Showing posts with label hacktricks. Show all posts
Showing posts with label hacktricks. Show all posts

06 June 2015

IPHONE TOOLBOX: 75+ iPhone Resources

iPhone Apps

apps.jpg
Apple hasn't yet released an iPhone SDK (software development kit) to developers, instead, they've opted to promote the use of the device's full-featured Safari browser, and have encouraged web developers to develop web apps specifically for the iPhone.
iPhoneChat- iChat-like AIM chat application.
OneTrip- Simple shopping-list application.
FlickIM- Multi-featured AIM chat application.
Digg (iPhone edition)-Digg.com formatted for the iPhone.
Gcalc- Calculates the cost of tech according to power consumption.
Hahlo- iPhone-styled interface for Twitter.
iPhlickr- iPhone-styled Flickr interface.
iDelicious- Styled interface for del.icio.us.
iPicli- A nicely designed gallery of creative content, managed by users.
PocketTweets- Another twitter app, with a minimal interface.
eBuddy- Feature-packed iPhone chat client with support for AIM, Yahoo!, and MSN (Site works only if visited on your iPhone).
Cool Gorilla Talking Phrasebook- Foreign language phrase-book with audio.
Texterity- Innovative way to view magazines (specifically formatted for the iPhone).
Bejeweled- Version of the popular mobile-phone game, "Bejeweled" optimized for the iPhone.
Newsgator Mobile for iPhone- Full-featured, mobile version of Newsgator's online offering. Great for users of the MacRSS client, NetNewsWire, which automatically syncs to the service.
Twitter for iPhone Yet another twitter app.
Dailymotion for iPhone- Youtube's already built-in, what about the other video-sites? Another video-sharing site, Dailymotion, is offering an iPhone formatted version of their site.
iRovr- A social-network exclusive to the iPhone.
iPhoneiGTD- App for access of projects being tracked via the Mac client iGTD. The only catch is that your iGTD data needs to be synced with .Mac in the first place.
TeleMoose- A front-end for Amazon.com optimized for the iPhone.
Google Reader- An interface for popular web-based RSS reader, Google Reader, nicely optimized for the iPhone.

iZoho
- An iPhone front-end for the web-based office suite Zoho. The iPhone version lets you do everything you might do on your computer, including viewing and editing docs, spreadsheets, and presentations.
Gas.app- Enter your zip code and this app will find you the cheapest gas in town (USA only).
MyMetar- A "weather bookmarking service" which allows you to bookmark your local METARs, TAFs, and radar images.
iPhoneTravel- Searches directory travel.ian.com just in case you need to book flights, hotels, and cruises from your iPhone.
iBookmark- Lets you manage and sync del.ico.us bookmarks with your iPhone.
Youtube- An iPhone-optimized Youtube browser, just in case the "desktop" version isn't working for you.
GoMovies- An easy and quick way to search for movie showtimes and other movie-related info right from your iPhone.
iChess- Bored? Cure your chess craving with iChess, a simple, chess app for your iPhone.
Leaflets- A suite of iPhone apps: Search, Feeds, Newsvine, App-List, Upcoming, Flickr, del.icio.us, and Le Tour de France, organized in a desktop-like fashion. Safari 3 users can preview Leaflets by viewing the web-based demo.
Listingly- A list making application with a great UI. Integrated word recognition and the ability to print lists make this an indispensable resource, especially for making shopping lists on the go.
iPling- A "social expansion engine" allows you to findothers with similar interests. The app even provides a way for users to meet up in real-life after the anonymous exchange of text-messages.
NYTimes River- Cuts out the clutter on the NYTimes website, just delivering the news in an easily readable format.
CheapMF- Out shopping? Not sure about prices? CheapMF can help. It's a utility that searches Amazon.com for prices on specified products in order to help you make educated shopping decisions.
iTouch- A simple, addictive game which tests your reflexes, just touch some dots on the screen.
Avalanche- An addictive puzzle game in which the goal is to clear the screen of blocks by picking three or more inter-connected blocks of the same color.
Expense View- Allows you to import your spending data into your iPhone on-the-go.You can then access your data at home and see exactly how you've been spending your money. It's even equipped with graphs and categories for the organized spender.
iPhone recipes- Cooking resource 101 Cookbooks has assembled an iPhone interface for searching through recipes.
iActu- Newsstand like interface for reading news headlines from various Newspapers.
iTweet- The third twitter app on this list, with an intuitive, streamlined interface.
Ta-da List 37signals, simple, intuitive to-do list app.
Movies Another app for looking up movie showtimes and other related info on your iPhone.
iTipr- Excellent application for calculating appropriate tip amounts.
Seeqpod- Search for playable music on the internet and then play it back on your iPhone.
Beejive- Another chat application, Beejive, is a solid contender in the iPhone chat app market. The app supports several chat protocols including, AIM, MSN, Yahoo!, Gtalk, ICQ, and Jabber. While everything seems to be in working order for me, please note the app's still in it's early alpha development stage.
TestiPhone- Web-based simulator for quickly testing your iPhone applications.
JiWire- A utility to find free Wi-Fi hotspots by location, worldwide.
FastApp- An iPhone "dashboard" that displays the latest additions to iPhoneApplicationList.com
WordBreaker- A word-game in which you you attempt to guess your computer's secret word before it guesses yours, in a hangman-like logic format.
Airport Delay Tracker- Track live air traffic information.
iBloglines- Another iPhone-optimized RSS reader, this one, with the Bloglines service.
Belfry SciCalc- A nicely implemented scientific calculator for the iPhone.
Your Vids- Another iPhone optimized video service with several features.
TV Forecast- A personalized TV-guide optimized for the iPhone.

