Pages

Subscribe:

How to burn ISO to USB - make bootable USB

Many times we face a problem when our cd/dvd do not work and we have to use bootable USB drive for system formatting. For this you can use ISO to USB. You can guess about its working by its name.


This free utility works on windows XP, Vista and 7. Once you hahve downloaded this utility, the use of this tool is simple.


Attach the USB on the system and browse the iso image you want to burn.  If its bootable Windows ISO file then you can make bootable USB drive by checking Bootable option. 
Click on burn button to start the ISO file burning process.


Download this tool here:
http://www.isotousb.com/

Working free Live mobile tv streaming links for any mobile updated



Working live streaming tv huge links. After blocking Mundu TV links, Now I found new links of Zenga TV and Mundu TV working free with Airtel, If you have other network, you can use 3G/gprs pack to watch unlimitedmobile streaming TV for free. Just use default setting of 3G/3.5G/UTMS/HSDPA/2G/GPRS/EDGE. You need real player/any streaming mobile player. This links are tested with airtel, vodafone, reliance, tata docomo, uninor, aircel, bsnl, IDEA, and all telecom networks.
If you are using airtel network, you don’t need to activate any gprs pack, Just try this in 0 balance or minimum balance. (try at your own risk, we recommended  you to activate any gprs pack).
We can also watch live tv on our computer with normal internet connection and VLC media player.
Links:
rtsp://10.2.216.228:554/2G/LIVE/AAJTAK_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/STARPLUS_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/BBCWORLD_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/BLOOMBERGUTV_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/DISCOVERYCHANNEL_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/DISCOVERYTURBO_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/ETNOW_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/ETVBANGLA_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/ETVGUJARATI_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/ETVMADYAPRADESH_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/ETVMARATHI_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/ETVORIYA_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/ETVRAJASTHAN_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/ETVUP_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/ETV2_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/FOCUSTV_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/GODTV_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/HEADLINESTODAY_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/INDIANEWS_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/INDIANEWSHARYANA_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/INDIAVISION_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/JAIHINDTV_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/JAYAPLUS_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/JAYATV_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/JEEVANTV_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/KAIRALITV_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/MAAMUSIC_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/MAATV_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/MAKKALTV_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/MANORAMATV_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/NDTVPROFIT_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/RAJDIGITAL_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/RAJMUSIX_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/RAJMUSIXKANNADA_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/RAJNEWS_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/RAJTV_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/SABTV_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/SAKSHITV_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/SONYTV_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/STARANANDA_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/STARMAJHA_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/STARNEWS_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/STARONE_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/SVBC_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/TIMESNOW_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/TLC_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/TV1_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/TV9GUJARATI_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/TV9KANNADA_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/TV9MUMBAI_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/TV9TELUGU_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/VASANTHTV_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/ZOOM_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/DISCOVERYSCIENCE_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/CNBCTV18_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/CNBCAWAAZ_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/CNNIBN_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/IBN7_QCIF.sdp
rtsp://10.2.216.228:554/2G/LIVE/TV9_QCIF.sdp
For High quality streaming (only for 3G) just replace “_QCIF.sdp” with “_QVGA.sdp” . all above links supports 2G and 3G both

Hack Facebook Password – Facebook Hacking


Hack Facebook PasswordWondering to know how to hack Facebook password? Well, before you can do that, it is very much necessary to understand the real ways of hacking that actually work and also those that are simply scam and do not work. So in this post, we’ll look at some of the possible ways to hack Facebook password!
Every day I get a lot of emails from people requesting me to hack Facebook passwords of their spouse, girlfriend or boyfriend so as to reveal their secret relationships (if any). Most of them are even willing to pay for the service. However, I strongly deny any such requests since I do not provide any paid hacking service. But anyhow, I have decided to write down this post so that you can learn the tricks for yourself and implement everything at your own risk.
With my experience of over 7 years in the field of ethical hacking and security, all I can tell you is that there are only two ways to successfully hack Facebook password.
 

