Wednesday 24 July 2013

Google Has Introduced chromecast

Today Google Released its chromecast device with which you can  bring content from your device like Android , IOS and chrome to your TV SCREEN .

Google announced  this device with a name of chromecast which run a simplified version of chrome  and  also connect to tv with the help of HDMI PORT
There are various benefit of this devices .
this device will allow to the users to send wirelessley content from various services like Pandora,google music and  youtube , Netflix from various device to their tv screen

Tuesday 5 June 2012

Extract hosts/subdomains, ip or emails for a specific domain with Google search.

Goohost
Goohost is a simple shell script written by Watakushi that extracts hosts/subdomains, ip or emails for a specific domain with Google search.
 Step 1 : Open the Backtrack
and type : 
mkdir -p /pentest/enumeration/google/goohost/
cd /pentest/enumeration/google/goohost
wget http://dl. dropbox.com/u/10761700/goohost.sh
chmod +x goohost.sh
./goohost.sh -m ip -t fbi.gov
./goohost.sh -m host -t fbi.gov
./goohost.sh -m mail -t fbi.gov
Enjoy :)
video [http://www.youtube.com/watch?feature=player_embedded&v=vBbK-DGA_Hs ] 

Thursday 24 May 2012

CEHv7 Introduction To Ethical Hacking

This is the introduction To Ethical Hacking You Must Need To Know. Befamiliar with everything which is listed here .


Understand The essential hacker terminology.  
Make sure you’re familiar with and can define the terms  :
Threat, 
Exploit, 
Vulnerability, 
target of evaluation (TOE), 
and attack.



Understand the difference between ethical hackers and crackers.
 Ethical hackers are security professionals who act defensively. Crackers are malicious hackers who choose to inflict damage on a target system.


Know the classes of hackers. It’s critical to know the differences among black-hat, whitehat, and gray-hat hackers for the exam. Know who the good guys are and who the bad guys are in the world of hacking.
White hats are the good guys, the ethical hackers who use their hacking skills for defensive
purposes.
Black hats are the bad guys: the malicious hackers or crackers who use their skills for illegal
or malicious purposes
Gray hats are hackers who may work offensively or defensively, depending on the situation.
This is the dividing line between hacker and cracker.

Know the phases of hacking. 
  1. Passive and active reconnaissance, footprinting [the first step of ethcial hacking ] 
  2. Scanning or Port scanning and enumeration  [the second step of ethical hacking ]
  3. Gaining access [is when the real hacking takes place.]
  4. Maintaining access,
  5. and Covering tracks
    are the five phases of hacking.
Know the order of the phases and what happens during each phase.


Be aware of the types of attacks
Understand the differences between active and passive
and inside and outside attacks. 
-> The ability to be detected is the difference between active
and passive attacks. 
-> The location of the attacker is the difference between inside and outside
attacks.


Know the ethical hacking types
Hackers can attack the network from a remote network, a remote dial-up network, or a local network, or through social engineering, stolen equipment, or physical access.


Understand the security testing types
Ethical hackers can test a network using :
Black-box,
White-box, 
or Gray-box testing techniques.


Black-box testing involves performing a security evaluation and testing with no
prior knowledge of the network infrastructure or system to be tested.


White-box testing involves performing a security evaluation and testing with
complete knowledge of the network infrastructure such as a network administrator would
have.
Gray-box testing involves performing a security evaluation and testing internally.
Testing examines the extent of access by insiders within the network.


Know the contents of an ethical hacking report. 
An ethical hacking report contains information on the hacking activities performed, network or system vulnerabilities discovered, and countermeasures that should be implemented.


Know the legal implications involved in hacking. 
The Cyber Security Enhancement Act of 2002 can be used to prosecute ethical hackers who recklessly endanger the lives of others.
Be aware of the laws and punishment applicable to computer intrusion.


