Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Sunday, January 19, 2014

How To Find Out Someone's IP-Address Without Even Asking Him?

First Off, I have to apologize for not blogging so long, sorry for keeping you waiting and willing to get new posts, but I really had some personal issues to sort out which made me unable to get a free time, but now I’m done with all that and want to share with you a little mesmerizing tutorial which is really unique and rare of its kind.

As the title implies on this short post I will let you know how to get people’s ip-addresses without asking them, I promise I won’t include any hard or tricky arguments on this blog I will just keep it simple and straight forward by raping it all to gather step by step without skipping anything. And the reason made me do such a tutorial is I have recieved an authentic comment on an old article I've posted on August-2013 titled as [ Hack Any PC Using IP Via Metasploit].

A direct comment form Abdifatah Mohamed said: “is there a possible way to get the ip address of someone who lives in a different country than mine. WITHOUT ASKING HIM/HER !!!!”

And to get the distilled and the ideal answer for that question you may just watch the bellow video:

Sorry for the inconvenience! earlier i have hosted the video on FACEBOOK, which made some visitors unable to view and watch the video at all.
Now i have shifted the gears and hosted the video on DAILYMOTION,  and you won't face any problem this time.




Warning: don’t ever use the knowledge you have received for this short post or video to violate people, if you ever do so LBR blog is not responsible for what you meet as a penalty for the mistakes you do. I have just provided this information with you for educational purpose.

Again if there’s anything that you’d like to suggest or ask feel free to put it in the comments section below.

Sunday, December 8, 2013

Extra Chrome Saved Passwords Security Feature With The New Chrome Canary

Web Developers deciding which Chrome Channel to use the beta or the stable one, it’s really and largely depends on their tolerance of bugs and strength of desire to try the latest features and improvements. But there is a way to get the best of both worlds: a perfectly rock-solid stable experience and access to the latest features say hello to the Canary Channel.

Chrome Canary is Google’s code name for its latest Chrome browser which is currently in testing, is once again available to both developers and users. Chrome Canary is not necessarily for the faint of heart in its current state, it’s a decidedly beta product that comes with warnings from the search company that says it could crash at any time and shouldn’t be considered a replacement for Chrome or any other browser at the moment. Quite the contrary, Chrome Canary is a work in progress, a piece of software that should not be relied on for the most important tasks. Still, Chrome Canary is an important browser for those who have been using Google’s software for some time. Chrome Canary represents the future of Google’s browser, and includes several improvements over the current platform that should make for a better experience.

Unlike the beta and dev channels, Google Chrome Canary installs separately alongside the regular version of Chrome. It doesn't change, modify or affect any files; nothing is shared between them. This means that you can keep a stable version of Chrome for your regular day-to-day work, but also have a safe way -playground- to toy around with the latest features, changes and flags.

Note: Once caveat being that some settings altered on Canary will sync – but only if you sign in.

The major meaningful reasons you should try Chrome Canary are:
  • It’s safe – it doesn’t affect regular chrome browser.
  • It’s fun – you get to try the latest features earlier before anyone could see it.
  • It auto-updates – unlike Chromium snapshots, Canary is updated almost daily.
  • It’s useful – developers can work with newer chrome features & APIs sooner.
  • Its proper Chrome – all of Chrome’s features are present, including flash Quick Office viewer and a PDF reader.

New Security Feature

Up until now, anyone with access to your PC could view all of your saved passwords in Chrome by pointing the browser to chrome://settings/passwords, but that changes in the newest build of Chromium, the open-source project  that chrome is based on. When the update eventually makes its way to the official version of Chrome, the browser will prompt users to re-authenticate using the Windows/OS X user’s password before showing any saved passwords. And sooner the worries about revealing saved passwords on Chrome will vanish.
Google provides official Canary builds for windows and Mac (sorry for Linux users) and, once downloaded, it installs just like regular Chrome.

Canary uses different colored icon to that of regular Chrome, helping ensure that you don’t accidentally start the wrong one. This means you can pin it to your start screen, task bar, or dock without creating confusion!


