8 People Can Use The Same Msn Dial Up Account
its easy really. want to have an entire family on dial-up with just one bill?
step one. purchase 20 dollar a month subscription to MSN unlimited access dial up. This will include an MSN 9 cd which you will need. With the software installed, fill up your secondary account slots with new users. Make sure you pick @msn if it gives you the choice, hotmail email addresses will not work..
say the secondary account is johnsmith@msn.com type in the Dial up connection
USER : MSN/johnsmith
PASS: ******* (whatever)
connect to your local msn phone number and the other people you gave secondary accounts to will be able to do the same, while you are connected. Its a sweet deal considering everyone is paying about 2 bucks a month for internet access, especially if you cannot get broadband. if you wanted to sell off the access to people you could actually make money doing this.. but i do not suggest it.
I used to be an msn tech and this was a little known secret even to most of the employees.
After you do this you do not need the software any more. I would suggest keeping it on to micromanage everyone else's accounts. and for the simple fact that if they don't pitch in, cut them off.
I'm on broadband now so i don't care if i tell you my little secret. anyone else knew of this?
Thursday, October 25, 2012
Top 15 Security/Hacking Tools & Utilities
Top 15 Security/Hacking Tools & Utilities
1.
Nmap
I
think everyone has heard of this one, recently evolved into the 4.x series.
Nmap
(“Network Mapper”) is a free open source utility for network exploration or
security auditing. It was designed to rapidly scan large networks, although it
works fine against single hosts. Nmap usesraw IP packets in novel ways to
determine what hosts are available on the network, what services (application
name and version) those hosts are offering, what operating systems (and OS
versions) they are running, what type of packet filters/firewalls are in use,
and dozens of other characteristics. Nmap runs on most types of computers and
both console and graphical versions are available. Nmap is free and open
source.
Can
be used by beginners (-sT) or by pros alike (–packet trace). A very versatile
tool, once you fully understand the results.
Get
Nmap Here
2.
Nessus Remote Security Scanner
Recently
went closed source, but is still essentially free. Works with a client-server
framework.
Nessus
is the world’s most popular vulnerability scanner used in over 75,000
organizations world-wide. Many of the world’s largest organizations are
realizing significant cost savings by using Nessus to audit business-critical
enterprise devices and applications.
Get
Nessus Here
3.
John the Ripper
Yes,
JTR 1.7 was recently released !
John
the Ripper is a fast password cracker, currently available for many flavors of
Unix (11 are officially supported, not counting different architectures), DOS,
Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords.
Besides several crypt(3) password hash types most commonlyfound on various Unix
flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003
LM hashes, plus several more with contributed patches.
4.
Nikto
Nikto
is an Open Source (GPL) web server scanner which performs comprehensive tests
against web servers for multiple items, including over 3200 potentially
dangerous files/CGIs, versions on over 625 servers, and version specific
problems on over 230 servers. Scan items and plugins are frequently updated and
can be automatically updated (if desired).
Nikto
is a good CGI scanner, there are some other tools that go well with Nikto
(focus on http fingerprinting or Google hacking/info gathering etc, another
article for just those).
5.
SuperScan
Powerful
TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly
popular Windows port scanning tool, SuperScan.
If
you need an alternative for nmap on Windows witha decent interface, I suggest
you check this out, it’s pretty nice.
6.
p0f
P0f
v2 is a versatile passive OS fingerprinting tool. P0fcan identify the operating
system on:
–
machines that connect to your box (SYN mode),
–
machines you connect to (SYN+ACK mode),
–
machine you cannot connect to (RST+ mode),
–
machines whose communications you can observe.
Basically
it can fingerprint anything, just by listening, itdoesn’t make ANY active
connections to the target machine.
7.
Wireshark (Formely Ethereal)
Wireshark
is a GTK+-based network protocol analyzer,or sniffer, that lets you capture and
interactively browse the contents of network frames. The goal of the project is
to create a commercial-quality analyzer for Unix and to give Wireshark features
that are missing from closed-source sniffers.
Works
great on both Linux and Windows (with a GUI), easy to use and can reconstruct
TCP/IP Streams! Will do a tutorial on Wireshark later.