Possible Ways to Hack Facebook Password


1. Keylogging – The Easiest Way!

 
Keylogging refers to simply recording each and every keystroke that is  typed on a specific computer’s keyboard. This is possible with the use of a small computer program called keylogger (also known as spy software). Once installed, this program will automatically load from the start-up, runs in the invisible mode and start capturing each and every keystroke that was typed on the computer. 
Some keyloggers with advanced features can also capture screenshots and monitor every activity of the computer. One doesn’t need to have any special knowledge in order to install and use a keylogger. That means, anyone with a basic knowledge of computer can install and use this software with ease. Hence for a novice computer user this method is the easiest way to hack Facebook password. I recommend the following keylogger as the best for gaining access to Facebook account.
 
Easily Access any Email
SniperSpy (TESTED) is a revolutionary product that will allow you to easily access *ANY* online account or password protected material such as MySpace, Facebook, Yahoo, Gmail or Hotmail. There are absolutely *NO* limitations to what accounts or websites this software can access!
 
 
Why SniperSpy is the best?
Today there exists hundreds of keyloggers on the market but most of them are no more than a crap. However, there are only a few that stand out of the crowd and SniperSpy is the best among them. I personally like SniperSpy for it’s REMOTE INSTALLATION FEATURE. With this, you can install it on a remote computer without the need for having physical access to it. It operates in a complete stealth mode so that it remains undetected.
 
Here is a summary of benefits that you will receive with Sniperspy software:
 
1. Access ANY Password
With SniperSpy you can hack any password and gain access to Facebook or any other online account.
 
2. Monitor Every Activity
You can monitor every activity of the target computer, take screenshots and record chats & IM conversations.
 
3. Never Get Caught!
SniperSpy operates in a total stealth mode and thus remains undetectable. Therefore you need not have the fear of being traced or getting caught.
 
4. Remote Installation Feature
With the Remote Install feature, it is possible to install it even on computers for which you do not have physical access. However, it can also be installed on a local computer.
 
5. Extremely Easy to Use
Installing and using SniperSpy is simple and needs no extra skill to manage.
 
6. Completely Safe to Use
This software is 100% safe to use since it does not collect any personal information from your computer. SniperSpy is a reputed, trustworthy and reliable company which offers 100% privacy for it’s users.
 
7. Works on both Windows and Mac
Fully compatible with Windows 2000/XP/Vista/7 and Mac.
 
So what are you waiting for? If you are really serious to hack Facebook password then SniperSpy is for you. Go grab it now and expose the truth!
 
 
 
 

2. Phishing – The Difficult Way

 
The other common way to hack passwords or online accounts is via Phishing. This is the most widely used technique by many hackers to gain access to Facebook and other social networking websites. This method will make use of a fake login page (often called as spoofeed webpage) which will exactly resemble the original one. Say for example, a spoofed webpage of Facebook looks exactly same as that of the original page. This page is actually created by the hacker and is hosted on his own server. Once the victim enters his/her password in such a fake login page, the login details are stolen away by the hacker.
Most Internet users would easily fall prey to such online phishing scams. Thus phishing scams trick users in such a way that, they themselves give away their passwords. But phishing requires specialized knowledge and high level skills to implement. Hence it would not be possible for a noob user (perhaps like you) to attempt this trick. It is a punishable offense too. So, I would recommend that you stay away from phishing and make use of the keyloggers to hack Facebook password since it is the easiest and the safest way.

Facebook Hacking Methods that Do Not Work! 