So what is that you are waiting it’s time to be fabulous and adventurous as well, go and grape your free piece of copy from here >> Download Chrome Canary

Tuesday, November 26, 2013

Breaking News: CloudCraker! An Online Pentesting Service

Holla! It’s being always a dream to meet a reliable, flexible, and trust worthy online PenTesting tool or service and it’s just happen to day when I intentionally found CloudCracker.com while I was serving the web, more importantly I was absolutely impressed about the fact that this online website is even much faster and accurate than a lot of third party Cracking and PenTesting tools and softwares.

So what is cloud cracker and what it does? It’s an online password cracking service for penetration testers and network auditors who need to check the security of WPA protected wireless networks, crack password hashes, or break document encryption.

In this PenTesting service you will be asked some data and that you need to provide (not the password), and then it will try identifying your password (it’s done in the same way the hacker tries to find out your password), if it fails to find your password then you are ready to use your wireless network and if it finds out your password then you have no other choice left other than changing your password.

Disclaimer: This post is not a complete guide or tutorial about how to use cloudcraker’s service but it’s just a fantastic cracking alternate that I’ve found instantly and I just wanted to share with you the news to be aware of the service if you are not already knew it, so don’t relay this post for the complete and confidential reference just take its as breaking news from LBR’s news desk.

For a formal info and reference visit cloudcraker’s official website from here >> cloudcraker.com and make your own appropriable judgements.


Final note: Honestly I’m in a middle of confusion about what kind of topics or niches to write articles about because nowadays technology arena is hilariously growing and vanishing at the same time, so if you have a query, suggestion, or special request try to scroll down till you reach the comments section below, so you can leave your query suggestion, or whatever you’ve in mind just right there. And I’ll always appreciate your comments because I’m sure they’ll help me provide rich articles and tutorials continuously about the things you ask, suggest, and request.  So feel free and let me know what you would love to see next time on LBR blog.

Monday, November 25, 2013

How To Stay Safe&Secure While Serving The Web

When you first enter to the connected world of the internet try to imagine a place where there is so many Apps and Services don't even cost a penny; games, social networks, videos, music, and pictures it’s almost like virtual paradise, but looking under Neath that wonderland there is a far greater told being collected-your identity- names, locations, addresses, family and friendship connections, likes, searches, browsing history.

Basically the more the internet you use the more information you give corporations so they can turn around and sell your identity to the heights bitter.

So here a great question comes into the mind, is there a way to be a part of  this online economy without sacrificing your identity and  privacy? YES you can lie!
Here is the four major ways online companies collect your data and four major ways you can hide your data from them.

First is Location: By using your computers ip-address fine online services can determine where you connecting to the internet from, a good practice are to hide your ip using a Proxy or what is called Virtual Private Network (VPN). And there is a plenty of plugins for your specific browser type that allow you to do both i.e.  Switchy and FoxyProxy, there is also free services out there such as CyberGhost that allow you to serve web while hiding your ip-address, you can also build your own VPN  service using computers in different locations, or you  can pay premium vpn services like [witopia], which make it look like you are from a different  country all together.

Second is site tracking and browsing history: when you visit certain websites they collect data on you even if you aren't aware of it, i have already mentioned your ip-address but also your browser type and your Operating System, what pages you’ve visited and what you clicked on. Depending on your browser again you can use third party plugins like [DNT+] that can block these websites from collecting information on you, or you can use harder security browser systems such as Tor and SRWare Iron which is like chrome.
Normally if you want to use an online service you've to sign up using personal information but it doesn't necessarily have to be your personal information that is where the Third step comes into play.

Third Fake Identities: if you go to fakenamegenerator.com you can generate intire fake identities that you can use to fill out forms, another good one is datafakegenerator.com that even let you generate fake Credit Card number. Fourth step concerns the most important part of information your email address.

