tag:blogger.com,1999:blog-45816760109326700132024-03-24T00:32:15.158+05:30HACKMANIA<b>"Fight one more round. When your arms are so tired that you can hardly lift your hands to come on guard, fight one more round. When your nose is bleeding and your eyes are black and you are so tired that you wish your opponent would crack you one on the jaw and put you to sleep, fight one more round – remembering that the man who always fights one more round is never whipped."</b>alexanderhttp://www.blogger.com/profile/03590062490571918173noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-4581676010932670013.post-56680374055911998732010-02-12T15:54:00.000+05:302011-11-01T18:29:26.475+05:30HACKMANIA<div style="margin-bottom: .0001pt; margin: 0in;">
<b><i><span style="color: black; font-family: Arial; font-size: 13.5pt;">As we enjoy great advantages from inventions of others, we should be glad of an opportunity to serve others by any invention of ours; and this we should do freely and generously.</span></i></b><i><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></i></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><i><span style="color: black; font-family: Arial; font-size: 13.5pt;">-Benjamin Franklin</span></i></b><i><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></i></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-family: Arial; font-size: 13.5pt;"><br />
</span><span style="color: black; font-size: 13.5pt;"><i>"Tell me first,what comes in your mind when you think of hacker or hacking?"</i><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">According to survey from<span class="apple-converted-space"> </span></span><b><span style="color: #cc0000; font-size: 13.5pt;">HACKMANIA</span></b><span class="apple-converted-space"><span style="color: black; font-size: 13.5pt;"> </span></span><span style="color: black; font-size: 13.5pt;">it has been found that mostly people thinks them as "DUDE" who are engaged in petty activities with Internet and computers.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;"><i>"But... to me"</i><b><br />
<br />
</b><i>"HACKER is one who enjoys and sense great freedom with computers. HACKER’S carries deep interest in CORE computer technology along with knowledge of Information processing. They live with it and live for it.<o:p></o:p></i></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;"><i>e.g. count bill gates as hacker.HACKER is one who thinks ETHICAL and always does ETHICAL.</i><span class="apple-converted-space"><i> </i></span><i>Else he/she is CRACKER!!!<o:p></o:p></i></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<i><span style="color: #990000; font-size: 13.5pt;">Well I'm not here to give you ideology and to make you hacker either. Just keep in mind that nobody in this world and make you hacker. Because it's and inherent feeling,no one can impose it over you. Just keep in mind that hacking is an art that comes from within. It is a kind of imagination that a<span class="apple-converted-space"> </span><b>Master of Art</b><span class="apple-converted-space"> </span>carries with deep and eternal knowledge.</span></i><span style="color: #990000; font-size: 13.5pt;"><br />
</span><span style="color: black; font-size: 13.5pt;">______________________________________________________________<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: #cc0000;">Whatever I am presenting here in<span class="apple-converted-space"> </span></span></b><span style="color: black; font-size: 13.5pt;"><a href="http://www.hackomania.blogspot.com/"><b><span style="color: #cc0000; font-size: 12pt;">www.hackomania.blogspot.com</span></b></a></span><span class="apple-converted-space"><b><span style="color: #cc0000;"> </span></b></span><b><span style="color: #cc0000;">is ethical and true to my knowledge. Now it depends upon you,how you uses it <span class="Apple-style-span" style="color: black; font-weight: normal;"><b><span style="color: black; font-size: 13.5pt;">Whether in HACKING or CRACKING.</span></b></span></span></b></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">Check sister project:</span><span class="apple-converted-space"><span style="color: black; font-size: 36pt;"> </span></span><span style="color: black;"><a href="http://www.crackomania.blogspot.com/"><span class="Apple-style-span" style="font-size: x-large;">www.crackomania.blogspot.com</span></a><span class="Apple-style-span" style="font-size: x-large;"><o:p></o:p></span></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-size: 18px;"><b><br />
</b></span></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<i><span style="color: black; font-size: 13.5pt;"><br />
Many post about hacking will tell you not to survive on WINDOWS if you Dreams to be Hacker.Remember Hacker can't be conservative. You knows no boundary so you are here.<span class="apple-converted-space"> H</span>ackmania<span class="apple-converted-space"> </span>will talk with each and every aspect. Here i will account that each and every operating system are best in their own way serving the needs of people.</span></i><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">______________________________________________________________<o:p></o:p></span></div>
<div align="center" style="margin-bottom: .0001pt; margin: 0in; text-align: center;">
<b><span style="color: #cc0000; font-size: 18pt;">LETS US START FROM HERE</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;">At first you need to master operating system.Hackmania<span class="apple-converted-space"> </span>considers you are almost aware of WINDOWS OS already.This is time learn something new and serious. You need to get your head over Operating systems like UNIX(open BSD, free BSD,UNIX WARE etc. )and LINUX(Ubuntu,red-hat,mandrake etc.).These Operating systems are best for them who is set to GO</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span class="Apple-style-span" style="color: #cc0000; font-size: large;"><span class="Apple-style-span" style="font-size: 18px;"><b><br />
</b></span></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">For tutorial of LINUX<span class="apple-converted-space"> </span><b><a href="http://www.linux-tutorial.info/">CLICK HERE</a>.<a href="http://www.freeos.com/guides/lsst/"></a></b><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;">Learn LINUX, as it's best OS that will make you aware of operating system concepts. It is meant for serious people who have GUTS for HACKING. LINUX is fast, secure and comes FREE under GNU.</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;">To download FREE copy of LINUX<span class="apple-converted-space"> </span></span></b><span style="color: black; font-size: 13.5pt;"><a href="http://www.ubuntu.com/getubuntu/download"><b>CLICK HERE</b>.</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;">To request a<span class="apple-converted-space"> </span>UBUNTU<span class="apple-converted-space"> </span>CD FREE click on this</span></b><span class="apple-converted-space"><span style="color: black; font-size: 13.5pt;"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="https://shipit.ubuntu.com/"><b>LINK</b></a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><i><span style="color: black; font-size: 13.5pt;">My major emphasis in<span class="apple-converted-space"> </span>hackmania<span class="apple-converted-space"> </span>is about network security and vulnerabilities in them.</span></i></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">______________________________________________________________<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div align="center" style="margin-bottom: .0001pt; margin: 0in; text-align: center;">
