This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

<div id="slider"> <a href="http://www.spiceupyourblog.com"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisdP7VBy7OkYcmJ0YM0PDhTk-GhgSDXXs8rVPdMdp8HG2difgXNB4_1sUZzDUz9rpB78zMvu_snGiHgdKUELENNuQjml8c_iTXdge5BrfPHptLPEsXvc0ANYz_W3fkuedCcMpfDgmuwDE/s1600/toystory.jpg" title="This Is A Caption" /></a> <a href="http://www.spiceupyourblog.com"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZb9A64F_M4G0CiFWohJk8DGpkFOTEVNH6rdUPULcMX6lZ7OZiUwx0J34vOLfjE7jjEPfTcX8HZ3d2D6Eqp7pdixXYsppzawCFt-nXyeH_Wk3u5RQyuHVYnzYOdudLU6kbnhsvhrC6nUo/s1600/up.jpg" title="This Is Another Caption" /></a> <a href="http://www.spiceupyourblog.com"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDiQK9ZDERVD5EuDOJ1oxTKkKVRamZVsx8clW3oqECuwkVn62-8ggeXZShnBeo4iOvWTzOPB1zYRmq69S_q2G99esr94u10FMWQ8DZmzzFmbY7nx8W_ecsiC_iKXRBmK0a_hpKTWX1IZ8/s1600/walle.jpg" title="This is an example of a caption" /></a> <a href="http://www.spiceupyourblog.com"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifUzlio7FH9-Gu3EqOOi8NfPIBS7NOFxsBhn9USQURiccHz6j6eKk78_l3sYpcTKk7OJ0ry58RzZQOqPmyDjHJM_Ebf8iAvSPuCEZ9nsZNQULzuF0UHMs3lqaZzv6-aygfP7J6NflQ3lc/s1600/nemo.jpg" title="This is another Caption" /></a> </div>
Showing posts with label hacking news. Show all posts
Showing posts with label hacking news. Show all posts

Friday, 18 May 2012

Anonymous attacks Indian government websites

Anonymous used YouTube to announce its OpIndia campaign 

The hacker group Anonymous has carried out a series of attacks against websites in India.


Websites for government departments, India's Supreme Court and two political parties all came under attack.Anonymous said the attacks were carried out in retaliation against blocks imposed on well-known video and file-sharing sites.The Indian anti-piracy firm behind the blocking of Vimeo, DailyMotion and The Pirate Bay was also attacked.In late March, Chennai-based Copyrightlabs won a restraining orderthat made Indian ISPs and phone firms stop their customers reaching sites that were illegally sharing copies of Bollywood films called 3 and Dhammu.

As the the blocks started to come into force in mid-May, Anonymous launched attacks against 14 separate government and political sites. Hit hardest were the Indian telecoms department, electronics and IT ministry, supreme court and sites used by the BJP and INC political parties which were all knocked offline.
The website of Copyrightlabs was also "down for maintenance" during the attacks.In tweets documenting its ongoing hack attacks, Anonymous said they were being carried out in retaliation for "internet censorship" in India.

To knock out the sites, Anonymous bombarded them with data, a tactic known as a Distributed Denial of Service (DDoS) attack.The tactic had only partial success as most of the sites targeted soon recovered and were only offline intermittently.The disabling of the websites was the first tangible result actions of the OpIndia campaign announced by Anonymous on 9 May in a message posted to YouTube.

Though not to worry these sites can be easily accessed by using proxy services like www.kproxy.com. Put down your views in the comment for below. Subscribe and like :D


Tuesday, 1 May 2012

Ethical Hacking and Cyber Securit Boot Camp at Delhi

All you script kiddeis put your hacking hats on and get ready for a Boot camp on Ethical Hacking and Cyber security being arranged by The hacking News[THN] in New Delhi,India. Though its not just for the scriptkiddies only but for every aspiring hacker.Their Hacker Boot Camp training session will teach you how SYSTEM INTRUSIONS and many more stuff are done. You will be shown the techniques, tools and methods that the hacker uses. This insight will help you understand how to better protect your IT architecture and identify the vectors of attack that hackers use. 


