Showing posts with label ftp. Show all posts
Showing posts with label ftp. Show all posts

Free backup utility for windows and lunix

Saturday, August 27, 2011 // by Hacking Beast Editor // Labels: , , , , , , , // 0 comments



Backup utility




Areca Backup is one of the few backuputilities that I’ve seen that runs on both Windows and Linux operating systems. Like most backup utilities you can choose what files you want to backup and where you want to send them to, which includes backing up the files to an FTP/SFTP server. You can also have the the backup zipped to help save some space.
Here are some of the features the developer highlights:
  • Archives compression (Zip & Zip64 format)
  • Archives encryption (AES128 & AES256 encryption algorithms)
  • Storage on local hard drive, network drive, USB key, FTP, FTPs (with implicit and explicit SSL / TLS) or SFTP server
  • Source file filters (by extension, subdirectory, regular expression, size, date, status, with AND/OR/NOT logical operators)
  • Incremental, differential and full backup support
  • Support for delta backup (store only modified parts of your files)
  • Archives merges : You can merge contiguous archives into one single archive to save storage space.
  • As of date recovery : Areca allows you to recover your archives (or single files) as of a specific date.
  • Transaction mechanism : All critical processes (such as backups or merges) are transactional. This guarantees your backups’ integrity.
  • Backup reports : Areca generates backup reports that can be stored on your disk or sent by email.
  • Post backup scripts : Areca can launch shell scripts after backup.
  • Files permissions, symbolic links and named pipes can be stored and recovered. (Linux only)
Areca Backup is developed using Java which is likely why it is available for both Windows and Linux. I generally stay away from Java apps, but I haven’t seen a backup utility this powerful for Linux before so I thought it was worth mentioning.
Areca Backup Homepage (Windows/Linux; Freeware)

The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

XSS vulnerability in Bing.com Maps

Wednesday, August 24, 2011 // by Hacking Beast Editor // Labels: , , , , , , , , , , , , // 0 comments










 Security Researcher has exposed and founded a XSS vulnerability in www.bing.com . The Bing Maps can be hacked because the application fails to properly perform adequate boundary checks on user-supplied data.An attacker can exploit this issue to execute arbitrary code in the victim's browser.

The reflected XSS vulnerability is a variant of a cross-site scriptingflaw: it occurs when the data provided by the attacker is exectued bythe browser, and then displayed on "normal" pages returned to otherusers in the course of regular browsing, without proper HTML escaping. Aclassic example of this is with online message boards where users areallowed to post HTML formatted messages for other users to read.

Vulnerability Link : Here

The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

Protect your online identity !





If you hack websites or hack into computers or any other thing online , then you need to protect your online identity . you all are familiar with IP address . It is a Internet Protocal address it is like your online address like your home address . If u have hacked any email,website,pc and if u have not protected your ip or if u don't have hide your ip then you can be easily traced . Don't worry you can be anonymous online just by using a simple website ..
You can be safe online by using Hide My Ass




First your IP was like this  by using www.whatismyip.com






But after using Hide My Ass server our IP is 






This method 100% works you can also buy superb! VPN from the website and can also creat anonymous emails.  


The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

Paki Hacking ToolKit v 1.0




MD5 TOOL 

Email Spam 
SQL Tool 
Encryption & Decrypter 
ASCII Art 
Ping Web 
Google Dorks Scanner 


Requirements

•Require .Net framwork 4.0 to run this application.

•And it will be run on All Microsoft Operating systems

•Minimum requirement Windows Xp

•Don't remove any file inside RES folder 


Download  Here 

The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

University of Colombo Sri Lanka - DNS Hacked and Leaked by Anonymous

Monday, August 22, 2011 // by Hacking Beast Editor // Labels: , , , , , , , , , , , , // 0 comments

A twitter update from the Anonymous Srilanka Shows that the Anonymous hackers has attacked  on the University of Colombo and has hacked DNS and the important and private information has been leaked by them

Paste Bin Proof



















The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

Nepal Telecommunications Authority Hacked by w3bd3f4c3r

Sunday, August 21, 2011 // by Hacking Beast Editor // Labels: , , , , , , , , , , // 0 comments



A hacker with his code name w3bd3f4c3r  has hacked the Nepal telecommunications authority with sql injection attack
The hacker has posted all other info in Pastebin
Some screen shots by the hacker :-



The hacker has leaked the information including admin password and username and the whole database of the website.




