The package consists of Avanset exam simulator carcked version with 4 cisco press ebooks by Todd Lammle and Odom.W .
It also contain a free ccna study Guide for review purpose.
Finally it consists of 4 latest ccna dumps to pass the exam.
100% Guarenteed pass with these dumps.
These are from exam-collection.com
These are all at a cost of 10$ only.contact:showbuzz12345@gmail.com for further payment process.
Old School Of Hacking
Total Pageviews
Saturday 28 June 2014
Everything required for a ccna aspirant to pass the exam.
Tuesday 8 April 2014
How to learn Hacking or becoming a Hacker
How to learn Hacking or becoming a hacker
I don't know how expert i am but i believe these enough for becoming a hacker and i always try to follow them. So just sharing with you.
A) Programming:
1. Python/perl : Learn Python or Perl programming language. You need one of these two language . Do you know why ? For example , creating exploit, Making Custom tools etc.
2.C/C++: You should know this language. Because this will help you in many way. It is powerful language. Perhaps you already know that most of complex and powerful software coded in C/C++. And The Linux/Unix operating system language is created in C Language. For finding exploit or making some nasty thing you need this language.
3. Assembly Language: AH!!! Worry ? Don't worry. It is not too hard for learning to read or understanding the code. Really you need asm if you are more serious about hacking. Without assembly language you will not be able to find the 0day against software , because debugger only output in asm code. Actually you don't need to be coder but you should able to read it, understand it... Also if you want to know how computer internal works then best way to learn asm. So go with Intel Syntax and nasm.
4. PHP/SQL/Java script/html: If you want to move to Web hacking then learn at least 2 languages(PHP and MySQL). For example If you found php code injection vulnerable so how you will exploit it? Clear answer is you need PHP knowledge. And if you want to attack Client side then you need javascript and html knowledge, For example EXPLOITING password protected html pages , cros site scripting, Exploiting CSRF etc . Have you ever heard about SQL injection ? Guess why i told you to learn SQL.Even If you want to find 0day for other framework like wordpress,joomla etc then you must need to have PHP/MySQL knowledge.
But if you are not serious about hacking and want to hack only for fun then some tools will do the job for you(this called skid and script kiddie), But be aware most of time(85%) you will be failed.
Hackers hack over network(Internet?). So guess why you need to learn networking. You have to understand how to connect, get familiar with ports, protocols etc. I suggest you to learn:
Of course without operating system nothing is possible. And you must need to learn about operating system deeply. You should be very good in various OS . Earn some Internal knowledge about operating system. Run all existing tools of an OS. See how it works.
1. Linux: Ah , Linux is My first choice. I love Linux OS. It is Open source. Hacker should choice Open source operating system so that they can see the sources code, can modify , run various open source tools etc. I can't explain lol, Get it right now!
2. Windows: Favorite target operating system for hackers. A lot of bugs and users over the world. Not open source. So you should learn it well. Still i read Windows assembly language and windows internal books instead Linux.
1. Install 2 targets operating system. Linux(Get Ubuntu,Debain,Fedora,Redhat,OpenSuse etc) and windows. Don't be fucker as some trainer doing with windows only as it is easy to exploit. So Linux also your target.
1. Install various software and tools. Run them . Learn them. See how it works. Install some security software, attack against your target system(Metasploit, nmap etc).
2. Install various networking software such as http,ftp,pop3,smtp,rdp,ssh,nntp etc and attack them and try to break them. try to find some bug such as BOF by Fuzzers . Even install other software For web hacking such as VB,MyBB,PhpBB , joomla etc and run Various tools against these application.
Now You know what is going on and it is the time to start the journey. Now read some security/hacking books, Search on Google and you will see most of security hole occur from Programming and for networking problem. You will learn very fast. Just remember journey will not be end. So be careful taking enough food(Programming+Networking+OS+Motivation+patient) before starting the long journey.
Don't give up!