Today, there are hundreds of scam websites out there that are waiting to rip off your pockets by making false promises. These websites claim to be the experts in the field of hacking and boast to instantly obtain any password for you. Most people fall victim to these websites and lose their hard earned money. Thus the idea behind this post is to expose the truth behind hacking the Facebook (or any email password) so that you can learn how to do it for yourself and stay away from all those scam websites. The following are some of the hacking methods that actually do not work:
1. Many scam websites claim to exploit a certain vulnerability of Facebook website as a means to crack the password. Unfortunately, there is no such vulnerability in Facebook (or any other online account) that can be exploited to crack the password. I advise you to stay away from such scam websites.
2. There is no ready-made software program that is available to hack Facebook password except the keylogger (spy software). In fact, keyloggers are pretty generic and meant to record the keystrokes of a computer which obviously includes the password also. Keep in mind that apart from the keylogger, there is no such program that is specifically designed to gain access to Facebook accounts. Stay away from any website that claim to sell such program.
3. Beware! On many websites and Internet forums you will often see fake articles about Facebook hacking. Most of them will tell you something like this: “you need to send an email to passwordretrieve@facebook.com along with your username and password” (or something similar). Never give away your password to anyone nor send it to any email address. If you do so, you will lose your password itself in attempt to hack somebody else’s password.
I hope this post will help you avoid scams and choose the right approach to accomplish your goal.

Now Firefox 7 available for Android

The newest version of firefox web browser launched and is available for download. This web browser is same as desktop firefox 7 with some addition feature for mobile. This version has built in social media features and users can easily post to their social network such as facebook, twitter, google+ and others.


Firefox Web Browser Features:


Awesome Screen: Browse your favorite sites with minimal or no typing.
Sync: Access your browser history, bookmarks, passwords and open tabs from any device.
Add-ons: Customize your browser quickly and easily.
Speed: Get to the Web and find what you’re looking for fast.
Tabs: Enjoy the convenience of tabbed browsing on the go.
Personas: 
Dress up your browser the way you like it.
Sharing: Use apps like Google, Twitter and Facebook to keep your friends in the loop.
Location-Aware Browsing: Get better, more relevant information when on the go.
Bookmarking: Swipe to the left and bookmark any site with one touch.


This version is only compatiable on Android 2.0 or above. 
Download 
https://market.android.com/details?id=org.mozilla.firefox

Facebook Now Allows any Mobile User to Access Facebook Mobile


facebook.jpg
Perviously restricted to just Cingular users, Facebook has opened up the availability for any cellular user to access Facebook mobile at m.facebook.com. The mobile site makes the news feed, pokes, messages, status updates, profiles, photos and messages fit beautifully on the small screen. For those of you who are into the social web scene this will be a breath of fresh air.

IP Spoofing Attack and Defenses



IP Address: 
On the Internet, each computer system is identified by its IP address. The work we do on the Internet is associated with the IP address of the system we are using. We know that every request or response process on the Internet is done on packets. The basic protocol for information exchange over the Internet is TCP/IP.
TCP stands for Transmission Control Protocol and IP stands for Internet Protocol (IP). When we request a webpage or other resource from a server the request is sent in the form of a TCP/IP packet. This packet contains some information about the request, source and destination, along with the data being sent. The source and destination keeps the IP address of the sender and receiver.
What is IP spoofing: IP spoofing is the process of replacing the source IP address with a fake IP address from the IP packets to hide the real identity of the sender. The source address is the address of the computer that the packet was sent from. By changing the address in the packet an attacker can make it appear that the packet was sent by a different computer system.
Figure 1: IP spoofing
See the above figure. Two computers, victim and partner, were communicating with each other. In the meantime, a sender (the attacker) also tries to communicate with the victim by forging the IP address and tries to fool the victim with the fake IP address of the partner. So the victim computer thinks that the packets came from the partner computer while we can see the original sender is the sender system which in this case is the attacker.
The term spoofing is also sometimes used to refer to header forgery because attacker forges the header of the packets with fake information.
This process is used to send fake mail, requests or other information with a fake IP address to mislead others about the information being sent. Hackers often use IP spoofing for sending spam mail and denial of service attacks. This protects the real identity of the hacker because the IP address sent with the packet belongs to someone else. When a machine replies to a spoofed packet, the response is sent back to the forged source address. So IP spoofing is used in an attack when the attacker does not care about the response.