<b><span style="color: #cc0000; font-size: 18pt;">:PRINCIPLES OF HACKING:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;">Steps of hacking:-</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">1.Reconnaissance<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">2.Probe<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">3.Toehold<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">4.Advancement<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">5.Stealth<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">6.Listening post<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">7.Takeover<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: #000066; font-size: 13.5pt;">1. Reconnaissance:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">Reconnaissance means art of Information gathering. It is first step of hacking as one needs to gather enough information about the target he/she is attacking upon. Information gathering is done in various ways.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">• Social engineering<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">• Electronic social engineering:<span class="apple-converted-space"> </span>phishing<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">• Using published information<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">• Port scanning<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">• Network mapping<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: #000066; font-size: 13.5pt;">2. Probe:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">A small utility program that is used to investigate, or test, the status of a system, network or Web site. Probes are mostly used for lawful purposes to determine if a device is functional. They can also be used by crackers to locate weaknesses in the system. A Web probe analyses a Web site and reports data such as response time, security protocols supported and type of Web server.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">e.g scanners,sniffers.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: #000066; font-size: 13.5pt;">3. Toehold:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">Here comes exploiting security weakness and gaining entry into system. At this stage vulnerability is discovered and intruder sets connection between his/her and target system. After establishing connection intruder remotely executes hostile commands on target. After gaining entry may intruder can go on rampage and make and can make system worst. If the current USER ID is for privileged user then, intruder will jump<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">to stealth stage or will get into advancement stage.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: #000066; font-size: 13.5pt;">4. Advancement</span></b><b><span style="color: black; font-size: 13.5pt;">:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">Here comes advancing from privileged account to privileged one. Intruder uses local exploit tools to obtain more information so that they can looks for more vulnerability and configuration related errors. Once local vulnerability has been found intruder can get advancement from unprivileged<span class="apple-converted-space"> </span>UID<span class="apple-converted-space"> </span>to root<span class="apple-converted-space"> </span>UID. Then with highest level of privileges intruder can finally control the system. He/she can steal that, can modify programs and files maliciously, can also delete the entire file system.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: #000066; font-size: 13.5pt;">5. Stealth:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">It is method to delete all clue through which you can be traced. Generally Intrusion detection system (IDS) logs all system behaviour and activity. And intruder always wants to hide these activities so he/she can may delete log files. Intruder can may replace the systems binary code with malicious version of code.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: #000066; font-size: 13.5pt;">6. Listening post:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">Intruder installs a back-door to establish a listening post. Intruder inserts a malicious program into the system, such as stealth tool, a back-door tools and sniffer. These programs insure that intruder’s future activities will not be logged. They report fake information on files, processes, and status of network interface to the administrators. They allow intruder to access the compromised system through the back-door with the help of sniffer tools. The intruder can as well capture traffic on network interfaces. Intruder can better control these systems.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: #000066; font-size: 13.5pt;">7. Takeover:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">Takeover means intruder now have complete control systems. They can do maximum exploit to your system if they wish. They can even expand there control from single host on network and as may affect other systems as well. From activities described above they can get specific information about your systems. Such as, user-names and passwords. Intruder can check some specific configuration files (e.g. /.roosts) of the controlled host and use it break into another systems as well.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;">Overview of hacking tool kits:-</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<ul type="disc">
<li class="MsoNormal" style="color: black; mso-list: l7 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Scanners<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l7 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Sniffers and snoopers<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l7 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Spoofing tools<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l7 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Trojan horse<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l7 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Password cracker<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l7 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Denial of service tools<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l7 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Stealth and back-door tools<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l7 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Malicious applets and scripts<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l7 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Logic bombs<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l7 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Buffer overflow<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l7 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Bugs in software<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l7 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Holes in trust management<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l7 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Social engineering<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l7 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Dumpster diving</span></li>
