Our social:

Latest Post

Monday, 13 August 2012

HOW TO ACCESS BANNED SITES(mostly for colleges)


Q1) What Method i will be using ?

Ans : I will be using a method called SSH tunneling

Q2) What is SSH ? and What does it exactly do?

Ans : Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices and all traffic are encrypted not like ftp or telnet were all the messages are sent in plain text

So if we encrypt our connection even a firewall or a proxy wont know were we connecting .Follow the setps given bellow to make a ssh tunnel

Q3) Things we need ?

Ans : 1. Putty you can download from



2. A SSH account there are lots free ssh services providers try
googling them

Q4) Setting up a SSH Tunnel With Putty ?

Ans : 1. After u download open putty now enter the host name as SSH
account which we created earlier and enter the port as 22


2. Now go To SSH options and open tunnels now Change Source port
to 8080 and click Dynamic. and finally click open

3. Now login with your details .Now we will configure Mozilla firefox to use
SSH connection.


4. Now open Firefox and Go to the "Tools" menu and then Options and
Go to the "Advanced" button, the "Network" tab, and then click
"Settings

5. In the connection settings enter "localhost" as the "Socks Host and
your port number, such as "1080" into the "Port:" field .thats it
now all connections are encrypted thus bypassing firewall or proxy


If you want view the packets u can use wire shark

Sunday, 12 August 2012

NEW HALO 4 GAME WILL LAUNCH ON 6 NOV 2012



Amazing new game coming on this year Halo 4. This game will official launch on 6 November 2012. but you can do pre-order now. The Master Chief returns to battle an ancient evil bent on vengeance and annihilation. Shipwrecked on a mysterious world, faced with new enemies and deadly technology, the universe will never be the same. Enlist aboard the Infinity to experience Halo's original multiplayer and Spartan Ops - innovative episodic fiction-based co-op missions.

Key Features
1. The Reclaimer Saga Begins: Experience the dawn of an epic new Halo adventure, solo or split screen with up to three friends.
2. Go Beyond the Story: Halo 4's Infinity Multiplayer features a vastly expanded suite of multiplayer modes, weapons, vehicles, armor abilities, a new loadout and Spartan IV player progression system.
3. Edge-of-your-seat Entertainment: Immerse yourself in Halo 4's graphics, sound and epic game play including a mysterious and deadly new class of enemies.

Video:



On Game mode of war games This revolutionary battle simulation system is where Spartans go to hone their skills in combat. Through holographic technology and vast pneumatic riser fields, the War Games facility is transformed into a hyper-realistic battlefield, simulating both real and hypothetical combat arenas. Moderated by the War Games AI, Spartans engage in a variety of classic and new game types.

Hal0 4 is a three Game Type:

1. Slayer: The standard Slayer experience of past Halo titles, now with a variety of new features that span across the entire War Games experience.

New features include a scoring system which separates both individual and team performance and a dynamic ordnance drop system, among several other exciting things yet to be revealed.

2. Infinity Slayer:
A new twist on the traditional Slayer experience that now allows Spartans to earn points during the course of a match which can eventually be leveraged to call in ordnance from overhead. Ordnance drops within Infinity Slayer consist of three selectable but randomly generated weapons or power-ups, which can alter the Spartans' speed, shielding, or ability to issue damage.

3. Regicide:
The Spartan in first place is the "king." As the king racks up kills, his or her bounty increases, thereby increasing the points other Spartans gain from killing the king. All other Spartans' heads-up displays and motion sensors give away the king's location at all times during the match, intensely focusing combat wherever the point leader happens to be.

The Limited Edition Halo 4 Console
Embark upon the new Halo Reclaimer saga in style on an Xbox 360 Limited Edition Halo 4 Bundle. Designed in collaboration with 343 Industries, this limited-edition bundle includes a customized Halo 4 Xbox 360 console complete with a 320GB hard drive, exclusive on-off and eject sound effects, two customized controllers, a standard edition Halo 4 game and downloadable Halo 4 content.
The Limited Edition Halo 4 wireless controller
Take control of your destiny with the Xbox 360 Halo 4 Limited Edition Wireless Controller, featuring UNSC artwork designed in collaboration with 343 Industries.





GOOGLE PROJECT GLASS PRICE HAS RELEASED




The concept of this Glass was came on 4th Apr 2012 by Google. Now google has released price of Project Glass. Google project has released their price aprrox $1,500 or £961. Now its available for pre order now and ship will be next year.. Its real amazing Future Technology. Google co-founder Sergey Brin took the stage at the conference for a live demo of Project Glass. Brin was able to talk to a group of skydivers in real-time using the special Google Glasses..

