1ND14N H4X0R5 T34M (IHT) JAI HIND JAI BHARAT

We are :- DeadManINDIA,Null_Port_Govind,Haxor Rahul,EagleShadow,Karate-Katrina,Spy-Hunter,Grey-Noob,Mr.R@66!T.

A big Slute to Our Indian Armies

Freedom is not free Our Soldiers Donates theirs lifes for us

We are Indians and We are Proud to be Indians

India is great.Because their is one place in the world where Peoples Recpect all Religious.

Kali is good OS for Hacking

Peoples Says this OS is best This OS is best but no one OS like Kali Linux .

MOM and DAD

I can't saw God but When i see my MOM and DAD then i think God in there they are My Gods Love You MOM DAD.

Monday 4 November 2013

Credit Card Generator by "ظیان میر"

Try IT At Your Risk
 
Generate Credit Cards using this software
*******************************




We Are Team IHA
**************






Things you need :



##########################################

six ( 6 ) Digit BIN numbers of Credit Cards .

example : 400115


Click Here to get the Bins : http://bit.ly/1gmZshx


##########################################





1. type the BIN number and press Enter .

example : 400115






2. type the amount , how many Credit Cards you want to generate

example : 6






3. Credit Cards Generated Successfully

example :

[+] 4001154445469220

[+] 4001154806678435

[+] 4001151229772795

[+] 4001155252048510

[+] 4001155565127845

[+] 4001155431496523

[+] Type: Visa





4. if you want to generate more Credit Cards press y ( yes ) or to exit press n ( No ) .



Download Link : http://bit.ly/1feAMEB



Admin

Protect Your Computer Against ARP Poison Attack

I wonder how many of you tried netCut after reading yesterday’s article? Don’t you find it kind of hard to believe that netCut has been available for so long yet so many computers is affected by this attack just because of the standard of ARP. Attacking computers with netCut seemed to be fun for script kiddies but the person who got cut is no fun at all.
If you felt that your Internet connection that is shared on network being cut off when others is working fine, then here is how you can determine whether if someone is really poisoning your ARP cache. Other than that, if you’re connected to a public wi-fi, you should protect your computer against these attacks. Even when you think you are on a paid wifi which seems to be safer, you’re wrong because someone could cut off your Internet and then spoof their computer as your computer to get free internet on a paid wifi.

I did some research on how to protect against netCut and here are a few working ones. Not all can protect against netCut, for example Anti Netcut by tools4free and StopCut. Both of these anti netcut tools doesn’t work and annoying as well because every once in a while, an advertisement window will popup. In fact I even got a warning from Comodo Firewall that Anti Netcut is trying to secretly connect to a FTP server. In the Arcai’s netcut Software 2.0, there is a checkbox “Protected My Computer” which supposedly to protect your computer against Arcai’s netcut Software but it didn’t work on my Windows XP SP3 computer.
A working third party software that can intercept ARP spoofing/ARP attacks/ARP poisoning, intercept IP Address conflict, prevent Dos attack, safety mode, ARP flow analysis, protect ARP cache, active defense, locate attacker and ARP virus cleaner is AntiARP.
AntiARP Protect against netCut
There are 2 version of AntiARP which is the Personal Edition and the Server Edition. Unfortunately both versions are shareware. The Personal edition can only work on desktop operating system such as Windows 2000, XP and Vista. If you want to use it on Windows server based OS, then you have to go for the Server edition which cost more. It can automatically block netCut’s attack and also let you know who is the attacker.
So far I found out that the free Comodo Firewall is able to protect your computer against ARP poisoning but you have to enable it as it is disabled by default. Click on Firewall at the top bar and then click Advanced button at the left pane. Go to Attack Detection Settings and check “Protect the ARP Cache”.
Comodo Protect ARP Cache
As for Kaspersky Internet Security 2010 users, sorry to let you know that it doesn’t block netCut attacks.

Sunday 3 November 2013

What is VOIP

What is VOIP

Introduction

VOIP is an acronym for Voice Over Internet Protocol, or in more common terms phone service over the Internet.
If you have a reasonable quality Internet connection you can get phone service delivered through your Internet connection instead of from your local phone company.

Some people use VOIP in addition to their traditional phone service, since VOIP service providers usually offer lower rates than traditional phone companies, but sometimes doesn't offer 911 service, phone directory listings, 411 service, or other common phone services. While many VoIP providers offer these services, consistent industry-wide means of offering these are still developing.

How does VOIP work?

A way is required to turn analog phone signals into digital signals that can be sent over the Internet.
This function can either be included into the phone itself (See: VOIP Phones) or in a separate box like an ATA .

VOIP Using an ATA


Ordinary Phone ---- ATA ---- Ethernet ---- Router ---- Internet ---- VOIP Service Provider

VOIP using an IP Phone


IP Phone ----- Ethernet ----- Router ---- Internet ---- VOIP Service Provider

VOIP connecting directly

It is also possible to bypass a VOIP Service Provider and directly connect to another VOIP user. However, if the VOIP devices are behind NAT routers, there may be problems with this approach.