iPhone Resources

Collections (App Lists, Wallpapers, Forums etc)

collections.jpg
iPhone Application List- An ever-updating list of iPhone apps.
iPhone Widget List- Like iPhone Application List, but with even more apps.
sciphone.net- A constantly updated collection of the best iPhone wallpapers, including weekly themepack releases.
ThemeMyPhone- A community-centric resource for iPhone wallpapers.
ModMyiPhone.com- iPhone forum and community.
iPhone Application Gallery ~ AppSafari ~- An iPhone application gallery with ratings, reviews, and comments.

Blogs

iPhone Central- The guys from Macworld have put together a blog solely dedicated to the iPhone, with all the authority that goes with the Macworld name. They even have an iPhone version.
The iPhone Blog- A nicely put together iPhone blog.
ZDNet- iPhone- ZDNet's iPhone coverage.
The Cult of Mac- The Cult of Mac blog covers the iPhone plenty.
CNet- iPhone- CNet's coverage of the iPhone.
iPhone- Gizmodo Gizmodo's iPhone coverage.
TUAW- iPhone TUAW's iPhone coverage.
Ars Technica- Apple Ars Technica's Apple coverage, plenty of iPhone coverage to be found.

Podcasts

podcasts.jpg
iCali- Cali Lewis' (from GeekBrief.tv) in her iPhone-centric podcast.
ApplePhone Show- A weekly audio podcast covering the iPhone, hosted by industry leaders Scott Bourne, Chris Breen and Andy Ihnatko.
MacBreak Weekly- The popular weekly Mac podcast with hosts Leo Laporte, Merlin Mann, Scott Bourne and Alex Lindsay is bound to cover the iPhone more than enough.
TWiT Another one of Leo Laporte's successful tech podcasts, again, bound to even further inform you of the latest iPhone developments.

Hacks

hacks.jpg
Hack the iPhone- A comprehensive site containing all the info you need to hack your iPhone.
iPhone Hacks- An assembly of the latest iPhone hacks in blog form.
Applehound- Consistently updated listing of iPhone bugs, ready for hacking.

