Thursday, October 25, 2012

Did u know that 8 People Can Use The Same Msn Dial Up Account

8 People Can Use The Same Msn Dial Up Account

its easy really. want to have an entire family on dial-up with just one bill?

step one. purchase 20 dollar a month subscription to MSN unlimited access dial up. This will include an MSN 9 cd which you will need. With the software installed, fill up your secondary account slots with new users. Make sure you pick @msn if it gives you the choice, hotmail email addresses will not work..

say the secondary account is johnsmith@msn.com type in the Dial up connection

USER : MSN/johnsmith
PASS: ******* (whatever)

connect to your local msn phone number and the other people you gave secondary accounts to will be able to do the same, while you are connected. Its a sweet deal considering everyone is paying about 2 bucks a month for internet access, especially if you cannot get broadband. if you wanted to sell off the access to people you could actually make money doing this.. but i do not suggest it.

I used to be an msn tech and this was a little known secret even to most of the employees.

After you do this you do not need the software any more. I would suggest keeping it on to micromanage everyone else's accounts. and for the simple fact that if they don't pitch in, cut them off.
I'm on broadband now so i don't care if i tell you my little secret. anyone else knew of this?

Top 15 Security/Hacking Tools & Utilities



Top 15 Security/Hacking Tools & Utilities

1. Nmap
I think everyone has heard of this one, recently evolved into the 4.x series.
Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap usesraw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.
Can be used by beginners (-sT) or by pros alike (–packet trace). A very versatile tool, once you fully understand the results.
Get Nmap Here
2. Nessus Remote Security Scanner
Recently went closed source, but is still essentially free. Works with a client-server framework.
Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.
Get Nessus Here
3. John the Ripper
Yes, JTR 1.7 was recently released !
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonlyfound on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

4. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
Nikto is a good CGI scanner, there are some other tools that go well with Nikto (focus on http fingerprinting or Google hacking/info gathering etc, another article for just those).

5. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.
If you need an alternative for nmap on Windows witha decent interface, I suggest you check this out, it’s pretty nice.

6. p0f
P0f v2 is a versatile passive OS fingerprinting tool. P0fcan identify the operating system on:
– machines that connect to your box (SYN mode),
– machines you connect to (SYN+ACK mode),
– machine you cannot connect to (RST+ mode),
– machines whose communications you can observe.
Basically it can fingerprint anything, just by listening, itdoesn’t make ANY active connections to the target machine.

7. Wireshark (Formely Ethereal)
Wireshark is a GTK+-based network protocol analyzer,or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.
Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.

8. Yersinia
Yersinia is a network tool designed to take advantageof some weakeness in different Layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).
The best Layer 2 kit there is.

9. Eraser
Eraser is an advanced security tool (for Windows ), which allows you to completely remove sensitive datafrom your hard drive by overwriting it several times with carefully selected patterns. Works with Windows95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License.
An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the ass.

10. PuTTY
PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator. A must have for any h4x0r wanting to telnet or SSH from Windows without having to use the crappy default MS command line clients.

11. LCP
Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute force session distribution, Hashes computing.
A good free alternative to L0phtcrack.
LCP was briefly mentioned in our well read Rainbow Tables and RainbowCrack article.

12. Cain and Abel
My personal favourite for password cracking of any kind.
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.

13. Kismet
Kismet is an 802.11 layer2 wireless network detector,sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
A good wireless tool as long as your card supports rfmon (look for an orinocco gold).

14. NetStumbler
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving.
NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
*. Verify that your network is set up the way you intended.
*. Find locations with poor coverage in your WLAN.
*. Detect other networks that may be causing interference on your network.
*. Detect unauthorized “rogue” access points in your workplace.
*. Help aim directional antennas for long-haul WLAN links.
*. Use it recreationally for WarDriving.
Get NetStumbler Here
15. hping
To finish off, something a little more advanced if you want to test your TCP/IP packet monkey skills.
hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP andRAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.
Get hping Here
Yah I’ve stayed away from commercial products in this article, perhaps I’ll cover those another day.
Digg This Article
You can also check out the Top 10 Security Live CDs for Pen-Testing, Forensics and Recovery Here.

