Sqlmap 0.9 Available For Download Now

Sqlmap is a very popular tool used which automates the method of discovering a Sql injection flaw in a web application and exploitation part as well. Sqlmap team has just released the newest version of Sqlmap, Sql map comes in with lots of changes including a fully re-written SQL Injection flaw detecting engine.


Features

Here are some of the newset features in Sqlmap 0.9:

  • Rewritten SQL injection detection engine (Bernardo and Miroslav).
  • Support to directly connect to the database without passing via a SQL injection, -d switch (Bernardo and Miroslav).
  • Added full support for both time-based blind SQL injection and error-based SQL injection techniques (Bernardo and Miroslav).
  • Implemented support for SQLite 2 and 3 (Bernardo and Miroslav).
  • Implemented support for Firebird (Bernardo and Miroslav).
  • Implemented support for Microsoft Access, Sybase and SAP MaxDB (Miroslav).
  • Added support to tamper injection data with –tamper switch (Bernardo and Miroslav).
  • Added automatic recognition of password hashes format and support to crack them with a dictionary-based attack (Miroslav).
  • Added support to fetch unicode data (Bernardo and Miroslav).
  • Added support to use persistent HTTP(s) connection for speed improvement, –keep-alive switch (Miroslav).
  • Implemented several optimization switches to speed up the exploitation of SQL injections (Bernardo and Miroslav).
  • Support to parse and test forms on target url, –forms switch (Bernardo and Miroslav).
  • Added switches to brute-force tables names and columns names with a dictionary attack, –common-tables and –common-columns.
You can download Sqlmap 0.9 here

    How To Find Lost Microsoft Office 2010 Product Key


    In my previous post Free Microsoft office 2010 Product key I posted free Microsoft office product key download, However if you are one who have already installed Microsoft office 2010 and have lost the product key for any reason and looking to recover Microsoft Office 2010 Product key then you are in the right place.


    Produkey

    Produkey is an excellent software which can be used to extract your Microsoft 2010 product key within few seconds, and the best part is that you don't even need to install the program and it can be carried out anywhere in USB or CD.

    Product Key Finder


    Product key is another great small program which can help you recover your microsoft office 2010 product, it  does not only support Microsoft Office 2010 Product key but it can be used to extract other programs as well.

    RafayHackingArticles Finally On A Custom Domain Now !

    Well it has been almost 2 years since I have started rafayhackingarticles and for 2 years it has happened to me countless times that i have thought of moving to a custom domain(.com,.net,.org) but every time i tried to do it there was some thing which always holding me back and one of the major things which was holding me back was my SEO Standing I was afraid that I might loose my traffic, but yesterday one of my friend David suggested me to move to custom domain as blogspot is Google's property and google can delete it any time they want and Google is very less likely to delete blogs on custom domains.

    So i said to my self that "Some day will never come" So I acted immediately and registered rafayhackingarticles.net, Now some of you might ask questions that whyI did not go for a .com domain, The answer is that it was not available.

    Learn How To Hack - Ethical Hacking and security tips

    Yesterday when I was searching godaddy for domains my first priority was to go after a .com domain but since it was not available .net was the second best option.

    What Topics Will I cover?

    1. Hacking And Security Related News.

    2. Ethical Hacking Techniques.

    3. Computer Tricks.

    4. Windows hacks.

    5. Security flaws.

    And much more.

    Advice for those on blogspot:

    During my experience of more than 2 years with blogging the biggest mistake i made was that I blogged on a blogspot domain(And never will), If are still on blogspot I suggest you to move to custom domain, Their are countless advantages of a custom domain over a sub domain, If you are looking forward to make serious money from blog i suggest you to move to custom domain.

    Cain And Abel 4.9.40 Is Available For Download

    Cain and abel is a very popular windows password recovery program, It allows you to recover almost all kinds of passwords, It also supports wide variety of password cracking methods such as a brute force attack, Dictionary attack, Rainbow Tables, Cryptanalysis attack etc, Cain is mostly used for the purpose of sniffing and also used to carry out wide variety of Man In the middle attacks.




    Features


    The Oxid team has just released the newest version of cain and abel software i.e. Cain and abel 4.9.40, Here are some of the added features in cain and abel 4.9.40:

    • Added Proxy support for Cain's Certificate Collector.
    • Added the ability to specify custom proxy authentication credentials for Certificate Collector.
    • Added ProxyHTTPS Man-in-the-Middle Sniffer (TCP port 8080).
    • HTTP, APR-HTTPS and APR-ProxyHTTPS sniffer filters are now separated.
    • Added progress bar indicator in the off-line capture file function.
    • Bug fixed in ProxyHTTPS Man-in-the-Middle Sniffer parsing "Connection Established" string.
    • Bug fixed in VoIP Sniffer creating MP3 Mono files.
    • Bug fixed in RTP Sniffer processing off-line capture files.
    • WinRTGen recompiled with OpenSSL library version 0.9.8q.
    • OpenSSL library upgrade to version 0.9.8q.
    • Winpcap library upgrade to version 4.1.2.
    You can download Cain and Abel 4.9.40 here

    How To Sniff VOIP Session Using Cain

    According to wikipedia:


    Voice over Internet Protocol (Voice over IP, VoIP) is one of a family of internet technologies, communication protocols, and transmission technologies for delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms frequently encountered and often used synonymously with VoIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, and broadband phone.

