Welcome Guest | RSS

Official Site Of The Xakep 4T english version

Thursday, 2024-04-25, 4:47 PM
Main » 2011 » April » 16

AOL Corporation has always been a kind of honey pie for all possible kinds of hackers. Millions of AIM, AOL Mail and ICQ registered users, hundreds of offices all around the world, one billion advertising market and other stuff you can check out directly from the aol.com home page, which enters the Top 50 websites attendance list all around the internet.

http://img403.imageshack.us/img403/8615/hackerxtreme3do6.png

Looking at all this magnificence you won’t be surprised that one day I’ve forwarded my XSpider 7.7 to one of the AOL networks in the range of 64.12.0.0 - 64.12.255.255. So here's how the things turned out...

Victim detected

Out of a rich variety of corporation IP addresses considering the specified range, the alex-aolde-mtc02.evip.aol.com was the first one to attract my attention. After some detailed inspection it turned out to be a ce ... Read more »

Views: 21400 | Added by: XakepNews | Date: 2011-04-16

Wikileaks was born in 2006 but only in 2010 that began to generate controversy on the web site created by another famous hacker Julian Paul Assange.

http://img710.imageshack.us/img710/9381/wikileaks.png

Parliamentary and other hackers ... Read more »

Views: 23257 | Added by: XakepNews | Date: 2011-04-16

The battle between Linux and Microsoft, which lasted two decades since the inception of Linus Torvalds famous operating system kernel is completed. Linux has won, says Linux Foundation executive director Jim Zemlin.
http://www.linux.bulweb.eu/images/linux-banner.jpg

... Read more »
Views: 17275 | Added by: XakepNews | Date: 2011-04-16

Public appearance: WikiLeaks founder Julian Assange will reportedly speak at the Cambridge Union next week, his first public speech for four months

Public appearance: WikiLeaks founder Julian Assange will reportedly speak at the Cambridge Union next week, his first public speech for four months

Julian Assange, the controversial founder of the WikiLeaks website, will address Cambridge University students later this month, according to a student newspaper.

The 39-year-old Australian will speak to the Cambridge Union Society, one of the oldest student debating societies on Tuesday, March 15, Cambridge student newspaper The Tab said.

He is expected to discuss his life and career during the early evening visit.

Lawyers for Assange this week lodge ... Read more »

Views: 15181 | Added by: XakepNews | Date: 2011-04-16

Lately, I see more and more vulnerable government web sites. And the reason is banal: government web sites are charged to be written by non-professionals, or the website is not being moderated and support team does not check emails, etc. Security audit is considered as some kind of luxury service when, in fact, it is a necessity as well as the key to success of website users.

The purpose of this hack is not getting some profit or benefit from the uploaded shell. I want to show how vulnerable the highest level web sites can be. It would seem that protecting them should be the #1 task, because it’s not difficult to imagine what entails hacking the government web site. What if I break into the LAN and get the access to the server which stores some secret information, such as external independent testing results (in case of MES web site)? What then? The authenticity of those certificates which are required by every institution of higher education can be called into que ... Read more »

Views: 10636 | Added by: XakepNews | Date: 2011-04-16

Admit that "Wireless Internet in every home" is a very attractive slogan. It sounds great when your ISP, which granted a dial-up access 5 years ago, deploys a big WiFi infrastructure throughout the whole city (or at least in its center) just in a few days. It would sound like a fools dream came true and now you can enjoy fast internet connection while sitting in McDonald's and mopping up another macfresh. But when you look closer you realize that it can’t happen all that way because ISP (and all its customers thereafter) information security leaves a lot to be desired. In order not to make unsubstantiated statements I suggest your attention a case of an informal audit of the newly born wireless network and who knows, maybe you will realize its credibility having bitter experience with your provider.


Let’s agree in advance: in order to observe etiquette and not to embarrass my ISP, I will not name specific sites and brands. Moreover, the law was not vio ... Read more »

Views: 8216 | Added by: XakepNews | Date: 2011-04-16

Have you ever thought about legal hacking? Is it possible to do the things you love and pump your pentesting skills without breaking the law? Where is it safe to try out some injections and run experiments with web-exploits, without thinking of your VPN is enabled or not? How to test your hackers’ knowledge, starting the path from a scripts’ bug to the very system root? You know… There is the way!

We are often asked the same question: "How to learn hacking?". The answer is simple: study it just like any other subject. At first, you need to deeply and thoughtfully study the theory and only then proceed to practice. The only difference is that there are a lot of books fully ready for studying mathematics, but not hacking. It just looks like there aren’t. You will rebel: "What do you mean there aren’t? What about those shareware programs or any web-resource. There are so much of them. They are great hackers’ "playgrounds”, aren’t they? ". You know, that is an option, anyway ... Read more »

Views: 5994 | Added by: XakepNews | Date: 2011-04-16

Any break-in pursues its own aim, which determines its value. It's up to you to decide whether to deface a site for the latent risqué things lovers or to screw up another root shell. The reality is that any vulnerability in a web application poses a threat to the server. And if you don't confine yourself to the trite and somewhat boring SQL injections so this article is right for you. The victim's address is at input, the admin access via RDP is at output – these are classics of penetration!