20 September 2014

40+ Free Hacking Tutorials


 
                                                                                                                                                                          Ethical hacking, hacking, hacking tutorials, hacking resources, Hacking Tutorials for Beginners, How to learn Ethical hacking, Penetration Testing Tutorial, Backtrack Penetration Testing Tutorial, Introduction to Penetration Testing, Information Gathering with Nmap, Simple How To Articles, The Six Dumbest Ideas in Computer Security,  Secure Design Principles, 10 steps to secure software, Introduction to Public Key Cryptography, Crypto Tutorial, Introduction to Cryptography,
Here are some great hacking tutorials and resources that you can explore in your journey to learn hacking:

1. Hacking Tutorials for Beginners By BreakTheSecurity.com

Unless you know how to hack, you cannot defend yourself from hackers. Break The Security(BTS) provides Penetration Testing and Ethical Hacking tutorials. It guides users to get into the PenTesting and Ethical Hacking World.

2. How to learn Ethical hacking By Astalavista.com

You can learn all there is to know about Ethical hacking over here.

3. Penetration Testing Tutorial By Guru99.com

Here you learn Penetration Testing by practice. The goal of this testing is to find all security vulnerabilities that are present in the system being tested. This tutorial takes boredom out of learning and makes education a fun experience.

4. Backtrack Penetration Testing Tutorial

This Backtrack Penetration Testing Tutorial is a penetration testing tutorial using Backtrack Linux. Backtrack is the best penetration testing distribution. Offers some penetration testing programs and these programs will used in this Backtrack Penetration Testing Tutorial.

5. Introduction to Penetration Testing

The difference between penetration testing and hacking is whether you have the system owner’s permission. This tutorial helps you understand this better.

6. Information Gathering with Nmap

This tutorial consists of a series that will give a basic walkthrough of a penetration test. However, many tools on the backtrack distro will not be covered in these and could be asked from the author separately.

7. Simple How To Articles By Open Web Application Security

Series of articles describing how to perform a specific activity that contributes to application security.

8. The Six Dumbest Ideas in Computer Security

Introduces you to the six dumbest ideas in computer security: the anti-good ideas that come from misguided attempts to do the impossible.

9. Secure Design Principles

While there are many specific security practices, they flow from a small set of well-accepted principles. Understanding the fundamental principles puts you in the best position to implement specific practices where needed in your own projects. This tutorial guides you through the same.

10. 10 steps to secure software

The author and security analyst recommends that programmers follow some principles for developing secure software that is today's weakest link.

11. Introduction to Public Key Cryptography

Public-key cryptography and related standards and techniques underlie security features of many Red Hat products, including signed and encrypted email, form signing, object signing, single sign-on, and the Secure Sockets Layer (SSL) protocol. This document introduces the basic concepts of public-key cryptography.

12. Crypto Tutorial

The page contains many crypto tutorials, totalling 973 slides in 12 parts, of which the first 10 (+ part 0) are the tutorial itself and the 12th is extra material which covers crypto politics.

13. Introduction to Cryptography

Deals with the very basics of cryptography.

14. An Overview of Cryptography

There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography, which is the focus of this chapter.

15. Cryptography Tutorials Herong's Tutorial Examples

Collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include blowfish, certificate, cipher, decryption, DES, digest, encryption, keytool, MD5, OpenSSL, PEM, PKCS#8, PKCS#12, private key, public key, RSA, secret key, SHA1, SSL, X.509.

16. The Crypto Tutorial Herong's Tutorial Examples

Easy-to-use, interactive cryptography tutorial. You have the opportunity to learn the secrets of cryptography in 30 lessons without having any background knowledge.

17. Handbook of Applied Cryptography 

This ebook contains some free chapter from one of the popular cryptography books.

18. Network Penetration testing Guide

Risk assessment is a critical first-step in the information security lifecycle. Network penetration testing offers an invaluable way to establish a baseline assessment of security as it appears from outside the organisation's network boundaries.

19. How to hack anything in Java

Many applications in the enterprise world feature thick Java clients. Testing the security of such applications is considered practically more difficult than a similar browser-based client because inspecting, intercepting and altering application data is easy in the browser.

