Translate

November 30, 2010

Best 5 Hacking Books

Today i am going to share "Best 5 Hacking books" with all of you.. ope you will like these books... You have must read them at least one time...Have a nice time with these best Hacking books...
"Hackers are not highly intelligent people, but only intelligent people can be good hacker" 



1. Hacker's HandBook
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.

2. Stealing The Network
How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The books companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.

3. Secrets Of A Super Hacker
:-- Here is the most amazing book ever published on computer hacking. Step-by-Step illustrated details on the techniques used by hackers to get your data including :- Guessing Passwords, Stealing Passwords, Password Lists, Social Engineering, Reverse Social Engineering, Crashing Electronic Bulletin Boards, Dummy Screens, Fake E-mail, Trojan Horses, Viruses, Worms, Trap Doors, And Much more. Anyone concerned with computer security and data privacy needs to read this book. 

4. Hack Attacks Testing
A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits.

5. Hacking Exposed-5
One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols. Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective.
»»  READMORE...

Best Operation System for Hacker

Hello RITH members.. Here we will today learn about "Best Operating Systems for Hackers – BackTrack Linux" .Have a look below :

There are a couple of things that are essential to any hacker’s walk of life. To name a few, there’s the ubiquitous flash drive for data transfer. You have the crossover cable for even faster data transfer. There’s the Wi-Fi antenna for high gain and strong amplification. Possibly, you might find a video capture card in the computer. Of course, there’s the ubiquitous laptop and desktop computer. But what software is on these computers? Undoubtedly, you will find at least two operating systems, most often Windows and Linux. But with Linux, there are several different distributions. Is there a specific one? With hackers and crackers, there is only one Linux distro out there. It is called Backtrack.


BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.
Regardless if you’re making BackTrack your primary operating system, booting from a Live DVD, or using your favourite thumb drive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.
BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tool collection to-date.
Back Track is quite possibly the most comprehensive Linux distribution of security tools. Both hackers and crackers can appreciate the features of this distribution. For black-hatters, it is an easy access to software that facilitates exploitations of secure system. For white-hatters, it is a penetration tester that finds holes in a security scheme. See, everybody wins!
Major Features
BackTrack features the latest in security penetration software. The current Linux kernel is patched so that special driver installation is unnecessary for attacks. For example, an Atheros-based wireless networking adapter will no enter monitor mode or inject packets without the MadWiFi driver patch. With BackTrack, you don’t need to worry about that. It’s just plug-and-play ready-to-go!
What’s great is that this Linux distribution comes Live-on-CD. So, no installation is needed. However, what you experience BackTrack, you will realize that it is a must to download this operating system and install it on your Laptop. At the very least, download the VMWare Virtual Appliance for Backtrack. Make sure you also install the VMWare Tools for Linux as well. Many features will still work in VMWare mode.
    * Based on: Debian, Ubuntu
    * Origin: Switzerland
    * Architecture: i386
    * Desktop: Fluxbox, KDE
    * Category: Forensics, Rescue, Live Medium
    * Cost: Free
Tools:
BackTrack provides users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to password crackers. Support for Live CD and Live USB functionality allows users to boot BackTrack directly from portable media without requiring installation, though permanent installation to hard disk is also an option.
BackTrack includes many well known security tools including:
    * Metasploit integration
    * RFMON Injection capable wireless drivers
    * Kismet
    * Nmap
    * Ettercap
    * Wireshark (formerly known as Ethereal)
    * BeEF (Browser Exploitation Framework)

A large collection of exploits as well as more common place software such as browsers. BackTrack arranges tools into 11 categories:

    * Information Gathering
    * Network Mapping
    * Vulnerability Identification
    * Web Application Analysis
    * Radio Network Analysis (802.11,Bluetooth,Rfid)
    * Penetration (Exploit & Social Engineering Toolkit)
    * Privilege Escalation
    * Maintaining Access
    * Digital Forensics
    * Reverse Engineering
    * Voice Over IP
Download and Documents:
Home Page                 http://www.backtrack-linux.org/
User Forums               http://www.backtrack-linux.org/forums
Documentation         http://www.backtrack-linux.org/tutorials/

Thankyou for Reading this RITH article...
Admin,RITH.
»»  READMORE...

