Google

Friday, February 8, 2008

how to create an .exe file

many of u might be knowing this but still this is for those who dont know

Making an executable file(.exe)

goto to start run and type iexpress


STEP BY STEP ON HOW TO USE IT
click create new self extraction then next

click extract files and run an installation command and click next
type what you want to name the files then click next
click no prompt then next
license agreement unless you want to put one click do not display license


package files(most important) click add then choose your .bat file(also does .vbs files) then click next
under install program choose your .bat or .vbs file and click next
show window pick one and click next
finished message pick one and click next
click browse and type the name of it and save then next


configure restart just click no restart and then next
just click don't save then next
their click next and watchyour file change into something better
when its done click finish and check out your new file

Block websites without any software

block webSites without any Softwares !!__________________________________________________________
Steps

1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.orkut.com , and that site will no longer be accessable.
5] Done!

example :

127.0.0.1 localhost
127.0.0.2 www.orkut.com

- www.orkut.com is now unaccessable


For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.

IE:
127.0.0.3 www.yahoo.com
127.0.0.4 www.msn.com
127.0.0.5 www.google.com

This also works with banner sites, just find the host name of the server with the banners and do the same thing with that addy.

Hoep this small tutorial could keep you going in simple way of blocking websites

Career Academy Hacking, Penetration Testing and Counter 17CD

Package Includes:
Featuring live instructor-led classroom sessions with full audio, video and demonstration components
Printable courseware
300+ Penetration Testing Review Questions
eWorkbook - 725 pages Student eWorkbook by Logical Security

