo Sri Lanka - DNS Hacked and Leaked by Anonymous
Monday, August 22, 2011 // by Hacking Beast Editor //
Labels:
annonymus,
Cyber News,
Cyber Security,
database,
ddos,
defacements,
exploit,
ftp,
knodledge,
LulzSec,
servers,
vulnerability,
website hacking
//
0
comments
A twitter update from the Anonymous Srilanka Shows that the Anonymous hackers has attacked on the University of Colombo and has hacked DNS and the important and private information has been leaked by them
Paste Bin Proof


The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!Nepal Telecommunications Authority Hacked by w3bd3f4c3r
Sunday, August 21, 2011 // by Hacking Beast Editor //
Labels:
Cyber News,
Cyber Security,
database,
defacements,
exploit,
ftp,
hackers news,
hacking,
knodledge,
servers,
tips and tricks
//
0
comments

A hacker with his code name w3bd3f4c3r has hacked the Nepal telecommunications authority with sql injection attack
The hacker has posted all other info in Pastebin
Some screen shots by the hacker :-

The hacker has leaked the information including admin password and username and the whole database of the website.
The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!British student accused of trying to hack into Facebook
Saturday, August 20, 2011 // by Hacking Beast Editor //
Labels:
Cyber News,
Cyber Security,
defacements,
FACEBOOK,
ftp
//
0
comments
25-year-old Glenn Steven Mangham, a student in the UK, appeared in court over accusations of trying to hack into Facebook. He allegedly attempted to use various programs to get past Facebook’s defenses, faces five charges for repeatedly trying to penetrate the defenses of the social network under the Computer Misuse Act 1990, and has been banned from going on the Internet in general, until he reappears at court for a committal hearing next month.
The five counts include three charges for unauthorized access to a computer program or data, and two counts of committing unauthorized acts with intent to impair operation of, or prevent or hinder access to, a computer. More specifically, Mangham is accused of downloading a computer program to secure unauthorized access to Facebook, of attempting to hack into Facebook’s Mailman server, of using PHP script to secure access to Facebook’s Phabricator server, of sharing a PHP script intended to hack into that server, and of securing repeated access to another Facebook server.
Facebook runs a Puzzle server to allow computer programmers to test their skills. A Mailman server is typically used by firms to run internal and external email distribution lists. The Phabricator is a set of tools designed by the company to make it easier to build Facebook apps.
The UK-based hacker tried to gain access to Facebook between April 27 and May 9. He was then arrested on June 2 and released from prison on conditional bail just yesterday, meaning he spent over two months behind bars.
Police seized a number of computers from Mangham’s when they raided his house. Although he was bailed at City of Westminster Magistrates’ Court, Judge Evans imposed four conditions to his bail, including that he live and sleep at his home address, not access the Internet, and not have any devices in the house that can access the Web.
The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!Vanguard Defense Industries (VDI) Hacked for #Antisec Operation
Thursday, August 18, 2011 // by Hacking Beast Editor //
Labels:
annonymus,
Cyber News,
Cyber Security,
exploit,
ftp,
hackers news,
hacking,
knodledge,
LulzSec
//
0
comments
AntiSec is targeting defense contractors again. Continuing their beef with law enforcement, and organizations that offer them support, they have targeted Richard Garcia, the Senior Vice President of Vanguard Defense Industries (VDI). AntiSec plans to release nearly 4,713 emails and thousands of documents taken during the breach.
AntiSec targeted VDI’s website due to their relationship with several law enforcement agencies from Texas and other parts of the U.S., as well as their relationship with the FBI, the DHS, and U.S. Marshals Service. Moreover, with this hack Antisec (in)directly targeted FBI since Richard Garcia is the former Assistant Director in Charge of the FBI’s field office in Los Angeles. To those supporting AntiSec, this alone is reason enough to target VDI and release Garcia’s corporate email to the public.
The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!Pakistani Govt. Web-Server at Risk, Serious vulnerability found on the Pakistani Govt. website found by Team hacking Beast and gr4yf0x.
Monday, August 15, 2011 // by Hacking Beast Editor //
Labels:
Cyber News,
Cyber Security,
database,
defacements,
exploit,
ftp,
hacking,
knodledge,
servers,
tips and tricks,
website hacking
//
0
comments
Pakistani Govt. Web-Server at Risk, Serious vulnerability found on the Pakistani Govt. website found by Team hacking Beast and gr4yf0x.
Vulnerable Link:-
There are more than 140 Pakistani Govt websites hosted in this server. So I think Pakistani Cyber Fence is at huge risk.
