Breaking News
Loading...
  • New Movies
  • Recent Games
  • Tech Review

Tab 1 Top Area

Tech News

Game Reviews

Recent Post

Saturday, October 29, 2011
Tor 0.2.2.34 Released with fixes of anonymity vulnerability

Tor 0.2.2.34 Released with fixes of anonymity vulnerability



Tor 0.2.2.34 fixes a critical anonymity vulnerability where an attacker can de-anonymize Tor users. Everybody should upgrade. Clients should upgrade so they are no longer recognizable by the TLS certs they present. Relays should upgrade so they no longer allow a remote attacker to probe them to test whether unpatched clients are currently connected to them.This release also fixes several vulnerabilities that allow an attacker to enumerate bridge relays. Some bridge enumeration attacks still remain.
Download Here



More Downloads


                                                      Plz, Post a Thanks To Keep This Post Alive!
Tor 0.2.2.34 Released with fixes of anonymity vulnerability

Tor 0.2.2.34 Released with fixes of anonymity vulnerability



Tor 0.2.2.34 fixes a critical anonymity vulnerability where an attacker can de-anonymize Tor users. Everybody should upgrade. Clients should upgrade so they are no longer recognizable by the TLS certs they present. Relays should upgrade so they no longer allow a remote attacker to probe them to test whether unpatched clients are currently connected to them.This release also fixes several vulnerabilities that allow an attacker to enumerate bridge relays. Some bridge enumeration attacks still remain.
Download Here



More Downloads


                                                      Plz, Post a Thanks To Keep This Post Alive!
How to bypass/hack a Firewall

How to bypass/hack a Firewall

Firewall is a basic and main component for securing a network . The basic purpose of a firewall is to isolate one network from another network so that networks can't make effect on each other.Hackers often bypass Antiviruses and Anti-spywares by some methods Like Crypting,Hexing, File-pumping etc,but it becomes very difficult for a Hacker to bypass a Firewall that's why I am writing this article about How to bypass a Firewall easily. 
Firewall is often called Hindrance(Obstacle) by hackers. In the below chart ,the complete working of firewall is shown :
The method which is mostly used by Hackers to bypass firewall is known as SSH tunneling.

What is SSH Tunneling?

  • Well according to wikipedia:
A Secure Shell (SSH) tunnel consists of an encrypted tunnel created through an SSH protocol connection. Users may set up SSH tunnels to tunnel unencrypted traffic over a network through an encrypted channel.
For more information on SSH Tunneling See it on Wikipedia Here

Reason to Bypass firewall

Firewall is always a problem for Hackers.Particularly if you are in university or working somewhere,you have examined that the network administrators deny access to file sharing, instant messaging or social networks such as facebook or myspace with a firewall or proxy server.So when ever you want to connect to them a message comes that these services are unavailable or something like that.To avoid this ,we have to break firewall so that we may access these services. 

SSH Tunneling

Now we will see How to Hack or Bypass firewall using SSH Tunneling
  • First of all Create an account for SSH access.There are many sites which provide paid and free SSH access.One of them is Superprotocol .
  • Now download an open source SSH Client named Putty .
  • After downloading ,execute the software and run it.
  • Now you will come to this configuration settings page.

  • Now in the host name,enter the server through which we can connect SSH access.make sure SSH is selected using port 22.
  • Next, in the SSH options,click on Tunnels,here we will set up a Tunnel.
  • Change the Source port to 8080 and then click on Dynamic.
  • After doing all this click on Open. 
  • Now login in with username and password which we given in SSH Provider.
  • Establishing the tunnel part is completed now.

Wire Shark Instalation

  • Now we need to Download another software named Wire Shark and execute wireshark.
  • Now start Packet capture,in the beginning it will be empty.
  • Open google.com in your browser and then packets getting captured by the software.

Configuring Mozilla

 Now the next part is the configuring of Mozilla Firefox so that we can use SSH connection.
  • Open the Mozilla browser and open "Tools" menu and then "Options".
  • Click on "Advanced" button tab, and then "Network" tab, and then click on "Settings".

  • Now you are in Connection Settings enter "localhost" as the "Socks Host and port number, such as "1080" into the "Port:" field.
  • Now come back to wire shark you will see some SSH connection but now there's no information about what is being sent from server to client.
How to bypass/hack a Firewall

How to bypass/hack a Firewall

Firewall is a basic and main component for securing a network . The basic purpose of a firewall is to isolate one network from another network so that networks can't make effect on each other.Hackers often bypass Antiviruses and Anti-spywares by some methods Like Crypting,Hexing, File-pumping etc,but it becomes very difficult for a Hacker to bypass a Firewall that's why I am writing this article about How to bypass a Firewall easily. 
Firewall is often called Hindrance(Obstacle) by hackers. In the below chart ,the complete working of firewall is shown :
The method which is mostly used by Hackers to bypass firewall is known as SSH tunneling.

What is SSH Tunneling?

  • Well according to wikipedia:
A Secure Shell (SSH) tunnel consists of an encrypted tunnel created through an SSH protocol connection. Users may set up SSH tunnels to tunnel unencrypted traffic over a network through an encrypted channel.
For more information on SSH Tunneling See it on Wikipedia Here

Reason to Bypass firewall

Firewall is always a problem for Hackers.Particularly if you are in university or working somewhere,you have examined that the network administrators deny access to file sharing, instant messaging or social networks such as facebook or myspace with a firewall or proxy server.So when ever you want to connect to them a message comes that these services are unavailable or something like that.To avoid this ,we have to break firewall so that we may access these services. 