CCSN is a revolutionary new certification in the field of information security training program for amateurs and professionals to help you gain the skills you need to become an expert in the field of information security. This specialized certification assures potential employers and customers that you have a level of advanced knowledge to detect and offer support for some of the most advanced security vulnerabilities. The CCSN is the only completely hands-on, real world oriented security certification.

Batches with limited Registrations in order to provide best Training Quality and Personal Interaction between students and Trainers. Course comes with a custom-built practical labs specially designed to clear up concepts, reinforce techniques, and make you comfortable with the tools of the trade.


To get Registration and Details, Please do Email to info@thehackernews.com

Course Outline:


  • Php, Database and Linux - These are Pre-Required Knowledge that students will learn within CCSN package.
  • Information Gathering and Scanning - Enumeration using various Backtrack Tools
  • Privacy is the number one issue facing by internet users. You will learn to use Proxy Servers, Anonymity Techniques, Various Tools, Tunneling & VPN usage and Concepts.
  • Email Hacking & Social Engineering - If you ever wonder how hackers actually hack into any email account? This Lesson is going to give each and every possible solution of this Question.
  • Cryptography and Encryption Basics, Understanding various Hashes and Encryption Algorithms and various password cracking techniques.
  • Camp will include various types techniques that can be used to Hack a System, Cracking system password, Using Stealers, Key loggers and Remote Administrations Tools (RATs) and Creating Undetectable Viruses using Crypters, Binders and Assembly Codes.
  • Web Application Hacking using - Advance SQL Injection, Cross Site Scripting, Local File Inclusion (LFI), Remote File Inclusion (RFI), Parameter Manipulation, Session and Cookies Hijacking, Click Jacking, Shell Injection, Brute force Attacks against Website login pages.
  • Server Hacking via Rooting Servers, Remote Code Execution, Buffers Overflows,  Brute force against Servers, Using Dos, DDos and Creating Botnets, Using various Exploits and Exploits Databases.
  • Understanding Wireshark, Cain & Abel and TCP Dump, Man in the middle attacks, Router Hacking, Sniffing Data and Passwords, ARP , DNS, DHCP Spoofing attacks,  DNS poising , DOS attack against an IP address, Flood the LAN with random MAC addresses, Packet Injection.
  • In labs of this lesson a CCSN student will learn practically to crack Wireless Encryptions and Prevention Techniques. The Complete Demonstration will have various real World scenarios to clear the Advantages of Wireless Hacking.
  • Using Wikto, Nessus , skipfish, w3af, SQLmap Websecurify for vulnerability Scanning and ExploitingII. Wordpress-scan , Drupal scan, Joomscan, cms-explorer for CMS Hacking and Pen-testing.
  • Using Metasploit Framework for Exploitation, Websploit, SET, Fast-Track SQL Pwnage, Winautopwn for various System/Network/web Attacks.
  • Using IP tables and Firewalls Policies to Protect Network/ System, Installing and Configuring Honeypots to trap hackers, Installing and Configuring IDS (Intrusion Detection System).
  • Computer Forensics and Incident Management.
Prerequisites : Dedication! Because Rest base programming and other things Students will learn within CCSN package.

Course Date
21th May 2012
No. of Seats
50
Course Duration
15 Days (6 Hours/Day)
Who can join this Course
Students, Professionals, Programmers, Developers, Security Enthusiasts

Venue : New Delhi, India

Contact :
Kislay Bhardwaj,
CTO - The Hacker News,
Ph: +91-9711223284

To get Registration and Details, Please do Email to info@thehackernews.com

Subscribe and Like:D PEACE.

Friday, 27 April 2012

VMWare Source Code leaked by Anonymous Hackers

VMware on Tuesday announced that a single file from its ESX server hypervisor source code has been posted online, and it held out the possibility that more proprietary files could be leaked in the future. "The fact that the source code may have been publicly shared does not necessarily mean that there is any increased risk to VMware customers," VMware said in a statement.