8.
Yersinia
Yersinia
is a network tool designed to take advantageof some weakeness in different
Layer 2 protocols. It pretends to be a solid framework for analyzing and
testing the deployed networks and systems. Currently, the following network
protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery
Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration
Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch
Link Protocol (ISL), VLAN Trunking Protocol (VTP).
The
best Layer 2 kit there is.
9.
Eraser
Eraser
is an advanced security tool (for Windows ), which allows you to completely
remove sensitive datafrom your hard drive by overwriting it several times with
carefully selected patterns. Works with Windows95, 98, ME, NT, 2000, XP and
DOS. Eraser is Free software and its source code is released under GNU General
Public License.
An
excellent tool for keeping your data really safe, if you’ve deleted it..make
sure it’s really gone, you don’t want it hanging around to bite you in the ass.
10.
PuTTY
PuTTY
is a free implementation of Telnet and SSH for Win32 and Unix platforms, along
with an xterm terminal emulator. A must have for any h4x0r wanting to telnet or
SSH from Windows without having to use the crappy default MS command line
clients.
11.
LCP
Main
purpose of LCP program is user account passwords auditing and recovery in Windows
NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute force
session distribution, Hashes computing.
A
good free alternative to L0phtcrack.
LCP
was briefly mentioned in our well read Rainbow Tables and RainbowCrack article.
12.
Cain and Abel
My
personal favourite for password cracking of any kind.
Cain
& Abel is a password recovery tool for Microsoft Operating Systems. It
allows easy recovery of various kind of passwords by sniffing the network,
cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis
attacks, recording VoIP conversations, decoding scrambled passwords, revealing
password boxes, uncovering cached passwords and analyzing routing protocols.
The program does not exploit any software vulnerabilities or bugs that could
not be fixed with little effort.
13.
Kismet
Kismet
is an 802.11 layer2 wireless network detector,sniffer, and intrusion detection
system. Kismet will work with any wireless card which supports raw monitoring
(rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
A
good wireless tool as long as your card supports rfmon (look for an orinocco
gold).
14.
NetStumbler
Yes
a decent wireless tool for Windows! Sadly not as powerful as it’s Linux
counterparts, but it’s easy to use and has a nice interface, good for the
basics of war-driving.
NetStumbler
is a tool for Windows that allows you to detect Wireless Local Area Networks
(WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
*.
Verify that your network is set up the way you intended.
*.
Find locations with poor coverage in your WLAN.
*.
Detect other networks that may be causing interference on your network.
*.
Detect unauthorized “rogue” access points in your workplace.
*.
Help aim directional antennas for long-haul WLAN links.
*.
Use it recreationally for WarDriving.
Get
NetStumbler Here
15.
hping
To
finish off, something a little more advanced if you want to test your TCP/IP
packet monkey skills.
hping
is a command-line oriented TCP/IP packet assembler/analyzer. The interface is
inspired to the ping unix command, but hping isn’t only able to send ICMP echo
requests. It supports TCP, UDP, ICMP andRAW-IP protocols, has a traceroute
mode, the ability to send files between a covered channel, and many other
features.
Get
hping Here
Yah
I’ve stayed away from commercial products in this article, perhaps I’ll cover
those another day.
Digg
This Article
You
can also check out the Top 10 Security Live CDs for Pen-Testing, Forensics and
Recovery Here.
Saturday, October 20, 2012
Theories of HACKER by KITOMARIAN
Theory KITOMARIAN
HACKER’s
LEAGUE
The Hacker's League is modeled loosely
after the American Radio Relay League (A.R.R.L.), an organization of
technological adventurers of the Edwardian period. In its heyday, the radio amateurs moved from
being nuisances to being important contributors to the development of radio
technology. In a field which demanded
governmental regulation for orderly operation, the A.R.R.L. represented the
interests of amateurs in the councils of government and organized ongoing
educational activities through which newcomers to the field could learn not
only the technology involved, but also the human interactions which connect the
technology to the outside world.
The most recent triumph of radio amateurs
has been the development of packet radio, which has recently been adopted by
Motorola as the basis for its "wireless local loop" for wireless
telephone operation. Thanks to the
amateurs, it was developed and tried out in an open environment outside of
commercial pressures which tend toward secrecy and exclusion.