SSH Tunneling

Now we will see How to Hack or Bypass firewall using SSH Tunneling
  • First of all Create an account for SSH access.There are many sites which provide paid and free SSH access.One of them is Superprotocol .
  • Now download an open source SSH Client named Putty .
  • After downloading ,execute the software and run it.
  • Now you will come to this configuration settings page.

  • Now in the host name,enter the server through which we can connect SSH access.make sure SSH is selected using port 22.
  • Next, in the SSH options,click on Tunnels,here we will set up a Tunnel.
  • Change the Source port to 8080 and then click on Dynamic.
  • After doing all this click on Open. 
  • Now login in with username and password which we given in SSH Provider.
  • Establishing the tunnel part is completed now.

Wire Shark Instalation

  • Now we need to Download another software named Wire Shark and execute wireshark.
  • Now start Packet capture,in the beginning it will be empty.
  • Open google.com in your browser and then packets getting captured by the software.

Configuring Mozilla

 Now the next part is the configuring of Mozilla Firefox so that we can use SSH connection.
  • Open the Mozilla browser and open "Tools" menu and then "Options".
  • Click on "Advanced" button tab, and then "Network" tab, and then click on "Settings".

  • Now you are in Connection Settings enter "localhost" as the "Socks Host and port number, such as "1080" into the "Port:" field.
  • Now come back to wire shark you will see some SSH connection but now there's no information about what is being sent from server to client.
How to use proxy easily in Backtrack 5

How to use proxy easily in Backtrack 5


Hey guys how u been ??? hope u enjoying , huh !!!
There are a lot of ways to hide your identity , either by single proxy or by multiple proxies like TOR which Xeo Hacker explained in a recent post.

But if u have BackTrack then nothing to worry about you can use proxy very easily and u can use multilple proxies also.

Well its called proxychains ..


So lets get started

wat it does


Well proxychains is a inbuilt tool in backtrack to let u use proxy very easily. It uses proxy according to the configuration file , which we gonna config and it takes u to any address or url via multiple proxies.


proxychains intro



well actually there is a configuration (.conf) file in etc folder . its named proxychains.conf . This is the file where u will do all ur stuffs and u'll hide your identity just by typing a single command once you configure.

Go to terminal and type following command then hit enter
gedit /etc/proxychains.conf

Wat happened ??? there is a gedit window opened with some text in it ... its actually ur config file


Modes or types of proxychains


There are 3 modes of proxychains
  1. dynamic_chain:This uses the list of proxies in the same order as u placed
  2. strict_chain:almost similar to previous one except it will not work if it gets any dead proxy server
  3. random_chain:this is the best .. this chooses and uses proxies randomly

Configuration of the file


u have to open that file with root privilege to edit that file so first issue following command
sudo su
then issue this command
gedit /etc/proxychains.conf
now you have to follow these steps
  • comment out the mode u want to use 









as u can see i have commented out random_chain by "//" .
  • now go to any proxy server list .. just google it .. i'll be using socks4 proxy servers so search on google .. then copy some IPs and their port no. and then  paste it where it says add proxy here . refer the pic at last i have added some IPs.

Now your configuration is done .....

How to use proxychains

to use proxychains just have to issue some commands as listed below.
proxyresolv [the site u want to open]

proxychains firefox [the site u want to open ]  (for firefox)
How to use proxy easily in Backtrack 5

How to use proxy easily in Backtrack 5


Hey guys how u been ??? hope u enjoying , huh !!!
There are a lot of ways to hide your identity , either by single proxy or by multiple proxies like TOR which Xeo Hacker explained in a recent post.

But if u have BackTrack then nothing to worry about you can use proxy very easily and u can use multilple proxies also.

Well its called proxychains ..


So lets get started

wat it does


Well proxychains is a inbuilt tool in backtrack to let u use proxy very easily. It uses proxy according to the configuration file , which we gonna config and it takes u to any address or url via multiple proxies.


proxychains intro



well actually there is a configuration (.conf) file in etc folder . its named proxychains.conf . This is the file where u will do all ur stuffs and u'll hide your identity just by typing a single command once you configure.

Go to terminal and type following command then hit enter
gedit /etc/proxychains.conf

Wat happened ??? there is a gedit window opened with some text in it ... its actually ur config file


Modes or types of proxychains


There are 3 modes of proxychains
  1. dynamic_chain:This uses the list of proxies in the same order as u placed
  2. strict_chain:almost similar to previous one except it will not work if it gets any dead proxy server
  3. random_chain:this is the best .. this chooses and uses proxies randomly

Configuration of the file


u have to open that file with root privilege to edit that file so first issue following command
sudo su
then issue this command
gedit /etc/proxychains.conf
now you have to follow these steps
  • comment out the mode u want to use 









as u can see i have commented out random_chain by "//" .
  • now go to any proxy server list .. just google it .. i'll be using socks4 proxy servers so search on google .. then copy some IPs and their port no. and then  paste it where it says add proxy here . refer the pic at last i have added some IPs.

Now your configuration is done .....

How to use proxychains

to use proxychains just have to issue some commands as listed below.
proxyresolv [the site u want to open]

proxychains firefox [the site u want to open ]  (for firefox)

Save this Page

Copyright © 2012 Checkzx All Right Reserved
Designed by CBTblogger