Team hacking Beast and gr4yf0x also found vulnerability on some other Pakistani websites
Vulnerable Site:- (Uploading Vulnerability)
http://www.nadra.gov.pk/chat/complaint/index.php?a=add
Fore More Information Click Here
The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!Mini PHP Shell 27.9 V2 Released
Thursday, August 4, 2011 // by Hacking Beast Editor //
Labels:
captcha,
Cyber News,
Cyber Security,
database,
ddos,
defacements,
desktoppishing,
exploit,
ftp,
hackers news,
hacking,
knodledge,
New Releases,
sql,
tech news
//
0
comments
According to Developer jos_ali_joe and [Devilzc0de] "This is a continuation of PHP Shell Mini 27.9 V1 , Editing Shell c99 and new tools ".
Features : Encoder , Processes , FTP-Brute-Forcer , Server-Information , SQL-Manager and etc.
Download : http://www.megaupload.com/?d=DRHS3AV9
This tool may have backdoor so download it carefully and turn your antivirus off
The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!Bash Shell Scripting - 10 Seconds Guide
Thursday, July 28, 2011 // by Hacking Beast Editor //
Labels:
exploit,
ftp,
hacking,
shell codeing,
technology,
tips and tricks,
tools,
website hacking
//
0
comments
This Bash shell scripting guide is not a detailed study but a quick reference to the BASH syntax. So lets begin...
Common Environment Variables
PATH - Sets the search path for any executable command. Similar to the PATH variable in MSDOS.
HOME - Home directory of the user.
MAIL - Contains the path to the location where mail addressed to the user is stored.
IFS - Contains a string of characters which are used as word seperators in the command line. The string normally consists of the space, tab and the newline characters. To see them you will have to do an octal dump as follows:
$ echo $IFS | od -bcPS1 and PS2 - Primary and secondary prompts in bash. PS1 is set to
$ by default and PS2 is set to '>' . To see the secondary prompt, just run the command :$ ls |... and press enter.
USER - User login name.
TERM - indicates the terminal type being used. This should be set correctly for editors like Vim to work correctly.
SHELL - Determines the type of shell that the user sees on logging in.
Note: To see what are the values held by the above environment variables, just do an echo of the name of the variable preceeded with a
$. For example, if I do the following:$ echo $USER ravi... I get the value stored in the environment variable
USER.Some Bash Shell Scripting Rules
- The first line in your script must be
#!/bin/bash
... that is a#(Hash) followed by a!(bang) followed by the path of the shell. This line lets the environment know the file is a shell script and the location of the shell. - Before executing your script, you should make the script executable. You do it by using the following command:
$ chmod ugo+x your_shell_script.sh
- The name of your shell script must end with a
.sh. This lets the user know that the file is ashell script. This is not compulsary but is the norm.
Conditional Statements
'If' Statement
The 'if' statement evaluates a condition which accompanies its command line.syntax:
if condition_is_true then execute commands else execute commands fi'if' condition also permits multiway branching. That is you can evaluate more conditions if the previous condition fails.
if condition_is_true then execute commands elif another_condition_is_true then execute commands else execute commands fiExample :
if grep "linuxhelp" thisfile.html then echo "Found the word in the file" else echo "Sorry no luck!" fi
If's Companion - Test
test is an internal feature of the shell. 'test' evaluates the condition placed on its right, and returns either a true or false exit status. For this purpose, 'test' uses certain operators to evaluate the condition. They are as follows:Relational Operators
- -eq - Equal to
- -lt - Less than
- -gt - Greater than
- -ge - Greater than or Equal to
- -le - Less than or Equal to
File related tests
- -f file - True if file exists and is a regular file.
- -r file - True if file exists and is readable.
- -w file - True if file exists and is writable.
- -x file - True if file exists and is executable.
- -d file - True if file exists and is a directory.
- -s file - True if file exists and has a size greater than zero.
String tests
- -n str - True if string str is not a null string.
- -z str - True if string str is a null string.
- str1 == str2 - True if both strings are equal.
- str - True if string str is assigned a value and is not null.
- str1 != str2 - True if both strings are unequal.
- -s file - True if file exists and has a size greater than zero.
- -a - Performs the AND function
- -o - Performs the OR function
A few Example snippets of using test
test $d -eq 25 && echo $d
... which means, if the value in the variable d is equal to 25, print the value. Otherwise don't print anything.
test $s -lt 50 && do_something
if [ $d -eq 25 ] then echo $d fiIn the above example, I have used square brackets instead of the keyword test - which is another way of doing the same thing.
if [ $str1 == $str2 ] then do something fi if [ -n "$str1" -a -n "$str2" ] then echo 'Both $str1 and $str2 are not null' fi... above, I have checked if both strings are not null then execute the echo command.
Things to remember while using test
- If you are using square brackets [] instead of test, then care should be taken to insert a space after the [ and before the ].