Video:


It will record your video, check your calendar, get weather updates and see messages from your friends..


New Video Skydiving Demo:Project Glass







Wednesday, 8 August 2012

CRYPTOGRAPHY







By definition cryptography is the process of converting recognizable data into an encrypted code for transmitting it over a network (either trusted or untrusted). Data is encrypted at the source, i.e. sender's end and decrypted at the destination, i.e. receiver's end.

In all cases, the initial unencrypted data is referred to as plain text. It is encrypted into cipher text, which will in turn (usually) be decrypted into usable plaintext using different encryption algorithms.

                               Plaintext =>Ciphertext=> Plaintext=>Encryption=> Decryption

The Purpose :-
* Authentication : The process of proving one's identity.
* Privacy/confidentiality : Ensuring that no one can read the message except the intended receiver.
* Integrity : Assuring the receiver that the received message has not been altered in any way from the original.
* Non-repudiation : A mechanism to prove that the sender really sent this message.

In general cryptographic algorithms are classified into three categories as follows :

1) Secret Key Cryptography (SKC) : Uses a single key for both encryption and decryption.
2) Public Key Cryptography (PKC) : Uses one key for encryption and another for decryption.
3) Hash Functions : Uses a mathematical transformation to irreversibly "encrypt" information.

Secret Key Cryptography :- 

With secret key cryptography, a single key is used for both encryption and decryption. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption.

Secret key cryptography algorithms that are in use today include :

1) Data Encryption Standard (DES) : DES is a block-cipher employing a 56-bit key that operates on 64-bit blocks. DES uses a key of only 56 bits, and thus it is now susceptible to "brute force" attacks.
Triple-DES (3DES) and DESX are the two important variants that strengthen DES.

2) Advanced Encryption Standard (AES ) : The algorithm can use a variable block length and key length; the latest specification allowed any combination of keys lengths of 128, 192, or 256 bits and blocks of length 128, 192, or 256 bits.

3 ) International Data Encryption Algorithm (IDEA) : Secret-key cryptosystem written by Xuejia Lai and James Massey, in 1992 and patented by Ascom; a 64-bit SKC block cipher using a 128-bit key. Also available internationally.

4) Rivest Ciphers : Named for Ron Rivest, a series of SKC algorithms.

RC1 : Designed on paper but never implemented.
RC2 : A 64-bit block cipher using variable-sized keys designed to replace DES. It's code has not been made public although many companies have licensed RC2 for use in their products. Described in RFC 2268.
RC3 : Found to be breakable during development.
RC4 : A stream cipher using variable-sized keys; it is widely used in commercial cryptography products, although it can only be exported using keys that are 40 bits or less in length.
RC5 : A block-cipher supporting a variety of block sizes, key sizes, and number of encryption passes over the data. Described in RFC 2040.
RC6 : An improvement over RC5, RC6 was one of the AES Round 2 algorithms.

5) Blowfish : A symmetric 64-bit block cipher invented by Bruce Schneier; optimized for 32-bit processors with large data caches, it is significantly faster than DES on a Pentium/PowerPC-class machine. Key lengths can vary from 32 to 448 bits in length. Blowfish, available freely and intended as a substitute for DES or IDEA, is in use in over 80 products.

Public-Key Cryptography :- 

Generic PKC employs two keys that are mathematically related although knowledge of one key does not allow someone to easily determine the other key. One key is used to encrypt the plaintext and the other key is used to decrypt the ciphertext. No matter which key is applied first, but both the keys are required for the process to work. Because a pair of keys are required, this approach is also called asymmetric cryptography.
In PKC, one of the keys is designated the public key and may be advertised as widely as the owner wants. The other key is designated the private key and is never revealed to another party.

Public-key cryptography algorithms that are in use today for key exchange or digital signatures include :

1) RSA : One of the most popular encryption algorithm, invented in 1977 by three MIT scientists (Ronald Rivest, Adi Shamir, and Leonard Adleman)
The key-pair is derived from a very large number, n, that is the product of two prime numbers chosen according to special rules; these primes may be 100 or more digits in length each, yielding an n with roughly twice as many digits as the prime factors. The public key information includes n and a derivative of one of the factors of n; an attacker cannot determine the prime factors of n (and, therefore, the private key) from this information alone and that is what makes the RSA algorithm so secure.




