July 2011

Sunday, 31 July 2011

Doxing - Hackers Information Gathering Technique

Doxing is a technique of tracing someone or gather information about an individual using sources on the internet. Its name is derived from “Documents” or “Docx”. Doxing method is based purely on the ability of the hacker to recognize valuable information about his target and use this information to his benefit. It is also based around the idea that, “The more you know about your target, the easier it will be to find his or her flaws”. This article gives you a brief explanation about doxing and explains how to hack user accounts using doxing

Information that You Can Find Using Doxing
People using internet usually left their information in some website and mostly in social networking site like Facebook, Twitter, Google Plus, etc. Information that you can find using doxing technique are given below.
  • Activities
  • Birthday
  • Contact Information
  • Gender
  • IP – Address
  • Location
  • Name
  • Personal Information
  • Social Networking Site Profiles
  • Website and many more. . .

Useful Website for Doxing
Pipl - Most of the higher quality information about people is simply "invisible" to a regular search engine. Unlike a typical search-engine, Pipl is designed to retrieve information from the deep web. Pipl robots are set to interact with searchable databases and extract facts, contact details and other relevant information from personal profiles, member directories, scientific publications, court records and numerous other deep-web sources.

Wink - It’s similar to Pipl to find people by name and get their phone number,
Address, Websites, photos, work, school and more.

123people - 123people is a real time people search service that looks into nearly every corner of the Web.  Using 123people proprietary search algorithm, you can find comprehensive and centralized name related information consisting of images, videos, phone numbers, email addresses, social networking and Wikipedia profiles plus and much more.

Zaba Search - Information found using ZabaSearch is all available elsewhere on the web and is all public information. ZabaSearch is a search engine, not a database and does not house, create or manage the information in the search results.

WHOIS – Domain Tools provides a directory that serves as a comprehensive snapshot of past and present domain name registration and ownership records. Most Domain hacking is done by gathering information in this website

Social Networking Site - Social networking site is website where individuals can set up an online profile, describing his/her interests, and add links to other profiles. Social Networking is one of the major source for doxing technique. Some social networking sites like Facebook, Google Plus, Hi5, LinkedIn, MySpace, and Twitter contains lot of information about victim.

Search Engine - Search engine is designed to search for information on the World Wide Web and FTP servers. Information may consist of web pages, images, information and other types of files. Some top search engines for doxing are Ask, Bing, Google, Yahoo!.

Useful Tools for Doxing
Maltego - Maltego is an open source intelligence and forensics application. It will offer you timeous mining and gathering of information as well as the representation of this information in an easy to understand format.

Creepy - Creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is presented in a map inside the application where all the retrieved data is shown accompanied with relevant information to provide context to the presentation.

How Doxing is Used for Hacking?
  • Hackers can gather information about the victim and create a dictionary file for a target person alone. Using that dictionary file, he can crack your passwords.
  • Hacker can get the victim's security question answer using doxing.

Conclusion
Doxing needs Intelligence and searching ability. You have to guess where to search and what to search about person. Depending on searching ability, you will get what you required. Doxing is used mainly by Cyber Crime Experts and Hackers. Overall doxing is a powerful hacking technique. If you like this article please leaves your small comment/feedback below..

Read more...

Wednesday, 27 July 2011

Make money from URL Shortener Services

Every day more and more people are looking to learn how to make money faster without pain, so they choose their way to earn through internet. If you are interested to earn money on web, then a simple way is to use URL Shorteners. Many URL shorteners are paying for the use of their service. As any person shortened URL, an advertisement page is shown before visitor redirected to the original page. People need to just register for an account and start the use of free URL shortening service to shrink URLs. They can place their links on Facebook, Twitter, Google Plus, Personal Websites, Forums, and any Social networking sites.