Monday 7 April 2014
TCP packet fragment attacks against firewalls and filters
TCP packet fragment attacks against firewalls and filters
System: TCP/IP networks
Packet Fragmentation Attacks
Introduction to Packet Fragmentation
Packet fragmentation is the part of the Internet Protocol (IP) suite of
networking protocols that assures that IP datagrams can flow through any
other sort of network. (For details, see Internet Request For Comments 791
(rfc791) and are available and searchable in electronic form from Info-Sec
heaven on the World-Wide-Web at http://all.net, through gopher service at
all.net, or by ftp service from rs.internic.net.) Fragmentation works by
allowing datagrams created as a single packet to be split into many smaller
packets for transmission and reassembled at the receiving host.
Packet fragmentation is necessary because underlying the IP protocol, other
physical and or logical protocols are used to transport packets through
networks. A good example of this phenomena is on the difference between
Ethernet packets (which are limited to 1024 bytes), ATM packets (which are
limited to 56 bytes), and IP packets which have variable sizes up to about
1/2 million bytes in length.
The only exception to this rule is in the case of an internet datagram
marked don't fragment . Any internet datagram marked in this way is
supposed to not be fragmented under any circumstances. If internet
datagrams marked don't fragment cannot be delivered to their destination
without being fragmented, they are supposed to be discarded instead. Of
course, this rule doesn't have to be obeyed by the IP software actually
processing packets, but it is supposed to be.
How Packet Reassembly Attacks Work
The packet fragmentation mechanism leads to attacks that bypass many
current Internet firewalls, but the reason these attacks work is not
because of the way fragmentation is done, but rather because of the way
datagrams are reassembled.
Datagrams are supposed to be fragmented into packets that leave the header
portion of the packet intact except for the modification of the fragmented
packet bit and the filling in of an offset field in the IP header that
indicates at which byte in the whole datagram the current packet is
supposed to start. In reassembly, the IP reassembler creates a temporary
packet with the fragmented part of the datagram in place and adds incoming
fragments by placing their data fields at the specified offsets within the
datagram being reassembled. Once the whole datagram is reassembled, it is
processed as if it came in as a single packet.
According to the IP specification, fragmented packets are to be reassembled
at the receiving host. This presumably means that they are not supposed to
be reassembled at intermediate sites such as firewalls or routers. This
decision was made presumably to prevent repeated reassembly and
refragmentation in intermediate networks. When routers and firewalls
followed the rules, they found a peculiar problem.
The way firewalls and routers block specific services (such as telnet )
while allowing other services (such as the world wide web http service) is
by looking into the IP packet to determine which Transfer Control Protocol
(TCP) port is being used. If the port corresponds to 80, the datagram is
destined for http service, while port 23 is used for telnet . In normal
datagrams, this works fine. But suppose we didn't follow the rules for
fragmentation and created improper fragmented packets? Here's what one
attacker did:
* Create an initial packet which claims to be the first fragment of a
multi-packet datagram. Specify TCP port 80 in the TCP header so it
looks like a datagram going to http service, which is allowed to pass
the firewall.
* The firewall passes the packet to the host under attack and passes
subsequent packet fragments in order to allow the destination host to
reassemble the packet.
* One of the subsequent packets has an offset of 0 which causes the
reassembler to overwrite the initial part of the IP packet. This is
the part of the IP packet that specifies the TCP port. The attacker
overwrites the IP port number which was originally 80 with a new port
number such as 23, and is now granted telnet access to the host under
attack despite the firewall that is supposed to block the service.
Sunday 6 April 2014
Translating Binary To Text
Translating Binary to Text
Contents
1. Introduction
2. The Binary System
3. Converting Binary to ASCII (Text)
Introduction:
We’ve all seen binary code. We’ve come to think of them as a bunch of ones and zeroes in long strings…
010010101010101001101011
But these ones and zeroes can also represent decimal numbers. First off, I will show you how to read these numbers as the decimal numbers we’re used to in our daily life. Then, I will show you how to use those numbers and your keypad to translate them into text. Note that your computer doesn’t use the decimal system, so technically, when it converts binary to text, it doesn’t go through the process I will show you. This is just a divertive way of explaining you how the binary system works.
