Tuesday, November 30, 2010

zip bomb , try it out .

zip bomb, also known as a Zip of Death or decompression bomb, is a malicious archive file designed to crash or render useless the program or system reading it. It is often employed to disable antivirus software, so that a more traditional virus sent afterwards could get through undetected.
Rather than hijacking the normal operation of the program, a zip bomb allows the program to work as intended, but the archive is carefully crafted so that unpacking it (e.g. by a virus scanner in order to scan for viruses) requires inordinate amounts of time, disk space or memory.
A zip bomb is usually a small file (up to a few hundred kilobytes) for ease of transport and to avoid suspicion. However, when the file is unpacked its contents are more than the system can handle.
The technique has been used on dialup bulletin board systems at least as long as compressing data archive programs have been around.
Today, most antivirus programs can detect whether a file is a zip bomb and so avoid unpacking it.
One example of a Zip bomb was the file "42.zip" which was 42 kilobytes of compressed data, containing six layers of nested zip files in sets of 16, each bottom layer archive containing a 4.2 gigabyte file for a total of 4.5 petabytes of uncompressed data. This file is still available for download on various websites across the internet.


Download Link:



This zip is detectable by modern antivirus , u can make ur own zip bomb which is undetectable . 
for this open notepad type a blank space on it , save it in  a separate folder and name it 1.txt . Now in the directory copy the file   using ctrl+c and now paste it using ctrl+v , now duplicate copy of the files will  be created , similarly paste it so that the size of the folder becomes 50kb . now go to command prompt , change current directory to this folder then run this command 
copy /b *.txt b.txt
so more files will created , repeat the command so that the size of the folder becomes 3 to 4 GB , now right click that folder and click add to archive , thus a new archive file file will be created , which will be in few hundred KB or few MB , thus 4GB file is compressed to few kb sized zip , now sent this zip file to some private mail server like 
someone@example.com as attachment , the mail server tries to scan the file and if memory is not available it gets crashed .;)
u can use the command to create file size of petabytes(if u have disk space) and compress them , this would be more effective .

sms bomber latest !

Hi t3ch viewer , i finally present u final working version of sms bomber through which u can sent many to a phone number .

cant guess , try this site out ,

http://smsattack.tk

Send sms to anyone in any amount using way2sms account ..

Enjoy my work , have any problems post your comments .

Monday, November 29, 2010

American embassy secrets released on the internet .

The conversation between the various american embassies and american government were released online. Moreover various war diaries were also released online . These were made my a hacker called  Julian Assange.
The site is http://wikileaks.org/ .

 Here are some facts about WikiLeaks:
* WikiLeaks says it is a non-profit organization funded by human rights campaigners, journalists and the general public. Launched in 2006, it promotes the leaking of information to fight government and corporate corruption.
* In October, WikiLeaks released 400,000 secret U.S. files on the Iraq war. The documents involved sensitive subjects including abuse of Iraqi prisoners in U.S. custody, Iraqi rights violations and civilian deaths.
* In July, it released tens of thousands of secret U.S. military documents about the war in Afghanistan, offering them first to The New York Times, Britain's Guardian newspaper and Germany's Der Spiegel.
* The Pentagon said the Afghan war documents leak -- one of the largest in U.S. military history -- had put U.S. troops and Afghan informers at risk.
* Under the heading "Afghan War Diary," the 91,000 documents collected from across the U.S. military in Afghanistan cover the war from 2004 to 2010, WikiLeaks said in a summary.
* Although founder Julian Assange has given few interviews recently, a website, www.wikileaks.org, and a Twitter feed, www.twitter.com/wikileaks, occasionally release material.
* Assange is an Australian who spends much of his time in Sweden. Earlier this year, he was accused of molestation by two women there, a charge being investigated by the Swedish prosecutor's office. A complaint about attempted rape led to an arrest warrant, but that was quickly dropped. Assange has denied all charges.
* Sweden's media laws are among the world's most protective for journalists. In addition, Sweden's Pirate Party, which advocates reform of copyright law, has agreed to host WikiLeaks' servers, giving it additional legal protection.
* WikiLeaks has no connection to the popular online encyclopedia Wikipedia.

Sunday, November 28, 2010

Hack windows xp remotely !

Hi viewers , Windows XP is a os with 100's of bug in it , through which an attacker and access control to the system remotely and gain control over the entire system .
In this we are going to attack a XP system running on a remote system using a framework called metaspoilt it is a collections of various exploits and payloads to attack various operating systems and softwares .
This video covers the use of Metasploit, launched from the Auditor Boot CD, to compromise an unpatched Windows XP box by using the RPC DCOM (MS03-026) vulnerability. It then sends back a VNC session to the attacker. This is just one example of the many things Metasploit can do.
If the embedded video below does not show RIGHT click here to save the file to your hard drive.