In the area of computers and
telecommunication, there are several parallels between today's hackers and the
radio amateurs of 1915. Hackers are seen
by the respectable technological players as nuisances capable of doing great
damage and generally without redeeming qualitites. They were indistinguishable from rogue
broadcasters who trampled on other signals in their urge to cover the longest
distance. In the corridors of power
there was a movement toward outlawing them.
Nontechnical people did not know quite what to think about this problem
and its suggested solution.
The A.R.R.L. was more than a lobbying
organization, though. It provided a
means for the mutual education essential to the growth of any technology, a
route of entry open to all comers, and a social scene to accompany the
technological forum. Through the
A.R.R.L. green kids could encounter grizzled old timers who would be
unapproachable in their positions the industry.
At field days and other events the cameraderie of being explorers
overcame the barriers of class and position as well as those engendered by
commercial competition. Networking was
possible in the amateur environment which forwarded the operation in the
commercial and professional environments.
The concept of the Hacker's League is
similar but different as befits the different nature of the technology. The aim is to provide a situation in which
otherwise unqualified entrants to the field can engage in informal learning
situations, test their skills as a means of exercising their craft, gain
hands-on experience with systems which would be unobtainable otherwise, and
participate on both sides of mentoring and tutorial relationships.
The Hacker's League would provide an
outlet for the creative energies which are otherwise expended making life worse
for perceived or imagined enemies through unauthorized entry to systems and
other illegal or unethical conduct. Such
energies would be turned toward projects which advance the state of the art,
and in a way which undermines the arrogance and exclusivity of the corporate
managers which hackers find so tempting a target.
To the charge that the Hacker's League
would become a front for the interests of industry may be raised the defense
that by exploiting industry's fear of low-level disorder it would provide an
organizing platform for higher-level attack upon the technological
underpinnings of the existing structure.
Consider the difference between outcomes had hackers in the 1970's been
content to organize politically for access to mainframes. There would have been
no personal computer industry, and the power relationships would not have
undergone the radical changes brought about by the triumph of open
architecture. One might well have said
then that the amateur computer activity was a distraction from the true task of
tugging at the sleeve of power, yet we can all see the effects of that
activity.
The Hacker's League could be seen as a
guild serving to restrict entry to the membership of the technical elite. In fact, the League would be far more open
than the current system of university education. It would provide a means of testing to see
whether one is suited to the demands of the technology without exacting years
of commitment to learning prerequisites.
Within the Hacker's League there would be much more mobility among
specialties than exists in university curricula, and the doors would be open to
underage entrants and those who come later in life after entrance to a
university becomes difficult or impossible.
Still, the human tendencies which lead
toward exclusivity and the formation of cliques will always be with us, and we
must bear them in mind as we proceed in conceptualizing and realizing the
Hacker's League. The technology in which
we work tends to eliminate the need for centralization, and one of the
important outcomes of the League’s development would be the demonstration of
the decentralized mode of organization, as noble an exploration as might be
contemplated, int he opinion of many.
After all, the primary challenge is not so
much in the hardware, or the physical form of the systems of intercommunication
and interaction around which society develops.
The important work is in developing the social forms of use of this technology
which forwards the common good as well as that of the individual. New ways of thinking, as Einstein said, are
the urgently needed ingredient for the humanization and survival of society. The Hacker's League would not only provide a
development bed for social innovations involving the use of information
technology, but it would empower those innovations through the parallel
development of the technology and, most importantly, of the human network
through which the technology is made to come alive.
Practice
The Hacker's League would be membership
organization open to nonmembers for certain functions. It would be organized as a nonprofit
educational and scientific organization.
Its publications would be freely available to all interested readers.
The League would hold periodic local
events demonstrating technical achievements of members or chapters, and
offering places for individuals outside the League to exhibit or to engage in
low-level trade, such as swap meets. A
newcomer would most probably make first contact at such events, and might
decide to attend a local chapter meeting.
Meetings of local chapters would be high
in information exchange and low in structure.