</ul>
<div>
<span class="Apple-style-span" style="font-size: medium;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;">DESCRIPTION:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 18pt;">1.Scanner:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">scanners are used to find out vulnerabilities in systems. They have cons and pros, it depends who are using them and for what purpose. If he/she is ethical hacker then its fine. If he/she is cracker then might harm you.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: #990000; font-size: 13.5pt;">I'm presenting here list of specific scanners.It'll better to download them and have a hand over them.</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;"><a href="http://sectools.org/app-scanners.html">a. Application-Specific Scanners.</a>(click to download)<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">i.THC<span class="apple-converted-space"> </span>amap<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">ii.NBTscan<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">iii.ike-scan<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">iv.SPIKE proxy<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;"><a href="http://sectools.org/vuln-scanners.html">b. Vulnerability Scanners</a>(click to download)<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">i.Nmap<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">ii.Nessus<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">iii.GFI<span class="apple-converted-space"> </span>languard<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">iv.Retina<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">v.Core impact<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">vi.ISS<span class="apple-converted-space"> </span>Internet scanner<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">vii.X-scan<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">viii.sara<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">ix.Qualysguard<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">x.SAINT<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">xi.MBSA<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;"><a href="http://sectools.org/web-scanners.html">c. Web Vulnerability Scanners<span class="apple-converted-space"><span style="color: windowtext; text-decoration: none;"> </span></span></a>(click to download)<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">i.Nikto<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">ii.Pros proxy<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">iii.Webscarab<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">iv.Webinspect<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">v.Whisker/libwhisker<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">vi.Burpsuite<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">vii.Wikto<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">viii.Acunetix<span class="apple-converted-space"> </span>WVS<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">ix.Watchfire<span class="apple-converted-space"> </span>appscan<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">x.N-stealth<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;"><a href="http://sectools.org/sploits.html">d. Vulnerability Exploitation Tools</a>(click to download)<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">i.Metasploit<span class="apple-converted-space"> </span>framework<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">ii.Core impact<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">iii.Canvas</span><br />
<span style="color: black; font-size: 13.5pt;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 18pt;">2.Sniffers and snoopers:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">A sniffer logs network data. Intruder can plug-in a sniffer to monitor the network traffic and obtain necessary information to access other hosts in network.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">A snooper can also known as<span class="apple-converted-space"> </span>spyware, monitors users activities by snooping on a terminal emulator session. Monitoring process memory, and logging a user's keystroke. By watching the users actions intruder can obtain useful information to attack other users on computer or even other system on the network.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;">List of packet sniffers:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">i.<a href="http://sectools.org/sniffers.html">wireshark</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">ii.<a href="http://sectools.org/sniffers.html">kismet</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">iii.<a href="http://sectools.org/sniffers.html">tcpdump</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">iv.<a href="http://sectools.org/sniffers.html">cain<span class="apple-converted-space"><span style="color: windowtext; text-decoration: none;"> </span></span>and<span class="apple-converted-space"><span style="color: windowtext; text-decoration: none;"> </span></span>abel</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">v.<a href="http://sectools.org/sniffers.html">ettercap</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">vi.<a href="http://sectools.org/sniffers.html">dsniff</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">vii.<a href="http://sectools.org/sniffers.html">netstumbler</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">viii.<a href="http://sectools.org/sniffers.html">ntop</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">ix.<a href="http://sectools.org/sniffers.html">ngrep</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">x.<a href="http://sectools.org/sniffers.html">etherape</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">xi.<a href="http://sectools.org/sniffers.html">kismac</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span class="Apple-style-span" style="color: #ff6600; font-size: medium;"></span><br />
<span class="Apple-style-span" style="color: #ff6600; font-size: medium;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 18pt;">3.spoofing tools:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">In a network the data packet always contains the source address field, which can expose the source of intruder if he/she sends the malicious packets. Hence to hide and avoid detection the intruder uses spoofing tools to forge another source address i.e address of another host or a non-existing address. The spoofed address can be<span class="apple-converted-space"> </span>IP-address or physical address, depending of the type of the network.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<i><span style="color: black; font-size: 13.5pt;"><b>Note:</b><br />
To gain access to network from outside- If the firewall of target network<span class="apple-converted-space"> </span>is not<span class="apple-converted-space"> </span>configured to filter out spoofing packet with source address belonging to the local domain; it's possible for an intruder to inject packets with spoofed inner address through the firewall.<br />
<br />
</span></i><b><span style="color: black; font-size: 13.5pt;">List of spoofing tools:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;"><br />