    Cain is an excellent software which can be used for sniffing a VOIP, There are couple of methods to sniff a VOIP session but in this tutorial I will explain you how you can use a Man in the Middle Attack with Cain and Abel to sniff a VOIP conversation.

    Sniff VOIP Session With Cain

    So here is how you can capture a VOIP session on your network:

    Step 1 - First of all download Cain  and install it.

    Step 2 - Once cain is successfully installed go ahead and launch it, Now launch the sniffer by clicking on a small green button just below the file option

    Step 3 - Next click on the blue "+" at the top, choose "All hosts in my subnet" and click ok



    Step 4 - This will show you all the active hosts on your network.



    Step 5 - Next goto ARP tab at the bottom and press the blue "+" sign, select the hosts on which you want to you want to perform a man in the middle attack and click ok


    Step 6 - Now just click on the little yellow "Microtoxic" button at the top to launch the ARP Poisoning attack which is the real name for Man in the middle attack..



    Step 7 -  Next click VOIP tab at the bottom and if cain has captured a VOIP session, you will get similar results.


    I hope you have enjoyed reading the post, I will write also write an article on protecting your VOIP sessions in the upcoming posts.

    HITB 2011 Amsterdam Round Two Quals Binary

    The provided binary is a ELF file designed to be run by inetd and accepts several character based commands followed by their parameters. The main loop reads a character from STDIN (in inetd a socket is duplicated into standard I/O descriptors) and based on the value picks a handler from an array of function pointers. The following commands exist:

    • 'f' - return meta data for a given file name
    • 'l' - list filenames from the home directory
    • 'q' - terminate the process
    • 's' - return symbolic link's path name
    • 'v' - verify input with a key file's data

    After mapping out all the available handlers and reviewing how they work there were no obvious vulnerabilities (e.g. buffer overflow). The handler functions that expect additional input first allocate some heap-based memory to store this input and care is taken to make sure it's not overflowed. After the handler completes its work the memory is freed. However, there's a design flaw in the way allocated memory is used when the key text is verified. Specifically, the key data is read into a allocated buffer and compared to the string supplied by a user. Once this is done the memory is simply freed, which returns the memory block to the free pool still containing the key data.

    As a result, we can use another handler, which allocates memory for its operation and returns the results to the user. One such command is the 's' character, which accepts a symbolic link as a parameter. Additionally, after listing the contents of the home directory using the 'l' command we find few symbolic links that can be used for the 's' command. Thus, when requesting to view a symbolic link the real path will be copied to a allocated buffer. Since the buffer will come from the free pool and the contents were not cleared then whatever data was there will also be displayed. If the resulting path is shorter in length than the data size of the "KeyFile" we can disclose part of the secret key string.

    Looking at the handler for the 'v' command it was identified that a string comparison is performed only on the last 14 bytes of the key file. This tells us how much of the disclosed key file's data we need to grab. Thus, to reproduce we need to submit the 'v' command with any key, which stores the key data into a buffer, but does not clear it after the comparison. Then, submit the 's' command to display the path of the "t1" link, which is short enough to disclose more than 14 bytes of the key file. Finally, take the last 14 bytes and submit them via the 'v' command again and this time the comparison succeeds and gives us the solution key.

    The solution string is (w/o quotes): "DwightIzK00l"

    40 Ways to Make Money on the Internet

    I did a little bookmark scrub this morning and thought I would share the remaining content of my "Online Money" folder. To warn you, there are certain things that I don't like and never bookmark so:

    What's NOT included: Taking Paid Surveys, Getting Paid to Surf the Internet, MLM, Contest Sites, "Buy my DVD, CD, Audiobook", etc.