List of URL Shortener Services to Earn Money :
Here, I given some of the top URL Shortener Services to Earn Money
Adf.ly
People believe that Adf.ly is one of the best paid URL shorteners because of its dependability and on-time payment Earn  $4.00 / 1000 visitors to your links and you can also earn by referring users and get a massive 20% commission. It pays through PayPal and AlertPay. Easy-to-reach $5.00 minimum payout.
Byb.me
Byb.me is a simple paid URL shortener and it does not have lots of features. People can earn $3.00/1000 visitors to their links. It contains real-time statistics with revenue breakdown and people can easily reach $10.00 minimum payout. All advertising is sternly family-safe without popups. It offers a financial remuneration in return to users to encourage them to do something.
LinkBucks
LinkBucks allows you to make cash from the links your users post, from the links you place on your website, or from the posts you make in a forum. It is simple and easy to get started making money. It offers three ways to create links such as single links, multiple links and an option to turn all the links in the webpage to a paying link by using a javascript. As visitors click on your links, Intermission ads, and Pop Up ads; you will see three types of ads and can select one of these ads. Linkbucks Pays through Paypal and the smallest amount to withdrawal is $5.00. You may process your payment as you reach that amount.
LNK.co
LNK.co is the medium to archive, shorten and track all your favorite links across the web and earn money doing so. Everyday millions of links are being posted on social networks from Facebook to MySpace without any rewards to the user, but today the bumble bee has decided to share revenue with you. After you make your withdrawal, you will be paid within 7 business days.
Ity.im
Get tiny URLs, great for when text space is limited. All advertising is family-safe with no popups and scanned by our anti-virus scanner on a regular basis. It is fast, reliable customer support with our support ticket system. Manage unlimited links easily with our advanced interface. Its minimum payout at only $3.00.
URL Cash
With URL Cash you will make money from all links that gets posted on your blogs, forums, websites as well as posts you make on other forums and blogs. It's simple and easy to get started making extra income today. It pays you through Alertpay, PayPal, Webmoney and Liberty Reserve
YvY.me
YvY.me a free URL shortening service with a twist and get paid to share your links on the Internet. Just register for an account and start shrinking.
You get paid for every person that visits your URLs.
Xa.ly
Xa.ly is a free URL shortening service with a spin. You get paid to share your links on the Internet! Just register for a free account and start shrinking. You get paid for every person that visits your URLs. Earn more than $4.50/1000 visitors to your links. Get short URLs, great for when text space is limited. All advertising is strictly family-safe with no popups. Real-time statistics with revenue reporting. Refer users and get a whopping 20% commission! Many tools - Mass URL Shrinker, Easy Links, API Low $5.00 minimum payout.
Conclusion
Earning money from URL is really a simple thing but getting more clicks for the Shortened URL is somewhat difficult. This can be achieved by linking an URL with a popular link. I recommend Adf.ly URL Shortener to earn money it provides faster way of payout to their user and one of the most popular one. Some people link to shorten their URL without ads for that visit "URL Shortening Services to Shorten Your URL|Links"

Read more...

Monday, 25 July 2011

URL Shortening Services to Shorten Your URL|Links

URL shortening is a technique on the World Wide Web in which a Uniform Resource Locator (URL) may be made substantially shorter in length and still direct to the required page. This is achieved by using an HTTP Redirect on a domain name that is short, which links to the web page that has a long URL
Example
Original URL:
http://lodge4hacker.blogspot.com/2011/07/next-generation-domain-naming-system.html
Shortened URL:
http://tinyurl.com/3dr8x33

List of best URL Shorteners
TinyURL
TinyURL is probably the most famous of all the URL shortening sites out there, but many people don’t take advantage of two key features they offer. The first - Incorporating a one-click bookmarklet on your browser, so you never have to visit the site to shorten a URL, just click a button on your browser and it’s done!

Bitly
Bitly helps you collect, organize, shorten and share links. Currently reinventing how people discover and share content on the web. It is available via website, browser extensions, mobile web, and numerous third-party tools integrated with our open public API.

Google URL Shortener
Google URL Shortener at goo.gl is a service that takes long URLs and squeezes them into fewer characters to make a link that is easier to share, tweet, or email to friends.

is.gd
is.gd is a free service for shortening web addresses and other URLs. This is useful in many circumstances e.g. when sending an address to a phone via SMS and character count is limited.

Ow.ly
Ow.ly is a URL shorterner from the makers of HootSuite. Ow.ly also plans to open up APIs for developers to integrate

Why Should I Shorten My URLs?
  • If you’re sharing a link on Twitter and some instant-messaging services, you’re limited to 140 characters. Any URL you share can quickly eat up those characters and limit your actual message.
  • Any time your link is visible, the longer it is, the harder it is to remember . Shortening it can solve this problem in some cases.
  • It may also allow you to track how your audience uses and shares your URL.

Read more...

