7/5/11

Hack Facebook Account for Sure

Follow these 4 tips to hack Facebook

I will cover 4 methods over here:


1 keyloggers
2 facebook phishing
3. Social engineering
4. Primary email address hack

Facebook phishing:


I have taken this method first because i think this is the most popular method/way of hacking facebook. I studied various facebook surveys taken on web about hacking facebook. The results of these surveys show "Phishing" as the most used method to hack facebook and to note…"Phishing is favorite method of facebook hackers". So, friends.. beware of facebook Phishing. Facebook staff is working hard to avoid these Facebook phishers. Phishing not only allows you to hack Facebook but also almost any email account. You have to only get the trick used to make a phisher, which i think is very easy. I learnt it without any difficulty. But, remember, this is only for educational purpose. I will not extend this topic over here as i have added more on Phishing in my article

Keylogging:


This is my second favorite, as only thing you have to do is remotely install a keylogger application (if you don't have any physical access to victim computer). Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack facebook password.

3. Social engineering:

This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on Facebook and i got his Facebook password very easily by this method. I think many of you might be knowing how what this social engineering, For newbies, social engineering is method of retrieving password or answer of security question simply be quering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.


4.Primary email address hack
So far, i found these Facebook hacking methods as best and working ways to hack facebook account passwords. I never encourage hacking Facebook or any email account,,I just wanna make you aware about Facebook dangers online. I will appreciate your effort if you mention any other Facebook hacking method.

I have some hacking softwares as well, if anybody want it.. feel free to contact me at raju_rulz@hotmail.com

7/4/11

Hacking Website And Computers

Recall Ben and Louis from the introduction. Both of them have houses, both of which are potential points of attack for Eve. Hopefully, both of them lock their doors and windows, or Eve could walk right in. Even if they do lock the entrances to their houses, Eve might be a skilled lockpicker. When people have valuable possessions that they need to protect, they will buy high-grade locks that are difficult to pick in order to keep intruders out. With the exception of locking mechanisms themselves, physical security is relatively easy to judge because you can see it. If you have thicker doors and windows, they are harder to break down. If you have security guards, it is harder to sneak in.

Unfortunately, computer security isn’t so obvious. Attacks are done electronically instead of physically, and you can’t see electricity (and even if you could, the signals that a computer processes are so complex that you would not be able to interpret them). It is therefore very easy, so to speak, to leave the “front door” of your computer wide open.

One might argue that it’s not a big deal for the average user, because who’s going to target them? They don’t have anything of value, right? Wrong. Most people store passwords and credit card numbers on their computers. If it’s easy to break in, why not? Credit card numbers are a criminal’s goldmine, and passwords lead to more credit card numbers. The computer itself is of value; attackers can use it to propagate attacks/viruses to even more computers.

Furthermore, whenever you browse websites such as Facebook, Amazon, or Bank of America, you make the assumption that such sites are safe — i.e., that no one is going to break into said website and steal your data. Websites are nothing more than more computers, so the same vulnerabilities that exist on your computer probably also exist on those websites. While there aren’t really any good ways to guarantee that a given website is following good security practices, it is important to be cognizant of what practices they should be following, so if you discover that they aren’t, you know to to stop trusting that website.


Hacking yahoo id

Everywhere there is a hype about a hacker , hacker and hacker, someone hacked into your mail account ,or someone hacked into your computer ,or someone cracked open your internet bank account , right?
But how is this possible? Learn it from a hacker and then prevent your self from being a victim.

Hacking A email – There a certain steps what a hacker does so that he can gain access to your email id.

1. He will get details about you , because he will want to know whose id he is hacking and will try to find you out on social networks. He will copy all your information out there and try to use “Forgot Password” Option so that he can get it opened without any hard work. If no , then there is a plan B.

2. He will First Create a clone page of the login Page , like suppose yahoo.com , he will create login form.

3 . Then he will send you a email which have a subject as “Yahoo : You Email Id is soon going to be deactivated” and then content will be complete rubbish , and will contain a link to the cloned page, like “Please Login here to make sure your account is Active”.

4. Now as soon as you click that link you are in their trap and then when you fill out the form , you are gone.


How to Hack yahoo ID

yahoo password hack crack 2010,hak 1990hak hotmail com,hotmail account hack tool,can u hack a hotmail account 2011,how to crack yahoo email password free,online free crack hotmail,hack yahoo password,download password hacktool 2011,how to hack someones yahoo password for free,how to hack hotmail account online for free


Tips from a hacker

Never respond To such Mails as they will land you up in big problems.
- No Damn Email service will ask you to login again at any cost , by sending an email to you.
- Never put the matching information which you entered in case of a lost password on social networking website.
- Always be sure , which link you are clicking , is it outside the main url , (here: mail.yahoo.com)
- Check who is sending you the email , someone link support@yahoo.com or yahoosupport@yahoo.com or any other email id.
-Many cyber threats can be prevented with the right data and email security
Special thanks to the Hacker (does not want to go Public)





2/15/11

COMPARATIVE ANALYSIS OF PREVENTION TECHNIQUES OF EMAIL SPOOFING

1. Introduction

Spoofing is the action of making something look like something that it is not in order to gain unauthorized access to a user's private information. The idea of spoofing originated in the 1980s with the discovery of a security hole in the TCP protocol. Today spoofing exists in various forms namely IP, URL and Email spoofing.

Email Spoofing:

Email spoofing may occur in different forms, but all have a similar result: a user receives email that appears to have originated from one source when it actually was sent from another source. Email spoofing is often an attempt to trick the user into making a damaging statement or releasing sensitive information (such as passwords).