    What IS included: Things you can use to legitimately make money online - Everything from Getting Paid to review software to good ole' Adsense.
    • Infolinks - Infolinks is probably the highest paying option for your in-text advertising. On DLM, you will see underlined links scattered throughout articles. Those are a function of Infolinks and without disclosing too much, it's been a great source of income. Best is that they accept all sizes of websites and blogs. Just sign up and begin.
    • Build a Niche Store - This is a simple store development platform which enables you to create content based sites that generate income through the eBay affiliate programs. Pretty darn simple and increasingly popular.
    • Adbrite - Sell space on your site for text ads. This would work like the DLM Marketplace you see on the right of my pages although I chose to manage it myself.
    • Amazon Affiliate Program - Easily create a store or shopping section on your site instead of sending your visitors to Amazon. Amazon handles the shopping cart and fulfillment.
    • Amazon Seller - Sell your stuff on Amazon
    • Associated Content - If you write a story, how-to, rant, how-to cut grass, etc., you can submit it to them and they will pay you $3-$20 per article if they like it.
    • Yahoo! Merchant Solutions - This is a pretty simple and cheap way to create an online store.
    • Azoogleads - Another ad program. They do have some decent companies lined up as advertisers. You provide space, they'll provide an ad.
    • BidVertiser - PPC (pay per click) program with a low $10 payout amount.
    • Blog - Start a blog and consistently write excellent content. With good ad placement, you may make some money. I detail my process here: Simply Said, How to Blog.
    • Cafepress - You provide a design, they'll toss it on a T-Shirt, Hat, etc. No upfront costs. Get a free online shop and promote your products on your website.
    • Chitika - Their eMiniMalls service has shown great results for many Bloggers and site owners. You choose a keyword and they show relevant products on your site using a pretty unique interface.
    • Clickbank - Quickly becoming my favorite affiliate program. They have thousands of things for you to advertise on your site.
    • ClicknWork - Get paid $5-$150 per hour for basically doing freelance work on a per-assignment basis. You have to pass a pretty tough test to get in.
    • Clicksor - These are the guys that generate contextual ads on sites that show up when you hover over a double-underlined word.
    • Commission Junction - If you have a site, you can join Commission Junction. Once enrolled for free, you can choose companies whose ads are pertinent to your site. Companies have the ultimate say on working with you. There are easily over 1,000 companies to choose from here.
    • CreamAid - For blogs only, advertisers provide you with a topic and you write about it on your site. To do this, you have to install a flash widget into your blog post. The more people you bring into the conversation through the widget, the more you get paid. It's difficult to explain.
    • eefoof - Think of it as YouTube + Flickr + Music. You add original content and they pay you based on the visitors you attract.
    • Ether - If you are an expert on something, Ether provides a way for people to pay you to talk about it in a one-on-one setting. If you want to charge $250/hr, that's fine. You have to do all the advertising so you should have a blog or site already established.
    • eBay- Come on, you know what this is. Gather your junk and sell it!
    • eBay Stores - If you have a real store and want to sell your stuff online, this is a decent option to get you started.
    • ELance - Name gives it away. Programmers, Codes, Web Designers, Writers, Editors, can look for freelance opportunities.
    • Feedvertising - This is an arm of Text Link Ads and is currently only good for Wordpress users. This does me no good currently, but as you can guess, they place ads in your feed(s).
    • Feedburner / Google - Not only are they the best place to house your feeds, they will also add ads to your feed and website. You get paid per impression and if you implement Google Adsense to your feed, you are paid per click.
    • Google Adsense - Come on, you don't need an explanation; these ads are all over the place. Google displays relevant ads based on your site's content
    • Google Adwords - Create simple text ads and choose keywords that determine when they are displayed. This is where the Adsense Content comes from. You do not need a site for this.
    • H3.com - Get paid to fill jobs. Commissions range from $50-$5,000. It all depends on how tough the job is to fill and how desperate the hiring company is. This is another one that's tough to explain.
    • Indeed.com - Add their job board to your site. They then post jobs based on the geographic location of visitors and the position types you pre-select. I tried it and I they continually report that I sent 0 visitors and I know that's not right. Nevertheless, I may have an isolated problem so they make the list.
    • InnerSell - If you have a customer that wants to buy something you cannot sell, you can sell the lead here.
    • Jigsaw - It's a pretty flaky model but if you have a Rolodex full of good contacts, you can sell them here. I can't make sense of it but it looks like you get $0.10 per profile.
    • LinkShare.com - If you have a site, you can join Linkshare. Once enrolled for free, you can choose companies whose ads are pertinent to your site. Companies have the ultimate say on working with you. Like Commission Junction, there are a ton of companies waiting to evaluate your site.
    • Microsoft Adcenter - Bid on keywords and Microsoft places your created ads then they are searched for. This is similar to Google Adwords. You do not need a site for this.
    • Overstock.com - Sell your stuff on Overstock.com
    • Pay Per Post - I don't agree with this model entirely but they have advertisers that will pay you to write about their products on your blog.
    • Pheedo - If you have an RSS feed, run it through Pheedo. Like Feedburner, they can include ads into your feed and if you really become large, advertisers will pay a premium for you to show their ads.
    • Shareasale.com - I've used them for a couple years for some banner advertising. They are similar to Commission Junction and Linkshare however they seem to have lower tiered companies with advertising offers.
    • Shoemoney - This is a blog that can teach you a ton on making money online. I've spent hours reading his old stuff.
    • Software Judge - They will pay you up to $50 to review software.
    • Text Link Ads - I have never made a dime here but I know people that have. You can earn by sending advertisers to them or by selling spots on your site. You must have a real site or blog to do this - nothing on a shared domain (i.e. /blogspot).
    • Vibrant Media - Don't bother unless your site has 500,000 page views of text based content a month. If you have that readership, these are the guys that display bubble box ads to underlined words on your site.
    • West Work At Home Agent - Not entirely online but this is worth a mention because it's won awards and is very legitimate. If you are an at-home Mom or free-lancer without work, you should check this out.