20. Mcafee on iPhone and iPad Security

Mobile application penetration testing is an up and coming security testing need that has recently obtained more attention, with the introduction of the Android, iPhone, and iPad platforms among others.

21. A Good Collection of White papers on security and vulnerabilities

Collection of white papers from different sources and some of these white papers are really worth referring.

22. Engineering Principles for Information Technology Security

The purpose of the Engineering Principles for Information Technology (IT) Security (EP-ITS) is to present a list of system-level security principles to be considered in the design, development, and operation of an information system.

23. Basic Principles Of Information Protection

As computers become better understood and more economical, every day brings new applications. Many of these new applications involve both storing information and simultaneous use by several individuals. The key concern in this paper is multiple use. For those applications in which all users should not have identical authority, some scheme is needed to ensure that the computer system implements the desired authority structure.

24. Open Web Application Security Project

Application security principles are collections of desirable application properties, behaviors, designs and implementation practices that attempt to reduce the likelihood of threat realisation and impact should that threat be realised.

25. Cryptography Course

Learn about the inner workings of cryptographic primitives and how to apply this knowledge in real-world applications!

Websites

26. http://www.astalavista.com/

27. http://packetstormsecurity.com/

28. http://www.blackhat.com/

29. http://www.metasploit.com/

30. http://sectools.org/

31. http://www.2600.com/

32. DEF CON - Hacking conference

33. http://www.breakthesecurity.com/

34. http://www.hacking-tutorial.com/

35. http://www.evilzone.org/

36. http://hackaday.com/

37. http://www.hitb.org/

38. http://www.hackthissite.org/

39. http://pentestmag.com

40. http://www.securitytube.net/

19 September 2014

Best Wi-Fi Hacking Tools Ever

 
                       
Hacking, hacking tools, wi fi hacking, ethical hacking, Kismet, NetStumbler, WireShark, AirSnort, CoWPAtty


1. Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which allow sniffing other media such as DECT. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and infering the presence of nonbeaconing networks via data traffic.

-Features :

1. 802.11b, 802.11g, 802.11a, 802.11n sniffing
2. Standard PCAP file logging (Wireshark, Tcpdump, etc)
3. Client/Server modular architecture
4. Multi-card and channel hopping support
5. Runtime WEP decoding
6. Tun/Tap virtual network interface drivers for realtime export of packets
7. Hidden SSID decloaking
8. Distributed remote sniffing with Kismet drones
9. XML logging for integration with other tools
10. Linux, OSX, Windows, and BSD support (devices and drivers permitting)

2. NetStumbler

NetStumbler is a tool for Windows that facilitates detection of Wireless LANs using the 802.11b, 802.11a and 802.11g WLAN standards. It runs on Microsoft Windows operating systems from Windows 2000 to Windows XP. A trimmed-down version called MiniStumbler is available for the handheld Windows CE operating system.

-Used for :

1. Wardriving
2. Verifying network configurations
3. Finding locations with poor coverage in a WLAN
4. Detecting causes of wireless interference
5. Detecting unauthorized ("rogue") access points
6. Aiming directional antennas for long-haul WLAN links

3. WireShark

Wireshark is the world's foremost network protocol analyser. It lets you see what's happening on your network at a microscopic level. It is the de facto standard across many industries and educational institutions.

-Features :

1. Deep inspection of hundreds of protocols, with more being added all the time
2. Live capture and offline analysis
3. Standard three-pane packet browser
4. Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
5. Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility

4. AirSnort

AirSnort is a Linux and Microsoft Windows utility (using GTK+) for decrypting WEP encryption on an 802.11b network. Distributed under the GNU General Public License,[1] AirSnort is free software. However, it is no longer maintained or supported.

5. CoWPAtty

CoWPAtty automates the dictionary attack for WPA-PSK. It runs on Linux. The program is started using a command-line interface, specifying a word-list that contains the passphrase, a dump file that contains the four-way EAPOL handshake, and the SSID of the network. 