The Binary System:
Here’s a simple example of binary:
10101
Let’s think of the example above as empty slots:
_ _ _ _ _
First off, you read binary from right-to-left. It’s just the way it’s designed. The first slot from the right represents a value of one, the second from the right a value of two, the third from the right a value of four, the fourth from the right a value of eight, the fifth from the right a value of sixteen, and the cycle continues by multiples of 2. This will never change.
By putting a 1 or a 0 in those slots you are either saying you want to corresponding value that’s attached to that slot or you don’t. A 1 means yes, and a 0 means no. For example, putting a zero in the first slot from the right, but a 1 in the second slot from the right means you want a two, but not a one:
_ _ _ 1 0
As such, the number above equals to a decimal value of two.
As an example, let’s say you want to represent eight in binary form. Well, thinking about the slots, you want the first slot to be 0 because you don’t want a one, you want the second slot to also be 0 because you don’t want a two, you want the third slot to also to be 0 because you don’t want a four, but you want the fifth slot to be 1 because you want a value of eight. As such, eight in binary form is:
1 0 0 0 (or simply 1000 without those underlines)
Now it is important to note that the amount of zeroes that precede the first value of one from the left is unimportant. So for example:
1 0 0 0 is the same as 0 0 0 1 0 0 0 (1000 = 000100)
To get it cleared up, here’s another example:
0 1 is the same as 1
Exercises: What do the following equal in decimal terms?
a) 100
b] 000100
c) 100000
d) 0010
Answers:
a) 4
b] 4
c) 32
d) 2
If you got the answers above right, then you pretty much understand the basics of binary.
Let’s now understand how to get the corresponding decimal values to the numbers which are not multiples of 2.
To get the total value of a binary number, add the values corresponding to each slot. So, for example, three in binary would be:
11
The above corresponds to three because if you add the total values of all the slots, that is to say a one from the slot to the right, and a two from the second slot to the right, then it equals three.
As another example, let’s say you want to represent 5 in binary terms. Then you would need a value of one to be added to a value of four, and you would not want a value of two:
101 [Reading from the right: 1(one) + 0(two) + 1(four) = five]
Here’s an additional example:
001011 [Reading from the right: 1(one) + 1(two) + 0(four) + 1(eight) + 0(sixteen) + 0(thirty-two) = eleven)
Exercises: What do the following equal in decimal terms?
a) 11011
b] 110
c) 010101
d) 10110
Answers:
a) 27
b] 6
c) 21
d) 22
If you got the above questions correct [without cheating], then you essentially understand the binary system. Understanding the binary system was the hard part. What follows is pretty easy.
3. Converting Binary to ASCII (Text)
ASCII is essentially the letters, numbers and symbols that are stored in our computers through the use of fonts. When the keyboard relays the buttons you pressed, it sends in a code which is then converted to the ASCII equivalent of “k” or “5” or whatever key you pressed.
Here’s an example of a message “hidden” in binary text:
0100100001100101011011000110110001101111
Now there are only so many letters, numbers and symbols stored for ASCII. Having sets of 8 digits for their binary equivalent is more than enough to represent all of these letters and the like. As such, all strings that represent text like in the above are separated into bits of 8 for simplicity:
01001000 01100101 01101100 01101100 01101111
Okay, so our example message was separated into 8 digit strings. The decimal value for each of these strings in the example was calculated for you.
01001000 = 72
01100101 = 101
01101100 = 108
01101100 = 108
01101111 = 111
The result was 72,101,108,108,111. Now, there is something called the ASCII table. It essentially corresponds to the binary numbers from yore to the equivalent letters/symbols/numbers. But since we found the decimal values of these binary strings, we can use a major shortcut.