This is the introduction To Ethical Hacking You Must Need To Know. Befamiliar with everything which is listed here .

Wednesday 23 May 2012

--- | Certified Ethical Hacker Series |--- CEHv7 Course Outline

CEHv7 Course Overview 

Objective Behind  Starting These Series is to Make The Basic Concept Easy To Understand 
Ethical Hacking Cehv7 Course Overview Presentation
View more PowerPoint from Prabh Jeet



This is My First Video .Totaly Unexperienced .Now No More Oral Presentation . Next There will be  only Demo  huhhhhh

Hope you May Like This Video :)                                                      


----------------------------------------------

      

CEHv7 Course Outline --- | Certified Ethical Hacker Series |--- from pabhjeet on Vimeo.
Objective Behind Starting These Series is to Make The Basic Concept Easy To Understand


Module 01: Introduction to Ethical        Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: System Hacking
 Module 06: Trojans and Backdoors
Module 07: Viruses and Worms
Module 08: Sniffers
Module 09: Social Engineering
Module 10: Denial of Service
 Module 11: Session Hijacking
Module 12: Hijacking Webservers
Module 13: Hacking Web Applications
Module 14: SQL Injection
Module 15: Hacking Wireless Networks
Module 16: Evading IDS, Firewalls, and Honeypots
Module 17: Buffer Overflow
Module 18: Cryptography
Module 19: Penetration Testing
___________________________________

Download These Some Resource :
CEH-Official-Certified-ReviewGuide-Sybex.pdf  By Kimberly Graves

Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf
Cehv6 Course Material
All Slides Of CEHv7 
Hacking Tool Tutorials,  There is one ebook that should be used as a reference.
Pass of Hacking Tool Tutorials is : www.free-7.net 

Build Your Own Security Lab 

Build Your Own Security Lab: A Field Guide for Network Testing

Devices for lab  
-------------------------------------------------------------------------------------
Note : Try to read More And More Bcoz Cehv7 is Expensive Exam So Be Prepare yourself Completely and Make Basic Concept clear Before Taking this Exam

Tuesday 22 May 2012

--- | Certified Ethical Hacker Series |---



--- | Certified Ethical Hacker Series |---
______________________________________

Hello Guys This Is Prabh jeet Now Today My Exam Is Over
Let Us Start this Task To which we have initiate in Our Page

Fisrt of All to be a professional ethical Hackers we require
  1. Motivation
  2. Dedication 
  3. Initiative 
  4. smartness 




No Hard work if u r doing hard work u r wrong .

Goal Of Ethical Hacker
There's been an increasing demand for ethical hackers (also known as white hat hackers) as they protect the computer systems from dangerous intrusions. The goal of the ethical hacker work is to
test a corporation’s network and systems defense under a contract and identify weaknesses in security configurations and operation procedures.
Ethical hackers are technically skilled IT pros with a strong desire to solve problems and prevent malicious hackers from causing damage to network systems.


What is the EC-Council certification all about ?
 EC-Council offers the popular Certified ethical hacker (CEH) and Computer Hacking Forensic   Investigator (CHFI) certifications

What Exams You Must Pass to Become CEH ?
You must pass only one exam: 312-50 (known also as EC0-350).
If you attend the official training then you do not need any requirements.
If you decide to learn by yourself you need to:

Have at least two years of documented experience with IT security
Pay $100.0 (Prometric APTC Eligibility Application Fee or VUE Eligibility Application Fee) and
send an email to EC-Council for approval Submit a completed Exam Eligibility Form
Upon approval, EC-Council will send you an eligibility voucher number, which you can use to register to the exam

How Much Does the CEH Exam Cost

The exam is expensive and costs $500 plus taxes.

What is the criteria to be eligible for CEH ?

CEH is an entry-level InfoSec certification. As such, there are no pre-requisites defined for one to be eligible. However, due to the nature of the content involved and the skills one achieve after completing this cert, EC-Council has to make sure that eligible candidates oblige to a code-of-conduct. For ensuring this,  they have laid out certain must-haves/todos. Anyone willing to take the cert. exam has to have a minimum of 2 years  of work experience or else one has to take the official CEH training at one of the ATCs (EC-Council Accredited Training Centers)

Exam fees for the certification is $500. If you can skip the training part (by showing a proof of min. 2 yrs work experience  from your employer) you can register for the exam at any of the Prometric centres available at your vicinity. Else if you have to  take the training, then you will have to register for it at one of the ATCs and whatever amount apart from $500 you pay to them goes into the their pocket. They charge it for the training and official prep materials cost.

Note: This Course Is also for Those Who have Interest in understanding various aspects how the hackers works and how to protect themself from various types of attacks which are happening on internet. 


HOW MUCH TIME DOES iT Will take To complete the Course 
Time to prepare for this certification will vary depending upon your understanding of the basic concepts and your ability to grasp  new ones.
To cleared this cert with a dedicated preparation We will here take  almost 40 to 45  days. keep reading and updating yourself and you will be ready for it soon enough.

Before Starting You Must Be Some Knowledge About 

1. You Must Be have some understanding of programming knowledge such as C, or Java. and   Understanding of the basics of HTML,PHP,MYSQL . These programming languages
can be learned by taking formal programming courses and reading books. It will help you to read and write code.

2. Learn the UNIX operating system as it is regarded as the original operating system built by hackers.
   Also learn about Windows and Mac OS.

3.You must be the Basic understanding of hardware or software.

4. you must be the understanding of COMPUTER NETWORKS OSI Reference mode TCP/IP    Reference models  ,UNDERSTANDING OF ALL LAYERS ,Wireless Transmission ,Communication Satellites , DSL Technology , Basics of internetworking  ,Ip addressing, Subnetting , Routing

CEH highly focuses on tools and expects you to have a proper understanding of their capabilities. If you have not, then set up a test lab. Use VirtualBox if
you have to. Try various tools included within BT5 on a WinXP SP2 victim. v7 focuses on Nmap, Wireshark, and Hping.


So WE HAVE TAKEN THE TASK TO COMPLETE THIS COURSE IN OUR PAGE  to which we will here complete in few days .we will provide here you tools,pdf,docs,usefull links
and also make a video tutorials where it is required .
Be in touch and Complete the target CEHv7 .

Download The Syllabus To which we cover here
Download This Pdf For Lab Setup 

I am uploading some ebooks and other usefull pdf . After some time i will provide you the link Also Download it .
And i recommended you also chk this link to Remove Your Doubt.

Hope U like This My small initiative for my page on facebook.

Be ready Guys I want next Tutorial By you Under the Topic Name : Ethics and Legality


--| Be a Hacker Not Victim |--



Friday 18 May 2012

[Adsense - The Dollar Producing Factory]


Get approved for Google Adsense 
Are you get disapprove many time ??
 so  Lets us start heres the trick to get approved for Get Google Adsense  :)

First Of all Note that :

You don't need a website, blogspot or need of content. And more over it will be legit and it's fast and 100% legal account :) .


Since last week, Google was repeatedly disapproving my account, eventhough I met with all their terms.
But Now at last coming to the point that is nowadays the adsense is not approving any
application for the Pubilsher accounts .
Actually Adsense has shrink the liabilities of publishers from the following countries. Like 
"China, Sri lanka, Pakistan, Bangladesh , Brazil, India, Indonesia, Vietnam, Malaysia, Philippines,and Thailand "
Google will not going to approve your application Even if you meet up  all the conditions of google Adsense policy :( so sad na .
So Dont worry i have also faced the same problem in my past i have filled adsense application about 110-130 times but still all was in vain :(


So at last i have worked lot on the algorithms of the google and make such vast study that how to get the adsense account approved within less then 24 hours..yes its not a joke...its reality...
Most of You everyone know me .


so i want to share these all with you but at minimum cost .So i must say that if any body ask you for money for adsense account approval   then dont hesitate to give him Money even because you can recover All amount with in one month or in two and the rest income is yours only....so think big ;)


so now i want to help others also by this means so if any body is intresting then just follow the step :-
Mail me at " vrrock6@gmail.com "
Make your website a earning source with the help of Google Adsense


Don't Forget That "Adsense is - The Dollar Producing Factory" So be the part of that company and earn and more and more !!!!!!


