Showing posts with label security. Show all posts



Hey There! Have You Ever Wanted free Domains? Well Intuit Gives Free Domains Out, But you must Fill the Details For The Payment. As I am gonna Promise your gonna get Your Domain, But I Shall Warn you! If you make Multiple Accounts, Your Account Can be Deleted.

What you will need :
Gmail  account
Internet Connection 
and a lil bit brain

So Lets Start Shall we?
First of all use any VPn say Security Kiss and select US server and click on connect
after that goto http://www.gybo.com/wisconsin/getonline, To
Register into Intuit. So The Page Should look something like this :



So Click the Continue & You should Redirect to This Page :



So You can Enter an Random Email Adress, But I Suggest you use
yours Just Because I do not want your account to be Deleted.
So Make your User ID & PW & Click Continue.
So Once your in this page :



You want to Click the ”Choose a domain (www.yourname.com)
You can choose any 1 tld
For your Website,

Now Choose a Domain name & Click ”Check Availability”
Now once you Have Chosen it, You should have page like this :


Click the Get Domain Button to Proceed to Next Step.
You will be Redirected to the Page where you must fill
information. You can just use www.fakenamegenerator.com to
Generate the Details or Enter your Personal Details.
I Used
www.fakenamegenerator.com Details,


Now Just Press ”Save & Continue” To Proceed into next step.
So now you will be in this Page, And Information Will be in it. :


So Click Submit.
Now you will be Asked Credit Card Information, But were gonna
find them on Google.
NOTE: YOU ARE NOT GONNA GET CAUGHT TO PAY
0.00$ !
So Write on Google The Following Thing :
Credit Card Dumps
.
Well it Accepts The Following Cards, Mastercard, Visa, Amex,
Discover . So you can find those on google too :)
So I Putted these Details :
Name: Michael Bartlett
Number: 4358802828369933
Exp: 01/20 (01 2020)
CVV: 942
As You have Completed your Payment, You will be Redirected to
This page :


Now just Click The ”Domains” & You Have your Domain in there
Congrats!, Now just Wait Till you Have Full Control Of Your
Domain. Which you can Move or Create It Normally With Intuit.
If You have Questions comment's are Welcome.


Hey Friends here I present a Free hosting Giveaway.
Only Top 5 winners will get Free Hosting without ads.
Winners will be selected via http://www.random.org/
You can participate using the widget below





This is an introduction to DNS poisoning which also includes an example of quite a nifty application of it using the IP Experiment. It’s purely educational, so I’m not responsible for how you use the information in it.

To start, you’ll need• A computer running Linux (Ubuntu in my case)• A basic understanding of how the Domain Name System (DNS) works.Note that this is a more advanced topic; don’t try this if you don’t know what you’re doing.


Why DNS?


The DNS provides a way for computers to translate the domain names we see to the physical IPs they represent. When you load a webpage, your browser will ask its DNS server for the IP of the host you requested, and the server will respond. Your browser will then request the webpage from the server with the IP address that the DNS server supplied.If we can find a way to tell the client the wrong IP address, and give them the IP of a malicious server instead, we can do some damage.


Malicious DNS Server


So if we want to send clients to a malicious web server, first we need to tell them its IP, and so we need to set up a malicious DNS server.The server I’ve selected is dnsmasq – its lightweight and the only one that works for this purpose (that I’ve found)To install dnsmasq on Ubuntu, run sudo apt-get install dnsmasq, or on other distributions of Linux, use the appropriate package manager.


Once you’ve installed it you can go and edit the configuration file (/etc/dnsmasq.conf)


sudo gedit /etc/dnsmasq.conf


The values in there should be sufficient for most purposes. What we want to do is hard-code some IPs for certain servers we want to spoof


The format for this is address=/HOST/IP


So for example;


address=/facebook.com/63.63.63.63


where 63.63.63.63 is the IP of your malicious web server


Save the file and restart dnsmasq by running


sudo /etc/init.d/dnsmasq restart


You now have a DNS server running which will redirect requests for facebook.com to 63.63.63.63


Malicious Web Server


You probably already have a web server installed. If not, install apache. This is pretty basic, so I won’t cover it here.


There are a couple of things you can do with the web server. It will be getting all the traffic intended for the orignal website, so the most likely cause of action would be to set up some sort of phishing site


I’ll presume you know how to do that though


Another alternative is to set up some sort of transparent proxy which logs all activity. I might come back to this in the future.


I Can Be Your DNS Server Plz?


An alternative is to, instead of a spoof webserver, set up a Metasploit browser_autopwn module . You can have lots of fun with that


But how do you get a victim? Well this is where my project, the IP Experiment could come in handy


If you don’t know, the IP Experiment basically harvests people’s IPs through websites such as forums and scans them for open ports. A surprising number of these IPs have port 80 open and more often that not, that leads straight to a router configuration mini-site. ‘Admin’ and ‘password’ will get you far in life; its fairly easy to login and change the DNS settings.
This summary is not available. Please click here to view the post.
Copyright © 2012 D3vil tech.