How it works

Internet Protocol (IP) Packets
Internet Protocol is a network protocol operating at Layer 3 (network layer) of the OSI model. Each IP packet sent contains a header with the data. The header contains some information about the sender, receiver, and other things.
Figure 2: IP packet
The header part contains additional information including the IP address of sender and receiver. The data part contains the data being sent.
Figure 3: IP Header
We can see the structure of the IP header in Figure 2. It contains much useful information about the packet. We can see the fields for SOURCE IP ADDRESS and DESTINATION IP ADDRESS. Here the source IP address, the IP address of the sender’s machine, and the destination IP address is the IP address of the receiver’s machine.
Transmission Control Protocol (TCP):
TCP stands for the connection-oriented, reliable transport protocol in the TCP/IP suite. It uses 3-way handshaking (SYN-SYN/ACK-ACK) to establish the connection. In this protocol, reliability is provided by sequence numbers and acknowledgement. See the second and third row for sequence numbers and acknowledge number fields. TCP assigns sequence numbers to every segment and acknowledges all data segments received from the other end.
Figure 4: TCP Header
By forging the header of the packet, we can make a fake IP address appear in the source IP address part.

Some tools used in IP spoofing

How to spoof IP address:
Here I am going to show IP spoofing with the help of NMap. Nmap is also known as Network Mapper. This tool is a free and open source (license) utility for network exploration or security auditing.
First of all you need to select the interfaces to spoof from. To do this, run the command
Nmap –iflist
Use the “–e” argument in the interface you have selected. The “–S” parameter can be used to specify the IP address that nmap will use as the source address. It can be our real IP address or we can spoof the IP address.
nmap -e eth0 -S 192.168.1.100 192.168.1.109
In the above command, I have used the eth0 interface and spoofed a source IP of 192.168.1.10, while scanning 192.168.1.32.
Application of the attack: This attack is widely used in Denial of Service attacks. In denial of service attacks an attacker floods the victim with large amounts of traffic. In this example, an attacker does not care to receive the responses from sent packets. Using packets with spoofed addresses is an advantage for the attack as the attacker can send packets with many different spoofed addresses. This makes it hard to filter the packets, as they seem to come from different sources. Attackers use random sequences of IP addresses to send spoofed packets in the Denial of Service attack. This attack is impossible to filter on the systems which rely on the validity of the source IP address in attack packets.
IP spoofing is also an effective way to defeat the networks which use IP address-based authentication. This attack is easy to inflict on corporations which have internal systems that trust each other’s systems based on the IP address. By spoofing a connection from a trusted machine, an attacker may be able to access the target machine without authentication.

