Tuesday 5 June 2012

Extract hosts/subdomains, ip or emails for a specific domain with Google search.

Goohost
Goohost is a simple shell script written by Watakushi that extracts hosts/subdomains, ip or emails for a specific domain with Google search.
 Step 1 : Open the Backtrack
and type : 
mkdir -p /pentest/enumeration/google/goohost/
cd /pentest/enumeration/google/goohost
wget http://dl. dropbox.com/u/10761700/goohost.sh
chmod +x goohost.sh
./goohost.sh -m ip -t fbi.gov
./goohost.sh -m host -t fbi.gov
./goohost.sh -m mail -t fbi.gov
Enjoy :)
video [http://www.youtube.com/watch?feature=player_embedded&v=vBbK-DGA_Hs ] 

Thursday 24 May 2012

CEHv7 Introduction To Ethical Hacking

This is the introduction To Ethical Hacking You Must Need To Know. Befamiliar with everything which is listed here .


Understand The essential hacker terminology.  
Make sure you’re familiar with and can define the terms  :
Threat, 
Exploit, 
Vulnerability, 
target of evaluation (TOE), 
and attack.



Understand the difference between ethical hackers and crackers.
 Ethical hackers are security professionals who act defensively. Crackers are malicious hackers who choose to inflict damage on a target system.


Know the classes of hackers. It’s critical to know the differences among black-hat, whitehat, and gray-hat hackers for the exam. Know who the good guys are and who the bad guys are in the world of hacking.
White hats are the good guys, the ethical hackers who use their hacking skills for defensive
purposes.
Black hats are the bad guys: the malicious hackers or crackers who use their skills for illegal
or malicious purposes
Gray hats are hackers who may work offensively or defensively, depending on the situation.
This is the dividing line between hacker and cracker.

Know the phases of hacking. 
  1. Passive and active reconnaissance, footprinting [the first step of ethcial hacking ] 
  2. Scanning or Port scanning and enumeration  [the second step of ethical hacking ]
  3. Gaining access [is when the real hacking takes place.]
  4. Maintaining access,
  5. and Covering tracks
    are the five phases of hacking.
Know the order of the phases and what happens during each phase.


Be aware of the types of attacks
Understand the differences between active and passive
and inside and outside attacks. 
-> The ability to be detected is the difference between active
and passive attacks. 
-> The location of the attacker is the difference between inside and outside
attacks.


Know the ethical hacking types
Hackers can attack the network from a remote network, a remote dial-up network, or a local network, or through social engineering, stolen equipment, or physical access.


Understand the security testing types
Ethical hackers can test a network using :
Black-box,
White-box, 
or Gray-box testing techniques.


Black-box testing involves performing a security evaluation and testing with no
prior knowledge of the network infrastructure or system to be tested.


White-box testing involves performing a security evaluation and testing with
complete knowledge of the network infrastructure such as a network administrator would
have.
Gray-box testing involves performing a security evaluation and testing internally.
Testing examines the extent of access by insiders within the network.


Know the contents of an ethical hacking report. 
An ethical hacking report contains information on the hacking activities performed, network or system vulnerabilities discovered, and countermeasures that should be implemented.


Know the legal implications involved in hacking. 
The Cyber Security Enhancement Act of 2002 can be used to prosecute ethical hackers who recklessly endanger the lives of others.
Be aware of the laws and punishment applicable to computer intrusion.


This is the introduction To Ethical Hacking You Must Need To Know. Befamiliar with everything which is listed here .

Wednesday 23 May 2012

--- | Certified Ethical Hacker Series |--- CEHv7 Course Outline

CEHv7 Course Overview 

Objective Behind  Starting These Series is to Make The Basic Concept Easy To Understand 
Ethical Hacking Cehv7 Course Overview Presentation
View more PowerPoint from Prabh Jeet



This is My First Video .Totaly Unexperienced .Now No More Oral Presentation . Next There will be  only Demo  huhhhhh

Hope you May Like This Video :)                                                      


----------------------------------------------

      

CEHv7 Course Outline --- | Certified Ethical Hacker Series |--- from pabhjeet on Vimeo.
Objective Behind Starting These Series is to Make The Basic Concept Easy To Understand


Module 01: Introduction to Ethical        Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: System Hacking
 Module 06: Trojans and Backdoors
Module 07: Viruses and Worms
Module 08: Sniffers
Module 09: Social Engineering
Module 10: Denial of Service
 Module 11: Session Hijacking
Module 12: Hijacking Webservers
Module 13: Hacking Web Applications
Module 14: SQL Injection
Module 15: Hacking Wireless Networks
Module 16: Evading IDS, Firewalls, and Honeypots
Module 17: Buffer Overflow
Module 18: Cryptography
Module 19: Penetration Testing
___________________________________