The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

British student accused of trying to hack into Facebook

Saturday, August 20, 2011 // by Hacking Beast Editor // Labels: , , , , // 0 comments





25-year-old Glenn Steven Mangham, a student in the UK, appeared in court over accusations of trying to hack into Facebook. He allegedly attempted to use various programs to get past Facebook’s defenses, faces five charges for repeatedly trying to penetrate the defenses of the social network under the Computer Misuse Act 1990, and has been banned from going on the Internet in general, until he reappears at court for a committal hearing next month.



The five counts include three charges for unauthorized access to a computer program or data, and two counts of committing unauthorized acts with intent to impair operation of, or prevent or hinder access to, a computer. More specifically, Mangham is accused of downloading a computer program to secure unauthorized access to Facebook, of attempting to hack into Facebook’s Mailman server, of using PHP script to secure access to Facebook’s Phabricator server, of sharing a PHP script intended to hack into that server, and of securing repeated access to another Facebook server.
Facebook runs a Puzzle server to allow computer programmers to test their skills. A Mailman server is typically used by firms to run internal and external email distribution lists. The Phabricator is a set of tools designed by the company to make it easier to build Facebook apps.
The UK-based hacker tried to gain access to Facebook between April 27 and May 9. He was then arrested on June 2 and released from prison on conditional bail just yesterday, meaning he spent over two months behind bars.
Police seized a number of computers from Mangham’s when they raided his house. Although he was bailed at City of Westminster Magistrates’ Court, Judge Evans imposed four conditions to his bail, including that he live and sleep at his home address, not access the Internet, and not have any devices in the house that can access the Web.

The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

Vanguard Defense Industries (VDI) Hacked for #Antisec Operation

Thursday, August 18, 2011 // by Hacking Beast Editor // Labels: , , , , , , , , // 0 comments


AntiSec is targeting defense contractors again. Continuing their beef with law enforcement, and organizations that offer them support, they have targeted Richard Garcia, the Senior Vice President of Vanguard Defense Industries (VDI). AntiSec plans to release nearly 4,713 emails and thousands of documents taken during the breach.
AntiSec targeted VDI’s website due to their relationship with several law enforcement agencies from Texas and other parts of the U.S., as well as their relationship with the FBI, the DHS, and U.S. Marshals Service. Moreover, with this hack Antisec (in)directly targeted FBI since Richard Garcia is the former Assistant Director in Charge of the FBI’s field office in Los Angeles. To those supporting AntiSec, this alone is reason enough to target VDI and release Garcia’s corporate email to the public.

The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

Pakistani Govt. Web-Server at Risk, Serious vulnerability found on the Pakistani Govt. website found by Team hacking Beast and gr4yf0x.

Monday, August 15, 2011 // by Hacking Beast Editor // Labels: , , , , , , , , , , // 0 comments


Pakistani Govt. Web-Server at Risk, Serious vulnerability found on the Pakistani Govt. website found by Team hacking Beast and gr4yf0x.


Vulnerable Link:-


There are more than 140 Pakistani Govt websites hosted in this server. So I think Pakistani Cyber Fence is at huge risk. 




Team hacking Beast and gr4yf0x also found vulnerability on some other Pakistani websites 

Vulnerable Site:- (Uploading Vulnerability) 
http://www.nadra.gov.pk/chat/complaint/index.php?a=add  

Fore More Information Click Here 

The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

Mini PHP Shell 27.9 V2 Released

Thursday, August 4, 2011 // by Hacking Beast Editor // Labels: , , , , , , , , , , , , , , // 0 comments






According to Developer jos_ali_joe and [Devilzc0de] "This is a continuation of PHP Shell Mini 27.9 V1 , Editing Shell c99 and new tools ".
Features : Encoder , Processes , FTP-Brute-Forcer , Server-Information , SQL-Manager and etc.
Download : http://www.megaupload.com/?d=DRHS3AV9

This tool may have backdoor so download it carefully and turn your antivirus off 

The content on Hacking Beast like Hacking Articles, Cyber News etc are provided by many sources ( email,messages,internet etc) , we do not take any responsibility of your activities. The news provided by us on this site is gathered from various sources. if any person have some FAQ's in their mind they can Contact Us. and you can also read our Disclamier for more info. Thank You !
If you enjoyed Hacking Beast Articles , Make sure you subscribe to our RSS feed. Stay Updated about latest Hacking News, Tips and Tricks,and Cyber News.! and recieve all our emails and latest posts directly in your inbox to enjoy fast and easy reading . Thank You!

