Monday, August 4, 2008

stay anonymous : N OTHERS

AIO 16 tools to stay anonymous :

AIO 16 tools to stay anonymous :
01 #1 Anonymous Proxy List Verifier 1.1
02 Anonimity 4 Proxy2.8
03 Charon 0.6
04 Get Anonymous 2.1
05 GhostSurf Platinum 2007
06 Hide ip Platinum 3.42
07 Hide The Ip 2.1.1
08 Invisible Browsing 5
09 IP Switcher Professional 1.01.12.0
10 MultiProxy v1.2
11 NetConceal Anonymity Shield 5.2.059.02
12 Proxy Switcher Standard 3.7.2.3913
13 Proxygrab 0.6
14 proxyway extra v3.2
15 SmartProxyHelper 1.5
16 Steganos Internet Anonym 2006 v8.0.1

Download Links :-

http://rapidshare.com/files/48541745/Aio-Ip-Anonymous-Surfing-Tools.exe.001
http://rapidshare.com/files/48541751/Aio-Ip-Anonymous-Surfing-Tools.exe.002

Are these Succesful against ISP??

will they b able to catch it....

2. IF U WANA DO PERFECT ..USE PROXY BOUNSING U CAN GET MANY PROXY JUST GO ON CHANGING THE PROXY AND U WILL NEVER BE CAUGHT........IP PLATINUM USES THAT TECHNIUQUE..........

3. Hacking Methodology :

This is Lecture no.2 in our Series of Hacking Lectures (NSEHL)
Here we discuss some of the Hacking methodology employed by most of the hackers . Here is an overview of how a successful hack is performed. we'll go into details in subsequent lectures

Disclaimer :- I AM NOT RESPONSIBLE FOR YUOR ACTIONS NOR DO I ENCOURAGE ANY ACTIVITIES

So here we go !!!

Testing Methodology

1 . Footprinting -
also called as information gathering .
In footprinting we'll deal with basic information findings like finding names of people ,address ,domains , subdomains , ip ranges ,geo-location , possible backdoors (physical).
At this step direct connection with the target has been made . so we are very very safe .
For collection we can look at physical methods like ,information in dustbins, old papers, hard drives) etc. and cyber methods like sattelite imaging , who is database , archives pages /cached pages (in case of webservers) etc.

2. Scanning -
At this step we actively/passively scan the network , any direct or indirect connection is made and chances of getting caught increases tremendously .
So be on the safer side , be anonymous .
Scanning the network helps us find out places to exploit , services the network is running , open ports ,different vulnerabilities in the services , host os detection

3. Penetrate-
This step includes penetration of the External layers of the network like - external firewalls ,DMZ server (webserver mail server , ftp) ,Modem ,wireless access point etc. it also include gaining physical access to the systems

4 . Enumerate -
Includes finding target's username, password , shares , Netbios names ,SMTP strings, email address etc.

5. Penetrating Internal Layers i.e data access -
Logging with enumerated usernames and password and checking what is the highest level of privilages we can get .It basically makes the attacker as one of the person from the internal network

6. Escalate -
Obviously being one of the employee wouldn't help much we have to be the boss . at this step we try to get to the highest level in terms of computer privilages i.e. root account or system admin

7. Pillage -
Do whatever you want to do -stole confidential data , credit cards ,files etc.

8. Get interactive -
Obviously a network with so many hops is not an effecient connection . at this step we try to get interactive with the system by making direct connection to the system avoiding tunnels ,firewalls ,loops ,hops

9. Expand Influence -
It means taking over as many computers on the network as we can . at this step we try to make as many slaves (computers) as we can find .

10 .Cleanup -
Who wants to be caught Noone !! . Consider this step to be of utmost importance. One mistake can bring FBI to your doorstep when you are celebrating your hack and put you behind the bars in no time . Be sure to clean up all the mess you have made . Install a backdoor ,fixing vulnerability to prevent other hackers access,Delete logs (only your entries) and get the hell out of there

These ten steps if gone through effeciently can lead to a very nice hack
Most of the times you'll see you need not even perform half of them .
anyways i think that finishes my Second lecture

SAUV : The practical part of all this has also been posted

http://hackerzrule.freeforums.org/viewtopic.php?t=257

No comments: