Wednesday, October 29, 2014

(5) Five steps to make stay hidden on the internet... - Cybercells tricks

Five steps to make stay hidden on the internet Step 1 Change your IP More then once a day i would suggest u change it 3-4 times Every day Step 2 Have terminal open and type in netstat Every 5minutes to see what data is coming in and out Step 3 Delete all your cookies !! And in settings of your browser dont store anything dont save your browser history . IF a person would attack your browser u will have nothing saved in it . Step 4 Dont login to any social media using your "anonymous ip" IF they trace it they are gonna se that your connected to facebook. And IF they scan u , u can simply see that using step 2;) Step 5 To avoid spammed etc when ur signign up to a website use a fake email addres that forwards the emails to yourmain email and after a couple of hours the email is gone . i would recomend using melt-mail Note that some website dont like when u use melt- mail like facebook thats why we cant link it in a regular way

Website Attack Methods Cross Site Scripting (XSS) XSS flaws occur whenever an application takes user supplied data and sends it to a web browser without first validating or encoding that content. XSS allows attackers to execute script in the victim's browser which can hijack user sessions, deface web sites, possibly introduce worms, etc. Injection Flaws Injection flaws, particularly SQL injection, are common in web applications. Injection occurs when user-supplied data is sent to an interpreter as part of a command or query. The attacker's hostile data tricks the interpreter into executing unintended commands or changing data. Malicious File Execution Code vulnerable to remote file inclusion (RFI) allows attackers to include hostile code and data, resulting in devastating attacks, such as total server compromise. Malicious file execution attacks affect PHP, XML and any framework which accepts filenames or files from users. Insecure Direct Object Reference A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, database record, or key, as a URL or form parameter. Attackers can manipulate those references to access other objects without authorization. Cross Site Request Forgery (CSRF) A CSRF attack forces a logged-on victim's browser to send a pre-authenticated request to a vulnerable web application, which then forces the victim's browser to perform a hostile action to the benefit of the attacker. CSRF can be as powerful as the web application that it attacks. Information Leakage and Improper Error Handling Applications can unintentionallyleak information about their configuration, internal workings, or violate privacy through a variety of application problems. Attackers use this weakness to steal sensitive data, or conduct more serious attacks. Broken Authentication and Session Management Account credentials and session tokens are often not properly protected. Attackers compromise passwords, keys, or authentication tokens to assume other users' identities. A8 - Insecure Cryptographic Storage Web applications rarely use cryptographic functions properly to protect data and credentials. Attackers use weakly protected data to conduct identity theft and other crimes, such as credit card fraud. Insecure Communications Applications frequently fail to encrypt network traffic when it is necessary to protect sensitive communications. Failure to Restrict URL Access Frequently, an application only protects sensitive functionality by preventing the display of links or URLs to unauthorized users. Attackers can use this weakness to access and perform unauthorized operations by accessing those URLs directly. Kizhan Razak Via TOP WORLD hackers

Website Attack Methods Cross Site Scripting (XSS) XSS flaws occur whenever an application takes user supplied data and sends it to a web browser without first validating or encoding that content. XSS allows attackers to execute script in the victim's browser which can hijack user sessions, deface web sites, possibly introduce worms, etc. Injection Flaws Injection flaws, particularly SQL injection, are common in web applications. Injection occurs when user-supplied data is sent to an interpreter as part of a command or query. The attacker's hostile data tricks the interpreter into executing unintended commands or changing data. Malicious File Execution Code vulnerable to remote file inclusion (RFI) allows attackers to include hostile code and data, resulting in devastating attacks, such as total server compromise. Malicious file execution attacks affect PHP, XML and any framework which accepts filenames or files from users. Insecure Direct Object Reference A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, database record, or key, as a URL or form parameter. Attackers can manipulate those references to access other objects without authorization. Cross Site Request Forgery (CSRF) A CSRF attack forces a logged-on victim's browser to send a pre-authenticated request to a vulnerable web application, which then forces the victim's browser to perform a hostile action to the benefit of the attacker. CSRF can be as powerful as the web application that it attacks. Information Leakage and Improper Error Handling Applications can unintentionallyleak information about their configuration, internal workings, or violate privacy through a variety of application problems. Attackers use this weakness to steal sensitive data, or conduct more serious attacks. Broken Authentication and Session Management Account credentials and session tokens are often not properly protected. Attackers compromise passwords, keys, or authentication tokens to assume other users' identities. A8 - Insecure Cryptographic Storage Web applications rarely use cryptographic functions properly to protect data and credentials. Attackers use weakly protected data to conduct identity theft and other crimes, such as credit card fraud. Insecure Communications Applications frequently fail to encrypt network traffic when it is necessary to protect sensitive communications. Failure to Restrict URL Access Frequently, an application only protects sensitive functionality by preventing the display of links or URLs to unauthorized users. Attackers can use this weakness to access and perform unauthorized operations by accessing those URLs directly. Kizhan Razak Via TOP WORLD hackers

(5) TOP WORLD hackers

>>Make a WinRAR password cracker<< --------------------------------------------------- This is a simple password cracker for WinRAR archives which can crack numeric passwords. The method works only on .rar files. You should have WinRAR installed to make this password cracker. Follow the easy steps below and see how easy it is! You don't need anything else, but notepad for this password cracker! Watch the video tutorial: http://youtu.be/BDFYCYnOPzw Via TOP WORLD hackers

0 comments:

Post a Comment

Welcome to my Blog!
Bine ati venit pe blogul nostru.
Cand nu sunt pe blog calatorim!!!
When I'm not blogging, I'm traveling :-)

Email me atGuran

Search

Subscribeto this blog
Follow me onTwitter
Connect onFacebook
My Ello

Blogroll


© 2014 by Guran Cosmin.

You're welcome to link to this site or use a single image and brief description to link back to any post. Republishing posts in their entirety is prohibited without permission.

Pictures

Become a Fan

Find Us On Facebook

Contact Form

Name

Email *

Message *

Video

720x90 AdSpace

Recent Videos

Movie

http://youtu.be/Yj0G5UdBJZw
guran. Powered by Blogger.

Wikipedia

Search results

Popular Posts

Followers

Archive

wikiHow - Recent Changes [en]