Saturday, October 20, 2012

Theories of HACKER by KITOMARIAN


Theory KITOMARIAN
HACKER’s LEAGUE

     The Hacker's League is modeled loosely after the American Radio Relay League (A.R.R.L.), an organization of technological adventurers of the Edwardian period.  In its heyday, the radio amateurs moved from being nuisances to being important contributors to the development of radio technology.  In a field which demanded governmental regulation for orderly operation, the A.R.R.L. represented the interests of amateurs in the councils of government and organized ongoing educational activities through which newcomers to the field could learn not only the technology involved, but also the human interactions which connect the technology to the outside world.

     The most recent triumph of radio amateurs has been the development of packet radio, which has recently been adopted by Motorola as the basis for its "wireless local loop" for wireless telephone operation.  Thanks to the amateurs, it was developed and tried out in an open environment outside of commercial pressures which tend toward secrecy and exclusion.

     In the area of computers and telecommunication, there are several parallels between today's hackers and the radio amateurs of 1915.  Hackers are seen by the respectable technological players as nuisances capable of doing great damage and generally without redeeming qualitites.  They were indistinguishable from rogue broadcasters who trampled on other signals in their urge to cover the longest distance.  In the corridors of power there was a movement toward outlawing them.  Nontechnical people did not know quite what to think about this problem and its suggested solution.

     The A.R.R.L. was more than a lobbying organization, though.  It provided a means for the mutual education essential to the growth of any technology, a route of entry open to all comers, and a social scene to accompany the technological forum.  Through the A.R.R.L. green kids could encounter grizzled old timers who would be unapproachable in their positions the industry.  At field days and other events the cameraderie of being explorers overcame the barriers of class and position as well as those engendered by commercial competition.  Networking was possible in the amateur environment which forwarded the operation in the commercial and professional environments.

     The concept of the Hacker's League is similar but different as befits the different nature of the technology.  The aim is to provide a situation in which otherwise unqualified entrants to the field can engage in informal learning situations, test their skills as a means of exercising their craft, gain hands-on experience with systems which would be unobtainable otherwise, and participate on both sides of mentoring and tutorial relationships.

     The Hacker's League would provide an outlet for the creative energies which are otherwise expended making life worse for perceived or imagined enemies through unauthorized entry to systems and other illegal or unethical conduct.  Such energies would be turned toward projects which advance the state of the art, and in a way which undermines the arrogance and exclusivity of the corporate managers which hackers find so tempting a target.

     To the charge that the Hacker's League would become a front for the interests of industry may be raised the defense that by exploiting industry's fear of low-level disorder it would provide an organizing platform for higher-level attack upon the technological underpinnings of the existing structure.  Consider the difference between outcomes had hackers in the 1970's been content to organize politically for access to mainframes. There would have been no personal computer industry, and the power relationships would not have undergone the radical changes brought about by the triumph of open architecture.  One might well have said then that the amateur computer activity was a distraction from the true task of tugging at the sleeve of power, yet we can all see the effects of that activity.

     The Hacker's League could be seen as a guild serving to restrict entry to the membership of the technical elite.  In fact, the League would be far more open than the current system of university education.  It would provide a means of testing to see whether one is suited to the demands of the technology without exacting years of commitment to learning prerequisites.  Within the Hacker's League there would be much more mobility among specialties than exists in university curricula, and the doors would be open to underage entrants and those who come later in life after entrance to a university becomes difficult or impossible.

     Still, the human tendencies which lead toward exclusivity and the formation of cliques will always be with us, and we must bear them in mind as we proceed in conceptualizing and realizing the Hacker's League.  The technology in which we work tends to eliminate the need for centralization, and one of the important outcomes of the League’s development would be the demonstration of the decentralized mode of organization, as noble an exploration as might be contemplated, int he opinion of many.

     After all, the primary challenge is not so much in the hardware, or the physical form of the systems of intercommunication and interaction around which society develops.  The important work is in developing the social forms of use of this technology which forwards the common good as well as that of the individual.  New ways of thinking, as Einstein said, are the urgently needed ingredient for the humanization and survival of society.  The Hacker's League would not only provide a development bed for social innovations involving the use of information technology, but it would empower those innovations through the parallel development of the technology and, most importantly, of the human network through which the technology is made to come alive.

Practice

     The Hacker's League would be membership organization open to nonmembers for certain functions.  It would be organized as a nonprofit educational and scientific organization.  Its publications would be freely available to all interested readers.

