Paid To Popup Hacking Articles: December 2010

How To Gain Access To Unprotected Webcams Using Google



1.Search on Google for the following Keyword "inurl:/view.index.shtml"





2. Next Choose a webcam and Enjoy




Google Dorks


Here is the list of Few Google Dorks used for this purpose:



inurl:/view.shtml
intitle:”Live View / - AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / - AXIS”
intitle:”Live View / - AXIS 206M”
intitle:”Live View / - AXIS 206W”
intitle:”Live View / - AXIS 210″
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1″ intext:”Open Menu”
intext:”MOBOTIX M10″ intext:”Open Menu”
intext:”MOBOTIX D10″ intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1″
intitle:”sony network camera snc-m1″
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console - Web Monitor”

Note:This article is for educational Purposes only.

Securing Your Network From Hackers With HoneyPots?



First thing any hacker would do to compromise any network is gathering information passively and seeking vulnerable services as well as ports. And this is where Honeypots play a role of fake vulnerability in network.
Honeypots are fake theoretically, but not practically. They are real vulnerabilities in Network intentionally kept open & designed to gather information about the possible attack / attacker.

How Honeypots Work?

This fake vulnerability attracts any hacker towards it & he would try to compromise it. The Honeypot will itself stores the data regarding how hacker is trying to break it, what tools he might be using, his intentions, keystrokes and many such things.

This information is useful to network security administrator in many ways. Generally the attack is not done in one shot. Hackers try some initial attacks. And based on its results he hacks into major network flaws after some days.

So Honeypots help security people to secure the networks from the information they have gathered from initial attack. They are called as honey pots only because they are made available in network of vulnerabilities like Honey Comb.

Are Honeypots Vulnerable itself?

Sure they are. There are lot of smart ass hackers – who if anyhow come to know that they are dealing with Honeypots, They can totally screw things up.

Because, they are actually dealing with the system file in the network. So they are already inside it without any breakdown. If they can compromise this fake vulnerability Honeypot i.e. that they can surely break in to the system in less time.

Vulnerability is a vulnerable after all & Honeypots too. But there are very rare chances for attacker to identify it & needs great experience. So, planting Honeypot into any network architecture would be a more secure scenario for any host or network.

About The Author

Amol wagh is a tech blogger and an Ethical hacker, He writes at his blog Hackersengima.

Website Hacking with Dot net nuke exploit


In this tutorial I will tell you how hackers use a simple dot net nuke exploit to hack a website, Now the exploit I am talking about is found in hundreds and hundreds on DNN websites and it allows the hacker to upload an image on your server or your web hosting account, This type of attack is also called one way Hacking and at the end of article I have also posted some countermeasures to help you defend your self against these kinds of attack
You might be interested in reading some related posts at AHA:

* Hack a website using Directory Transversal attack?
* Common methods to hack a website


Note:The Purpose of this tutorial is not to excite hackers but to make your aware of how hackers can Hack your websites


Website Hacking with DNN attack


Google Dork

A google dork is an act of using google provided search terms to obtain a specific result and this DNN vulnerability occurs only in those websites which have "/portals/0" in their navigation, So goahead and search for inurl:”/portals/0″ where inurl asks the google to display all the url's who have /portals/0 in their navigation

1.Lets say the vulnerable website is:

www.vulnerablewebsite.com//portals/0


2.Now we will just add Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx after the url so www.vulnerablewebsite.com/portals/0 will become www.vulnerablewebsite.com/portals/0Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx

3.Now a website is vulnerable to this type of attack you will get a similar windows:



4.Next enter the following Javascript in the address bar:
javascript:__doPostBack(‘ctlURL$cmdUpload’,”)

What this javascript will do is that it will enable us to upload our image to the server:


5.The hacker could upload any image on victims website.


Countermeasures

1.The easiest method is to rename your fcklinkgallery to some thing else but it will not prevent this attack, but you can protect it from script kiddie's in this way, A skilled hacker can easily find the renamed file by using some Footprinting methods

2.Another way to prevent this attack is to upgrade to IIS 7 or higher and a DNN version of 4.9.4 or higher

Surf web anonymously with Real Hide IP with Me



Your IP is exposed when ever you visit a website,when your Ip gets exposed it becomes easy to trace you and find out your personal information, Hackers can use your Ip to gain access to your personal files and documents and even can get into your paypal,alert etc accounts,Real IP hide is a Software which masks your IP with one click and you can surf web anonymously,on the other hand Hackers can use this software to hide their identity and not get caught, its benificial for all and i recommend that every Pc should have this software installed....



Download Real Hide IP

Hack Facebook Account - Remote Firefox Password Stealer(anshuman)



Hack Facebook,Gmail,Hotmail,etc Accounts With Our Latest Remote Firefox Password Stealer Instantly...

Features:-

Remote firefox password stealer is a remote spying tool
Its 100% fud - note :- as we have provided a fud crypter
It will steal all passwords from victims firefox from begin
It will give you all password stealed in ftp account
It will Only Steal Password Once and give you
After stealing password it will melt automatically
Its Very handly and its server also

Steps to use :-

First Create your own account on http://www.drivehq.com/
Sign Up is easy and instant
Just Download Remote Firefox Password Stealer from below.
Extract that folder to desktop from winrar
Open the stealer and you will see the below screen shot - do as follow in it.










Ftp Server :- ftp.drivehq.com Ftp Username:- Your username and password
And click On Build
You will get "any thing".exe in your desired folder

Important Steps:-

You have your spy virus.exe
Now open the 100% fud Crypter provided
Crypt It And again you will get new file which is fully hidded from antivirus
Now Open the Binder Provided And Bind it with with any cool icon
Now Send that final binded file ( your virus ) to victim
Its your duty to send that virus to victim and make him/her run that virus
As soon as he/she will open that virus you will get all password in your ftp account
note:- you can also mannuly run that virus to victim computer

File Detials:-

Name:- Remote Firefox password stealer
included :- Stealer,fud crypter, binder
size :- 1.29 MB
Download :- Download Remote Firefox Password Stealer