</span></b><span style="color: black; font-size: 13.5pt;">1.<a href="http://dir.filewatcher.com/d/OpenBSD/3.5/alpha/despoof-0.9.tgz.12763.html">Despoof</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">2.<a href="http://www.l0t3k.org/security/tools/spoofing/">Hunt.</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">3.<a href="http://3d2f.com/programs/45-538-spoofed-ip-download.shtml">spoofed<span class="apple-converted-space"><span style="color: windowtext; text-decoration: none;"> </span></span>ip</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">4.<a href="http://3d2f.com/programs/49-937-hide-my-mac-address-download.shtml">Hide My MAC Address</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">5.<a href="http://www.nextsecurity.net/downloads/wina...WinArpSpoof.zip">Windows<span class="apple-converted-space"><span style="color: windowtext; text-decoration: none;"> </span></span>ARP<span class="apple-converted-space"><span style="color: windowtext; text-decoration: none;"> </span></span>Spoofer</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">6.<a href="http://www.klcconsulting.net/Change_MAC_w2k.htm">MAC<span class="apple-converted-space"><span style="color: windowtext; text-decoration: none;"> </span></span>Spoofer</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">7.<a href="http://www.loadtestingtool.com/">W.A.P.T</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">8.<a href="http://www.trafmeter.com/">TrafMeter</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span class="Apple-style-span" style="font-size: medium;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #990000; font-size: 13.5pt;"><b>I would like to lay special emphasis on</b><span class="apple-converted-space"><b> </b></span><b>ARP</b><span class="apple-converted-space"><b> </b></span><b>spoofing. As it's method that can teach you actually what goes inside.</b></span><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div align="center" style="margin-bottom: .0001pt; margin: 0in; text-align: center;">
<b><span style="color: black; font-size: 18pt;">ARP<span class="apple-converted-space"> </span>spoofing</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div align="center" style="margin-bottom: .0001pt; margin: 0in; text-align: center;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;">ARP<span class="apple-converted-space"> </span>poisoning tools:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">ARP(Adress<span class="apple-converted-space"> </span>resolution protocol) is used to determine MAC address of a device with a known<span class="apple-converted-space"> </span>IP<span class="apple-converted-space"> </span>address.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">The translation is performed with table<span class="apple-converted-space"> </span>lookup.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">The<span class="apple-converted-space"> </span>ARP<span class="apple-converted-space"> </span>cache accumulates as the host continues to network.If the<span class="apple-converted-space"> </span>ARP<span class="apple-converted-space"> </span>cache doesn't have entry for an<span class="apple-converted-space"> </span>IP<span class="apple-converted-space"> </span>address, the outgoing<span class="apple-converted-space"> </span>IP<span class="apple-converted-space"> </span>packet is queued, and an<span class="apple-converted-space"> </span>ARP<span class="apple-converted-space"> </span>request packet broadcasts essentially the following request:<span class="apple-converted-space"> </span></span><i><span style="color: #333333;">"if your<span class="apple-converted-space"> </span>IP<span class="apple-converted-space"> </span>address matches this target<span class="apple-converted-space"> </span>IP<span class="apple-converted-space"> </span>address, the please let me know what your Ethernet<span class="apple-converted-space"> </span>address<span class="apple-converted-space"> </span>is"</span></i><span style="color: black;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">The host with target<span class="apple-converted-space"> </span>IP<span class="apple-converted-space"> </span>is expected to respond with an<span class="apple-converted-space"> </span>ARP<span class="apple-converted-space"> </span>reply, which contains the MAC address of the host. Once the table is updated because of having received this response, all the queued<span class="apple-converted-space"> </span>IP<span class="apple-converted-space"> </span>packet can be sent.The entries in the table expires after a set time to account for possible hardware address changes for the same<span class="apple-converted-space"> </span>IP<span class="apple-converted-space"> </span>address. This change may have happened, for example<span class="apple-converted-space"> </span>NIC<span class="apple-converted-space"> </span>(network interface card) was replaced.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;">Tools capable of performing<span class="apple-converted-space"> </span>ARP<span class="apple-converted-space"> </span>poisoning:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;"><br />
</span></b><span style="color: black; font-size: 13.5pt;">1.<a href="http://arpoison.sourceforge.net/">Arpoison</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">2.<a href="http://naughty.monkey.org/~dugsong/dsniff/">dsniff</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">3.<a href="http://ettercap.sourceforge.net/">ettercap</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">4.<a href="http://freeworld.thc.org/releases.php?q=parasite">parasite</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">5.<a href="http://www.oxid.it/cain.html">Cain and Abel</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;"><br /><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<i><span style="color: black;">Now here is the stuff for programmers who are interested in understanding<span class="apple-converted-space"> </span>ARP<span class="apple-converted-space"> </span>poisoning more vigorously</span></i><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">It will be better to know about<span class="apple-converted-space"> </span>pcap<span class="apple-converted-space"> </span>if you are trying<span class="apple-converted-space"> </span>ARP<span class="apple-converted-space"> </span>spoofing.<o:p></o:p></span></div>
<ul type="disc">
<li class="MsoNormal" style="color: black; mso-list: l6 level1 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;"><a href="http://en.wikipedia.org/wiki/Pcap">pcap</a><o:p></o:p></span></li>
</ul>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;"><b>ARP<span class="apple-converted-space"> </span>Spoofing code by using<span class="apple-converted-space"> </span>CbuildPacket</b><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">CBuildPacket<span class="apple-converted-space"> </span>is designed to send the built<span class="apple-converted-space"> </span>ARP,<span class="apple-converted-space"> </span>TCP, and<span class="apple-converted-space"> </span>ICMP<span class="apple-converted-space"> </span>packets to the network. There are many libraries or components such as<span class="apple-converted-space"> </span>Libnet<span class="apple-converted-space"> </span>and so forth on the Internet, but they have some weak points such as decreasing readability. So, this class is developed. The source of<span class="apple-converted-space"> </span>CBuildPacket<span class="apple-converted-space"> </span>will be opened.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;">To understand more about ARP posoning see:<span class="apple-converted-space"> </span><a href="http://www.oxid.it/downloads/apr-intro.swf">CLCIK HERE</a></span></b></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;">For defense and tools of ARP posioning:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<ul type="disc">