The Prelude, or How It All Began

And the beginning was trivial. At first there was a URL. For some reason someone was very interested in this URL, and I had to see what could be done to it. The URL at once got to Firefox, which quickly delivered a result: an institute or something of the kind, heaps of links, ... Read more »

Views: 1190 | Added by: XakepNews | Date: 2011-04-16

Watching the feeds, one’s can often face the news that another Twitter account of some Britney Spears, John McCain and others of that ilk was hacked. Typically, these hacks do not make much effort and are hacked using "brute force” (stars like to set some simple passwords). But brute force – is not our method. British comedian, "The Hitchhiker's Guide to the Galaxy" and "V - for Vendetta" film star, Stephen Fry, can be taken as an example. I will tell you about how to "fuck” a micro blog famous personality quickly and easily play-by-play.

Micro-blogging

Let’s start with the thing that the actor's official website is located at http://www.stephenfry.com. It represents a collection of posts from his blog and forum, gathering of advertising banners and some promotional tra ... Read more »

Views: 8781 | Added by: XakepNews | Date: 2011-04-16

Thousands of years ago nobody could even dream of such a thing as GPS. Sailors and travelers coped well with navigation using a compass, maps, the sun and the stars. It’s the digital era now but nevertheless, there are many ways to determine the location without using global positioning systems.

No doubt, GPS is a great thing, but what if you don’t have a receiver? Not everyone has a cell phone with a built-in GPS chip and the car owner doesn’t necessarily has bought it either. So what to do in that case? There’re three main things you can do considering no rare and exotic options:

  1. You can determine your IP address and then use a special database to get the location of your city. Those databases often include city’s longitude and latitude.
  2. You can determine the location of the next-door GSM / UMTS base station. This thing works only if you have the towers coordinates and identifiers database.
  3. You can also use the nearby Wi-Fi acces ... Read more »
Views: 7460 | Added by: XakepNews | Date: 2011-04-16

Some people truly believe their laptop built-in webcams can pry them so they fearfully beware of that. Sometimes they’re so seriously afraid of prying that they even tape their device’s watchful eye. Actually, they do it invainly. We'll show you how to master the built-in laptop webcam and use its functionality in civilian purpose and not as much civilian too.

Implementation: first annoying troubles

I was very surprised and upset when I learned that great and mighty .NET Framework is completely released from the ability of easy web camera interaction. In .NET v4 the situation has got a bit better (SilverLight-projects got some relevant classes), but I didn’t have enough time to test it, because I began writing some code examples for this article before VS2010 and .NET v4 official release.

Almost desperate, I have tightly ensconced myself in Google. All I found were MSDN and DirectDraw technology links. I even tried to knock out a simple application, ... Read more »

Views: 9598 | Added by: XakepNews | Date: 2011-04-16

Some people truly believe their laptop built-in webcams can pry them so they fearfully beware of that. Sometimes they’re so seriously afraid of prying that they even tape their device’s watchful eye. Actually, they do it invainly. We'll show you how to master the built-in laptop webcam and use its functionality in civilian purpose and not as much civilian too.

Implementation: first annoying troubles

I was very surprised and upset when I learned that great and mighty .NET Framework is completely released from the ability of easy web camera interaction. In .NET v4 the situation has got a bit better (SilverLight-projects got some relevant classes), but I didn’t have enough time to test it, because I began writing some code examples for this article before VS2010 and .NET v4 official release.

Almost desperate, I have tightly ensconced myself in Google. All I found were MSDN and DirectDraw technology links. I even tried to knock out a simple application, ... Read more »

Views: 10647 | Added by: XakepNews | Date: 2011-04-16

The Clickatel service (a service that allows SMS sending from any number) seemed a real catch not so long ago. Everybody have just played with it but soon got tired. It's time to take the next step and figure out how to call and talk to somebody using some spontaneous number. And also try to figure out how to intercept the voice traffic, pick a password for a SIP-provider account and just make the best use of remarkable VoIP technology at the same time.

http://3.bp.blogspot.com/_vd0HXNLvLlY/TQN_siOjwxI/AAAAAAAAAUI/YeIgSvWm2mw/s1600/pulling-sms-from-used-phones.jpg

Where’s the damn low-cost communications?

There’re lots of different implementations of a technology which is generally known as Voice over IP technology. Let’s take a look at the well-known Skype. Skype creators have developed their own data transmission protocol w ... Read more »

Views: 4671 | Added by: XakepNews | Date: 2011-04-16

Casual game is a kind of computer game designed for a wide range of users. The term "casual" is derived from the Latin word "casualis", which means "incidental". Thus, casual game is a game that is played from time to time, often just to kill some time. Creations of the NevoSoft company are just like that. The company gives an opportunity to play only for an hour and then ask you to pay money. Today we'll deal with that!

Some theory

Generally, casual games are suitable for virtually any category of computer users as for the level of complexity. As a rule, such games pass down is pretty poor, that’s why they are well suited for those people who just cannot concern oneself with playing a game for a long time. NevoSoft Company is one of the leading casual game developers in the whole world and particularly in Russia. One would think that such a major company should pay a great attention to its software protection and it should require a lot of time and effort ... Read more »

Views: 4897 | Added by: XakepNews | Date: 2011-04-16

Experts in the field of computer systems reported serious flaws in the software some of the largest shopping sites, and showed how they can be attacked in order to get DVD, magazines in electronic form, and other products free of charge or at heavily discounted prices, which have not been established vendors.

... Read more »
Views: 98164 | Added by: XakepNews | Date: 2011-04-16 | Comments (0)