Tuesday, January 22, 2013

Types of Computer Virus

Types of viruses :-

The different types of viruses areas follows-

1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of thehard disk or the floppy drive.The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard diskor overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus,any non-write-prote ­cted disk accessed by this system will become infected.
Examples of boot- sector viruses are Michelangelo andStoned.


2) File or Program Viruses :- Some files/ ­programs, when executed, load the virus in the memory and perform predefined functions to infectthe system. They infect program files with extensionslike .EXE, .COM, .BIN,.DRV and.SYS .
Some common file viruses areSunday, Cascade.


3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, filesat the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, andwhen the virus attachesto the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.
Ghostball was the first multipartite virus, discoveredby Fridrik Skulason in October 1989.
Other examples are Invader,Flip, etc.


4) Stealth Viruses :- These viruses are stealthy in nature means it uses variousmethods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus programaclean image of the file or bootsector.


5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code knownas the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.


6) Macro Viruses :- A macro virus is a computer virus that"infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when theapplication is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus.Well-know ­n examples are Concept Virus and Melissa Worm.

Hacking Mobile Using Bluetooth:-

NOTE : Only For Educational Purpose.>!!!

Super Bluetooth hack 2009 is one of the most downloaded Bluetooth
hacking tools. Super bluetooth hack 2009 is used for mobile based
Symbian operating system to hack & manage any mobile near you which is vulnerable to Bluetooth hackin­g attack
.
Download it from [Click Here]

How To Install Super Bluetooth Hack 2009

1) Download to PC
2) Transfer it to your Bluetooth enabled mobile.
3) Run the Installer (Remember, You must have Java enabled phone for installing it)
4) He finds it and you will be able to run program
5) Select the language and configure it.
6) Click > Connection
7) Click > Search Devices
8) Choose the “Victim”
9) And start managing with following hacks mentioned with Bluetooth.

How to send anonymous mail-!-

Many of the people are trying to spam some ones' mail but are sometimes blocked by
Yahoo, Hotmail, Gmail! So this is perfect, in which you can send fake and spam
emails to your friends and victims'!

These are the following steps!
1) First off all goto :- (see first comment)

2) Enter the name of the sender, from which mail you have to send the fake mail.

3) In option enter your victim email, Subject could be anything, If you want to choose the file ( any kind of attachment).

4) Now If you want to add more things in your email, you can add! Hit Send! You are done..

Sunday, January 13, 2013

Deface website

This is a basic methode we can use to deface websites.
Here we upload a file to victim website and that file will help us to deface it

These files called Shells..Basicly Shell is a PHP file.When we run that php file on a sever it will give us some permissions like delete files or upload files..Shells can do lot of things

The problem is how we going to upload it to victims sever??
here we can do some basic things to upload it..

As we are just going to learn or understand this we select a website that let us to upload files to the sever.Some websites use scripts to upload files..So users or Admin can upload files easily.And we can use the same method.

Now we search for those upload scripts using google..Use this dork to search

inurl:upload.php

So google will search for upload.php files.here we go..We got some sites .. select one

Most sites will let you upload images..

Actualy we can’t upload our shell as shell.php..Coz most of upload scripts will not let you to upload php,,But you can upload it as some othe file..Like image file

Rename your shell.php file to shell.php.gif

or you can just use any image format

After uploading search the uploaded file..Most sites will show you the uploaded image.So you wil see a blank image as you just uploaded a php script , not a image..
How ever find the path to the uploaded file.If the site shows the uploaded image then right click on it and “copy image url”..then paset in your browser and pess enter,,,this will load your image..
In this case it will load your shell…

In some severs this will not work..But try some diferent web sites..shell will load up in some severs..

The importent things to remember is that you should rename your shell as shell.php.gif

And you should find the right image path..I mean the direct path.. likehttp://www.site.com/images/upload/shell.php.gif

if you can’t see the uploaded file find it by browsing folders.

First try the image folder http://www.site.com/images

Like that type some folder names and try to find out..Or just use your brain

What is Prorat?

Prorat is one of RAT (Remote Administration Tools) are
widely used to take over the computer system. Tool made by
PRO Group, a group of Turkish hackers community, can be
used as a tool Hacking computers in a network. Use of Prorat
quite simple, you simply enter the IP (Internet Protocol) is the
target computer and then go through one open port. The
hardest part is finding where an open port. But you can use a
variety of network analysis tools such as nmap, Ethercap,
LookHost, etc.


















Here are the features provided by PRORAT:

- Remote Control
- Viewing System Info, application running and the Task Manager
- Add process, file, or download files
- Admin FTP
- Format the HDD (hard disk damage)
- Remotely download
- Running MS-DOS, Batch Script, VBScript
- Adding a Registry Entry
-Keylogger: Password Recording
- Make Screnshoot, see your Windows desktop instantly
- Send messages and chat
- Shutdown, Restart, Control Panel, IExplorer, Registry, Printer and Online Controls


download link..

Saturday, January 5, 2013

The Most Infamous Computer Hacks & Hackers in History::



#1
THE HACKER: Onel de Guzman
THE HACK: The ILOVEYOU computer worm distributed through e-mail
THE RESULT: More than 50 million reported infections across the world with billions of dollars in damage and overwritten files.
#2
THE HACKER: Jonathan James
THE HACK: Accessed vital DTRA and NASA computer servers “for fun”
THE RESULT: 10 military computers were hacked which led to an overhaul of government security systems and $41,000 in damages.
#3
THE HACKER: TiGER-M@TE
The HACK: InMotion/Web Hosting Hub Defacement
THE RESULT: Over 700,000 websites were hacked and defaced.
#4
THE HACKER: Gary McKinnon
THE HACK: Accessed vital U.S. Military and NASA computer servers
THE RESULT: He accessed 97 NASA computers and deleted operating files that caused an additional 2,000 military computers to fail.
#5
THE HACKER: Vladimir Levin
THE HACK: Intercepted Citibank’s dial-up wire transfer accounts
THE RESULT: $11 million intercepted, $10 million never recovered.
#6
THE HACKER: Anonymous
THE HACK: HostGator cPanel
THE RESULT: 200 servers hacked to re-direct visitors to malicious third-party site where Trojan virus was then planted.
#7
THE HACKER: Robert Morris
THE HACK: The invention of the first computer worm
THE RESULT: Over 6,000 computers were rendered useless.
#8
THE HACKER: Kevin Poulsen
THE HACK: Accessed FBI databases and jammed media phone lines
THE RESULT: He won a Porsche 944 S2 and was featured on TV.
#9
THE HACKER: Anonymous
THE HACK: Spread of Malware via a NetworkSolutions.com widget
THE RESULT: It is suspected that anywhere from 500,000 to 5 million domains were infiltrated and infected with the Malware.
#10
THE HACKER: Mark Zuckerberg
THE HACK: Accessed Harvard University’s private student database
THE RESULT: The invention of Facebook