- test is confined to integer values only. Decimal values are simply truncated.
- Do not use wildcards for testing string equality - they are expanded by the shell to match the files in your directory rather than the string.
Case Statement
Case statement is the second conditional offered by the shell.Syntax:
case expression in pattern1) execute commands ;; pattern2) execute commands ;; ... esac
The keywords here are in, case and esac. The ';;' is used as option terminators. The construct also uses ')' to delimit the pattern from the action.
Example:
... echo "Enter your option : " read i; case $i in 1) ls -l ;; 2) ps -aux ;; 3) date ;; 4) who ;; 5) exit esac
Note: The last case option need not have ;; but you can provide them if you want.
Here is another example:
case `date |cut -d" " -f1` in Mon) commands ;; Tue) commands ;; Wed) commands ;; ... esacCase can also match more than one pattern with each option.You can also use shell wild-cards for matching patterns.
... echo "Do you wish to continue? (y/n)" read ans case $ans in Y|y) ;; [Yy][Ee][Ss]) ;; N|n) exit ;; [Nn][Oo]) exit ;; *) echo "Invalid command" esacIn the above case, if you enter YeS, YES,yEs and any of its combinations, it will be matched.
This brings us to the end of conditional statements.
Looping Statements
while loopSyntax :
while condition_is_true do execute commands done
Example:
while [ $num -gt 100 ] do sleep 5 done
while : do execute some commands done
The above code implements a infinite loop. You could also write 'while true' instead of 'while :' .
Here I would like to introduce two keywords with respect to looping conditionals. They are break and continue.
break - This keyword causes control to break out of the loop.
continue - This keyword will suspend the execution of all statements following it and switches control to the top of the loop for the next iteration.
until loop
Until complements while construct in the sense that the loop body here is executed repeatedly as long as the condition remains false.
Syntax:
until false do execute commands done
Example:
... until [ -r myfile ] do sleep 5 done
The above code is executed repeatedly until the file myfile can be read.
for loop
Syntax :
for variable in list do execute commands done
Example:
... for x in 1 2 3 4 5 do echo "The value of x is $x"; done
Here the list contains 5 numbers 1 to 5. Here is another example:
for var in $PATH $MAIL $HOME do echo $var done
Suppose you have a directory full of java files and you want to compile those. You can write a script like this:
... for file in *.java do javac $file done
Note: You can use wildcard expressions in your scripts.
Special Symbols Used In BASH Scripting
- $* - This denotes all the parameters passed to the script at the time of its execution. Which includes $1, $2 and so on.
- $0 - Name of the shell script being executed.
- $# - Number of arguments specified in the command line.
- $? - Exit status of the last command.
The above symbols are known as positional parameters. Let me explain the positional parameters with the aid of an example. Suppose I have a shell script called my_script.sh . Now I execute this script in the command line as follows :
$ ./my_script.sh linux is a robust OS
... as you can see above, I have passed 5 parameters to the script. In this scenario, the values of the positional parameters are as follows:
- $* - will contain the values 'linux','is','a','robust','OS'.
- $0 - will contain the value my_script.sh - the name of the script being executed.
- $# - contains the value 5 - the total number of parameters.
- $$ - contains the process ID of the current shell. You can use this parameter while giving unique names to any temporary files that you create at the time of execution of the shell.
- $1 - contains the value 'linux'
- $2 - contains the value 'is'
The Set And Shift Statements
set - Lets you associate values with these positional parameters .For example, try this:
$ set `date` $ echo $1 $ echo $* $ echo $# $ echo $2
shift - transfers the contents of a positional parameter to its immediate lower numbered one. This goes on as many times it is called.
Example :
$ set `date` $ echo $1 $2 $3 $ shift $ echo $1 $2 $3 $ shift $ echo $1 $2 $3
To see the process Id of the current shell, try this:
$ echo $$ 2667
Validate that it is the same value by executing the following command:
$ ps -f |grep bash
Make Your BASH Shell Script Interactive
read statementMake your shell script interactive. read will let the user enter values while the script is being executed. When a program encounters the read statement, the program pauses at that point. Input entered through the keyboard id read into the variables following read, and the program execution continues.
Eg:
#!/bin/sh echo "Enter your name : " read name echo "Hello $name , Have a nice day."
Exit Status Of The Last Command
Every command returns a value after execution. This value is called the exit status or return value of the command. A command is said to be true if it executes successfully, and false if it fails. This can be checked in the script using the $? positional parameter.
If you enjoyed reading Hacking Beast articles then you can subscribe to our RSS feed. Say updated 24x7 and receive all the latest hacking articles and news in your inbox only from Hacking Beast