<li class="MsoNormal" style="color: black; mso-list: l1 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;"><a href="http://www.chrismc.de/development/xarp/">xarp</a><o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l1 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;"><a href="http://www.antiarp.com/English/e_index.htm">antiarp</a><o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l1 level1 lfo3; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;"><a href="http://www.arpdefender.com/">arpdefender</a><o:p></o:p></span></li>
</ul>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span class="Apple-style-span" style="color: #ff6600; font-size: large;"><b><br /></b></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 18pt;"> 4. Trojan horse:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">The<span class="apple-converted-space"> </span><a href="http://en.wikipedia.org/wiki/Trojan_Horse" title="Trojan Horse">Trojan Horse</a>, from Greek mythology, was a giant hollow horse containing Greek soldiers, used to overtake the city of </span><st1:city><st1:place><span style="color: black;">Troy</span></st1:place></st1:city><span style="color: black;"> during the<span class="apple-converted-space"> </span><a href="http://en.wikipedia.org/wiki/Trojan_War" title="Trojan War">Trojan War</a>.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-family: Arial;">In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the<span class="apple-converted-space"> </span><a href="http://searchexchange.techtarget.com/sDefinition/0,,sid43_gci213956,00.html"><span style="color: #5a4252;">file allocation table</span></a><span class="apple-converted-space"> </span>on your<span class="apple-converted-space"> </span><a href="http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci212227,00.html"><span style="color: #5a4252;">hard disk</span></a>. In one celebrated case, a Trojan horse was a program that was supposed to find and destroy computer<span class="apple-converted-space"> </span><a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213306,00.html"><span style="color: #5a4252;">virus</span></a>es. A Trojan horse may be widely redistributed as part of a computer virus.</span><span style="color: black;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-family: Arial; font-size: 13.5pt;">Trojan horse can affect your system in following ways:</span><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<ul type="disc">
<li class="MsoNormal" style="color: black; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Arial;">Remote access</span><o:p></o:p></li>
<li class="MsoNormal" style="color: black; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Arial;">Data destruction</span><o:p></o:p></li>
<li class="MsoNormal" style="color: black; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Arial;">Downloader/dropper</span><o:p></o:p></li>
<li class="MsoNormal" style="color: black; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Arial;">Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.)</span><o:p></o:p></li>
<li class="MsoNormal" style="color: black; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Arial;">Disable security software</span><o:p></o:p></li>
<li class="MsoNormal" style="color: black; mso-list: l0 level1 lfo4; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-family: Arial;"><a href="http://en.wikipedia.org/wiki/Denial-of-service" title="Denial-of-service">Denial-of-service</a><span class="apple-converted-space"> </span>attack (DoS)</span><span style="font-size: 13.5pt;"><o:p></o:p></span></li>
</ul>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-family: Arial; font-size: 13.5pt;">Now, I am presenting here Extensive and Exhaustive list over trojan horse programs for better unserstanding of trojans.</span><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div align="center" style="margin-bottom: .0001pt; margin: 0in; text-align: center;">
<b><span style="color: red; font-family: Arial; font-size: 13.5pt;">Warning: Don't use this information for any unethical cause.</span></b><b><span style="color: red; font-size: 13.5pt;"><o:p></o:p></span></b></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-family: '\'times new roman\''; font-size: 13.5pt;"><a href="http://www.simovits.com/trojans/tr_data/y2479.html"></a><br />
</span><b><span style="color: black; font-family: Arial; font-size: 13.5pt;">Trojan listing alternatives</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l3 level1 lfo5; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">1.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://www.simovits.com/trojans/trojans_name.html">Trojan list sorted on name</a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l3 level1 lfo5; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">2.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://www.simovits.com/trojans/trojans_files.html">Trojan list sorted on filenames</a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l3 level1 lfo5; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">3.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://www.simovits.com/trojans/trojans_sizes.html">Trojan list sorted on filesizes</a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l3 level1 lfo5; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">4.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://www.simovits.com/trojans/trojans_action.html">Trojan list sorted on actions</a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l3 level1 lfo5; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">5.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://www.simovits.com/trojans/trojans_workson.html">Trojan list sorted on affected systems</a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l3 level1 lfo5; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">6.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://www.simovits.com/trojans/trojans_country.html">Trojan list sorted on origin country</a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l3 level1 lfo5; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">7.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://www.simovits.com/trojans/trojans_language.html">Trojan list sorted on programming language</a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l3 level1 lfo5; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">8.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-family: Arial; font-size: 13.5pt;"><a href="http://www.simovits.com/trojans/trojans.html">Trojan list sorted on port</a></span><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;">shmgrate.exe:<br />
