Ez money Ez life my friend

Sunday, 31 March 2013

Largest Cyber-Attack In History Causes Global Internet Slowdown




If you’ve noticed that some websites have been slow recently, there’s a good reason for that. A huge distributed denial of service (DDoS) attack was launched against spam-fighting organization Spamhaus. With traffic peaking at over 300Gbps, this attack has had repercussions across the world. It’s being called the biggest cyber-attack in history.


So, what provoked this attack? A Dutch web host named Cyberbunker was recently blacklisted by Spamhaus. Starting a little over a week ago, the anti-spam organization started getting hit with a large-scale DDoS. Reportedly, the attack would be more than enough to knock down even government infrastructure. Now, Spamhaus is accusing Cyberbunker of hiring Eastern European organized crime outfits to take down the blacklist servers in retaliation.

By using techniques like DNS reflection, the attackers have been slamming Spamhaus for over a week. Steve Linford, CEO of Spamhaus, says that while attacks on large banks usually see peak traffic of 50Gbps, Spamhaus is seeing peaks over six times that amount. “This is definitely huge and [Spamhaus] has an infrastructure that gets hit with this stuff all the time, so for them to have issues with it makes it that much larger,”Adam Wosotowsky, Messaging Data Architect at McAfee Labs, told ExtremeTech today.

Despite the incredible amount of traffic, Spamhaus continues to operate. By working with cloud optimization and security company CloudFlare, the service has remained up and functional, for the most part. By load-balancing the incoming traffic to 23 different data centers across the globe, the attack was effectively diluted.

So Spamhaus got hit with a big attack, but it survived. Big deal, right? Well, unfortunately all of this illicit traffic is having a damaging effect on connection speeds.Netflix, which relies on content delivery networks (CDNs) around the world, is seeing substantial slowdown thanks to the congestion caused by the attack. While the slowdown is far from universal, it is worrisome. If a single attack against an anti-spam company can throw a monkey wrench into the internet,
what would all-out cyberwar do?

We’ve covered the threat of cyber-attacks from China in the past. The United States has even been accused of attacking allies. If a large scale attack were to hit the US, be it from hacking or DDoS, entire industries could crumble. This gigantic attack is just a pissed-off web host giving some “payback” to a spam blocker. What if a terrorist organization or rogue state decided to try to take out infrastructure?
TCP/IP and DNS are resilient, but they aren’t perfect. Interrupt the internet and the first world would drop to its knees.

Facebook Hacking Methods All In One




Facebook Hacking Methods All In One


So You Guys wanna Learn Facebook Hacking.  ..How to Hack Facebook Accounts Easily Yeah And I Mean It.
So Here Goes All Methods Of Facebook Hacking From Zero To One .. .
Let's Go.
Before Starting I Think You Guys All Know What Is Facebook How To Use It  .. That's Why You Are Here.
So Before Starting Let me Clear One thing There's No Such Software Exists Which Will Hack Facebook for You

The Only Two Methods By Which You Can Hack Facebook Is
  • Hire A Professional Hacker Who Will Hack For You
  • Or Just Learn All These Methods which i'm Gonna Provide you

Facebook Hacking Methods Are Following:

1.    Session Hijacking Attack
2.    Facebook Security
3.    Cookie Stealing Attack
4.    Keylogging
5.    Clickjacking
6.    Tabnabbing
7.    Remote Administration Tools
8.    Social Engineering Attack
9.   Phishing attack
10.  Using 3 Fake Friends Method


  •    Session Hijacking Attack :- What Is Session Hijacking Attack ? Session hijacking, also known as TCP session hijacking, is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user. Once the user's session ID has been accessed (through session prediction), the attacker can masquerade as that user and do anything the user is authorized to do on the network.
    Click Here To Get In Detail With Session Hijacking:- Click Me
  •     Facebook Security :- When you bookmark the URL for Facebook or any of your other social networks, be sure to use HTTPS instead of HTTP. This encrypts your communications.