17 September 2014

Topmost Hacking/Security Tools

 
                                                     Hacking tools, hacking, process of hacking,  12 topmost hacking tools and utilities,  Nmap,  Nessus Remote Security Scanner,  John the Ripper,  Nikto,  SuperScan,  p0f,  Wireshark,  Eraser, Yersinia,  Cain and Abel, LCP, Kismet


1. Nmap: 

Nmap is the most popular one, recently evolved into the 4.x series. Nmap or Network Mapper is a free open source utility which is used for network exploration or security auditing. It can scan large networks rapidly, and it can work fine against single hosts too. Nmap uses raw IP packets to determine the availability of hosts on the network, and their service. Nmap also determines what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and several other characteristics too. Nmap is compatible with most types of computers and both console and graphical versions of this tool are available. Nmap is free and open source and it can be used by beginners as well as pros. Download Nmap here.

2. Nessus Remote Security Scanner: 

Nessus is a closed source option now, though it comes for free. Nessus, which works with a client-server framework, is the world’s most popular vulnerability scanner and it is used across 75,000 organizations world-wide. Nessus helps in effective cost-cutting when auditing is done for business-critical enterprise devices and applications. Download Nessus here.

3. John the Ripper: 

John the Ripper is a fast password cracker which is available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Primarily it detects weak Unix passwords and it also supports Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, along with several more with contributed patches. Download John the Ripper here.

4. Nikto: 

This is an Open Source (GPL) web server scanner. It performs comprehensive tests against web servers for multiple items, and the list includes over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Updates are made frequently to scan items and plugins. Nikto is a good CGI scanner. Get Nikto here.

5. SuperScan: 

SuperScan is a powerful TCP port scanner, pinger and resolver and an update, SuperScan 4, has arrived recently. If you are looking for an alternative to nmap on Windows with a decent interface, Ithen SuperScan is highly recommended which you can download here.

6. p0f: 

P0f v2 is a versatile passive OS fingerprinting tool which has some basic requirements to identify the operating system like machines that connect to your box (SYN mode), machines you connect to (SYN+ACK mode), machine you cannot connect to (RST+ mode) and so on. Basically this tool can take fingerprint of anything but no active connection is made with the target machine. Get it here.

7. Wireshark (Formely Ethereal): 

This is a GTK+-based network protocol analyzer which lets you capture and interactively browse the contents of network frames. Wireshark aims to create a commercial-quality analyzer for Unix and it works great on both Linux and Windows (with a GUI). It's quite user-friendly which can reconstruct TCP/IP Streams. Download it here.

8. Yersinia: 

Yersinia is a network tool which is designed in a way so that it can take advantage of some weakness in different Layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, certain network protocols are implemented like Spanning Tree Protocol (STP), Dynamic Trunking Protocol (DTP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, VLAN Trunking Protocol (VTP) and more.Download Yersinia here.

9. Eraser: 

Eraser is an advanced security tool, primarily for Windows, and it allows you to completely remove sensitive data from your hard drive. It gets overwritten several times with carefully selected patterns. Eraser is compatible with Windows 95, 98, ME, NT, 2000, XP and DOS. It is a Free software and its source code is released under GNU General Public License. Eraser is an excellent tool which keeps your data safe anyhow. Download Eraser here.

10. LCP: 

LCP program mainly focuses on user account passwords auditing and recovery in Windows NT/2000/XP/2003. Its other specialisations include accounts information import, passwords recovery, brute force session distribution and hashes computing. LCP is a good free alternative to L0phtcrack. Get LCP here.

11. Cain and Abel: 

This is one of the most famous password cracking systems across the world. Cain & Abel is a password recovery tool used for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by just sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations and so on.Download this program here.

12. Kismet: 

This is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet is compatible with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. It is also a good wireless tool as long as your card supports rfmon. Download here.