</span></b><span style="color: black;">This is process running under window platforms like many other process. Now experts suggests that this Trojan allows attackers to access your computer from remote locations, stealing passwords, Internet banking and personal data. This process is a security risk and should be removed from your computer.shmgrate.exe if running on your PC it means that your pc has been nfected with a Trojan known as 'gaster'.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black;">Gaster trojan</span></b><span class="apple-converted-space"><span style="color: black;"> </span></span><span style="color: black;">should be fixed immediately.Delay in removal of shmgrate.exe may cause serious harm to your system and will likely cause a number of problems, loss of data, loss of control or leaking private information.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: #009900; font-size: 13.5pt;">For detailed information of processes check this:</span></b><span class="apple-converted-space"><span style="color: black; font-size: 13.5pt;"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://www.liutilities.com/products/wintaskspro/processlibrary/">PROCESS LIBRARY</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: #ff6600; font-size: 16pt;"></span><span style="color: black; font-size: 16pt;"><br />
<b>5.Password Cracker:</b></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;"><b></b></span><span class="apple-converted-space"><span style="color: black;"> </span></span><span style="color: black;">A password cracker is an application program that is used to identify an unknown or forgotten password to a computer or network resources. It can also be used to help a human<span class="apple-converted-space"> </span><a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci211852,00.html">cracker</a><span class="apple-converted-space"> </span>obtain unauthorized access to resources.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;"><br />
</span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;"><b>Methods of cracking Password:</b><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black;">Brute-force:</span></b><span class="apple-converted-space"><span style="color: black;"> </span></span><span style="color: black;">When a password cracker uses brute-force, it runs through combinations of characters within a predetermined length until it finds the combination accepted by the computer system.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black;">Dictionary searches:</span></b><span class="apple-converted-space"><span style="color: black;"> </span></span><span style="color: black;">It searches each word in the dictionary for the correct password. Password dictionaries exist for a variety of topics and combinations of topics, including politics, movies, and music groups.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">Some password cracker programs search for hybrids of dictionary entries and numbers. For example, a password cracker may search for ants01; ants02; ants03, etc. This can be helpful where users have been advised to include a number in their password.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">Another method is identifying encrypted passwords. After retrieving the password from the computer's memory, the program may be able to decrypt it.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">Or, by using the same algorithm as the system program, the password cracker creates an encrypted version of the password that matches the original.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;">List of password crackers:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l2 level1 lfo6; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">1.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://www.oxid.it/cain.html">Cain and Abel</a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l2 level1 lfo6; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">2.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://www.openwall.com/john/">John the Ripper</a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l2 level1 lfo6; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">3.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://www.thc.org/thc-hydra/">THC Hydra</a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l2 level1 lfo6; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">4.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://www.aircrack-ng.org/">Aircrack</a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l2 level1 lfo6; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">5.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://www.l0phtcrack.com/">L0phtcrack</a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l2 level1 lfo6; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">6.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://airsnort.shmoo.com/">Airsnort</a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l2 level1 lfo6; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">7.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://www.solarwinds.net/">SolarWinds</a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l2 level1 lfo6; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">8.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://www.foofus.net/fizzgig/pwdump/">Pwdump</a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l2 level1 lfo6; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">9.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://www.antsight.com/zsl/rainbowcrack/">RainbowCrack</a><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: .5in; mso-list: l2 level1 lfo6; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in; text-indent: -.25in;">
<span style="color: black; font-size: 13.5pt;">10.<span style="font: normal normal normal 7pt/normal 'Times New Roman';"> </span></span><span style="color: black; font-size: 13.5pt;"><a href="http://www.hoobie.net/brutus/">Brutus</a><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">One can get better view of password cracking by getting there head over Brute force Attack:<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<h2>
<span style="color: black;">Brute Force Attack<o:p></o:p></span></h2>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">Brute force attacks use exhaustive trial and error methods in order to find legitimate authentication credentials.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">Attackers can use brute force applications, such as password guessing tools and scripts, in order to try all the combinations of well-known usernames and passwords. This application can may use default password databases or dictionaries that contain commonly used passwords or they may try all combinations of the accepted character set in the password field.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">User identification is not always achieved with a username and password pair. Using a brute force tool makes it easy to find a legitimate session ID that appears in a URL (see<span class="apple-converted-space"> </span><a href="http://www.imperva.com/resources/glossary/parameter_tampering.html">Parameter Tampering</a>). A session ID is an identification string used to associate specific Web pages with a specific user. The following is an example of such a session ID.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<code><span style="color: #3333ff;">http://greetings.acme-hackme.com/view/9BA54003218827622</span></code><span style="color: black;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">This is an example of a greeting card site that has a unique session ID for each greeting card. Using Brute Force applications, attackers may try thousands of session IDs embedded in a legitimate URL in an attempt to view greeting cards that they are not authorized to view.