    In fact, you will have to temporarily disable this feature any time you give access to a new application. That alone should give you confidence that you have achieved a greater level of protection.
    Click Here To Get In Detail With Facebook Security:- Click Me 
  •  Cookie Stealing Attack :- In this tutorial i will explain how you can hack a Facebook/twitter accounts by stealing cookies. This method works only when the victims computer is in a LAN (local area network ).Best place to try out this is in schools ,collages ,cafes . where computers are connected in LAN .Before i proceed let me first...
    Click Here To Get In Detail With Cookie Stealing Attack :- Click Me
  •     Keylogging :- What Is Keyloggers? Using key logger utility you will be able to establish full control over your computer. You will also find out, what was going on your computer in your absence: what was run and typed etc which act as best children internet protection software. Using the keylogging program constantly,...
    Click Here To Get In Detail With Keylogging:- Click Me
  •     Clickjacking :- What is Clickjacking? Clickjacking is a technique used by hackers or spammers to trick or cheat the users into clicking on links or buttons that are hidden from normal view (usually links color is same as page background). Clickjacking is possible because of a security weakness in web browsers that allows...
    Click Here To Get In Detail With Clickjacking :- Click Me
  •     Tabnabbing :- Hey friends,It's Chris Defaulter Valentine.An Microsoft Certified Systems Engineer (MCSE),Internet Marketer IIT hacker I Have 10 Years' Experience Circumventing Information Security Measures And Can Report That I've Successfully Compromised All Systems That I Targeted For Unauthorized Access Except One. I Have...
    Click Here To Get In Detail With Tabnabbing :- Click Me
  •  Remote Administration Tools :- A remote administration tool (or RAT) is a program that allows certain persons to connect to and manage remote computers in the Internet or across a local network. A remote administration tool is based on the server and client technology. The server part runs on a controlled computer and receives commands...
    Click Here To Get In Detail With Remote Administration Tools :- Click Me
  •  Social Engineering Attack :- I myself have had a few people in the past ask me questions on social engineering. I always say to anyone, you need to imagine social engineering as a game. But before i talk about the 'Game', I want to go into detail about Basic knowledge and self preparation. Basic knowledge and self preparation: It's...
    Click Here To Get In Detail With Social Engineering Attack :- Click Me
  •     Phishing attack :- Phishing - is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well known and trustworthy Web sites. Web sites that are frequently spoofed by phishers include...
    Click Here To Get In Detail With Phishing attack :- Click Me
  •     Using 3 Fake Friends Method :- Hack Facebook Account" is most popular term is the in Web, Previously I posted many articles on "Hack Facebook Accounts" with Keyloggers, phishing, etc but that Hacking Of Facebook Account methods are not working fine now a days. So Hackers have to go smarter and we have found a new security hole (its just...
    Click Here To Get In Detail With Using 3 Fake Friends Method :- Click Me
Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do. Hacking email accounts is criminal activity and is punishable under cyber crime and you may get up to 40 years of imprisonment, if got caught in doing so.  

Saturday, 30 March 2013

Free Download : CEH [ Certified Ethical Hacker Ebooks



    !! CERTIFIED ETHICAL HACKER !!



1: Student Introduction
2: Introduction to Ethical Hacking
3: Hacking Laws
4: Footprinting
5: Google Hacking
6: Scanning
7: Enumeration
8: System Hacking
9: Trojans and Backdoors
10: Viruses and Worms
11: Sniffers
12: Social Engineering
13: Phishing
14: Hacking Email Accounts
15: Denial of Service
16: Session Hijacking
17: Hacking Webservers
18: Web Application Vulnerabilities
19: Web based Password Cracking Techniques
20: SQL Injection
21: Hacking Wireless Networks
22: Physical Security
23: Linux Hacking
24: Evading IDS Firewall and Honeypot
25: Buffer Overflows
26: Cryptography
27: Penetration Testing
28: Writing Virus Codes
29: Assembly Language Tutorial
30: Exploit Writing 1 
31: Exploit Writing 2 
32: Exploit Writing 3 
33: Reverse Engineering Techniques
34: MAC OS X Hacking
35: Hacking Routers, Cable Modems and Firewalls
36: Hacking Mobile Phones, PDA and Handheld Devices
37: Bluetooth Hacking
38: VoIP Hacking
39: RFID Hacking
40: Spamming
41: Hacking USB Devices
42: Hacking Database Servers
43: Cyber Warfare- Hacking Al-Qaida and Terrorism
44: Internet Content Filtering Techniques
45: Privacy on the Internet
46: Securing Laptop Computers
47: Spying Technologies
48: Corporate Espionage by Insiders
49: Creating Security Policies
50: Software Piracy and W
51: Hacking and Cheating Online Games
52: Hacking RSS and Atom
53: Hacking Web Browsers
54: Proxy Server Technologies
55: Preventing Data Loss
56: Hacking Global Positioning System
57: Computer Forensics and Incident Handling
58: Credit Card Frauds
59: How to Steal Passwords
60: Firewall Technologies
61: Threats and Countermeasures
62: Case Studies
63: Botnets
64: Economic Espionage
65: Patch Management
67: Security Convergence
68: Identifying the Terrorists
69: prova 312-50
70: CEH - Classroom Lab Setup v6


Download Link: 

- 1: Certified Ethical Hacker_Vol_1.rar - 51 MB
- 2: Certified Ethical Hacker_Vol_2.rar - 51 MB
- 5: Certified Ethical Hacker_Vol_5.rar - 51 MB
- 6: Certified Ethical Hacker_Vol_6.rar - 18 MB

Password:- Maya Badmash

Get Free Dota 2 Steam Keys


Dota 2 is a multiplayer online battle arena video game developed by Valve Corporation and the stand-alone sequel to the Defense of the Ancients mod for Warcraft III: Reign of Chaos and its expansion packThe Frozen Throne. Formally announced on October 13, 2010, via Game Informer, the game is currently available for early test access purchase, with a free-to-play business model when released. Dota 2 will be released via download by Valve's content delivery platform Steam, on which the game has been developed to run exclusively for both release and update delivery. Dota 2 will run on Microsoft Windows and Mac OS X.