Tuesday, 19 July 2011

Next Generation Domain Naming System - ICANN

Internet Corporation for Assigned Names and Numbers (ICANN) announced a historic change to the Internet's domain naming system on 20th June 2011
ICANN board approved a plan to expand the number of possible internet domain name that new domain naming system allows you to create new Top Level Domains in any language or script, For example .facebook,.hacker, .mac. Currently there are 22 gTLDs (.com, .net, .org) and 250+ ccTLDs (.fr, .de, .cn).To acquire a new generic top-level domain, Organization will be required to pay ICANN $185,000.
Below are some examples for new top level domain announced by ICANN
www.bmw.car
www.nokia.mobile
www.icici.bank
Thus, ICANN give a freedom to user/organization to choose their own new custom gTLD

New gTLDs will change the way people find information on the Internet and how businesses plan and structure their online presence. Internet address names will be able to end with almost any word in any language, offering organizations around the world the opportunity to market their brand,products,community or cause in new and innovative ways.

Applications for new gTLDs (generic top-level domains) will be accepted from 12 January 2012 to 12 April 2012.

Read more...

Sunday, 17 July 2011

Monitoring Network Traffic Using Packet Sniffing Tools

Network traffic is the flow of data across the network (Wired and Wireless Network)

Packet sniffer or Network analyzer is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network.

Who uses packet sniffers?
Packet sniffers are used by both White Hat Hacker (Legal) and Black Hat Hacker (Illegal) activity.
Legal packet sniffer is a commercial device used to assist with network management and maintenance and to provide network security. It is also used as a diagnostic tool for network backup systems and to examine the network system for any security breaches.
Illegal packet sniffer is used to gain unauthorized access to sensitive information and data on a network. An illegal packet sniffer is installed without the knowledge of the IT administrator and hides in different areas of the network for the purpose of spying on and stealing the information packets that pass over the network.

How packet Sniffer works?
When a computer sends a data in the network it sends in the form of packets. These packets are the chunks of data are actually directed to the certain designated system. Actually every sent data has a predefined receiving point. So, all the data are directly directed to a particular computer. Normally a system in a network is designed to receive and read only those data which are intended for it, but when we install a packet sniffer on a network, it looks out for all the data traveling across the network.

The packet-sniffing process involves a cooperative effort between software and hardware. This process can be broken down into three steps such as
  • Packet sniffer collects raw binary data from the wire. Typically, this is done by switching the selected network interface into promiscuous mode
  • Captured binary data is converted into a readable form.
  • Analysis of the captured and converted data. The packet sniffer takes the captured network data, verifies its protocol based on the information extracted, and begins its analysis of that protocol’s specific features.

Packet Sniffing Tools
Some popular to tools for network analyzing and packet sniffing are given below.

Wireshark - It is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types.

Tcpdump - It is one of the oldest network packet sniffer. It was originally written in 1987. Tcpdump works primarily on Unix like operating systems, but there is a port of it that works on Windows as well. tcpdump  is meant for experienced users only, as this packet sniffer is a command line utility. tcpdump can analyze network behavior, and monitor applications that generate network traffic.
Microsoft Network Monitor - Microsoft Network Monitor is a free network packet sniffer. This works on Windows PCs, and provides expert capability to see all the network traffic in real time on an intuitive GUI. Microsoft Network Monitor  is actively maintained by Microsoft, is available for a completely free download, and has a dedicated support site here. Microsoft Network Monitor can be used by beginners just to analyze their home network traffic, or by network administrators to analyze complete organization network by sniffing network packets.

Kismet - Kismet is an console  based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing and can even decloak hidden networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps.

Capsa - It is a very comprehensive network packet sniffer that comes in both free version as well as paid version. Free version comes with tons of features, and is good enough for home use, as well as use in small business. Capsa  does effective network analysis in real time by sniffing network packets, and analyze them. Free version of Capsa lets you monitor 50 IP addresses together, which makes this free packet sniffer especially useful for network administrators.

SniffPass - SniffPass is a very specific type of packet sniffer that focuses on capturing passwords from network traffic. When you turn on Sniffpass password sniffer, it keeps on monitoring network traffic, and as soon as it intercepts a password, it instantly shows that on screen. This is a great way to find forgotten passwords of websites.

Ettercap - Ettercap is a suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks.It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis.

Dsniff - Dsniff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data. arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker. sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI.

EtherApe - EtherApe is a graphical network monitor for Unix modeled after etherman. Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links change in size with traffic. Color coded protocols display.

Cain and Abel - Enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms.

Ntop - Ntop shows network usage in a way similar to what top does for processes. In interactive mode, it displays the network status on the user's terminal. In Web mode, it acts as a Web server, creating an HTML dump of the network status. It sports a NetFlow/sFlow emitter/collector, an HTTP-based client interface for creating ntop-centric monitoring applications, and RRD for persistently storing traffic statistics.