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">It is relatively easy to find a legitimate key for an object id. For example, consider the URL:<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<code><span style="color: #3333ff;">http://www.orkut.co.in/Main#Album.aspx?uid=39101007091397604758&aid=1247473078</span></code><span class="apple-converted-space"><span style="color: black;"> </span></span><span style="color: black;"> <span class="apple-converted-space"> </span><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">In this example, the dynamic page requested by the browser is called<span class="apple-converted-space"> </span></span><code><span style="color: black;">Album.aspx</span></code><span class="apple-converted-space"><span style="color: black;"> </span></span><span style="color: black;">and the browser sends the Web server the parameter<span class="apple-converted-space"> </span></span><code><span style="color: black;">i.e</span></code><span class="apple-converted-space"><span style="color: black; font-family: 'Courier New';"> </span></span><code><span style="color: black;">uid=39101007091397604758&aid=1247473078IHJD</span></code><span style="color: black;">. An attacker may try brute force values for<span class="apple-converted-space"> </span></span><b><span style="color: black; font-family: monospace;">u</span></b><code><b><span style="color: black;">id</span></b></code><span class="apple-converted-space"><span style="color: black;"> </span></span><span style="color: black;">to get users.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">Brute force attack can't comply in every situation. For example see this fact-<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black;">The amount of time required to break a 128-bit key is also daunting. Each of the 2<sup><span class="Apple-style-span" style="font-size: medium;">128</span></sup><span class="apple-converted-space"> </span>(340,282,366,920,938,463,463,374,607,431,768,211,456) possibilities must be checked. A device that could check a billion keys (10<sup><span class="Apple-style-span" style="font-size: medium;">18</span></sup>) per second would still require about 10<sup><span class="Apple-style-span" style="font-size: medium;">13</span></sup><span class="apple-converted-space"> </span>years exhausting the key space. This is a thousand times longer than the age of universe, which is about 13,000,000,000 (<img alt="1.3 \times 10^{10}" border="0" class="tex" height="22" src="file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtml1/01/clip_image001.gif" v:shapes="_x0000_i1025" width="87" />) years.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: #ff6600; font-family: 'Courier New'; font-size: 13.5pt;">What you say now?</span></b><b><span style="color: black; font-family: 'Courier New'; font-size: 13.5pt;"><o:p></o:p></span></b></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br />
<a name='more'></a><br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 36pt;">6.Denial of service Tools:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black;">An analogy:<span class="apple-converted-space"> </span></span></b><span style="color: black;">What happens if a malicious client connects to the server, sends 1byte of data(other than a newline) and then goes to sleep. The server will call readline, which will read the single byte of data from the client and the block in the next call to read, waiting for more data from the client.The server is then blocked("hung" may be better term) by this one client and will not service any other clients(either new client connection or existing client's data) untill the malicious client either senda newline or terminates.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><i><span style="color: black;">simply, we can say that Denial of Service (DoS) Attack is an explicit attempt by attackers to prevent legitimate users of a service from using that service.</span></i></b><span style="color: black;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;">Methods of attack:</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<ul type="disc">
<li class="MsoNormal" style="color: black; mso-list: l5 level1 lfo7; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">ICMP flood<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l5 level1 lfo7; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Teardrop attacks<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l5 level1 lfo7; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Peer-to-peer attacks<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l5 level1 lfo7; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Permanent denial-of-service attacks<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l5 level1 lfo7; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Application level floods<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l5 level1 lfo7; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Nuke<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l5 level1 lfo7; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Distributed attack<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l5 level1 lfo7; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Reflected attack<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l5 level1 lfo7; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Degradation-of-service attacks<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l5 level1 lfo7; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Unintentional denial of service<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l5 level1 lfo7; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Denial-of-Service Level II<o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l5 level1 lfo7; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><span style="font-size: 13.5pt;">Blind Denial of Service<o:p></o:p></span></li>
</ul>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-size: 13.5pt;">For precise information on method of DoS attack<span class="apple-converted-space"> </span><a href="http://en.wikipedia.org/wiki/Denial-of-service_attack"><b>CLICK HERE</b></a><o:p></o:p></span></div>
<div align="center" style="margin-bottom: .0001pt; margin: 0in; text-align: center;">
<b><span style="color: red; font-size: 18pt;">"Rare papers on DoS attack"</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<ul type="disc">