Hash Functions :- 

Hash functions, also called message digests and one-way encryption, are algorithms that, in some sense, use no key. Instead, a fixed-length hash value is computed based upon the plaintext that makes it impossible for either the contents or length of the plaintext to be recovered. Hash algorithms are typically used to provide a digital fingerprint of a file's contents, often used to ensure that the file has not been altered by an intruder or virus. Hash functions are also commonly employed by many operating systems to encrypt passwords. Hash functions, then, provide a measure of the integrity of a file.
Hash algorithms that are in common use today include:
1) Message Digest (MD) algorithms : A series of byte-oriented algorithms that produce a 128-bit hash value from an arbitrary-length message.
MD2 : Designed for systems with limited memory, such as smart cards.
MD4 : Developed by Rivest, similar to MD2 but designed specifically for fast processing in software.
MD5 : Also developed by Rivest in 1991 after potential weaknesses were reported in MD4; this scheme is similar to MD4 but is slower because more manipulation is made to the original data.It accepts variable length message from the user and converts it into a fixed 128-bit message digest value.
One interesting and important aspect of the MD5 hash function is that it is a one way algorithm. This means you can produce the 128-bit fingerprint if the data chunk is available to you. You cannot, however, generate the entire data if only the fingerprint of the data is known.

2) Secure Hash Algorithm (SHA) : Algorithm for NIST's Secure Hash Standard (SHS). SHA-1 produces a 160-bit hash value and was originally published as FIPS 180-1 and RFC 3174. FIPS 180-2 describes five algorithms in the SHS: SHA-1 plus SHA-224, SHA-256, SHA-384, and SHA-512 which can produce hash values that are 224, 256, 384, or 512 bits in length, respectively. SHA-224, -256, -384, and -52 are also described in RFC 4634.

3) RIPEMD : A series of message digests that initially came from the RIPE (RACE Integrity Primitives Evaluation) project. RIPEMD-160 was designed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel, and optimized for 32-bit processors to replace the then-current 128-bit hash functions. Other versions include RIPEMD-256, RIPEMD-320, and RIPEMD-128.

4) HAVAL (HAsh of VAriable Length) : Designed by Y. Zheng, J. Pieprzyk and J. Seberry, a hash algorithm with many levels of security. HAVAL can create hash values that are 128, 160, 192, 224, or 256 bits in length.

5) Whirlpool : A relatively new hash function, designed by V. Rijmen and P.S.L.M. Barreto. Whirlpool operates on messages less than 2256 bits in length, and produces a message digest of 512 bits. The design of this hash function is very different than that of MD5 and SHA-1, making it immune to the same attacks as on those hashes.

6) Tiger : Designed by Ross Anderson and Eli Biham, Tiger is designed to be secure, run efficiently on 64-bit processors, and easily replace MD4, MD5, SHA and SHA-1 in other applications. Tiger/192 produces a 192-bit output and is compatible with 64-bit architectures; Tiger/128 and Tiger/160 produce the first 128 and 160 bits, respectively, to provide compatibility with the other hash functions

Friday, 3 August 2012

CALL FOR PAPER AT HCON






Hcon has decided to release hacking magazine for you guys. itll be an online magazine free for all but for now it needs contributions. Contributions in the sense, Articles. For realeasing anything you need good fleshy information which is not possible for one man. So here by i ask you all to contribute to this great effort made by Ashish Mistry and also if you cannot for anyreasons atleast share it on your blog like me or on your facebook homepage.


Hcon, Information security Training and Tools provider, launched their own PenTesting Magazine ‘Hzine’. We are inviting unique and interesting articles for our First Edition of Hzine.





Theme for the articles : Operating Systems (OS)


Articles can be on Topics :
1. Penetration testing / Hacking
2. Forensics
3. Malware
4. Exploit Development
5. Embedded, Mobile OS
6. OS Configs and Defenses
7. Offensive or Defensive Programming
8. About OS Tools, any specific OS articles
9. Troubleshooting any security issue
10. Any other OS related quality articles are also welcome


Things to consider for article submission :
1. It will be a free Magazine
2. It has to be your own work, research
3. It has to be in ENGLISH only
4. As we are not gaining any money from it, so don’t expect from us to give you
5. Send articles in document format only (doc, docx, odt)
6. articles has to be with if any needed reference


More info: http://www.hcon.in/hzine.html


Contact:  https://www.facebook.com/Root.Hcon


www.hcon.in/contact-us.html
if you feel you have it in you !!