By pressing ALT + [The Number], you will get the ASCII equivalent of that number. For example, by pressing the ALT key and at then (while keeping it down) the numbers 72 in any text editor, you will get the corresponding “H” to show up.
Let’s do so for the entire example message:
72 = H
101 = e
108 = l
108 = l
111 = o
So the entire “hidden” message translates to “Hello”.
Exercise: Decode the following message
01000011011011110110111001100111011100100110000101110100011101010110110001100001
011101000
1101001011011110110111001110011 00100001
Hint: The first step on your way to decoding the message (separated into bytes for you)
01000011 01101111 01101110 01100111 01110010 01100001 01110100 01110101 01101100 01100001 01110100 01101001 01101111 01101110 01110011 00100001
Email Forge Sends Email From Anyone
1. Some ISP's block port 25 so it might not work
2. Most likely, you won't be able to see what yer typing
First of all, you need an SMTP server. These are extremely common and, in fact, I'll provide one for you (mail.hotmail.com). SMTP: Simple Mail Transfer Protocol. This service runs on port 25 (in most cases) and is used to send outgoing email.
Now, open up the command prompt and telnet to mail.hotmail.com on port 25 (note: to see what you type, type telnet and enter then type in set local_echo):
code:--------------------------------------------------------------------------------
telnet mail.hotmail.com 25
--------------------------------------------------------------------------------
When yer connected type in (except what's in between *'s; you chose what will go in the []):
code:--------------------------------------------------------------------------------
helo
*wait*
mail from:[whoever]@[whoever.com]
*wait*
rcpt to:[whoever]@[whoever.com]
*wait*
data
*wait*
[write]
[whatever you want]
[in]
[as many]
[lines as wished]
.
*wait*
quit
--------------------------------------------------------------------------------
Helo is just a handshake with the server. Mail from: is FROM who you want the email to be. rcpt to: is who you want the email to go to. under data is what you want sent. the '.' ends data. quit quits. There! simple isn't it.
Friday 4 April 2014
Finding missing files from a release
Finding Missing Files From A Release
I hope this hasn't been submitted before, but i did a search and didn't find anything so here goes.
Have you ever downloaded a game/app/movie/... and when it was finished, you find out that are some missing files or corrupt ones?
Well here's a way to find those fill:
--> www.incomplete.me.uk
This is a service that works through irc (so mirc (or another) must be installed to use it).
You go on the specific channel (manually or by clicking one of the direct links on the site) and then "ask" for the specific file.
When there's someone out there who has it, it will be send to you automatically
If not, the file request shall be put on a queu list untill someone that has it, has sent it to the person that requested it.
!!! Obey the rules though, if not you can be banned from the channel and in severe cases your provider can be banned so others won't be able to use this !!!
I hope this can help out some people here, who have experienced/will experience this.
Learn How To Hide Files Behind Images
Learn How To Hide Files Behind Images
There are some important files or documents you want to hide from others on your computer.To do that you might be creating folder inside folder to hide such files but in todays tutorial i will change this by teaching you a interesting trick to hide files behind images.To hide a file behind a image means that if any one opens that image he will see the image, but to see the hidden file we need to open that image in a specific way. So lets get started.
How to Hide File Behind Image?
Follow these steps inorder to hide the required files behind image.
1. Select an image to be used for hiding file behind the image.
2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
3. And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.
4. Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it.
Type cd desktop
Here cd refers to the change of directory to the desktop.After that type
Copy /b imagename.jpg + filename.rar finalimage.jpg
Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif)
Replace filename with name of your file you want to hide. It must be in .rar format.
Finally Replace finalimage.jpg with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.
6. Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.
How To Access Hidden File ?
To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.
1. Open winrar
2. Now locate your image and open it or simply drag your image in winrar.
3. Extract the file and done.