Fourth Disposable Emails: This is quite tricky because most online services require a valid email before you can complete the registration process. So you need a fake anonymous email that you can actually check, the best options that can allow this, is the disposable email services such as 10minutemail, guerrillamail or mailnesia for a longer lasting fake email address.

Final note: Although it’s not 100% anonymity these tips will at least give you 90% to the way there.

At last I'd love to hear some of the methods you guys use to stay hidden online let me know in the comments section. That is it for this short tutorial until next time hack some fun into your week ends. Cheers

Thursday, September 26, 2013

Lockify! A Fully end-to-end Encryption For Your Confidential Messages

With the entertaining, enormous, and magnificent inventions of today’s world especially in the technology arena software development is a major part more specifically the web applications. And exactly from the invention of Google Chrome web applications has largely expanded in a variety of categories which include business tools, office apps, entertainment, education, lifestyle, productivity, social & communications, utilities, extensions and themes.

And fortunately Google Chrome lunched a new niche of web applications that can run on desktop environment without any extra requirements, just download them and run them. If you want to experience some of that applications visit here >> Desktop-apps.

With that keeping in mind to day I want share with a unique and amazing app called Lockify, Lockify is an encryption software which will give you a fully end-to-end encryption for your messages, with Lockify your confidential message is encrypted on your machine. And it will never enter the cloud unencrypted and only you have the decryption key- in the form of a link- which you can share with whomever you like, however you like. And after they receive and click the link verification will be asked in order to view the encrypted message and the receiver should verify the link you’ve have instantly sent to him/her according to a verification method you specify, and that verification could be a question you pose to them, a password you share with him/here, their email address, or their twitter username. And for assured security the best verification option is a password you share with them which means only those you give the password can decrypt the message.

Well now that we understood what Lockify really is? And what it can do for us it’s obvious and convenient to think about how to setup and install the app. So let’s do that and enjoy the best encryption smart application ever. Follow the below steps.
  • Go to this link >> Download Lockify App.
  • After you do that the installation process will start instantly and you have to wait a moment till the process finishes, the speed of the installation process really depends on your computers capacity and your internet speed unless that the app is very light and small.
  • When the installation completes your computer will notify you and you will see a new icon on your task bar just click that icon and you’ll see the Lockify app inside the panel click the Lockify icon and that is it.
  • The Lockify app will smoothly come handy after this stage and its app to you what you’ll do next and don’t panic the Lockify app is self explanatory software. You run the app you’ll see everything in front of you and again it’s up to you what you will do after that. And good luck with a fully end-to-end encryption software on your hand, enjoy it and share with your fellows and friends.

Final note: The progress that Chromium family made so far is really wonderful and certainly helpful to many regular users like me, so as a grateful fellow I have to say thanks to the chromium team and let me give you a free giveaway link to get one of their rare and special software they have ever developed. Click here >> Giveaway.


And if you truly inspire LBR blog, and the little work I am doing here please show some love by leaving your comment on the below comments section, because that will help me gain some traffic loops. Thanks

Tuesday, September 17, 2013

Get Rid Of The NSA Surveillance For Ever

Due to the NSA's surveillance  on almost every internet transmission except the encrypted ones, and their backdoor gates on every windows equipped system, the entire regular internet users including me myself are still struggling to find the best ways and options to be anonymous on this rare and epic situation.

And since the beginning of the struggle particularly when I read some articles and news feeds talking about PRISM, XKeyScore, and Tempora, I was trying to find out a better and peaceful way to get rid-off those annoying eyes watching me whenever I browse a page on the internet or just lunch and applications which is synchronized to the net. Hopefully during my research I come up with so many options which successfully made me anonymous and out of that NSA surveillances radar, but the truth is I never felt safe and secure in so many ways until a friend of mine Mr. Subeer Muse a freelancer, penetration tester, and security guru. The initiator of SEH group and top level co-author at aqoonwadaag website, gave me a link to a website called prism-break which contains a huge and massive information, softwares, plug-ins, tips and tricks all about how to stop governments and surveillance agencies from spying on you by encrypting your communications and ending your reliance on proprietary services. And believe me by just landing that website I felt safe and secure because there are a plenty of options available for almost every existing system including Apple OS X, Windows, Linux, and even for Android operating systems.