Newcomers would be acknowledged and provided with a brief orientation so
that they would not feel put off by displays of technical virtuosity or
cliquishness. If the newcomer desired
further involvement, there would be a set of course tracks available as
suggested paths for establishing, through achievement, one's level of
skill. These might be thought of as
Scout Merit Badges, although the name would probably not be used.
In the early stages of involvement, the
newcomer might interact with a designated instructor who is also working to
establish skill in teaching and coaching.
Later, as the newcomer gains skill and established competence, he or she
would be recommended for more individual instruction and consultation from more
highly skilled mentors. Such mentoring
relationships would be an important feature of the League, both as a means and
end.
The League at the local level would
acquire maintain obsolescent equipment which would be operated and improved by
the members through development projects proposed from the membership. Telecommunication resource would also be
solicited as donations from carriers, on the none-too-subtle suggestion that
the availability of such resource in such a context is conducive to the
development of skilled citizens instead of antisocial attackers. Through this resource the League would
maintain its larger structure, which would be a communication-based overlay of
networks and ad-hocracies.
Through these structures conflicting
positions could be discussed and debated in a functioning participatory
democracy. Informed plebiscites would be
conducted both as a means of determining the sense of the League on issues of
importance and as development projects testing the capabilities of information
technology under various arrangements of use.
The highest structure of organization would be at the local level, and
the administrators at wider levels might be given titles, such as Janitor,
which tend to prevent puffery and self-glorification. Sapiential authority would be fostered within
the League as opposed to positional authority.
The newcomer would progress from
establishing his or her level of skill to a process of exploring the available
courses of self-development. It would be
possible to propose a specific course different from the recommended
courses. The newcomer would then engage
in projects which require the improvement in skill level under the supervision
or review of competent skilled members.
This should be seen as professional
development (where the word has no connotation of "earning a
livelihood") and since it is a responsibility of all professionals to
teach and transmit their skills, the newcomer would along the way be expected
to perform as an instructor and later a supervisor and mentor to future
newcomers. Thus, progress in
self-development would not be simply a matter of the "neat hacks" one
could accomplish, but would require an integration into the society first of
hackers, then the broader society. There
is no reason why technologists must rely on others to represent their work to
the public or the polity.
One of the public service functions
performed by the members of the Hacker's League (and this performance would be
explicitly carried out by the members and not by the "organization")
would be consultation on informational security and integrity of communications
within everyday society. Members of the
League would provide a service of analysis of proposals, investigations of
system misuse and pursuit of abusers which would rest on its own professional
foundation rather than serving direct commercial ends which might distort the
conclusions of investigations.
To use a popular metaphor, members of the
Hacker’s League might be compared to doctors on the Electronic Frontier, with
their own loose medical association to keep quackery at bay and serving a
public health function. Or perhaps the
analogy might be to schoolteachers who also write literature and literary
criticism, as well as turning out works of art and organizing criticism of the
same. Obviously, this metaphoric space
needs work.
One can expect to better one's material
condition through participating in the networks of relationships which would be
the Hacker's League, if one has the skill and aptitude to improve one's
skills. If not, it would be no shame to
cease participation. An important function of the League would be to encourage
the incompetent to go elsewhere without opprobium. They may well turn up as administrators
within industry, and it is in no ones' interest for there to be hostile
relations based upon "loser" status.
In fact, the Hacker's League would be a
way to do away with the "winner/loser" dichotomy. If you try, you win to some degree, and
younger members less secure in themselves need to learn this, at times to a
desperate degree. One can take on more
than one can handle, be allowed to fail with support from those more
experienced, and not incur actual or emotional costs which would otherwise
drive one away from such experimentation.
The Hacker's League wouldn't be working without a measurable degree of
honestly won failure on the part of its members.
What types of projects would be
undertaken? Perhaps the development of
distributed operating systems suitable for networks of variegated intelligent
devices; elegant user front-ends and development environments for intuitive
system configuration; pidgin speech (unnatural language) recognition systems;
new structures of groupware; possibly neural networks at higher levels.
But these are my own conjectures, and what
would actually transpire would almost certainly make these guesses look
ridiculously quaint and primitive. Let's
give it a chance to happen.
Subscribe to:
Posts (Atom)