Module 1
Ethical Hacking and Penetration Testing
Security 101
Hacking Hall of Fame
What are Today's hackers Like?
Today's Hackers
Risk Management
Evolution of Threats
Typical Vulnerability Life Cycle
What is Ethical Hacking?
Rise of the Ethical Hacker
Types of Security Test
Penetration Test (Pen-test)
Red Teams
Testing Methodology
VMWare Workstation
Wind0wz and Linux Running VMWare
Linux Is a Must
Linux Survival Skills
Useful vi Editor Commands
Module 1 Review
Module 2
Footprinting and Reconnaissance
Desired Information
Find Information by the Target (Edgar)
terraserver.M'***zoft.com
Network Reconnaissance & DNS Search
Query Whois Databases
Command-Line Whois Searches
ARIN whois: Search IP Address Blocks
SamSpade Tool and Website
Internet Presence
Look Through Source Code
Mirror Website
Find Specific Types of Systems
Big Brother
AltaV_I_S_T_A
Specific Data Being Available?
Anonymizers
Countermeasures to Information Leakage
Social Engineering
DNS Zone Transfer
Nslookup command-line utility
Zone Transfer from Linux
Automated Zone Transfers
Zone Transfer Countermeasures
www.CheckDNS.net
Tracing Out a Network Path
tracert Output
Free Tools
Paratrace
War Dialing for Hanging Modems
Manual and Automated War Dialing
Case Study
www.guidedogs.com
Footprinting Countermeasures
Demo - Footprinting & Info Gathering
Module 2 Review
Module 3
TCP/IP Basics and Scanning
The OSI Model
TCP/IP Protocol Suite Layers
Encapsulation
Data-Link Protocols
IP - Internet Protocol, Datagram (Packet)
ICMP Packets
UDP – User Datagram Protocol
UDP Datagram
TCP – Transmission Control Protocol
TCP Segment
TCP/IP 3-Way Handshake and Flags
TCP and UDP Ports
Ping Sweeps
Good Old Ping, Nmap, TCP Ping Sweep
TCP Sweep Traffic Captured
Unix Pinging Utilities
Default TTLs
Pinging Countermeasures
Port Scanning
Nmap
Advanced Probing Techniques
Scanrand
Port Probing Countermeasures
Watch Your Own Ports
Demo - Scanning Tools
Module 3 Review
Module 4
Enumeration and Verification
Operating System Identification
Differences Between OS TCP/IP Stack
Nmap -O
Active vs Passive Fingerprinting
Xprobe/Xprobe2
Countermeasures
SNMP Overview
SNMP Enumeration
SMTP, Finger, and E-mail Aliases
Gleaning Information from SMTP
SMTP E-mail Alias Enumeration
SMTP Enumeration Countermeasures
CIFS/SMB
Attack Methodology
Find Domains and Computers
NetBIOS Data
NBTscan
NULL Session
Local and Domain Users
Find Shares with net view
enum: the All-in-one
Winfo and NTInfoScan (ntis.exe)
Digging in the Registry
NetBIOS Attack Summary
NetBIOS Countermeasures
What’s this SID Thing Anyway?
Common SIDs and RIDs
whoami
RestrictAnonymous
USER2SID/SID2USER
psgetsid.exe and UserDump Tool
LDAP and Active Directory
GUI Tools to Perform the Same Actions
Demo - Enumeration
Module 4 Review
Module 5
Hacking & Defending Wireless/Modems
Phone Numbers & Modem Background
Phone Reconnaissance
Modem Attacks
Wireless Reconnaissance
Wireless Background
Wireless Reconnaissance Continued
Wireless Sniffing
Cracking WEP Keys
Defending Wireless
Module 5 Review
Module 6
Hacking & Defending Web Servers
Web Servers in General: HTTP
Uniform Resource Locator: URL
Apache Web Server Functionality
Apache: Attacking Mis-configurations
Apache: Attacking Known Vulnerabilities
Defending Apache Web Server
M'***zoft Internet Information Server (IIS)
IIS: Security Features
IIS: Attacking General Problems
IIS: IUSER or IWAM Level Access
IIS: Administrator or Sys Level Access
IIS: Clearing IIS Logs
IIS: Defending and Countermeasures
Web Server Vulnerability Scanners
Demo - Hacking Web Servers
Module 6 Review
Module 7
Hacking & Defending Web Applications
Background on Web Threat & Design
Basic Infrastructure Information
Information Leaks on Web Pages
Hacking over SSL
Use the Source, Luke…
Functional/Logic Testing
Attacking Authentication
Attacking Authorization
Debug Proxies: @stake webproxy
Input Validation Attacks
Attacking Session State
Attacking Web Clients
Cross-Site Scripting (XSS) Threats
Defending Web Applications
Module 7 Review
Module 8
Sniffers and Session Hijacking
Sniffers
Why Are Sniffers so Dangerous?
Collision & Broadcast Domains
VLANs and Layer-3 Segmentation
tcpdump & WinDump
Berkley Packet Filter (BPF)
Libpcap & WinPcap
BUTTSniffing Tool and dSniff
Ethereal
Mitigation of Sniffer Attacks
Antisniff
ARP Poisoning
MAC Flooding
DNS and IP Spoofing
Session Hijacking
Sequence Numbers
Hunt
Ettercap
Source Routing
Hijack Countermeasures
Demo - Sniffers
Module 8 Review
Module 9
Hacking & Defending Wind0wz Systems
Physical Attacks
LANMan Hashes and Weaknesses