The lists of the useful and available applications on that site are too much to mention on this particular post but I will shortly tell you the gist as well as some of my favorite ones. By suggesting secure alternatives for existing proprietary services like operation systems, web browsers, chatting applications.

Operating Systems

Instead of using Mac OS X, Google Chrome OS, and Windows Os you better use one of these GNU/LINUX alternatives [Debian, Fedora, Gentoo, Linux Mint DebianEdition, openSUSE] and if you are interested in the Linux BSD based operating systems you may check [openBSD]. Don’t panic all of these are secure, reliable and open source Linux operating systems, if you need more info regarding one of these operating systems you may click the link or just Google it yourself. Unfortunately if you have iOS or Windows Phone operating systems you better replace the device because these operating systems have no free alternatives.

Web browsers

If you are eager to get more browsing security and privacy options you must particularly use Tor Browser Bundle which is encrypted and anonymous web browsing powered by Tor network. JonDonym is also a great browsing option after Tor because it has special JonDo IP anonymization service and JonDoFox profile for firefox. And remember these two above browser systems are IP HIDDEN systems which mean they can be completely anonymous with no worries.
Mozilla Firefox is the third option to check because it’s fast, flexible and secure web browser with a vibrant add-on ecosystem. If you are using android equipped tablet or phone you better check Orbot which is the Tor Browser Bundle version for android systems. On the other hand if you are a regular user for iOS you should use Onion Browser.

Chatting and instant messaging Alternatives

Normally people communicate across the internet using popular emailing and instant messaging applications and social networks, but if you want a secure medium you better use one of these two amazing and user friendly tools:
  • CyptoCat: which is a private web based add-on and encrypted instant messaging within the web browser. And as I’ve experienced it works only on Google Chrome and Comodo Dragon web browsers. you can get cryptocat from here >> Download.
  • TorChat: which is Peer-to-Peer (P2P) chat built on Tor Hidden Services not sponsored by the Tor Project, and so far this is my favorite although I previously admired CryptoCat and for simplicity set up if you are a newbie CryptoCat is good for you. get torchat from here >> Download.


Final note: As I earlier told you at the beginning of the post there are a huge alternatives and tools to talk about and I can’t gather all that information on this small post I rather advice you to take your own adventure and explore your personal experience by visiting prism-break’s official website from here >> prism-break org.

At last but not at least some of the above applications and tools may require team participation for instance chatting applications like cryptocat and torchat because you won’t understand how they exactly work unless you check them and the only way you could do so is if you have an end user receiver.

If you inspire LBR or particularly this post don’t forget to show some love by leaving you review in the comment section below.

Tuesday, September 10, 2013

Your Freedom! The Ultimate VPN & Tunneling Solution

Have you ever been trapped behind a firewall or a filtering web proxy and cannot access some or many web pages or use an application you would like to use or play a game you would like to play? Is your internet connection being censored and you would like to stick censorship where the sun doesn't shine? Would you prefer to stay anonymous, that your IP address is not logged with every access to someone’s webpage? Then look no further, today I have a rare and unique solution for you which will instantly give you a full freedom to browse the net.

That impressive solution is to download, install, and configure a professional VPN application called “Your Freedom”. Well, if you are an internet nerd have already used one of the popular vpn applications like CyberGate, TunnelBear, ExPat Sheild, UltraSurf, or Hotspot Sheild. The concept is same but “Your Freedom” is all-in-on vpn, tunneling, firewall and proxy bypassing, anonymization, and anti-censorship solution which means you don’t have to worry about anything or search solutions for all of these specific areas as long as you have installed and correctly configured “Your Freedom” application. So let me tell you some of the basic configuration hints that will help you correctly configure YF. Just follow the steps carefully.