Download These Some Resource :
CEH-Official-Certified-ReviewGuide-Sybex.pdf  By Kimberly Graves

Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf
Cehv6 Course Material
All Slides Of CEHv7 
Hacking Tool Tutorials,  There is one ebook that should be used as a reference.
Pass of Hacking Tool Tutorials is : www.free-7.net 

Build Your Own Security Lab 

Build Your Own Security Lab: A Field Guide for Network Testing

Devices for lab  
-------------------------------------------------------------------------------------
Note : Try to read More And More Bcoz Cehv7 is Expensive Exam So Be Prepare yourself Completely and Make Basic Concept clear Before Taking this Exam

Tuesday 22 May 2012

--- | Certified Ethical Hacker Series |---



--- | Certified Ethical Hacker Series |---
______________________________________

Hello Guys This Is Prabh jeet Now Today My Exam Is Over
Let Us Start this Task To which we have initiate in Our Page

Fisrt of All to be a professional ethical Hackers we require
  1. Motivation
  2. Dedication 
  3. Initiative 
  4. smartness 




No Hard work if u r doing hard work u r wrong .

Goal Of Ethical Hacker
There's been an increasing demand for ethical hackers (also known as white hat hackers) as they protect the computer systems from dangerous intrusions. The goal of the ethical hacker work is to
test a corporation’s network and systems defense under a contract and identify weaknesses in security configurations and operation procedures.
Ethical hackers are technically skilled IT pros with a strong desire to solve problems and prevent malicious hackers from causing damage to network systems.


What is the EC-Council certification all about ?
 EC-Council offers the popular Certified ethical hacker (CEH) and Computer Hacking Forensic   Investigator (CHFI) certifications

What Exams You Must Pass to Become CEH ?
You must pass only one exam: 312-50 (known also as EC0-350).
If you attend the official training then you do not need any requirements.
If you decide to learn by yourself you need to:

Have at least two years of documented experience with IT security
Pay $100.0 (Prometric APTC Eligibility Application Fee or VUE Eligibility Application Fee) and
send an email to EC-Council for approval Submit a completed Exam Eligibility Form
Upon approval, EC-Council will send you an eligibility voucher number, which you can use to register to the exam

How Much Does the CEH Exam Cost

The exam is expensive and costs $500 plus taxes.

What is the criteria to be eligible for CEH ?

CEH is an entry-level InfoSec certification. As such, there are no pre-requisites defined for one to be eligible. However, due to the nature of the content involved and the skills one achieve after completing this cert, EC-Council has to make sure that eligible candidates oblige to a code-of-conduct. For ensuring this,  they have laid out certain must-haves/todos. Anyone willing to take the cert. exam has to have a minimum of 2 years  of work experience or else one has to take the official CEH training at one of the ATCs (EC-Council Accredited Training Centers)

Exam fees for the certification is $500. If you can skip the training part (by showing a proof of min. 2 yrs work experience  from your employer) you can register for the exam at any of the Prometric centres available at your vicinity. Else if you have to  take the training, then you will have to register for it at one of the ATCs and whatever amount apart from $500 you pay to them goes into the their pocket. They charge it for the training and official prep materials cost.

Note: This Course Is also for Those Who have Interest in understanding various aspects how the hackers works and how to protect themself from various types of attacks which are happening on internet. 


HOW MUCH TIME DOES iT Will take To complete the Course 
Time to prepare for this certification will vary depending upon your understanding of the basic concepts and your ability to grasp  new ones.
To cleared this cert with a dedicated preparation We will here take  almost 40 to 45  days. keep reading and updating yourself and you will be ready for it soon enough.

Before Starting You Must Be Some Knowledge About 

1. You Must Be have some understanding of programming knowledge such as C, or Java. and   Understanding of the basics of HTML,PHP,MYSQL . These programming languages
can be learned by taking formal programming courses and reading books. It will help you to read and write code.

2. Learn the UNIX operating system as it is regarded as the original operating system built by hackers.
   Also learn about Windows and Mac OS.

3.You must be the Basic understanding of hardware or software.