Dota 2 consists of session-based online multiplayer activity, with the primary objective of each match being for teams to destroy their opposing team's fortified stronghold. Each player controls a player character called a "hero", who is given the responsibility of participating in team combat, which generally takes place along a series of lanes that connect their opposing bases, lined with defensive towers. The gameplay elements are largely incorporated from Defense of the Ancients, with the game's lead designer, IceFrog, being the longest-serving and current developer of the Warcraft III mod.

This game costs around $30 and is available only on steam.

You can download steam client and register for a free steam account by following this link:

After, installing steam client, login from the account you just created.

Click on "Add Game" option and then select "Add a steam game"

Then use one of these keys. Remember, a key can be used only once, so Hurry!!!

JRNQE-X78HJ-0MIQZ

FM875-YWRH8-5JKQH

43YV7-85KN7-VYW45

EFV4D-KEBZ3-QRJ0C

EPZQ8-696DP-ZP8QE

DX2IV-XPJTI-ZYPZF

Alternative option,  you can also activate by using this invite (Only 1 available)

Hope you enjoyed this post.

Please Like and Share  

want steam acc?
lemme know 
https://www.facebook.com/uni.4me1

Monday, 25 March 2013

Hack Facebook account using cookie stealing



How to hack a facebook account – or, basically how to hijack php sessions. Yes – this is old news – yes its a common vulnerability – but you get a better idea for what it is and how it works when things are explained in detail (with screenshots!).

Before we begin, however, I want to re-emphasize that it is VERY EASY to protect yourself against this sort of attack. Facebook supports HTTPS, so when you browse facebook (or twitter for that matter) or if you have it bookmarked – please make sure you’re using HTTPS:// rather than HTTP://in the URL at the very least, if not using a VPN solution for further encryption. Also, if the ‘victim’ logs out of facebook, the attackers session becomes invalid – so it’s a good practice to actually log out of facebook and log back in again rather than using the ‘remember me’ checkbox.

Facebook like many sites operates using authentication cookies. Their auth cookies contain a variety of information, but for our purposes this is irrelevant. Here is a sanitized cookie for reference:

Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc; lsd=Xesut; lxe=greg.evans%40****************; c_user=100001230367821; lo=wl9fcGXMhPfoT4bAhKFP3Q; lxs=1; sct=1276721745; xs=a615cfe596448194d6e2a8d062a90e4e

You can see the ‘lxe’ field is the login. We haven’t done any further research into what the various other fields mean, but using facebook without any kind of security you’re both leaking the email address used for your login and the session cookie.

First thing you’ll want to do is fire up your favorite packet capture application. For this example we’ve used Wireshark:

Next, set the filter in the top left to ” http.cookie contains “datr” “. This should show you only packets captured which contain the cookie we’re looking for. You can see that in this screenshot we’ve already captured a cookie.

Once you’ve found a suitable cookie, you can copy it into the buffer by right clicking on the cookie line, and clicking Copy -> Bytes (Printable Text Only)

Next you’ll want to open up firefox. You’ll need both greasemonkey and the cookieinjector script.
Simply browse to facebook – make sure you are not logged in:

Hit ALT-C to bring up the cookie injector dialog box:

Then paste in the cookie!

Hit refresh and – VIOLA! you’re now logged in as your victim! Now this doesn’t give you access to their credentials, this is about the equivalent to walking up to their workstation while they’re away from their desk and using facebook.

Neat huh? Pretty easy too. I smiled big when we demo’ed the attack in our lab – its old, sure, but being successful is always a good feeling!

Hope you enjoyed this post


Saturday, 23 March 2013

CS 1.6 WALLHACK+AIMBOT NO SURVEY(non-steam)


video----http://www.youtube.com/watch?v=0QRch22-UkA

xtract
sopen d hack
start cs
press capslock key to start d hack (press capslock key every time u die to start)

download


http://www.filebucks.org/download.php?getfile=NDczOA==

like n enjoy

want steam games go here
http://8e3b062a.linkbucks.com



Kaspersky 2012 Activation Key



video---http://www.youtube.com/watch?v=fZpVLY4ccZQ

1. Turn of your Internet Connection (In the below right connect, click on the Network icon and choose Disable or Access Start à Setting à Control Panel à Network Connection, then Disable Internet access).


2. On Kaspersky Internet Security 2012 Beta, click on"Insert your activation code here" one the right corner. Then click on Activate the application button.


3. Check on Activate commercial version box, then fill up with any number on the Enter activation code field (such as 1231234567, for example:-P). Click on Next.



4. Waiting for few seconds. You will get a notification that informs you don't have an Internet connection "Internet connection is missing". Then, you just need to click on Browse in the Key file field and browse the key on your hard disk to activate Kaspersky Internet Security 2012 Beta.



5. Enable your Internet Connection. Update KIS 2012 beta data and scan your computer now.

Note: If you have already activated the trial key (90 days), then click on the red X symbol next to License number to remove the old license.


http://sharecash.org/download.php?file=3055905

download key file n enjoy