Archive for HACKING

IP Spoofing(Submitted by JIMISH)

             The basic protocol for sending data over the Internet and many other computer networks is the Internet Protocol. The header of each IP packet contains, among other things, the numerical source and destination address of the packet. The source address is normally the address that the packet was sent from. By forging the header so it contains a different address, an attacker can make it appear that the packet was sent by a different machine. The machine that receives spoofed packets will send response back to the forged source address, which means that this technique is mainly used when the attacker does not care about response or the attacker has some way of guessing the response.

In certain cases, it might be possible for the attacker to see or redirect the response to his own machine. The most usual case is when the attacker is spoofing an address on the same LAN or WAN.

 

Uses of spoofing

 

IP spoofing is most frequently used in denial-of-service attacks. In such attacks, the goal is to flood the victim with overwhelming amounts of traffic, and the attacker does not care about receiving responses to his attack packets. Packets with spoofed addresses are thus suitable for such attacks. They have additional advantages for this purpose – they are more difficult to filter since each spoofed packet appears to come from a different address, and they hide the true source of the attack.

 

Denial of service attacks that use spoofing typically randomly choose addresses from the entire IP address space, though more sophisticated spoofing mechanisms might avoid unroutable addresses or unused portions of the IP address space.

 

The proliferation of large botnets makes spoofing less important in denial of service attacks, but attackers typically have spoofing available as a tool, if they want to use it, so defenses against denial-of-service attacks that rely on the validity of the source IP address in attack packets might have trouble with spoofed packets. Backscatter, a technique used to observe denial-of-service attack activity in the Internet, relies on attackers’ use of IP spoofing for its effectiveness.

 

IP spoofing can also be a method of attack used by network intruders to defeat network security measures, such as authentication based on IP addresses. This method of attack on a remote system can be extremely difficult, as it involves modifying thousands of packets at a time. This type of attack is most effective where trust relationships exist between machines. For example, it is common on some corporate networks to have internal systems trust each other, so that a user can log in without a username or password provided he is connecting from another machine on the internal network (and so must already be logged in). By spoofing a connection from a trusted machine, an attacker may be able to access the target machine without authenticating.

WINDOWS XP PROFESSIONAL SP2 HACK

THIS IS A PROCEDURE TO CONVERT YOUR PIRATED XP INTO GENUINE VERSION OF XP….HAVE FUNN….!!!IT REALLY WORKS…..!!!

  • Click start>run
  • Type ‘regedit’>ok.
  • in regedit go to:

           HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\

          WINDOWS NT\current version\WPA events.

  • On the right panel,double click on OOBE timer.
  • In the opened window delete all values and click ok.
  • shut the regedit.
  • go again in start>run and type:-“%systemroot%\system32\oobe\msoobe.exe /a
  • (don’t insert inverted commas(” “).
  • In the window that opens,choose the option:”yes, i wish to make a phone call(or something like that)”.
  • in the next step click button that says ‘CHANGE PRODUCT KEY’ (or something like that).
  • Now find a windows xp professional ‘cd key’ from Internet.
  • It can be found easily but u need to have installed a very good anti virus in your pc like ‘kaspersky internet security’ or ‘AVG antivirus’.
  • after entering the cd key click update
  • after updating the assistant to activation will return on page,than click in “remember me later”.
  • restart windows.
  • Go to start>run:“%systemroot%\system32\oobe\msoobe.exe /a”.                         
  • The following message will occur :”windows activation“.

  • Click ‘ok’ to end process.

                         

THE INFORMATION TECHNOLOGY ACT, 2000 (Submitted by Jimish)

An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to asElectronic Commerce“, which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers’ Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith or incidental thereto.

WHEREAS the General Assembly of the United Nations by resolution A/RES/51/162, dated the 30th January, 1997 has adopted the Model Law on Electronic Commerce adopted by the United Nations Commission on International Trade Law;

AND WHEREAS the said resolution recommends, inter alia, that all States give favourable consideration to the said Model Law when they enact or revise their laws, in view of the need for uniformity of the law applicable to alternatives to paper-based methods of communication and storage of information;

AND WHEREAS it is considered necessary to give effect to the said resolution and to promote efficient delivery of Government services by means of reliable electronic records;

WHAT IS CYBERCRIME??? >>(Submitted by Jimish)

Cyber crime broadly defined as any criminal offence in information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud.

CYBER CRIME MAY BE CLASSIFIED IN FOLLOWING CATEGORIES

  • Auction Fraud.
  • Unauthorized Access
  • Credit Card Fraud.
  • INTERNET Extortion
  • Phishing/Spoofing.
  • Attacks using Virus, Worms & Trojans.
  • Denial Of Service attacks
  • Child Pornography
  • Cyber Stalking
  • Intellectual Property Crime

SO, BEWARE OF MENTIONED CRIME & KEEP PROTECTED YOUR SELF FROM THAT.

BEWARE OF HACKERS TRAP >>(Submitted by Jimish)

IF YOU ARE TRAPPED IN HACKERS TRAP THEN….

REPORT YOUR COMPLAIN ON FOLLOWING LINK.

IT IS OF CYBER CRIME DEPARTMENT AHMEDABAD.

http://cybercrime-ahd.com/reporting.php

HOW TO PROTECT YOURSELF FROM CYBER CRIME>> (Submitted by Jimish)

1. If you’re asked for your personal information — your name, email or home address, phone number, account numbers, or Social Security number — find out how it’s going to be used and how it will be protected before you share it.

2. If you get an email or pop-up message asking for personal information, don’t reply or click on the link in the message. The safest course of action is not to respond to requests for your personal or financial information.

3. If you are shopping online, don’t provide your personal or financial information through a company’s website until you have checked for indicators that the site is secure, like a lock icon on the browser’s status bar or a website URL that begins “https:” (the “s” stands for “secure”). Unfortunately, no indicator is foolproof; some scammers have forged security icons.

4. “We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity.”
“Phishers” send spam or pop-up messages claiming to be from a business or organization that you might deal with — for example, an Internet service provider (ISP), bank, online payment service, or even a government agency. The message usually says that you need to “update” or “validate” your account information

5. The message directs you to a website that looks just like a legitimate organization’s, but isn’t. To trick you into divulging your personal information so the operators can steal your identity and run up bills or commit crimes in your name. So,never reply to or click on links in email or pop-ups that ask for personal information.