4. you must be the understanding of COMPUTER NETWORKS OSI Reference mode TCP/IP    Reference models  ,UNDERSTANDING OF ALL LAYERS ,Wireless Transmission ,Communication Satellites , DSL Technology , Basics of internetworking  ,Ip addressing, Subnetting , Routing

CEH highly focuses on tools and expects you to have a proper understanding of their capabilities. If you have not, then set up a test lab. Use VirtualBox if
you have to. Try various tools included within BT5 on a WinXP SP2 victim. v7 focuses on Nmap, Wireshark, and Hping.


So WE HAVE TAKEN THE TASK TO COMPLETE THIS COURSE IN OUR PAGE  to which we will here complete in few days .we will provide here you tools,pdf,docs,usefull links
and also make a video tutorials where it is required .
Be in touch and Complete the target CEHv7 .

Download The Syllabus To which we cover here
Download This Pdf For Lab Setup 

I am uploading some ebooks and other usefull pdf . After some time i will provide you the link Also Download it .
And i recommended you also chk this link to Remove Your Doubt.

Hope U like This My small initiative for my page on facebook.

Be ready Guys I want next Tutorial By you Under the Topic Name : Ethics and Legality


--| Be a Hacker Not Victim |--



Friday 18 May 2012

[Adsense - The Dollar Producing Factory]


Get approved for Google Adsense 
Are you get disapprove many time ??
 so  Lets us start heres the trick to get approved for Get Google Adsense  :)

First Of all Note that :

You don't need a website, blogspot or need of content. And more over it will be legit and it's fast and 100% legal account :) .


Since last week, Google was repeatedly disapproving my account, eventhough I met with all their terms.
But Now at last coming to the point that is nowadays the adsense is not approving any
application for the Pubilsher accounts .
Actually Adsense has shrink the liabilities of publishers from the following countries. Like 
"China, Sri lanka, Pakistan, Bangladesh , Brazil, India, Indonesia, Vietnam, Malaysia, Philippines,and Thailand "
Google will not going to approve your application Even if you meet up  all the conditions of google Adsense policy :( so sad na .
So Dont worry i have also faced the same problem in my past i have filled adsense application about 110-130 times but still all was in vain :(


So at last i have worked lot on the algorithms of the google and make such vast study that how to get the adsense account approved within less then 24 hours..yes its not a joke...its reality...
Most of You everyone know me .


so i want to share these all with you but at minimum cost .So i must say that if any body ask you for money for adsense account approval   then dont hesitate to give him Money even because you can recover All amount with in one month or in two and the rest income is yours only....so think big ;)


so now i want to help others also by this means so if any body is intresting then just follow the step :-
Mail me at " vrrock6@gmail.com "
Make your website a earning source with the help of Google Adsense


Don't Forget That "Adsense is - The Dollar Producing Factory" So be the part of that company and earn and more and more !!!!!!


Special Offer For Student Like Me --- Get a Free E-Book to boom Your earning on Google Adsense with adsense on your demand on Adsense Account so hurry Up what the Hell you Wating For.....!!!!

For Adsense account Contact Me at :---
 Vrrock6@gmail.com or contact me IN  www.facebook.com/A1KrAm


**Disclaimer -: We are not from the google side.And once you have taken the account or our service then dont ever think to ask for REFUND the money So Place The oder Accordingly *







Sunday 15 April 2012

Intitle:"index.of" [Quick Tips To Search Google Like a Pro]



Search Google Like Geek
This Post is for to Teach how to search on google like pro.



So let us start From Basic


Example: "internet marketing"


Exclude Words:
Lets say you want to search for content about internet marketing, but you want to exclude any results that contain the term advertising. To do this, simply use the "-" sign in front of the word you want to exclude.


Example : Search: internet marketing -advertising



Site Specific Search :
Often, you want to search a specific website for content that matches a certain phrase. Even if the site doesn’t support a built-in search feature, you can use Google to search the site for your term. Simply use the "site:somesite.com" modifier.


Example: "internet marketing" site:www.smallbusinesshub.com


Download :
There is so many fileserver just include them in your search 


For example : Site:mediafire.com books name




Similar Words and Synonyms:
Let’s say you are want to include a word in your search, but want to include results that contain similar words or synonyms. To do this, use the "~" in front of the word.


Example: "internet marketing" ~professional


Specific Document Types:
If you’re looking to find results that are of a specific type, you can use the modifier "filetype:". For example, you might want to find only PowerPoint presentations related to internet marketing.


Example: "internet marketing" filetype:ppt


This OR That:
By default, when you do a search, Google will include all the terms specified in the search. If you are looking for any one of one or more terms to match, then you can use the OR operator. (Note: The OR has to be capitalized).