WinNT Hash and Weaknesses
Look for Guest, Temp, Joe Accounts
Direct Password Attacks
Before You Crack: Enum Tool
Finding More Account Information
Cracking Passwords
Grabbing the SAM
Crack the Obtained SAM
LSA Secrets and Trusts
Using the Newly Guessed Password
Bruteforcing Other Services
Operating System Attacks
Hiding Tracks: Clearing Logs
Hardening Wind0wz Systems
Strong 3-Factor Authentication
Creating Strong Passwords
Authentication
Wind0wz Account Lockouts
Auditing Passwords
File Permissions
Demo - Attacking Wind0wz Systems
Module 9 Review
Module 10
Hacking & Defending Unix Systems
Physical Attacks on Linux
Password Cracking
Brute Force Password Attacks
Stack Operation
Race Condition Errors
Format String Errors
File System Attacks
Hiding Tracks
Single User Countermeasure
Strong Authentication
Single Sign-On Technologies
Account Lockouts
Shadow Password Files
Buffer Overflow Countermeasures
LPRng Countermeasures
Tight File Permissions
Hiding Tracks Countermeasures
Removing Unnecessary Applications
DoS Countermeasures
Hardening Scripts
Using SSH & VPNs to Prevent Sniffing
Demo - Attacking Unix Systems
Module 10 Review
Module 11
Rootkits, Backdoors, Trojans & Tunnels
Types Of Rootkits
A Look at LRK
Examples of Trojaned Files
Wind0wz NT Rootkits
NT Rootkit
AFX Wind0wz Rootkit 2003
Rootkit Prevention Unix
Rootkit Prevention Wind0wz
netcat
netcat: Useful Unix Commands
netcat: What it Looks Like
VNC-Virtual Network Computing
Backdoor Defenses
Trojans
Back Orifice 2000
NetBus
SubSeven
Defenses to Trojans
Tunneling
Loki
Other Tunnels
Q-2.4 by Mixter
Starting Up Malicious Code
Defenses Against Tunnels
Manually Deleting Logs
Tools to Modify Logs
Demo - Trojans
Module 11 Review
Module 12
Denial of Service and Botnets
Denial-of-Service Attacks
CPUHog
Ping of Death
Teardrop Attacks
Jolt2
Smurf Attacks
SYN Attacks
UDP Floods
Distributed DoS
DDoS Tool: Trin00
Other DDoS Variation
History of Botnets
Anatomy of a Botnet
Some Common Bots
Demo - Denial of Service
Module 12 Review
Module 13
Automated Pen Testing Tools
General: Definitions
General:What?
General: Why?
Core Impact™ Framework
Core Impact™ Operation
Canvas™ Framework
Canvas™ Operation
Metasploit Framework
Metasploit Operation
Demo - Automated Pen Testing
Module 13 Review
Module 14
Intrusion Detection Systems
Types of IDSs
Network IDSs
Distributed IDSs (DIDSs)
Anomaly Detection
Signature Detection
Common IDS Software Products
Introduction to Snort
Attacking an IDS
Eluding Techniques
Testing an IDS
Hacking Tool - NIDSbench
Hacking Tool - Fragroute
Hacking Tool - SideStep
Hacking Tool - ADMmutate
Other IDS Evasion Tools
Demo - IDS and Snort
Module 14 Review
Module 15
Firewalls
Firewall Types
Application Layer Gateways
ALGs (Proxies)
Stateful Inspection Engine
Hybrid Firewall
Host-Based Firewall
Network-Based Firewall
DMZ (Demilitarized Zone)
Back-to-Back Firewalls
Bastion Hosts
Control Traffic Flow
Multiple DMZs
Controlling Traffic Flow
Why Do I Need a Firewall?
What Should I Filter?
Egress Filtering
Network Address Translation (NAT)
Firewall Vulnerabilities
IPTables/NetFilter
Default Tables and Chains
iptables Syntax 1
iptables Syntax 2
Sample IPTables Script 1
Sample IPTables Script 2
Persistent Firewalls
Firewall Identification
Firewalk
Tunneling with Loki
Tunneling with NetCat/CryptCat
Port Redirection with Fpipe
Denial-of-Service Attacks Risk?
Demo - Firewalls and IP Tables
Module 15 Review
Module 16
Honeypots and Honeynets
What Is a Honeypot?
Advantages and Disadvantages
Types and Categories of Honeypots
Honeypot: Tarpits
Honeypot: Kfsensor
Honeypot: Honeyd
Sample Honeyd Configuration
High-Interaction Honeypot
Project HoneyNet
Types of Honeynets
The Main Difference is Data Control
GEN II Data Control: Honeywall CD
Gen II Data Capture: Sebek & Sebek II
Automated Alerting
Testing
Legal Issues
Demo - Setting up a Honeypot
Module 16 Review
Module 17
Ethics and Legal Issues
The Costs
Relation to Ethical Hacking?
The Dual Nature of Tools
Good Instead of Evil?
Recognizing Trouble When It Happens
Emulating the Attack
Security Does Not Like Complexity
Proper and Ethical Disclosure
CERT’s Current Process
Full Disclosure Policy
Organization for Internet Safety (OIS)
What Should We Do from Here?
Legal Meets Information Systems
Addressing Individual Laws
18 USC SECTION 1029
18 USC SECTION 1030
1030: Worms and Viruses
Blaster Worm Attacks
Civil vs. Criminal
18 USC SECTIONS 2510 and 2701
Digital Millennium Copyright Act
Cyber Security Enhancement Act
Module 17 Review
Course Closure




