• What It is

    Here You can get some info .

  • What we do

    We will provide some nice information regarding Hacking

  • About Us

    A person like uuuu... :)




  • A man has been jailed for 18 years following a prolonged campaign of hacking his neighbours Wi-Fi in an attempt to frame them for child pornography and threats against the US Vice President.
    Minnesota resident Barry Ardolf was sentenced to a lengthy stretch in America's finest following an astonishing campaign of revenge against his neighbours, apparently motivated by the neighbours reporting Ardolf to the police after kissing their 4-year-old son.
    The FBI, having become involved following the death threats against Vice President Joe Biden , discovered documents stolen from the man's neighbours as well as detailed revenge plans against his neighbours Matt and Bethany Kostolnik. While the Kostolnik's Wi-Fi router network was encrypted, Ardolf reportedly used password cracking software to discover the password to the router where upon he would access the Kostolnik's home network and set up fake MySpace and Yahoo email accounts posting as his neighbours. In a court document from the prosecution prior to sentencing, Ardolf was described as a "dangerous man" that "uses his technical skills both to inflict harm and to avoid getting caught."

    -News Source (PCR)
    [......]



    Pakistan Cyber Army hunts once again. This time the target was BSNL. More than 10,000 customers sensitive information & credentials (Name, Email-id, Phone number Address and so on) leaked. PCA also exposed BSNL's VPN details, important technical information and some other details


    [......]





    Pakistani President's website presidentofpakistan.gov.pk is Vulnerable and its Database has been hacked by Zero. He also exposed vital credentials

    Vulnerable Website:- 

    Vulnerable Link:-

    Database:-

    Credentials:-

    Admin:- 

    admin@president.gov.pk 
    95bd46fafdd3eb2fe90b816fed5a218990f61281

    Zia Ghani (Web-content Manager):- 

    zia.ghani@president.gov.pk 
    ef2524fd2ecd57fba015c3d97fac1a207af5ffce
    [......]



    35 million users Personal information of a South Korean social network site may have been exposed. Local authorities were quick to blame hack attacks against the Cyworld social networking website and the Nate web portal – both of which are run by SK Telecom – on Chinese hackers.

    Names, phone numbers, email addresses, and other details may have been exposed through the Cyworld hack, which follows previous attacks against South Korean government sites and financial service firms. North Korea has been implicated in some of these hacks.

    South Korean police are reportedly investigating the cyberattack against Cyworld – a social network with a SIMS-like environment featuring avatars and virtual apartments – and Nate, which offers webmail.

    Mark Darvill, director at security appliance firm AEP Networks, commented: "By any standard this is a massive attack and one of many in recent months where the finger has been pointed at hackers based in China. It's too early to say whether this attack is politically motivated or merely an attempt to steal personal information for financial gain."

    "It's now becoming increasingly difficult to differentiate between attacks on military, communications, financial, civilian or critical infrastructure targets," he added.

    There are approximately 49 million people in South Korea in total, so it would appear that the great majority of them who are online at all may have been hacked.
    [......]









    Bollywood Star - Mallika Sherawat official website mallikasherawatwow.com get defaced by an Indian hacker "KFMDD Teams" . Hacker put "Tiranga" on the deface page as shown.
    [......]