Examples of spoofed email
• email claiming to be from a system administrator requesting users to change their passwords to a specified string and threatening to suspend their account if they do not do this
• email claiming to be from a person in authority requesting users to send them a copy of a password file or other sensitive information
• E-mail spoofing is e-mail activity in which the sender address and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source. Because core SMTP doesn't provide any authentication, it is easy to impersonate and forge emails. It is usually fraudulent but can be legitimate. It is commonly used in spam and phishing e-mails to hide the origin of the e-mail message. By changing certain properties of the e-mail, such as the From, Return-Path and Reply-To fields (which can be found in the message header), ill-intentioned users can make the e-mail appear to be from someone other than the actual sender. The result is that, although the e-mail appears to come from the address indicated in the From field (found in the e-mail headers), it actually comes from another source.
• Occasionally (especially if the spam requires a reply from the recipient, as in advance-fee frauds), the source of the spam e-mail is indicated in the Reply-To field (or at least a way of identifying the spammer); if this is the case and the initial e-mail is replied to, the delivery will be sent to the address specified in the Reply-To field, which could be the spammer's address. However, most spam emails (especially malicious ones with a trojan/virus payload, or those advertising a web site) forge this address too, and replying to it will annoy an innocent third party.
• Prior to the advent of unsolicited commercial email (spam) as a viable business model, "legitimately spoofed" email was common. For example, a visiting user might use the local organization's SMTP server to send email from the user's foreign address. Since most servers were configured as open relays, this was a common practice. As spam email became an annoying problem, most of these "legitimate" uses fell victim to antispam techniques.

How to Avoid Email Spoofing??????
1. Strong Website Authentication:

This approach would require all users of legitimate e-commerce and e-banking sites to strongly authenticate themselves to the site using a physical token such as a smart card.



The positive aspects of this approach are:
• Even if a user falls for a phishing attack, a phisher can’t log into real site without the right physical token.
• Users are given a stronger sense of trust in their transactions with business web site.
The downsides of this approach are:
• User education
• Set up time delays
• Desktop software installation
• High management costs
• Potentially high cost per user

2. Mail Server Authentication

The Anti-Spam Research Group (ASRG) and the Anti-Spam Alliance have been investigating solutions to the growing spam problem based on authenticating sending mail servers. There are numerous technical proposals such as RMX for how this will work.




The positives of this approach are:
• Easy to configure at senders mail servers
• Makes it harder for phishers to be anonymous
• Legitimate business email can be better identified – lower spam false positives

The downsides of this approach are:
• Requires sender and recipient gateways to both use these methods
• SMTP sender is not visible to recipient
• From: address still can be spoofed and users can be fooled
• Will be a problem for anyone using a 3rd party emailing service
• Doesn’t accommodate email forwarding


3. Digitally Signed Email With Desktop Verification


This approach is based on the use of the existing industry standard S/MIME, which is a secure email standard supported by most email client software that is in use in corporations today. Companies who are vulnerable to phishing attacks, such as financial institutions, payment processors and e-commerce vendors, would send their emails with a digital signature attached. Note that the digital signature would be attached at the outbound gateway, rather than requiring the individual sender to apply the digital signature. This automation at the gateway would further increase the adoption rate of such a solution. When users receive these digitally signed emails, their business email clients (e.g. Microsoft Outlook, Lotus Notes, Novell Groupwise, etc) will automatically verify the signature for authenticity. If an email arrives to a user that is either not signed, or the signature can not be verified, the user would know that it is not a genuine email from the sending bank or ecommerce provider.



The positives of this approach are:
• S/MIME is a standard in business email clients – would work without any additional software deployment to email users
• Makes the “From:” address impossible to spoof without detection
• Any phisher who digitally signs their email must register with a certificate authority – provides a stronger identity audit trail when prosecuting the phisher
• Legitimate business email can be better identified by end-users – provides better trust ` with customers
The downsides of this approach are:
• Recipients still have to inspect the “From:” address for misleading domains (e.g. a phishing email could have a valid digital signature with the email address of account.update@ebay.custservices.com. The end user would have to know that ebay.custservices.com is not in fact Ebay because ebay.com is not in the domain portion of the address.)
• Not all email clients support S/MIME (e.g. Hotmail, AOL, Yahoo! Mail, Outlook Web Access for Exchange 5.5)
• Recipients may not check certificate revocation status


4. Digitally Signed Email With GatewayVerification



Similarly to Solution 3 proposed above, this approach uses the S/MIME standard for email that is widely available today. Instead of relying on the end user’s email client to verify the signature on the email, a gateway server at the mail relay level would verify the signatures before they were even received by the receiver’s email server. This approach would work well for ISPs and web email providers who wish to support signed email as a way to defeat phishing attacks.

The positives of this approach are:
• S/MIME is a standard today that is supported by many email gateways
• Makes the “From:” address impossible to spoof without detection
• Any phisher who digitally signs their email must register with a certificate authority – provides a
stronger identity audit trail when prosecuting the phisher
• Legitimate business email can be better identified by end-users – provides better trust with customers

The downsides of this approach are:
• Sender and recipient gateways must both understand S/MIME digital signatures
• Doesn’t prevent valid signatures from having misleading From: addresses (e.g. a phishing email could have a valid digital signature with the email address of account.update@ebay.custservices.com. The recipient gateway would likely pass the email on and the end user would have to know that ebay.custservices.com is not in fact Ebay because ebay.com is not in the domain portion of the address.)