Example: internet marketing OR advertising


Phone Listing:
Let’s say someone calls you on your mobile number and you don’t know how it is. If all you have is a phone number, you can look it up on Google using the phonebook feature.


Example: phonebook:617-555-1212 (note: the provided number does not work – you’ll have to use a real number to get any results).


Area Code Lookup:
If all you need to do is to look-up the area code for a phone number, just enter the 3-digit area code and Google will tell you where it’s from.


Example: 617


Numeric Ranges:
This is a rarely used, but highly useful tip. Let’s say you want to find results that contain any of a range of numbers. You can do this by using the X..Y modifier (in case this is hard to read, what’s between the X and Y are two periods. This type of search is useful for years (as shown below), prices or anywhere where you want to provide a series of numbers.


Example: president 1940..1950




Calculator:
The next time you need to do a quick calculation, instead of bringing up the Calculator applet, you can just type your expression in to Google.


Example: 48512 * 1.02


Word Definitions:
If you need to quickly look up the definition of a word or phrase, simply use the "define:" command.


Example: define:plethora


This is some Basic For Student Who Always Tell me to give me some resource ,pdf ,ebook videos , links ..


Note:There is some Tools Made By me For Advance Hacking: Google Enumeration Will share with You.


For Advance Google Searching You Must need to Download This Book Name Google Hacking For Penetration Testers 


Download :Simply Type in Google  site:mediafire.com Google Hacking 




Thanks :)




Our Next Post Will come Like How To search Google Like Geek [papa]

How to install Tor on backtrack 5 r2 [Backtrack Tutorials]


Tor is an open source Anonymous Internet tool. It protects your personal identification from tracking systems by changing the source IP address frequently. Application will create many virtual tunnels through the tor network.
By default Tor is not integrated in BackTrack 5. Why use Tor on Backtrack ? Normally Tor is used to protect the browsing security but Tor can be used for network scanning tools and other information gathering tools or by student for Educational Purpose.


In this my article i will show you how to install TOR properly on Backtrack . Dont Be Hesitate If You are Unable to Take Advantage of this post . Put YOUR Question with Me I will quickly give your answer . 


So Let Us Start 
I do not recommend just using TOR for your proxy. It's wise to layer your anonymity (Including your router,  if you're working off a Desktop).




start. Open the Terminal.
step 1. #cd /etc/apt
             #ls

step 2. #vi sources.list
step 3. Press 'i' on your keyboard.
step 4. Add this line at the bottom:  deb http://deb.torproject.org/torproject.org lucid main



step 5. Press ESC, type a colon, type wq and hit enter.  
step 6. Run this command: gpg --keyserver keys.gnupg.net --recv 886DDD89
step 7. Run this command: gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
step 8. apt-get update
step 9. apt-get install tor tor-geoipdb
step 10. Download Tor Browser Bundle for Ubuntu (To your desktop). https://www.torproject.org/projects/torbrowser.html.en
step 11. cd Desktop
step 12. Download the architecture-appropriate file above, save it somewhere, then run one of the following two commands to extract the package archive:


tar -xvzf tor-browser-gnu-linux-i686-2.2.35-9-dev-LANG.tar.gz          
or
tor-browser-gnu-linux-x86_64-2.2.35-9-dev-LANG.tar.gz 

step 13. chown -R root:root ./tor-browser_en-US
step 14. Open the folder 'Tor-Browser_en-US"
step 15. Open the file 'start-tor-browser in gedit.
step 16. Find the line:
"if [ "`id -u`" -eq 0 ]; then
        complain "The Tor Browser Bundle should not be run as root.  Exiting."
        exit 1

17. Change to:

        if [ "`id -u`" -eq 1 ]; then
        complain "The Tor Browser Bundle should not be run as root.  Exiting."
        exit 1

18. apt-get install polipo
19. cd /etc/polipo
20. mv config conf-backup.txt
21. Now Go here, copy all text:  
22. vi config
23. Press 'i' on your keyboard.
24. Paste the text you just copied.
25. Press ESC, type a colon, type wq and hit enter.  
26. service polipo start
27. service tor start
28. Start tor browser bundle (From the file on your desktop). 
     To run the Tor Browser Bundle, execute the start-tor-browser script: 
       # ./start-tor-browser 


This will launch Vidalia and once that connects to Tor, it will launch Firefox. Do not unpack or run TBB as root
29. Done!




Wanna check it?

1. ps aux |grep polipo
2. netstat -ntl

Remember, polipo runs on port 8118, TOR runs on 9050. ;) 




Remember : Tor and polipo should automatically run when you start Backtrack:


So Dont Need To start tor Again and Again.