Attacks that are launched through IP spoofing

There are a few variations on the types of attacks that successfully employ IP spoofing. Although some are relatively dated, others are very pertinent to current security concerns.
Non-Blind Spoofing
Non-Blind Spoofing attacks work on those networks where the attacker and victim are on the same subnet. In this situation, the attacker can sniff the network packets to know the sequence and acknowledgement numbers being sent in the packets. The biggest threat of spoofing in this type of attack would be session hijacking. This can be done by corrupting the data stream of an established connection with a valid user, then re-establishing the connection based on the correct sequence and acknowledgement numbers with the attack machine. Here the attacker can easily bypass the authentication mechanisms because he has the correct sequence and acknowledgement numbers – and guessing these is the hardest part.
Blind Spoofing
This attack is complicated and difficult in comparison to the Non-Blind attack because the sequence and acknowledgement numbers cannot be sniffed. In order to get the correct sequence number and acknowledgement, the attacker will send several packets to the target machine, guessing sequence and acknowledgement numbers in order to sample sequence numbers. A few years back machines used formula based sequence number generators, so it was easy to generate the formula by analyzing just a few packets and TCP sessions. But nowadays these sequence numbers are generated randomly to make it unpredictable. After sending several packets there may be a possibility to guess the right sequence number. This attack takes a great deal of time and has a lesser probability of success.
Man-in-the-Middle Attack
The man-in-the-middle attack (MITM) is a common security violation that is formed by both types of spoofing we have discussed above. In this attack, an attacker intercepts a legitimate communication between two machines (server and client).Then, the attacker controls the flow of data. He can alter the information being exchanged by two machines without the knowledge of either the original sender or the recipient.
Denial of Service Attack
Denial of service is the main attack which uses IP spoofing and are the most difficult to defend against. In this attack the attacker only tries to consume the bandwidth and resource of a server. The attacker does not care about the response, so they need not worry about properly completing handshakes and transactions. In this attack an attacker only wishes to flood the victim’s machine with as many packets as possible in a short amount of time in order to make the victim’s machine inaccessible to valid users. The attacker uses random-source IP addresses to send packets to the target machine to make tracing and stopping the DoS as difficult as possible. Most of the servers use IP block mechanisms to prevent this type of flooding. Using random spoofed IP easily bypasses those security mechanisms.
Services vulnerable to IP spoofing
Configurations and services that are vulnerable to IP spoofing:
  • RPC (Remote Procedure Call services)
  • Any service that uses IP address authentication
  • The X Window System
  • The R services suite
Most popular tools used to modify packet headers:
Tools – For Windows
  • Engage Packet Builder – Scriptable packet builder for Windows
  • HPing – Command-line oriented TCP/IP packet assembler/analyzer
  • Nemesis – Command-line portable IP stack
  • PacketExcalibur – Graphical and scriptable network packet engine
  • Scapy – Interactive packet manipulation tool
  • Spoofer – IP Spoofing Tester
  • Colasoft Packet Builder – Tool for creating custom network packets
  • Colasoft Packet Player – Packet replay tool
  • NMap – Utility for network exploration and security auditing
Tools – For Linux
  • LSRscan – Loose Source Route Scanning Tool
  • Scapy – Interactive packet manipulation tool
  • Spoofer – IP Spoofing Tester
  • Yersina – Tool to exploit weaknesses’ in different network protocols
  • Sendip – Send completely arbitrary packets out over the network
  • HPing – Command-line TCP/IP packet assembler/analyzer
  • IRPAS – Internetwork Routing Portocol Attack Suite (File2Cable etc.)
  • LSRtunnel – Loose Source Route Tunneling Tool
  • Nemesis – Command-line portable IP stack
  • NMap – Utility for network exploration and security auditing
  • PacketExcalibur – Graphical and scriptable network packet engine

Defenses against IP Spoofing

There are a few precautions that can be taken to prevent IP Spoofing attacks on the network:
Filtering packets at the Router - Implementing ingress and egress filtering on your routers is the best defense against the IP spoofing attack. Ingress filtering is the process of blocking packets from outside the network with a source address inside the network. Egress filtering is the blocking of packets from inside the network with a source address that is not inside. You will also need to implement an ACL (access control list) that blocks private IP addresses on your downstream interface. On the upstream interface you should restrict source addresses outside of your valid range, which will prevent someone on your network from sending spoofed traffic to the Internet.
Encryption and Authentication - Implementing encryption and authentication will also reduce spoofing threats. Both of these features are included in IPv6, which will eliminate current spoofing threats. Host IP based authentication must not be used based on the IP address. It is recommended to design network protocols and services so that they do not rely on the IP source address for authentication.
Conclusion: IP spoofing is really easy because there are many tools available which allow users to edit packets and send packets from the IP. So performing IP spoofing is really simple, which leads to some big hacking operations. Although many servers have secure mechanisms to prevent spoofed packets, all those mechanisms are limited. Most of the networks still does not consider this attack. So their authentication based on IP address fails.
If we take a look at recent DOS attacks, most of the attackers are still untraceable because they have used IP spoofing to perform the attack and to prevent their real identity. So server administrators and network administrators must consider this attack while designing the security rules for their servers and networks. By considering some points, it’s easy to identify the forged packet with fake IP addresses.