<li class="MsoNormal" style="color: black; mso-list: l4 level1 lfo8; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><b><span style="font-size: 13.5pt;"><a href="http://www.netmasterclass.net/site/articles/A%20Brief%20Description%20of%20an%20ICMP%20Flood%20Attack.pdf">ICMP flood Attack</a></span></b><span style="font-size: 13.5pt;"><o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l4 level1 lfo8; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><b><span style="font-size: 13.5pt;"><a href="http://www.daxnetworks.com/Technology/TechDost/TD-102004-Teardrop%20Attack%20Detection.pdf">Teardrop attacks</a></span></b><span style="font-size: 13.5pt;"><o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l4 level1 lfo8; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><b><span style="font-size: 13.5pt;"><a href="http://www.eecs.harvard.edu/~stuart/papers/eis03.pdf">Peer-to-peer attacks</a></span></b><span style="font-size: 13.5pt;"><o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l4 level1 lfo8; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><b><span style="font-size: 13.5pt;"><a href="http://docs.google.com/gview?a=v&q=cache:8QCjObgl9awJ:research.corsaire.com/whitepapers/040405-application-level-dos-attacks.pdf+Permanent+denial-of-service+attacks+pdf+file&hl=en&gl=in&pli=1">Permanent denial-of-service attacks</a></span></b><span style="font-size: 13.5pt;"><o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l4 level1 lfo8; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><b><span style="font-size: 13.5pt;"><a href="http://research.microsoft.com/en-us/groups/sn-res/infocom03.pdf">Application level floods</a></span></b><span style="font-size: 13.5pt;"><o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l4 level1 lfo8; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><b><span style="font-size: 13.5pt;"><a href="http://www.users.nac.net/splat/winnuke/">Nuke</a></span></b><span style="font-size: 13.5pt;"><o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l4 level1 lfo8; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><b><span style="font-size: 13.5pt;"><a href="http://documents.iss.net/whitepapers/ddos.pdf">Distributed attack</a></span></b><span style="font-size: 13.5pt;"><o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l4 level1 lfo8; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><b><span style="font-size: 13.5pt;"><a href="http://www.icir.org/vern/papers/reflectors.CCR.01/reflectors.html">Reflected attack</a></span></b><span style="font-size: 13.5pt;"><o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l4 level1 lfo8; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><b><span style="font-size: 13.5pt;"><a href="http://www.netholding.nl/SITEBeheer/download.asp?27&.pdf">Degradation-of-service attacks</a></span></b><span style="font-size: 13.5pt;"><o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l4 level1 lfo8; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><b><span style="font-size: 13.5pt;"><a href="http://docs.google.com/gview?a=v&q=cache:1wgc-59cClAJ:www.cert.org/archive/pdf/DoS_trends.pdf+Unintentional+denial+of+service+pdf+file&hl=en&gl=in">Unintentional denial of service</a></span></b><span style="font-size: 13.5pt;"><o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l4 level1 lfo8; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><b><span style="font-family: -webkit-sans-serif; font-size: 13.5pt;"><a href="http://en.wikipedia.org/wiki/Denial-of-service_attack#Denial-of-Service_Level_II"><span style="color: #002bb8;">Denial-of-Service Level II</span></a></span></b><span style="font-size: 13.5pt;"><o:p></o:p></span></li>
<li class="MsoNormal" style="color: black; mso-list: l4 level1 lfo8; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list .5in;"><b><span style="font-family: Georgia; font-size: 13.5pt;"><a href="http://www.faqs.org/rfcs/rfc3552.html">Blind Denial of Service</a></span></b><span style="font-size: 13.5pt;"><o:p></o:p></span></li>
</ul>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-size: 13.5pt;">I am sure these paper will teach you lot about various DoS attacks and will make you know how to depth these attacks.</span></b><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<b><span style="color: black; font-family: Arial; font-size: 13.5pt;"><br /></span></b><br />
<b><span style="color: black; font-family: Arial; font-size: 13.5pt;">HACKMANIA</span></b><span class="apple-converted-space"><span style="color: black; font-family: Arial; font-size: 13.5pt;"> </span></span><span style="color: black; font-family: Arial; font-size: 13.5pt;">is still under construction....</span><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0in;">
<span style="color: black; font-family: Arial; font-size: 13.5pt;">work accomplished 2%</span><span style="color: black; font-size: 13.5pt;"><o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>alexanderhttp://www.blogger.com/profile/03590062490571918173noreply@blogger.com316tag:blogger.com,1999:blog-4581676010932670013.post-60434428969757893152008-09-11T13:44:00.007+05:302011-11-23T17:35:06.207+05:30Hackmania<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCIKD0vEeF47PeoaI_dDJB9X3qOdwXGCXxSCeoy4dFieWErDPhOXIRnDGyaLQOi3BL7Jea3ofFBY-x3Fnr5Owidsoodya3nYVrZVv0OgjKJ2gIprj_k76JBmf3v8r_1G8EURV_FymXwGUh/s1600/Snapshot_20111025_1.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCIKD0vEeF47PeoaI_dDJB9X3qOdwXGCXxSCeoy4dFieWErDPhOXIRnDGyaLQOi3BL7Jea3ofFBY-x3Fnr5Owidsoodya3nYVrZVv0OgjKJ2gIprj_k76JBmf3v8r_1G8EURV_FymXwGUh/s200/Snapshot_20111025_1.JPG" width="200" /></a></div>
Hi, everybody this blog has been created especially for those people who have sheer interest in CORE computer technology and HACKING. Those who want to add something valuable to this word of technology with there virile and versatile mind.<br />
since. hacking is all about interest of someones mind...so i would try to make it as much interesting as much i can.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<span style="font-family: monospace; font-size: small;"><span class="Apple-style-span" style="font-size: 13px; white-space: pre-wrap;"><span style="font-family: 'Times New Roman';"><span class="Apple-style-span" style="font-size: medium; white-space: normal;"><br />
</span></span></span></span><br />
<br />
<b><span class="Apple-style-span" style="font-size: x-large;">You are the visitor number</span></b> <span class="Apple-style-span" style="font-family: monospace; font-size: 13px; white-space: pre-wrap;"><a href="http://www.findmoremobi.org/" target="blank"></a></span><a href="http://www.findmoremobi.org/" target="blank"></a><br />
<a href="http://www.findmoremobi.org/" target="blank"><span class="Apple-style-span" style="font-family: monospace; font-size: 13px; white-space: pre-wrap;"><img alt="Website counter" border="0" hspace="0" src="http://www.professionalwebcounter.com/1707932-337B1DA339BCA2FF2C2F88948FD729D1/counter.img?theme=18&digits=4" vspace="0" /> </span></a> <span class="Apple-style-span" style="font-family: monospace; font-size: 13px; white-space: pre-wrap;"><noscript>&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;br /&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt; &amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;a href="http://www.findmoremobi.org/"&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;Free Counter&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;br /&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt; The following text will not be seen after you upload your website, please keep it in order to retain your counter functionality &amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;br /&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt; &amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;a href="http://www.chipchaser.info/" target="_blank"&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;card casino game online&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;</noscript></span><br />
<br />
<a href="http://www.bloggerschoiceawards.com/blogs/show/94029/?utm_source=bloggerschoiceawards&utm_medium=badge&utm_content=bestgeekblog"><img alt="My site was nominated for Best Geek Blog!" border="0" src="http://www.bloggerschoiceawards.com/images/bca_badges/bca_badge_bestgeekblog.gif" /></a><br />
<blockquote>
</blockquote>alexanderhttp://www.blogger.com/profile/03590062490571918173noreply@blogger.com