1. service tor start
2. service polipo start

Be sure to stop both when you need to update anything:


By giving Command Like

1. service tor stop
2. service polipo stop


@@@@@ Done @@@@@@@


Hope You Like It 
Dont Be Hesitate If  You are Unable to Take Advantage of this post . Put YOUR Question with Me I will quickly Reply .


Reference :WWW.GOOGLE.COM 

Tor Config file [Basic configuration]


+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

this is for tor configuration >> to install Tor on backtrack 5 r2
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


### Basic configuration

### *******************


# Uncomment one of these if you want to allow remote clients to
# connect:

# proxyAddress = "::0"        # both IPv4 and IPv6
# proxyAddress = "0.0.0.0"    # IPv4 only

proxyAddress = "127.0.0.1"
proxyPort = 8118

# If you do that, you'll want to restrict the set of hosts allowed to
# connect:

# allowedClients = "127.0.0.1, 134.157.168.57"
# allowedClients = "127.0.0.1, 134.157.168.0/24"

allowedClients = 127.0.0.1
allowedPorts = 1-65535

# Uncomment this if you want your Polipo to identify itself by
# something else than the host name:

proxyName = "localhost"

# Uncomment this if there's only one user using this instance of Polipo:

cacheIsShared = false

# Uncomment this if you want to use a parent proxy:

# parentProxy = "squid.example.org:3128"

# Uncomment this if you want to use a parent SOCKS proxy:

socksParentProxy = "localhost:9050"
socksProxyType = socks5


### Memory
### ******

# Uncomment this if you want Polipo to use a ridiculously small amount
# of memory (a hundred C-64 worth or so):

# chunkHighMark = 819200
# objectHighMark = 128

# Uncomment this if you've got plenty of memory:

# chunkHighMark = 50331648
# objectHighMark = 16384

chunkHighMark = 67108864

### On-disk data
### ************

# Uncomment this if you want to disable the on-disk cache:

diskCacheRoot = ""

# Uncomment this if you want to put the on-disk cache in a
# non-standard location:

# diskCacheRoot = "~/.polipo-cache/"

# Uncomment this if you want to disable the local web server:

localDocumentRoot = ""

# Uncomment this if you want to enable the pages under /polipo/index?
# and /polipo/servers?.  This is a serious privacy leak if your proxy
# is shared.

# disableIndexing = false
# disableServersList = false

disableLocalInterface = true
disableConfiguration = true

### Domain Name System
### ******************

# Uncomment this if you want to contact IPv4 hosts only (and make DNS
# queries somewhat faster):
#
# dnsQueryIPv6 = no

# Uncomment this if you want Polipo to prefer IPv4 to IPv6 for
# double-stack hosts:
#
# dnsQueryIPv6 = reluctantly

# Uncomment this to disable Polipo's DNS resolver and use the system's
# default resolver instead.  If you do that, Polipo will freeze during
# every DNS query:

dnsUseGethostbyname = yes


### HTTP
### ****

# Uncomment this if you want to enable detection of proxy loops.
# This will cause your hostname (or whatever you put into proxyName
# above) to be included in every request:

disableVia = true

# Uncomment this if you want to slightly reduce the amount of
# information that you leak about yourself:

# censoredHeaders = from, accept-language
# censorReferer = maybe

censoredHeaders = from,accept-language,x-pad,link
censorReferer = maybe

# Uncomment this if you're paranoid.  This will break a lot of sites,
# though:

# censoredHeaders = set-cookie, cookie, cookie2, from, accept-language
# censorReferer = true

# Uncomment this if you want to use Poor Man's Multiplexing; increase
# the sizes if you're on a fast line.  They should each amount to a few
# seconds' worth of transfer; if pmmSize is small, you'll want
# pmmFirstSize to be larger.

# Note that PMM is somewhat unreliable.

# pmmFirstSize = 16384
# pmmSize = 8192

# Uncomment this if your user-agent does something reasonable with
# Warning headers (most don't):

# relaxTransparency = maybe

# Uncomment this if you never want to revalidate instances for which
# data is available (this is not a good idea):

# relaxTransparency = yes

# Uncomment this if you have no network:

# proxyOffline = yes

# Uncomment this if you want to avoid revalidating instances with a
# Vary header (this is not a good idea):

# mindlesslyCacheVary = true

# Suggestions from Incognito configuration
maxConnectionAge = 5m
maxConnectionRequests = 120
serverMaxSlots = 8
serverSlots = 2
tunnelAllowedPorts = 1-65535