"Hardcore Charlie" - who claims to have downloaded some 300 Megabytes of VMWare source code.

Anonymous tweeted:
@AnonymousIRC: Oops, VMWare source leaked? Not goodhttp://pastebin.com/JGxdK6vw to Anonymous contributors. May the Pirate Bay always sail strong!
The leaked documents include what appear to be internal VMWare communications, pasted onto CEIEC letterhead and with official looking stamps. One email exchange, dated June 5, 2003 is from Jeffrey Sheldon to an internal VMWare listserv and has the subject "code review:untruncating segments.

Given the large number of service providers that run vSphere, security issues in ESX could potentially have a broad and widespread impact, according to security researchers. VMware says it is looking into the matter and will be canvassing its industry partners and developers in order to determine the source of the breach.
Subscribe and Like:D PEACE.

Accidentally invented Dos attack using Google spreadsheets

Panos Ipeirotis, a computer scientists working at New York University,attack on his Amazon web service using Google Spreadsheets and Panos Ipeirotis checked his Amazon Web Services bill last week - its was $1,177.76 !

He had accidentally invented a brand new type of internet attack, thanks to an idiosyncrasy in the online spreadsheets Google runs on its Google Docs service, and he had inadvertently trained this attack on himself. He calls it a Denial of Money attack, and he says others could be susceptible too.

On his personal blog Ipeirotis explained that it all started when he saw that Amazon Web Services was charging him with ten times the usual amount because of large amounts of outgoing traffic.

As part of an experiment in how to use crowdsourcing to generate descriptions of images, he had posted thumbnails of 25,000 pictures into a Google document, and then he invited people to describe the images. The problem was that these thumbnails linked back to original images stored on Amazon’s S3 storage service, and apparently, Google’s servers went slightly bonkers. “Google just very aggressively grabbed the images from Amazon again and again and again,” he says.

After analyzing traffic logs he was able to determine that every hour a total of 250 gigabytes of traffic was sent out because of Google’s Feedfetcher, the mechanism that allows the search engine to grab RSS or Atom feeds when users add them to Reader or the main page.

After speaking with Google representatives, Ipeirotis believes that the company is trying to balance user privacy with a desire to present fresh content. It seems that Google doesn’t want to store the information on its own servers so it uses Feedfetcher to retrieve it every time, thus generating large amounts of traffic.

“Google becomes such a powerful weapon due to a series of perfectly legitimate design decisions,” Ipeirotis wrote in a blog posting on the issue. 
Subscribe and Like:D PEACE.

International Police Association defaced by Anonymous Hackers


Anonymous Hackers struck again and this time it was the International Police Association.Anonymous hackers deface International Police Association http://ipa-iac.org (IPA) on Friday afternoon and Anonymous hackers responsible left an angry message (hehehe,really interesting)  on the website's homepage, stating that they defaced the page "for the lulz" (for fun) but also warned that they might have stolen some "sensitive data."

A message posted at the top of the page reads,
 "oHai [hello]... International Police Association (International Admin Center) you will see we haz [had] some #LULZ at your expense maybe you will fix your security issues and of course... we always recommend you NOT store admin passwords in PLAINTEXT For a site like International Police Association... w3 [we] really expected moar [more]... #LULZ the thin..."

The International Police Association is the largest organization for police officers in the world according to Wikipedia, and is not connected to Interpol http://www.interpol.int/ . The IPA was founded by English police sergeant Arthur Troop in January 1950 under the model "Service Through Friendship" with the goal of creating friendly links to encourage cooperation between police officers across the world. The organization currently has around 400,000 members in 64 countries. Its main offices are based in Nottingham, England.

The message continues to boast that Anonymous cannot be stopped because "There is no head to cut off motherfu--kers!!!" Before concluding with the words, " F--k the police!!!!"

I think anonymous Rocks....what do you think about it? Leave your comments below and Don't forget to subscribe and like:D PEACE.