IP Phone ----- Ethernet ----- Router ---- Internet ---- Router ---- Ethernet ---- IP Phone


Applications using VOIP

Traditional telephony applications, such as outbound call center applications and inbound IVR applications, normally can be run on VOIP.

Why use VOIP?

There are two major reasons to use VOIP
  • Lower Cost
  • Increased functionality

Lower Cost

In general phone service via VOIP costs less than equivalent service from traditional sources. This is largely a function of traditional phone services either being monopolies or government entities. There are also some cost savings due to using a single network to carry voice and data. This is especially true when users have existing under-utilized network capacity that they can use for VOIP without any additional costs.

In the most extreme case, users see VOIP phone calls (even international) as FREE. While there is a cost for their Internet service, using VOIP over this service may not involve any extra charges, so the users view the calls as free. There are a number of services that have sprung up to facilitate this type of "free" VOIP call. Examples are: Free World Dialup and Skype for a more complete list see: VOIP Service Providers

Increased Functionality

VOIP makes easy some things that are difficult to impossible with traditional phone networks.
  • Incoming phone calls are automatically routed to your VOIP phone where ever you plug it into the network. Take your VOIP phone with you on a trip, and anywhere you connect it to the Internet, you can receive your incoming calls.
  • Call center agents using VOIP phones can easily work from anywhere with a good Internet connection.

INCREASE YOUR INTERNET SPEED 100% WORKING

 IAM  GOING TO TELL U HOW TO INCREASE INTERNET SPEED
I ALSO CHEAK ITS WORK 100%






BadBIOS Malware: Reality or Hoax?

On Thursday, Ars Technica ran a story about badBIOS, a nasty piece of malware allegedly discovered three years ago by security consultant Dragos Ruiu on an Apple laptop. The malware is so sophisticated that some wonder if the story is real or just a hoax. The rootkit appears to be advanced and highly persistent, with “self-healing” capabilities. It can infect computers running almost any operating system by changing the device’s firmware, including the Basic Input/Output System (BIOS) and the Unified Extensible Firmware Interface (UEFI). It can spread even if the computer’s power cords and Ethernet cables are unplugged, and even if Wi-Fi and Bluetooth communications are disabled. It can even “jump air gaps” via computer speakers and microphones. The initial infection vector appears to be through USB drives, but this hasn’t been confirmed. The facts Dragos Ruiu is a reputable researcher. He is the organizer of CanSecWest and PacSec and the founder of Pwn2Own, the renowned hacking competition. Several other respected infosec professionals have vouched for him regarding badBIOS. Furthermore, Ars’ Dan Gooding, the editor who ran the story, says it’s not a Halloween hoax. “I have tried to make clear that many of the details of this article sounded far-fetched to me. They still do. I have also tried to be transparent that no one has independently corroborated Ruiu's findings. That said, these same details have been publicly available for more than two weeks, and a large number of Ruiu's peers find them believable,” Gooding noted. The story could also be true since the malware’s behavior and capabilities are technologically possible. Hackers can overwrite the BIOS flash memory, infection via USB is clearly plausible because there are numerous threats that use this method. In addition, covertly transmitting data across the network via IPv6 even when the protocol is disabled is also plausible. Communications via high definition audio is also possible. Errata Security’s Robert Graham provides details on each of these technical aspects. The questions While this could very well be a true story, there are several things that don’t add up. Researchers have seen advanced pieces of malware used in state-sponsored espionage operations, such as Flame or Stuxnet. However, the story as a whole simply sounds like something from Trend Micro’s 2020 web series.
For one, Ruiu hasn’t presented any concrete evidence to demonstrate the existence of the badBIOS malware. Users on MetaFilter and Reddit have analyzed the claims and many of them point to a lot of questionable things. For instance, security expert Igor Skochinsky, who has dedicated much of his work to investigating rootkits, says he has analyzed the BIOS dump provided by Ruiu and he hasn’t found anything suspicious. Another suspicious thing is related to the USB infection. Ruiu says he will analyze the USB traffic more thoroughly once he gets his hands on some “expensive equipment.” As many point out, USB protocol analyzers are not very expensive. Jacob Kaplan-Moss, co-creator of Django, makes an interesting point on MetaFilter regarding communications via audio channels as described by Ruiu. “The theoretical bandwidth for audio-based networking is something like 600 bytes per second. (And I think to get that rate you'd need to send data in using audible frequencies, so you'd hear your speakers squealing like a modem),” Kaplan-Moss noted. “That's two seconds for a single TCP packet. It would take quite a long time to distribute anything, especially a virus as sophisticated as the one he's alleging,” he added. “If the ‘virus’ is really communicating over audio, the equipment necessary to detect this is even cheaper: a freaking microphone. He hasn't made any attempt to capture the ‘networking’; that's super-suspect.” So is badBIOS real or a hoax? Time will tell. Ruiu will either have to provide some concrete evidence or allow others to take a crack at the allegedly infected computers, or he’ll have to come forward with a confession. As some point out, another possible scenario is that Ruiu is not making this up. However, he might have simply misinterpreted the results of his research.