    Bitdefender has updated its suites for the coming year, and it says it has done it in part by adopting a bit of Romanian lore. Although, to be honest, it may also sound familiar to fans of George R.R. Martin's Game of Thrones series. Available exclusively today from CNET Download.com, Bitdefender Total Security 2012 (download)Bitdefender Internet Security 2012 (download), and Bitdefender Antivirus Plus 2012 (download) were improved in part by taking on the "philosophy based on mythical wolf-dragon from Romania," said Matt Hicks, the company's global public relations manager. The wolf-dragon, he said, is supposed to represent security and alertness. 
    Whatever the impetus behind the redesign of the suite, there's no doubt that they include a number of notable improvements. A revamped interface has given the suites a cleaner design that feels lighter and easier to use, while retaining its modularity. The virus-detection engine has been improved to look at processes while they are running, while Bitdefender's own processes were moved to the kernel to make it more difficult to for threats to circumvent the suite. In turn, this has reduced the suite's impact on system resources, according to Catalin Cosoi, Bitdefender's head of Online Threats Lab.
    The browser add-on for Firefox and Internet Explorer has been wisely done away with, replaced by a make-agnostic module that will protect you across all five major browsers by scanning Web traffic before it reaches the browser. A new autopilot feature has been added to create a completely silent security experience. It's similar to Bitdefender's competitors' "silent" or "gaming" mode, although it does a bit more than just silencing security pop-up alerts. It also makes some changes to the program's settings, in how it deals with threats, and it also is on as the default setting for Bitdefender. Meanwhile, a vulnerability scanner will check your computer for outdated programs, drivers, and patches, and recommend solutions.
    The Bitdefender Safego tool has been integrated into the suite, too. It performs link scanning for Facebook, with plans to include Twitter support soon. On Facebook, it will scan your news and wall feeds. It's also available for free to all Facebook users, and the company's Android app remains free to use for all, as well.
    The rescue mode changes are extremely useful. If threats like rootkits can't be removed easily, the computer is rebooted into rescue mode. Florin Virlan, Software Engineering Director, said that Bitdefender's rescue mode differs from competitors because it creates a "self-contained Linux OS, contained in one encrypted file on your PC," that the rescue mode boots into. It also adds Linux as an option to your boot BIOS. 
    The Safebox feature, which automatically backs up your files to a remote server when changes have been detected, will now sync files across multiple computers when they are running Bitdefender. Notably, Safebox is the only new or improved feature that only comes in Bitdefender Total Security 2012. The other improvements have been made across all three suites.
    One thing to watch out for is that Bitdefender does not play well with any other security program, even the ones designed to work as complements to security suites like Malwarebytes. Come back to Download.com later today to read full reviews of Bitdefender's 2012 suites. 
    For More info Click HERE
    [......]



    Paypal collected 1000 IP addresses of those carrying out Anonymous' DDoS attacks against PayPal last December. To be fair the names on the list will probably be the bottom feeding script kiddies rather than the hackers at the top of Anomymous's greasy pole. The clever hackers know to mask their IP addresses first.
    An FBI affidavit suggests the Untouchables may have lots more people to arrest. FBI agent Chris Thompson says PayPal security officials were in close contact with the bureau beginning 6 December, two days after PayPal froze WikiLeaks' donation account and the first day it began receiving serious denial-of-service traffic.
    FBI agents began monitoring Anonymous press releases while PayPal collected traffic logs on a Radware intrusion prevention system installed on its network.

    Paypal gave the feds a USB thumb drive containing the Radware reports, which documented "approximately 1,000 IP addresses that sent malicious network packets to PayPal during the DDoS attacks." These were the IP addresses that sent the largest number of packets. Packets coming from Anonymous contained strings like "wikileaks," "goof," and "goodnight". The affidavit was offered in support of a search warrant for the home of an Arlington, Texas couple and their son. They have not been charged yet, but the house was the source of 3,678 packets in about two-and-a-half hours.
    [......]



    Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and  password hashes, dump tables and columns, fetching data from the database, running SQL  statements and even accessing the underlying file system and executing commands on the operating system.


    The New features of Havij 1.15 :-

    Webknight WAF bypass added.
    Bypassing mod_security made better
    Unicode support added
    A new method for tables/columns extraction in mssql
    Continuing previous tables/columns extraction made available
    Custom replacement added to the settings
    Default injection value added to the settings (when using %Inject_Here%)
    Table and column prefix added for blind injections
    Custom table and column list added.
    Custom time out added.
    A new md5 cracker site added
    Bugfix: a bug releating to SELECT command
    Bugfix: finding string column
    Bugfix: getting multi column data in mssql
    Bugfix: finding mysql column count
    Bugfix: wrong syntax in injection string type in MsAccess
    Bugfix: false positive results was removed
    Bugfix: data extraction in url-encoded pages
    Bugfix: loading saved projects
    Bugfix: some errors in data extraction in mssql fixed.
    Bugfix: a bug in MsAccess when guessing tables and columns
    Bugfix: a bug when using proxy
    Bugfix: enabling remote desktop bug in windows server 2008 (thanks to pegasus315)
    Bugfix: false positive in finding columns count
    Bugfix: when mssql error based method failed
    Bugfix: a bug in saving data
    Bugfix: Oracle and PostgreSQL detection
    [......]