November 26, 2010

Jenis - Jenis Port

Port adalah suatu celah atau pintu atau lubang pada system komputer sebagai jalur transfer data.

Pada system komputer sebenarnya ada dua jenis Port yaitu :

1. Port fisik adalah soket atau slot atau colokan yang ada di belakang CPU sebagai penghubung peralatan input-output komputer, misalnya Mouse,keyboard,printer…dll.
2. Port Logika (non fisik) adalah port yang di gunakan oleh Software sebagai jalur untuk melakukan koneksi dengan komputer lain, tentunya termasuk koneksi internet.

Port Logika inilah yang akan kita bahas di sini, yaitu port yang berhubungan secara langsung dengan kegiatan kita ber-internet.

1. Port 80, Web Server
Port ini biasanya digunakan untuk web server, jadi ketika user mengetikan alamat IP atau hostname di web broeser maka web browser akan melihat IP tsb pada port 80,

2. Port 81, Web Server Alternatif
ketika port 80 diblok maka port 81 akan digunakan sebagai port altenatif hosting website

3. Port 21, FTP Server
Ketika seseorang mengakses FTP server, maka ftp client secara default akan melakukan koneksi melalui port 21 dengan ftp server

4. Port 22, SSH Secure Shell
Port ini digunakan untuk port SSH

5. Port 23, Telnet
Jika anda menjalankan server telnet maka port ini digunakan client telnet untuk hubungan dengan server telnet

6. Port 25, SMTP(Simple Mail Transport Protokol)
Ketika seseorang mengirim email ke server SMTP anda, maka port yg digunakan adalah port 25

7. Port 2525 SMTP Alternate Server
Port 2525 adalah port alternatifi aktif dari TZO untuk menservice forwarding email. Port ini bukan standard port, namun dapat diguunakan apabila port smtp terkena blok.

8. Port 110, POP Server
Jika anda menggunakan Mail server, user jika log ke dalam mesin tersebut via POP3 (Post Office Protokol) atau IMAP4 (Internet Message Access Protocol) untuk menerima emailnya, POP3 merupakan protokol untuk mengakses mail box

9. Port 445, SMB over IP, File Sharing
Kelemahan windows yg membuka port ini. biasanya port ini digunakan sebagai port file sharing termasuk printer sharing, port inin mudah dimasukin virus atau worm dan sebangsanya

10.Port 3389, Remote Desktop
Port ini adalah untuk remote desktop di WinXP

11. Port 389, LDAP Server
LDAP atau Lightweight Directory Access Protocol menjadi populer untuk akses Direktori, atau Nama, Telepon, Alamat direktori. Untuk Contoh LDAP: / / LDAP.Bigfoot.Com adalah server direktori LDAP.

12. Port 143, IMAP4 Server
IMAP4 atau Internet Message Access Protocol menjadi lebih populer dan digunakan untuk mengambil Internet Mail dari server jauh. Hal ini disk lebih intensif, karena semua pesan disimpan di server, namun memungkinkan untuk online mudah, offline dan menggunakan terputus.

13. Port 443, Secure Socket Layer (SSL) Server
Ketika Anda menjalankan server yang aman, Klien SSL ingin dapat terhubung ke server Secure Anda akan terhubung pada port

14. Port 5631, PCAnywhere
Ketika server PCAnywhere ditetapkan untuk menerima permintaan remote, itu mendengarkan pada port TCP 5631. Hal ini memungkinkan Anda untuk menjalankan sebuah host PCAnywhere dan menggunakan Internet untuk terhubung kembali dan jarak jauh mengendalikan PC Anda.

15. Port 5900, Virtual Network Computing (VNC)
Ketika Anda menjalankan server VNC untuk kontrol jarak jauh PC Anda, menggunakan port 5900. VNC adalah berguna jika anda ingin kontrol jarak jauh server Anda.
»»  READMORE...