CD1.Ethical.Hacking.and.Penetration
Code:
http://rapidshare.com/files/24150271/Module_1.part01.rar

http://rapidshare.com/files/24150273/Module_1.part02.rar

http://rapidshare.com/files/24150275/Module_1.part03.rar

http://rapidshare.com/files/24150276/Module_1.part04.rar

http://rapidshare.com/files/24159635/Module_1.part05.rar

http://rapidshare.com/files/24159637/Module_1.part06.rar

http://rapidshare.com/files/24159638/Module_1.part07.rar

http://rapidshare.com/files/24159639/Module_1.part08.rar

http://rapidshare.com/files/24163957/Module_1.part09.rar

http://rapidshare.com/files/24163959/Module_1.part10.rar





CD2 Footprinting and Reconnaissance
Code:
http://rapidshare.com/files/24168655/Module_2.part01.rar

http://rapidshare.com/files/24168656/Module_2.part02.rar

http://rapidshare.com/files/24168657/Module_2.part03.rar

http://rapidshare.com/files/24168658/Module_2.part04.rar

http://rapidshare.com/files/24174114/Module_2.part05.rar

http://rapidshare.com/files/24174115/Module_2.part06.rar

http://rapidshare.com/files/24310589/Module_2.part07.rar

http://rapidshare.com/files/24310590/Module_2.part08.rar

http://rapidshare.com/files/24310591/Module_2.part09.rar





CD3 TCP/IP Basics and Scanning
Code:
http://rapidshare.com/files/24321107/mod.3.part1.rar

http://rapidshare.com/files/24321109/mod.3.part2.rar

http://rapidshare.com/files/24339724/mod.3.part3.rar





CD4 Enumeration and Verification
Code:
http://rapidshare.com/files/25291513/module.4.part1.rar

http://rapidshare.com/files/25291516/module.4.part2.rar

http://rapidshare.com/files/25297786/module.4.part3.rar

http://rapidshare.com/files/25297787/module.4.part4.rar





CD5 Hacking & Defending Wireless/Modems
Code:
http://rapidshare.com/files/24480780/module_5.part1.rar

http://rapidshare.com/files/24480781/module_5.part2.rar

http://rapidshare.com/files/24480784/module_5.part3.rar

http://rapidshare.com/files/24480785/module_5.part4.rar

http://rapidshare.com/files/24480786/module_5.part5.rar

http://rapidshare.com/files/24480787/module_5.part6.rar





CD6 Hacking & Defending Web Servers
Code:
http://rapidshare.com/files/28925031/Module.6.Hacking.Defending.Web.Servs.part01.rar

http://rapidshare.com/files/28925032/Module.6.Hacking.Defending.Web.Servs.part02.rar

http://rapidshare.com/files/28925034/Module.6.Hacking.Defending.Web.Servs.part03.rar

http://rapidshare.com/files/28925035/Module.6.Hacking.Defending.Web.Servs.part04.rar

http://rapidshare.com/files/28931012/Module.6.Hacking.Defending.Web.Servs.part05.rar

http://rapidshare.com/files/28931013/Module.6.Hacking.Defending.Web.Servs.part06.rar