Bash Shell Scripting - 10 Seconds Guide

Thursday, July 28, 2011 // by Hacking Beast Editor // Labels: , , , , , , , // 0 comments










This Bash shell scripting guide is not a detailed study but a quick reference to the BASH syntax. So lets begin...

Common Environment Variables


PATH - Sets the search path for any executable command. Similar to the PATH variable in MSDOS.

HOME - Home directory of the user.

MAIL - Contains the path to the location where mail addressed to the user is stored. 

IFS - Contains a string of characters which are used as word seperators in the command line. The string normally consists of the space, tab and the newline characters. To see them you will have to do an octal dump as follows:
$ echo $IFS | od -bc
PS1 and PS2 - Primary and secondary prompts in bash. PS1 is set to $ by default and PS2 is set to '>' . To see the secondary prompt, just run the command :
$ ls |
... and press enter.

USER - User login name.

TERM - indicates the terminal type being used. This should be set correctly for editors like Vim to work correctly.

SHELL - Determines the type of shell that the user sees on logging in.

Note: To see what are the values held by the above environment variables, just do an echo of the name of the variable preceeded with a $. For example, if I do the following:
$ echo $USER
ravi
... I get the value stored in the environment variable USER.

Some Bash Shell Scripting Rules

  • The first line in your script must be #!/bin/bash
    ... that is a # (Hash) followed by a ! (bang) followed by the path of the shell. This line lets the environment know the file is a shell script and the location of the shell.
  • Before executing your script, you should make the script executable. You do it by using the following command:
    $ chmod ugo+x your_shell_script.sh
  • The name of your shell script must end with a .sh . This lets the user know that the file is ashell script. This is not compulsary but is the norm.

Conditional Statements

'If' Statement

The 'if' statement evaluates a condition which accompanies its command line.
syntax:
if condition_is_true
then
   execute commands
else
   execute commands
fi
'if' condition also permits multiway branching. That is you can evaluate more conditions if the previous condition fails.
if condition_is_true
then
   execute commands
elif another_condition_is_true
then
   execute commands
else
   execute commands
fi
Example :
if grep "linuxhelp" thisfile.html
then
   echo "Found the word in the file"
else
   echo "Sorry no luck!"
fi

If's Companion - Test

test is an internal feature of the shell. 'test' evaluates the condition placed on its right, and returns either a true or false exit status. For this purpose, 'test' uses certain operators to evaluate the condition. They are as follows:

Relational Operators
  • -eq - Equal to
  • -lt - Less than
  • -gt - Greater than
  • -ge - Greater than or Equal to
  • -le - Less than or Equal to

File related tests
  • -f file - True if file exists and is a regular file.
  • -r file - True if file exists and is readable.
  • -w file - True if file exists and is writable.
  • -x file - True if file exists and is executable.
  • -d file - True if file exists and is a directory.
  • -s file - True if file exists and has a size greater than zero.

String tests
  • -n str - True if string str is not a null string.
  • -z str - True if string str is a null string.
  • str1 == str2 - True if both strings are equal.
  • str - True if string str is assigned a value and is not null.
  • str1 != str2 - True if both strings are unequal.
  • -s file - True if file exists and has a size greater than zero.
Test also permits the checking of more than one expression in the same line.
  • -a  - Performs the AND function
  • -o  - Performs the OR function

A few Example snippets of using test
test $d -eq 25 && echo $d

... which means, if the value in the variable d is equal to 25, print the value. Otherwise don't print anything.
test $s -lt 50 && do_something
if [ $d -eq 25 ]
then
echo $d
fi
In the above example, I have used square brackets instead of the keyword test - which is another way of doing the same thing.
if [ $str1 == $str2 ]
then
do something
fi

if [ -n "$str1" -a -n "$str2" ]
then
echo 'Both $str1 and $str2 are not null'
fi
... above, I have checked if both strings are not null then execute the echo command.

Things to remember while using test
  1. If you are using square brackets [] instead of test, then care should be taken to insert a space after the [ and before the ].
  2. test is confined to integer values only. Decimal values are simply truncated.
  3. Do not use wildcards for testing string equality - they are expanded by the shell to match the files in your directory rather than the string.

Case Statement

Case statement is the second conditional offered by the shell.
Syntax:

case expression in
pattern1) execute commands ;;
pattern2) execute commands ;;
...
esac

The keywords here are in, case and esac. The ';;' is used as option terminators. The construct also uses ')' to delimit the pattern from the action.


Example:

...
echo "Enter your option : "
read i;

case $i in
1) ls -l ;;
2) ps -aux ;;
3) date ;;
4) who ;;
5) exit
esac

Note: The last case option need not have ;; but you can provide them if you want.


Here is another example:
case `date |cut -d" " -f1` in
Mon) commands ;;
Tue) commands ;;
Wed) commands ;;
...
esac
Case can also match more than one pattern with each option.You can also use shell wild-cards for matching patterns.
...
echo "Do you wish to continue? (y/n)"
read ans

case $ans in
Y|y) ;;
[Yy][Ee][Ss]) ;;
N|n) exit ;;
[Nn][Oo]) exit ;;
*) echo "Invalid command"
esac
In the above case, if you enter YeS, YES,yEs and any of its combinations, it will be matched.

This brings us to the end of conditional statements.

Looping Statements

while loop
Syntax :

while condition_is_true
do
execute commands
done

Example:

while [ $num -gt 100 ]
do
sleep 5
done

while :
do
execute some commands
done

The above code implements a infinite loop. You could also write 'while true' instead of 'while :' .
Here I would like to introduce two keywords with respect to looping conditionals. They are break and continue.
break - This keyword causes control to break out of the loop.
continue - This keyword will suspend the execution of all statements following it and switches control to the top of the loop for the next iteration.

until loop
Until complements while construct in the sense that the loop body here is executed repeatedly as long as the condition remains false.
Syntax:

until false
do
execute commands
done

Example:

...
until [ -r myfile ]
do
sleep 5
done

The above code is executed repeatedly until the file myfile can be read.

for loop
Syntax :

for variable in list
do
execute commands
done

Example:

...
for x in 1 2 3 4 5
do
echo "The value of x is $x";
done

Here the list contains 5 numbers 1 to 5. Here is another example:

for var in $PATH $MAIL $HOME
do
echo $var
done

Suppose you have a directory full of java files and you want to compile those. You can write a script like this:

...
for file in *.java
do
javac $file
done

Note: You can use wildcard expressions in your scripts.

Special Symbols Used In BASH Scripting


  • $* - This denotes all the parameters passed to the script at the time of its execution. Which includes $1, $2 and so on.
  • $0 - Name of the shell script being executed.
  • $# - Number of arguments specified in the command line.
  • $? - Exit status of the last command.

The above symbols are known as positional parameters. Let me explain the positional parameters with the aid of an example. Suppose I have a shell script called my_script.sh . Now I execute this script in the command line as follows :

$ ./my_script.sh linux is a robust OS

... as you can see above, I have passed 5 parameters to the script. In this scenario, the values of the positional parameters are as follows:
  • $* - will contain the values 'linux','is','a','robust','OS'.
  • $0 - will contain the value my_script.sh - the name of the script being executed.
  • $# - contains the value 5 - the total number of parameters.
  • $$ - contains the process ID of the current shell. You can use this parameter while giving unique names to any temporary files that you create at the time of execution of the shell.
  • $1 - contains the value 'linux'
  • $2 - contains the value 'is'
... and so on.

The Set And Shift Statements

set - Lets you associate values with these positional parameters .
For example, try this:

$ set `date`
$ echo $1
$ echo $*
$ echo $#
$ echo $2

shift - transfers the contents of a positional parameter to its immediate lower numbered one. This goes on as many times it is called.

Example :

$ set `date`
$ echo $1 $2 $3
$ shift
$ echo $1 $2 $3
$ shift
$ echo $1 $2 $3

To see the process Id of the current shell, try this:

$ echo $$
2667

Validate that it is the same value by executing the following command:

$ ps -f |grep bash

Make Your BASH Shell Script Interactive

read statement
Make your shell script interactive. read will let the user enter values while the script is being executed. When a program encounters the read statement, the program pauses at that point. Input entered through the keyboard id read into the variables following read, and the program execution continues.
Eg:

#!/bin/sh
echo "Enter your name : "
read name
echo "Hello $name , Have a nice day."

Exit Status Of The Last Command

Every command returns a value after execution. This value is called the exit status or return value of the command. A command is said to be true if it executes successfully, and false if it fails. This can be checked in the script using the $? positional parameter.
The content of Hacking Beast Articles is provided by Various Sources like email,messages etc for Educational Purpose & Security Awareness only . We do not take any presponsibality of your activities . If any one have any FAQ'S in mind and want to contact us then it will be our pleasure then please contact us  Thank you !
If you enjoyed reading Hacking Beast articles  then you can   subscribe to our RSS feed. Say updated 24x7 and receive all the latest hacking articles and news in your inbox only from Hacking Beast