1.       First and for most you have to create a new account from YF’s official website right here >> Register.

2.      Then after creating your account successfully, you have to go and get the software by downloading it from here >> download YF, and by the way you may see a table with a plenty of options try to download the windows full installer in the first row and as recommended, but if you have slow internet connection you better go to the second option which simply says Windows Installer and remember with this second option its must to have java 6 or newer unless that the application won’t run. And there will be some other two options for MAC and android.

3.       Install the application as you usually do with the other applications; just skip if there is any wizard comes up at the end of the installation. So now since you have installed the application lets configure it.

4.      Run the application and go to the account information panel, and put the username and the password you made in step one.

5.      Then check the server connection panel. And set connection mode to “UDP” then click the wizard button. And you have to wait a while because the wizard will search all the available servers and then will list them prioritized to their strength.

6.      When the wizard finishes searching try to choose the first server it gives you because that is the best for you according to the speed and accuracy.

7.      Then click finish and then click save and exit. That isn’t just one step left go to the YF’s try icon right click it and choose start connection. And in a moment if everything went correct you’ll be connected to the server and became protected and anonymous.

Note: as we all now there is nothing complete in this world and the fact is YF can be the best solution but it still have one down site which is every username and password you register from YF works only three hours in the day. But don’t worry to overcame this problem try to create multiple fake emails from here >> Generate Fake Emails. And hopefully that will solve your problem.

At last but not at least if you ever need any help or support here is a link for Your Freedom user guide it’s a small PDF file just follow the link it’ll definitely help you.


If you believe this post gave you and extra option and solution to serve net anonymously and safely please share comment and like.

Friday, August 16, 2013

Hack any PC using IP via Metasploit

Usually whenever you are thinking to do some stuff with your friend's computer or maybe your colleague’s laptop without a physical contact with his/her things that may seem a little bit impossible.
But with the help of the Metasploit feature you can even fully control his entire network or computer by just having his/her computer’s IP address and a few steps which I will shortly guide you through.

It's really important and highly recommended to have a basic knowledge about coding specially on CMD and Linux environments like Red Hat Linux or the other available distros. Well for this moment I will consider that you have the recommended skills to do the real hacking, just follow  me up.

1    1.)    First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.

2.) You need PostgrSQL for your database.
Download here:http://www.postgresql.org/
Make sure you use all the defaults or Metasploit won't work!

3.) Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III).
Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...

4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit GUI.

5.)Now, in the window type:

db_connect postgres:ThePassYouChose@localhost:5432

The first time you do this you will see lots of text flash buy. Don't worry, this is normal.

6.) Type db_host to make sure you are connected correctly.

7.)Now type this:

db_nmap 000.000.000.000

Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...

8.) Now we get to the fun part; the automatic exploitation.
Just type db_autopwn -t -p -e -s -b ,
Watch the auto-exploitation start, go play Halo for a while, and then come back...

9.) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.

10.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:

Sessions -i ExploitNumber

The features of Metasploit are much like a rat. Once you get into someone's computer, you can see their screen, control their mouse, see what they type, see them, etc.


If you really succeed to hack any computer by just doing these fun and easy steps let us know, share the word with us in the comments section below.

Tuesday, August 13, 2013

Encrypt Your Data With CipherMe!

Todays world security and privacy are more important than any other entity regarding data and information, the encryption technique is the most vital part in securing the information across the network and other transmission mediums, there may be a number of different ways and procedures that we can encrypt our data, and hopefully I have recently met with a unique software called CipherMe.



"CipherMe" is an encryption program, which you can secure your important files that you don't want anyone to see its content. And if you want them back, you can easily decrypt them again by only using CipherMe's decryption mechanisim.

If you're interested and want to experience with this amazing software feel free to download and enjoy with its reliable services >> Download CipherMe .

I Hope you Enjoy the program, please leave your opinion/feedback in a comments section below.
Be save and secure and all the best.

 

© 2013 Learn By Research. All rights resevered. Designed by Templateism

Back To Top