Network Miner - NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files and certificates from PCAP files.

Read more...

Saturday, 9 July 2011

Computer Cookie - Working, Vulnerability and Security

Computer cookies are small piece of information in text format that’s sent to an web browser by an web server. This information can be accessed either by the web server or by the client computer. Cookie information can be used for authentication, identification of a user session, user's preferences, shopping cart contents, or anything else that can be accomplished through storing text data.

What are the types of Cookie?
  • Session cookie
  • Persistent cookie
  • Secure cookie
  • HttpOnly cookie
  • First-Party Cookie
  • Third-Party Cookie
  • Super cookie
  • Zombie cookie
  • Unsatisfactory Cookie

Role of Cookie in Internet
Session Management
Session management is the process of keeping track of a user's activity across sessions of interaction with the computer system.
Personalization
Cookies may be used to remember the information about the user who has visited a website in order to show relevant content in the future. For example a web server may send a cookie containing the username last used to log in to a web site so that it may be filled in for future visits.
Tracking
Tracking cookies may be used to track internet users' web browsing habits. This can also be done in part by using the IP address of the computer requesting the page or the referrer field of the HTTP request header, but cookies allow for greater precision.

How to View Cookies in Web Browser?
Microsoft Internet Explorer
  • Open the Microsoft Internet Explorer software program.
  • Click on “Tools” in the main menu area of the Internet Explorer browser.
  • Scroll down and select “Internet Options” from the tools menu.
  • Look under the Browsing History section on the General settings tab.
  • Press the “Settings” button.
  • Select the “View Files” button and scroll down until you see the files labeled as cookies.
Mozilla Firefox
  • Start or open your Firefox Internet browser.
  • Select the “Tools” option from the main menu of the Firefox 3 software program.
  • Find the “Options” setting on the tools menu and click on it.
  • Click on the “Privacy” button.
  • Locate the “Use Setting for history” tab and select the “Show Cookies”.
Google Chrome
  • Launch your Google Chrome Internet browser.
  • Find the wrench icon located on the main menu and right click on it.
  • Choose “Options” from the menu.
  • Locate and select the “Under the Hood” tab.
  • Look under cookie settings and press “Show Cookies.”
Apple Safari
  • Open the Safari Internet browser software program.
  • Click on “Preferences” in the main browser menu.
  • Discover the “Security” tab and click on it.
  • Select the “Show Cookies” option on the Security.

Vulnerability on Cookies
Cookies are tracking devices for websites They keep track of commonly used information to help your browser operate more efficiently. They usually won't store passwords but often times track browser history, usernames, and other possible identifiers that can be used to gain access to accounts or exploit security vulnerabilities in your computer. Often they are simply text or web URL files so they won’t contain programs (i.e. viruses). The problem that cookies pose is that they have the ability to “share” this information over the internet.

How to Prevent Cookie from hackers?
  • Delete all cookies or individual cookies from your browser regularly
  • Use an updated antivirus in your system
  • Enable a firewall in your system
  • Use HTTP Secure Connection if available (Click here for SSL Search engine)

Read more...

Friday, 8 July 2011

Google Insights for SEO Campaign

Google Insights for Search is a google service providing insights to the search terms. Unlike Google Trends, Google Insights for Search provides a visual representation of regional interest on a country's map. It displays top searches and rising searches that may help with keyword research.

Keyword research is a practice used by search engine optimization professionals to find and research actual search terms people enter into the search engines when conducting a search. Search engine optimization professionals research keywords in order to achieve better rankings in their desired keywords


Google Insights provides SEO information on the most searched associated keywords and provides a list of the fastest rising related words and new related keywords that may be worth targeting.Google Insights for Search is a tremendous tool for webmasters. You have the option of performing search with many alternatives. This gives you a deep insight in to how a particular Keyword has moved over days/months and years. The representation is also region and category specific.Google Insights allows you to track the popularity of a keyword of your choice over a set time frame and see how it has performed and what patterns it has shown in the past. Google Insights also allows you to see the popularity of your keyword by country or by area of your chosen country.
Feature of Google Insights for Search
Categories
Category refers to a classification of industries or markets, which are commonly referred to as verticals. For example, the Entertainment/Music category may include music genres, recording artists, recordings, performances, instruments, and music-related merchandise.When you select a particular category, the data for your search term will be restricted to that category.