CD7.Hacking.Defending.Web.Applications
Code:
http://rapidshare.com/files/26188740/Module.7.part1.rar

http://rapidshare.com/files/26188742/Module.7.part2.rar

http://rapidshare.com/files/26196529/Module.7.part3.rar





CD8. .Sniffers.and.Session.Hijacking
Code:
http://rapidshare.com/files/26196533/Module.8.part1.rar

http://rapidshare.com/files/26360406/Module.8.part2.rar

http://rapidshare.com/files/26360407/Module.8.part3.rar





CD9.Hacking.Defending.Wind0wz.Systems
Code:
http://rapidshare.com/files/26370153/Module.9.part1.rar

http://rapidshare.com/files/26376136/Module.9.part2.rar

http://rapidshare.com/files/26370156/Module.9.part3.rar





CD10.Hacking.Defending.Unix.Systems
Code:
http://rapidshare.com/files/28216732/Module_10.part01.rar

http://rapidshare.com/files/28216733/Module_10.part02.rar

http://rapidshare.com/files/28216734/Module_10.part03.rar

http://rapidshare.com/files/28216735/Module_10.part04.rar

http://rapidshare.com/files/28216737/Module_10.part05.rar

http://rapidshare.com/files/28216740/Module_10.part06.rar

http://rapidshare.com/files/28222043/Module_10.part07.rar

http://rapidshare.com/files/28222044/Module_10.part08.rar

http://rapidshare.com/files/28222045/Module_10.part09.rar

http://rapidshare.com/files/28222046/Module_10.part10.rar





CD .11.Rootkits.Backdoors.Trojans.Tunnels
Code:
http://rapidshare.com/files/28236225/Module_11.part01.rar

http://rapidshare.com/files/28236226/Module_11.part02.rar

http://rapidshare.com/files/28236228/Module_11.part03.rar

http://rapidshare.com/files/28236229/Module_11.part04.rar

http://rapidshare.com/files/28236231/Module_11.part05.rar

http://rapidshare.com/files/28236233/Module_11.part06.rar

http://rapidshare.com/files/28238956/Module_11.part07.rar

http://rapidshare.com/files/28238959/Module_11.part08.rar





CD.12.Denial.of.Service.and.Botnets
Code:
http://rapidshare.com/files/28250428/Module_12.part1.rar

http://rapidshare.com/files/28250430/Module_12.part2.rar

http://rapidshare.com/files/28250431/Module_12.part3.rar

http://rapidshare.com/files/28250432/Module_12.part4.rar

http://rapidshare.com/files/28250433/Module_12.part5.rar

http://rapidshare.com/files/28250434/Module_12.part6.rar

http://rapidshare.com/files/28250435/Module_12.part7.rar





CD.13..Automated.Pen.Testing.Tools
Code:
http://rapidshare.com/files/28259605/Module.13.part01.rar

http://rapidshare.com/files/28259607/Module.13.part02.rar

http://rapidshare.com/files/28259608/Module.13.part03.rar

http://rapidshare.com/files/28259610/Module.13.part04.rar

http://rapidshare.com/files/28259612/Module.13.part05.rar

http://rapidshare.com/files/28259613/Module.13.part06.rar

http://rapidshare.com/files/28259614/Module.13.part07.rar





CD.14.Intrusion.Detection.Systems
Code:
http://rapidshare.com/files/28268932/Module_14.part01.rar