    The personal information of about 35 million Internet users in South Korea was stolen in an alleged hacking attack that originated in China, officials said Thursday.
    Hackers purportedly attacked popular Internet and social media sites Nate and Cyworld earlier this week, stealing data such as social security numbers and email addresses, the Korea Communications Commission said in a statement.
    The regulator said that the operator of the sites, SK Communications, alleged the attack originated from computers in China based on their Internet Protocol addresses. IP addresses are the Web equivalent of a street address or phone number.
    The stolen data included user IDspasswordssocial security numbersnamesmobile phone numbers and email addresses. Nate said the social security numbers and passwords are encrypted so that they are not available for illegal use.

    South Korean police said Thursday their investigation could take several months.

    Kim Jie-won, a KCC official, said that if proven, the alleged attack would be the largest Internet hacking case to have taken place in South Korea.

    The country is one of the most wired in the world and its citizens some of the most Internet-savvy. South Korea has a population of about 50 million people. More than 80 percent of households have broadband access to the Internet, according to the country's statistical office.
    South Korea has faced Internet attacks before, with blame frequently pinned on hackers operating from IP addresses in China. China has denied all charges of hacking in the past and says the country itself is a victim of hacking.
    In May, South Korean prosecutors said that hackers in North Korea  had broken into the computer network of a South Korean bank earlier this year. The prosecutors said software used in the hacking was similar to that used in a 2009 attack that paralyzed South Korean and U.S. websites.

    North Korea has flatly denied any responsibility for the attacks.
     

    [......]



    One prominent security researcher has discovered a vulnerability in the batteries of Apple's MacBook line of portable computers that could allow hackers to ruin the batteries or install malware on them that could corrupt a Mac.
    Charlie Miller, a renowned white-hat hacker who works for security firm Accuvant, plans to reveal and offer a fix next month for a MacBook battery vulnerability he has discovered, Forbes reports. Miller uncovered default passwords, which are used to access the microcontroller in Apple's batteries, within a firmware update from 2009 and used them to gain access to the firmware.

    Apple and other laptop makers use embedded chips in their lithium ion laptop batteries to monitor its power level, stop and start charging and regulate heat.
    During the course of his tests, the researcher "bricked" seven batteries, rendering them unusable by rewriting the firmware. Of more concern is the possibility that hackers could use the vulnerability to install difficult to remove malware, or, in a worst case scenario, cause the batteries to explode.

    “These batteries just aren’t designed with the idea that people will mess with them,” he said. “What I’m showing is that it’s possible to use them to do something really bad.” According to him, IT few administrators would think to check the battery, providing hackers with an opportunity to hide malicious software on a battery that could repeatedly implant itself on a computer.

    Miller admitted that he hasn't tried to blow up any batteries, but he did say it might be possible. "You read stories about batteries in electronic devices that blow up without any interference,” he noted. “If you have all this control, you can probably do it.”
    another researcher, Barnaby Jack, who works for antivirus software maker McAfee, also looked into the battery issue a couple years ago, but said he didn't get as far as Miller did.

    Miller, who is a regular winner of security contests demonstrating Mac, Safari and iPhone exploits, has notified Apple and Texas Instruments of the issue. Despite requests from several other researchers not to proceed, he plans to unveil the vulnerability, along with a fix he calls "Caulkgun," at the Black Hat security conference next month. 
    "Caulk Gun" will change a battery's default passwords to a random string of characters. While the fix will prevent hackers from breaking into the battery, it would also block any future firmware updates from Apple.