Special Offer For Student Like Me --- Get a Free E-Book to boom Your earning on Google Adsense with adsense on your demand on Adsense Account so hurry Up what the Hell you Wating For.....!!!!

For Adsense account Contact Me at :---
 Vrrock6@gmail.com or contact me IN  www.facebook.com/A1KrAm


**Disclaimer -: We are not from the google side.And once you have taken the account or our service then dont ever think to ask for REFUND the money So Place The oder Accordingly *







Sunday 15 April 2012

Intitle:"index.of" [Quick Tips To Search Google Like a Pro]



Search Google Like Geek
This Post is for to Teach how to search on google like pro.



So let us start From Basic


Example: "internet marketing"


Exclude Words:
Lets say you want to search for content about internet marketing, but you want to exclude any results that contain the term advertising. To do this, simply use the "-" sign in front of the word you want to exclude.


Example : Search: internet marketing -advertising



Site Specific Search :
Often, you want to search a specific website for content that matches a certain phrase. Even if the site doesn’t support a built-in search feature, you can use Google to search the site for your term. Simply use the "site:somesite.com" modifier.


Example: "internet marketing" site:www.smallbusinesshub.com


Download :
There is so many fileserver just include them in your search 


For example : Site:mediafire.com books name




Similar Words and Synonyms:
Let’s say you are want to include a word in your search, but want to include results that contain similar words or synonyms. To do this, use the "~" in front of the word.


Example: "internet marketing" ~professional


Specific Document Types:
If you’re looking to find results that are of a specific type, you can use the modifier "filetype:". For example, you might want to find only PowerPoint presentations related to internet marketing.


Example: "internet marketing" filetype:ppt


This OR That:
By default, when you do a search, Google will include all the terms specified in the search. If you are looking for any one of one or more terms to match, then you can use the OR operator. (Note: The OR has to be capitalized).


Example: internet marketing OR advertising


Phone Listing:
Let’s say someone calls you on your mobile number and you don’t know how it is. If all you have is a phone number, you can look it up on Google using the phonebook feature.


Example: phonebook:617-555-1212 (note: the provided number does not work – you’ll have to use a real number to get any results).


Area Code Lookup:
If all you need to do is to look-up the area code for a phone number, just enter the 3-digit area code and Google will tell you where it’s from.


Example: 617


Numeric Ranges:
This is a rarely used, but highly useful tip. Let’s say you want to find results that contain any of a range of numbers. You can do this by using the X..Y modifier (in case this is hard to read, what’s between the X and Y are two periods. This type of search is useful for years (as shown below), prices or anywhere where you want to provide a series of numbers.


Example: president 1940..1950




Calculator:
The next time you need to do a quick calculation, instead of bringing up the Calculator applet, you can just type your expression in to Google.


Example: 48512 * 1.02


Word Definitions:
If you need to quickly look up the definition of a word or phrase, simply use the "define:" command.


Example: define:plethora


This is some Basic For Student Who Always Tell me to give me some resource ,pdf ,ebook videos , links ..


Note:There is some Tools Made By me For Advance Hacking: Google Enumeration Will share with You.


For Advance Google Searching You Must need to Download This Book Name Google Hacking For Penetration Testers 


Download :Simply Type in Google  site:mediafire.com Google Hacking 




Thanks :)




Our Next Post Will come Like How To search Google Like Geek [papa]