http://rapidshare.com/files/28268933/Module_14.part02.rar

http://rapidshare.com/files/28268935/Module_14.part03.rar

http://rapidshare.com/files/28268936/Module_14.part04.rar

http://rapidshare.com/files/28268937/Module_14.part05.rar

http://rapidshare.com/files/28268938/Module_14.part06.rar

http://rapidshare.com/files/28275713/Module_14.part07.rar

http://rapidshare.com/files/28275714/Module_14.part08.rar

http://rapidshare.com/files/28275715/Module_14.part09.rar

http://rapidshare.com/files/28275716/Module_14.part10.rar





CD .15.Firewalls
Code:
http://rapidshare.com/files/28283458/Module_15.part01.rar

http://rapidshare.com/files/28283459/Module_15.part02.rar

http://rapidshare.com/files/28283460/Module_15.part03.rar

http://rapidshare.com/files/28283461/Module_15.part04.rar

http://rapidshare.com/files/28283464/Module_15.part05.rar

http://rapidshare.com/files/28283465/Module_15.part06.rar

http://rapidshare.com/files/28338024/Module_15.part07.rar

http://rapidshare.com/files/28338028/Module_15.part08.rar

http://rapidshare.com/files/28338029/Module_15.part09.rar

http://rapidshare.com/files/28338030/Module_15.part10.rar

http://rapidshare.com/files/28338032/Module_15.part11.rar





CD. 16.Honeypots.and.Honeynets
Code:
http://rapidshare.com/files/28345006/Module_16.part01.rar

http://rapidshare.com/files/28345007/Module_16.part02.rar

http://rapidshare.com/files/28345008/Module_16.part03.rar

http://rapidshare.com/files/28345009/Module_16.part04.rar

http://rapidshare.com/files/28345010/Module_16.part05.rar

http://rapidshare.com/files/28345011/Module_16.part06.rar

http://rapidshare.com/files/28354433/Module_16.part07.rar

http://rapidshare.com/files/28354435/Module_16.part08.rar







CD. 17 .Ethics.and.Legal.Issues
Code:
http://rapidshare.com/files/28354436/Module_17.part1.rar

http://rapidshare.com/files/28354437/Module_17.part2.rar

http://rapidshare.com/files/28354438/Module_17.part3.rar

http://rapidshare.com/files/28354439/Module_17.part4.rar

http://rapidshare.com/files/28357536/Module_17.part5.rar

http://rapidshare.com/files/28357537/Module_17.part6.rar



PASS included in rar file description

Tuesday, February 5, 2008

Disable yahoo from tracking you

As you all know, Yahoo! upgraded its features and the capacities of the mail accounts have grown to 2GB. That's good for sure, but the "monitoring" methods that we all have been far too familiar with in the last couple of years have been renewed with this move also. Yahoo! is now keeping track of which sites its members that are getting into groups or using Yahoo! services are visiting and storing this data with a method called "Web Beacons". The aim is to give these statistics to the partner companies arranged by agreement and to improve the "advertisement guiding" function.

However, those who are bothered by this and do not want to be kept track of have still a choice. Yahoo! has hidden this option way deep inside somewhere but I'm declaring it here in case there are people who want it anyway:

1. Go to the address

CODE http://privacy.yahoo.com/privacy

and click the "Cookies" link under the "Special Topics" column.

2. Click the "Web Beacons" link under the "Reference Links" Column.

3. On this page, click the "click here to opt out" link toward the end of the third paragraph under the "Outside the Yahoo! Network" title.

4. After a while, a page that says you have been out of the monitoring program will load. Without doing anything, close that page or continue your usual surfing by typing another address in the address bar. (Do NOT click the "Cancel Opt-out" button, your action will be cancelled!)

Sunday, February 3, 2008

Top 6 freewares for your computer

1.OpenOfficeOrg -Alternate to Microsoft Office.Has all the features of Microsoft Office and it is free.

Download



2.VLC Media Player - It has the capacity to play any type of media (popular ones), including Flash Videos (flv) and Windows Media Videos. It’s very light and thus ideal for all purposes.

Download

3.Mozilla Firefox- This is one of the best and the most popular browser, it is light, now it is very secure and proxy configuration is very easy. It also has a script executing add on called Greasemonkey which is very helpful. There are many other addons for Mozilla.


Download


4.Opera Browser- A SuperFast Browser that is secure and Free. My Favoruite Browser with Awesome unique features


Download


5.Gimp - It’s a free image editor tool. Numerous digital photo imperfections can be easily compensated for using GIMP. Fix perspective distortion caused by lens tilt simply choosing the corrective mode in the transform tools. Eliminate lens barrel distortion and vignetting with a powerful filter but a simple interface.

Download

6.AVG - This company claims that it has provided security for over 50 million computers, it is a good anti-virus solution. It can protect you from spywares, trojans, worms, virus, filters junk emails and more.

Download