Seasonality
Seasonality or Rising searches highlight searches that have experienced significant growth in a given time period, with respect to the preceding time period. So if you're comparing data for a search term during 2006, the time period serving as the basis of comparison is 2005.

Geographic distribution
Geographic distribution is a feature in google insight where you can see how search volume/keyword is distributed across regions and cities.For example, the keyword Dhoni (Indian Cricket player) has more popular search in india than other countries

Visualization
Google insight provides a analysed data/report in an visulazied manner through a Animated heat map and Embeddable charts
Benefit of Using Google Insight
  • Examining seasonality
  • Creating brand associations
  • Determining a new market
  • Choosing advertising messages
  • Identifying Current trends
  • Keyword Research
  • Improving business performance
  • Increase traffic in sites

Conclusion
Nowadays, In a competition world keyword plays an important role in marketing, advertising and search engine. Analyzing is essential before choosing a good keyword/search term.
“Use better keywords for better site traffic, branding and marketing”

Read more...

Wednesday, 6 July 2011

Uninor Website Background Picture


Above Picture taken from a Uninor Website and modified slightly to fit as desktop wallpaper
Note: Click on the Image to view in original size
Ads:


Airtel Digital TV  [Black Airtel Logo] Brand New Original OEM Genuine Housing Bottom Chassis Cover Door FOR BlackBerry Curve 8520 THE PROJECT ON BHARTHI'S AIRTEL TELECOMMUNICATION SERVICES: AIRTEL COMMUNICATION AND ITS ESSENTIAL GROWTH

Read more...

Create a Log File Using Notepad

Log files are the files which save the data with the timestamp. It makes your work better and organized way, you can see the specific data recorded on the specific date & time.
Microsoft Notepad is a word processing tool included with Windows and is installed by default under the Accessories program group. You can use it to create a log-type file that adds the current date and time each time the Notepad file is opened. This article describes how to create a log file with Notepad.

Here are the steps to create a log file using notepad.
  • Open Notepad from Start menu or Press Win-key +R > type notepad
  • In the first line, type .LOG (Remember the point first)
  • Save the file with any name.
Now, whenever you open this file, the time-stamp will automatically appear for the current time and date and you can type whatever data you want.
Above picture is an log file of my blog entry shows date and time that when my article posted in my blog.

Log files are mainly used to record a data with time and date. Server creates an log file to monitor an client activity and some softwares create logfiles themselves to server the data to the software as well as to the software developers.This are some applications of log files. If you like this article make a small feedback in below comment box.

Ads: Notepad   Sticky Notes  Note to Self: A Personal Organizer

Read more...

Tuesday, 5 July 2011

Ninja Hacker's



Wallpaper Created
 by 
Hacker's Lodge


Ads : 
Adobe Photoshop CS5           Hackers & Painters: Big Ideas from the Computer Age           Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software  

Read more...

Monday, 4 July 2011

Facebook RSS Reader Application: "Connect Blog|Website to Your Facebook"

RSS(Really Simple Syndication) is used to publish frequently updated works such as blog entries, news headlines, audio, and video in a standardized format. RSS reader is a small software program that collects and displays RSS feeds. It allows you to scan headlines and short description from a various website and blogs.


Facebook RSS reader application keeps your Facebook fans Page and friends to updated with the latest news from your sites. Using a RSS application is an great time saving i.e., the post you posted in blog/site will automatically transfer to a Facebook

How it works?
Facebook RSS reader application periodically checks the RSS/Atom feeds that you specify and compare the log file. If any new entry is found, it will publish in your Facebook Walls that you specify.

Top Facebook RSS Feed Reader Application:
RSS Graffiti: Reads your Feeds; Writes your Walls. RSS Graffiti allows you to publish multiple RSS/ATOM feeds on your Facebook profile's & page’s walls and automatically pushes them to the news-feeds (Facebook homepage) of your Facebook friends & fans.

Social RSS: Social RSS allows you to add your blog/favorite RSS feeds to your wall, boxes tab or a dedicated tab on your profile or Facebook Page. It updates automatically and lets your readers subscribe to the feeds if they wish!

Networked Blogs: Bring your blog to Facebook and Facebook to your blog. Supports multiple blogs, RSS and ATOM feeds, and fan/business pages. The best to import your feed. Get your blog networked with the largest blogger community on Facebook.
Benefit of RSS Reader Application
  • It connect your site to your Facebook fans and friends
  • It increase your blog/website traffic
  • Your visitor will get updated information about your site

Ads :   The Facebook Marketing Book      The Facebook Effect

Read more...

Home