Saturday, November 27, 2010

BSNL modem hacks . .

According to a survey BSNL has largest number of broadband users in india , BSNL provides a modem called UT-STARCOM and series of its releases to its south indian broandband users .
This modem has several vulnerabilities .
some are ,

->Any one can login into the router . change password of Admin account by logging into User account.

-> Attacker can sniff the traffic of the router remotely .

->can change DNS server address and can perform spoofing and Phishing attacks easily in an un discoverable manner .

->Other DDos attacks can be performed .

here is a whitepaper presented by few students of panimalar collage , Chennai regarding this issue .
This proves 20% of the Broadband users in India are vulnerable to these attacks   . .


BSNL HACKS

Email bomber .

Hi viewers ,
I wish u introduce Email bomber , it is a software/tool which can  be used to send 100's of email to any email account using gmail smtp server , for this u should use a gmail id through which email can be sent .

some features of it :

Uses port connection with gmail server and sends email  , so email sending rate  will be fast than http connection.

Uses random numbers in the email subject , so gmail doest queues email as single mail and prevent from spam detection .

download link:

http://www.mediafire.com/?kl7k9002krbq7x1




I used Auto-It scripting to create the bomber , hence it may be detected as Trojan by few antivirus , but i assure that it is 100 percent safe .

Antivirus reports by popular antivirus software for this file:

AntivirusVersionLast UpdateResult
AhnLab-V32010.11.28.002010.11.27-
AntiVir7.10.14.1262010.11.27-
Antiy-AVL2.0.3.72010.11.28-
Avast4.8.1351.02010.11.27-
Avast55.0.594.02010.11.27-
AVG9.0.0.8512010.11.28-
BitDefender7.22010.11.28-
CAT-QuickHeal11.002010.11.27-
ClamAV0.96.4.02010.11.28-
Command5.2.11.52010.11.27-
Comodo68732010.11.28TrojWare.Win32.Autoit.~d01
DrWeb5.0.2.033002010.11.28-
Emsisoft5.0.0.502010.11.27Trojan.Generic!IK
eSafe7.0.17.02010.11.24-
eTrust-Vet36.1.80032010.11.26-
F-Prot4.6.2.1172010.11.27-
F-Secure9.0.16160.02010.11.27-
Fortinet4.2.254.02010.11.27-
GData212010.11.28-
IkarusT3.1.1.90.02010.11.27Trojan.Generic
Jiangmin13.0.9002010.11.27-
K7AntiVirus9.69.31032010.11.27Trojan
Kaspersky7.0.0.1252010.11.28-
McAfee5.400.0.11582010.11.28-
McAfee-GW-Edition2010.1C2010.11.27-
Microsoft1.64022010.11.27-
NOD3256542010.11.28-
Norman6.06.102010.11.27-
nProtect2010-11-27.012010.11.27-
Panda10.0.2.72010.11.28-
PCTools7.0.3.52010.11.28-
Prevx3.02010.11.28-
Rising22.75.04.002010.11.27-
Sophos4.60.02010.11.28-
SUPERAntiSpyware4.40.0.10062010.11.28-
Symantec20101.2.0.1612010.11.28-
TheHacker6.7.0.1.0922010.11.27Trojan/Dropper.gen
TrendMicro9.120.0.10042010.11.27-
TrendMicro-HouseCall9.120.0.10042010.11.28-
VBA323.12.14.22010.11.26-
VIPRE74312010.11.28-
ViRobot2010.11.19.41582010.11.27-
VirusBuster13.6.63.12010.11.27-
Additional information
MD5   : 9b707bdde43c6b2ac9e848c5de57a96c
SHA1  : c31906d7cd6d08049e78036e50e828ec9a28ec8a
SHA256: 6afbf6f98bf1192952a43a5571611eb9704db838ba4da260533d38337f22e9d8

Bluetooth hacks :)

Blue tooth is a device used for effective transmission of data at low power at the same with reasonable speed .
Each Bluetooth device has its own device address and it also has a name using which it communicates with another devices , what happens if we can change the blue tooth address and name similar to another Bluetooth thus we can gain access to devices controlled by the hacked Bluetooth .
This method of duplicating the address of a Bluetooth to resemble another Bluetooth device is called blue tooth spoofing .... how to do this ?

got curious , there are some other methods like sending 100's of files to a target device using spoofed Bluetooth device , thus the receiving Bluetooth device gets crashed  ....
want to know how to do these Bluetooth attacks , watch the slides below .. .

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Best Web Host