Courtesy: Darknet.org.uk 

15 September 2014

Skills That Make You A Real Geek


   
                                                                geek, nerd, nerd skills, tech skill, Apple, Mac, OS X, essential geek skills, learn computer, essential nerd skills




1. Know Your Hardware

When it comes to hardware, you should be able to tell what's what, even the oldest and most obsolete chips make no difference to a nerd. In fact, we specialise in those. Well, that and finding the most out of date hardware from old equipment and putting them to good use in new ones.

2. Run All Your Essential Apps on a USB Stick

It is possible to install various apps on a thumb drive, but if you're a nerd, you would already know that. The rite of passage is in carrying around a thumb drive with all your apps in it, so you can access them and their settings from any computer.

3. Straighten the Pins on an Older CPU

When the pins of an old CPU or card have been bent, you probably throw it away. Not if you're a nerd. There are two simple tricks to realign these pins. The first is to run a credit card up and down through the rows of pins and the second is to take a mechanical pencil and realign them by sheating them in the pencil's tip. The first method works when the pins are lightly bent, while the second one works when the credit card trick fails.

4. Know the 13 Basic HTML Tags
to
-- Heading styles
-- New paragraph


or
-- Single line break

-- Hidden comment

-- Horizontal rule line

-- Bold text

-- Emphasise text

-- Strong emphasis

-- Italicise

-- Underline

  -- Non-Breaking space

-- Anchor a link

”description” -- Insert image

5. Get Through to Executive Customer Service

Nerds always get through to the executive customer service, somehow they always do. An average person doesn't know that there are ways to get around robotic customer service menus  (
Gethuman.com). Moreover, when nothing works, they find and call the number to a company's corporate offices.

6. Beat Quake in Under an Hour

The art of speed runs is almost non-existent nowadays. Remember how people used to finish Quake in 15 minutes or less? That's a skill that makes you an alpha nerd.

7. Build a Hackintosh

You may not buy a Mac PC yourself, but you've tried out Apple's OS X platform, just to see if it lives up to the hype. Moreover, you may even have tried to build yourself your own custom assembled PC, which runs the OS X platform. In other word, built yourself a Hackintosh.

8. Watch TV Shows on the Internet (Legally!)

There are a number of websites out there, led by Hulu, which offer video streaming services, allowing you to watch popular shows online. A nerd would watch his or her shows online through these legal websites rather than committing piracy.

9. Get Around the Content Filter on Public Computers

Content restrictions on public computers never go well with you. You would much rather get around these restrictions and continue on with things that you want to do on the computer. The first option is to use a proxy website, but if that doesn't work, then you handy portable thumb drive comes into use. You would have a portable version of Firefox enabled with Tor installed in the thumb drive. Use that.

10. Recite pi to 23 Decimal Places

Here's what the value is. Memorise it.

3.141592653589793238462643

11. Replace the Controller Board on a Hard Drive

When hard drives go bust, replacing their Controller Board is often the way to fix them. In nerd land, this an essential skill, which keeps your data safe.

12. Benchmark Your Computer

Nerds are always working to improve hte performance of their PCs. But doing this is of no use or fun if one can not know how much the performance has improved. This is where Benchmarking software comes in.

13. Decorate Your Room Using Only Printer Paper

You know you can create your poster right? As long as you have a reasonably high resolution image, the website Rasterbator can turn it into a poster and you can print it out

14. Securely Erase Your Data So it Can't be Recovered

You erase your data securely, so that it can not be recovered. Face it, even though you know that it might get you into trouble, you have done it. You will go on a manufacturer's website and download the 'zero fill' software for your hard drive. Then you will delete whatever files you need to.

15. Get into a Windows Computer if you Forgot Your Password

Lost your Windows login password for your PC? Doesn't matter, you know there are ways to recover it. You can use a cracker, that is a software that cracks this password. In addition, you can also do some other things, like checking whether an admin account is present. 

 

Subscribe to our Newsletter

Contact our Support

Email us: raghupathibalasani@gmail.com

Contact Address

  • Raghupathi
  • Hyderabad