    In spite of the battery vulnerability that he uncovered, Miller believes Mac OS X security is better than ever before. According to him, Apple engineers made few security-related changes in the jump from Leopard to Snow Leopard, but they made substantial improvements in Mac OS X 10.7 Lion, which was released on Wednesday.
    "Now, they've made significant changes and it's going to be harder to exploit,” he said, as noted by The Register.
    “It's a significant improvement, and the best way that I've described the level of security in Lion is that it's Windows 7, plus, plus,” said noted security consultant Dino Dai Zovi.
    Apple offered security researchers, including Miller and Dai Zovi, an unprecedented early look at Lion in order to get their feedback.
    According to researchers, Lion's biggest security improvement is Lion's support for Address Space Layout Randomization. ASLR randomizes the location of critical system components to reduce the risk of attack. Apple also added sandboxing security measures in Safari that will isolate potential bugs or malware. Finally, the newly revamped File Vault now allows an entire drive to be encrypted.



    [......]



    An unemployed truck driver has been charged with hacking into an Australian broadband network provider and could have caused significant damage to the national Internet infrastructure, police said Wednesday. The 25-year-old man, who will appear in a New South Wales state magistrates court Wednesday, faces charges of hacking into one of the National Broadband Network's service providers and numerous other businesses and websites in Australia and overseas since May, Australian Federal Police manager Grant Edwards said. The suspect, from the rural town of Cowra, cannot be publicly named until he appears in court.
    The investigation began in January when Sydney University reported that its website had been hacked and defaced. Police said Wednesday that there was no evidence that any personal information had been stolen from any of the businesses hacked.

    "We'll allege in court today that the man could have potentially caused considerable damage to Australia's national infrastructure by attacking the National Broadband Network," Edwards told reporters.
    The Sydney-based wholesale Internet provider, Platform Networks, is one of 13 contracted by the government-owned company NBN Co., which is rolling out one of the world's fastest fiber-optic broadband networks at a cost of 36 billion Australian dollars ($39 billion).

    The alleged hacker has been charged over the NBN hacking with one count of unauthorized modification of data to cause impairment. He faces up to 10 years in prison if convicted.
    Police have also charged him with another 48 counts of unauthorized access of restricted data. Each count is punishable by two years in prison.
    Police say more charges are likely and that more hackers could be arrested.
    The suspect used the online moniker "Evil" and his information technology skills were self-taught, Edwards said.
    "We'll allege that he's motivated by ego in his illegal hacking and proving his skills after complaining that he could not get work in the IT industry," he said.
    The case's chief investigator, police Supt. Brad Marden, said there was no evidence that any personal information had been stolen from any of the businesses hacked.
    "The main activities that have occurred on those systems _ and again because he is motivated by ego _ is to deface and damage the systems rather than extract information," Marden told reporters.
    NBN Co. assured customers in a statement that its network had not been affected by the hacking.
    [......]





    SQL Injection Vulnerability In Google Lab Database System found by Shadman Tanjim (Admin Bangladesh Cyber Army). Here is the report Submitted By Shadman to VOGH. 

    REPORT:-

    Very Big and Critical Vulnerability detect in Google Lab System. Vendor is already reported. But they don’t take positive step in this case this vulnerability is now exposed and open in public. Now I tell details About the Vulnerability in Google Lab System.
    Google Lab Website has SQL Injection Vulnerability and Dangerous thing is this
    Vulnerability is Exploitable. We can get Tables, columns and data. Google Lab
    Database has his own customize DB system. But Interesting things is their database system is Similar as Ms Access database. In this case Ms Access SQL Injection System is Also Work on Google Lab Database system. And this vulnerability is 100% real and Now We can see this in our eyes. 

    Now I give you Step by step proof about this Vulnerability.


    2. Vulnerability type: SQL Injection

    Info:
    6. Host IP: 209.85.175.141
    7. Web Server: Google Frontend
    8. Keyword Found: Fast
    9. Injection type is Integer
    10. Keyword corrected: Swirl
    [......]

    Infinity add