     The League would hold periodic local events demonstrating technical achievements of members or chapters, and offering places for individuals outside the League to exhibit or to engage in low-level trade, such as swap meets.  A newcomer would most probably make first contact at such events, and might decide to attend a local chapter meeting.

     Meetings of local chapters would be high in information exchange and low in structure.  Newcomers would be acknowledged and provided with a brief orientation so that they would not feel put off by displays of technical virtuosity or cliquishness.  If the newcomer desired further involvement, there would be a set of course tracks available as suggested paths for establishing, through achievement, one's level of skill.  These might be thought of as Scout Merit Badges, although the name would probably not be used. 

     In the early stages of involvement, the newcomer might interact with a designated instructor who is also working to establish skill in teaching and coaching.  Later, as the newcomer gains skill and established competence, he or she would be recommended for more individual instruction and consultation from more highly skilled mentors.  Such mentoring relationships would be an important feature of the League, both as a means and end.

     The League at the local level would acquire maintain obsolescent equipment which would be operated and improved by the members through development projects proposed from the membership.  Telecommunication resource would also be solicited as donations from carriers, on the none-too-subtle suggestion that the availability of such resource in such a context is conducive to the development of skilled citizens instead of antisocial attackers.  Through this resource the League would maintain its larger structure, which would be a communication-based overlay of networks and ad-hocracies.

     Through these structures conflicting positions could be discussed and debated in a functioning participatory democracy.  Informed plebiscites would be conducted both as a means of determining the sense of the League on issues of importance and as development projects testing the capabilities of information technology under various arrangements of use.  The highest structure of organization would be at the local level, and the administrators at wider levels might be given titles, such as Janitor, which tend to prevent puffery and self-glorification.  Sapiential authority would be fostered within the League as opposed to positional authority.

     The newcomer would progress from establishing his or her level of skill to a process of exploring the available courses of self-development.  It would be possible to propose a specific course different from the recommended courses.  The newcomer would then engage in projects which require the improvement in skill level under the supervision or review of competent skilled members.

     This should be seen as professional development (where the word has no connotation of "earning a livelihood") and since it is a responsibility of all professionals to teach and transmit their skills, the newcomer would along the way be expected to perform as an instructor and later a supervisor and mentor to future newcomers.  Thus, progress in self-development would not be simply a matter of the "neat hacks" one could accomplish, but would require an integration into the society first of hackers, then the broader society.  There is no reason why technologists must rely on others to represent their work to the public or the polity.

     One of the public service functions performed by the members of the Hacker's League (and this performance would be explicitly carried out by the members and not by the "organization") would be consultation on informational security and integrity of communications within everyday society.  Members of the League would provide a service of analysis of proposals, investigations of system misuse and pursuit of abusers which would rest on its own professional foundation rather than serving direct commercial ends which might distort the conclusions of investigations.

     To use a popular metaphor, members of the Hacker’s League might be compared to doctors on the Electronic Frontier, with their own loose medical association to keep quackery at bay and serving a public health function.  Or perhaps the analogy might be to schoolteachers who also write literature and literary criticism, as well as turning out works of art and organizing criticism of the same.  Obviously, this metaphoric space needs work.

     One can expect to better one's material condition through participating in the networks of relationships which would be the Hacker's League, if one has the skill and aptitude to improve one's skills.  If not, it would be no shame to cease participation. An important function of the League would be to encourage the incompetent to go elsewhere without opprobium.  They may well turn up as administrators within industry, and it is in no ones' interest for there to be hostile relations based upon "loser" status.

     In fact, the Hacker's League would be a way to do away with the "winner/loser" dichotomy.  If you try, you win to some degree, and younger members less secure in themselves need to learn this, at times to a desperate degree.  One can take on more than one can handle, be allowed to fail with support from those more experienced, and not incur actual or emotional costs which would otherwise drive one away from such experimentation.  The Hacker's League wouldn't be working without a measurable degree of honestly won failure on the part of its members.

     What types of projects would be undertaken?  Perhaps the development of distributed operating systems suitable for networks of variegated intelligent devices; elegant user front-ends and development environments for intuitive system configuration; pidgin speech (unnatural language) recognition systems; new structures of groupware; possibly neural networks at higher levels. 

     But these are my own conjectures, and what would actually transpire would almost certainly make these guesses look ridiculously quaint and primitive.  Let's give it a chance to happen.