    Cyber Crime

     
    Cyber ​​crime or crimes committed in the virtual world is a criminal offense committed on Internet technology (Cyberspace), whether that attack public facilities or private property in cyberspace, retrieving information from individuals or companies without permission from the owner who used to commit fraud, dissemination and embezzlement. Technically, these offenses can be divided into off-line crime, semi on-line crime and cybercrime. Each has its own characteristics, the main difference between the three types of crimes are connected to the network of public information (read: internet). Cybercrime is the development of a crime by using computer technology and its development along with the development of information technology. Cybercrime tidak mengenal batasan territorial, sehingga kebanyakan korban dari cybercrime umumnya tidak mengetahui dan terlibat interaksi langsung dengan pelakunya. Cybercrime does not recognize territorial boundaries, so that most victims of cybercrime are generally not aware of and involved direct interaction with the perpetrator.

    Internet crime is divided into two motifs, namely:
    1. Intellectual motif. Crimes committed just to satisfy themselves the perpetrators aim is to prove proficiency in computer or information systems, especially proficiency in computer network defenses and usually actors involved in the hacker communities.
    2. The motive of economic, political and criminal. Crimes committed for personal interests or the interests of certain groups that will impact on economic and political losses on the other side.
    Computer crime can also be viewed within the scope as follows:
    1. First, the computer as an instrument to perform a traditional crime,
    2. Second, computers and devices as objects of abuse, where the data in the computer that became the object of crime can be changed, modified, deleted or duplicated illegally.
    3. Third, the abuse related to computers or data,
    4. Fourth, is the unauthorized acquisition, disclosure or use of information and data, relating to the problem of abuse of access rights in a manner that is illegal.

    CRYME PREVENTION CYBER CRYME

    There is no guarantee of security in cyberspace, and no computer security system that can continuously protect data in it.  The hackers will continue to try to conquer the most sophisticated security system, and is a pleasure for hackers if they can break into other people's computer security system. A good step is to always update your computer security systems and protect data sent with cutting edge technology as well.

    At issue cyberporn or cyber sex (see page. 171-195), the issue of prevention and mitigation is not enough just to do the criminalization of terumus in sound art. The experience of some countries shows that cooperation between government, law enforcement officials, NGOs / NGOs and communities can reduce crime. Berikut pengalaman beberapa Negara itu : Here are some experiences that State:

    In Sweden, Internet security company, NetClean Technology in cooperation with the Swedish National Criminal Police Department and the NGO ECPAT, developed a software program to facilitate the reporting of child pornography. When a person doubts whether the existing material on the internet is legal or not, that person can use the software directly and will soon receive an answer from ECPAT Sweden.

    Norway followed Britain steps in cooperation between Telenor and the Norwegian National Police, Kripos. Kripos provides a list of sites to block child pornography, and Telenor there any person accessing it. Telenor every day blocks of about 10,000 to 12,000 people who tried to visit it there. Swedish National Police and Norway cooperate in updating the list of child pornography sites with the help of an ISP in Sweden. These sites can be accessed if they received approval from the police.
    Following the steps of Norway and Sweden, the Danish ISPs to block child pornography sites since October 2005. ISP is also working with the NGO Save the Children Denmark. During the first month, the ISP has blocked 1200 access of every day.

    Another determining factor in the prevention and combating cybercrime by means of non-penal is the question of ethics. In interacting with other people using the internet, covered by a specific rule called Nettiquette or ethics on the Internet. Although no standardized assessment of how to interact on the internet ethics, ethics in interacting in the real world (real life) can be used as a reference.

    Learn Website Hacking And Security With DVWA Tools

    Lots of readers often ask me How can I be good at website hacking and web application security, The thing is that even if you have an idea of how some popular website application attack work but still you need a safe environment to practice what you have learned because you are not allowed to access any website even for testing purposes unless and until you are not authorized to do that, This is where Damn vulnerable web app(DVWA) comes into play
    Basically Damn vulnerable web app(DVWA) PHP/MySQL web app which is Damn vulnerable, DVWA web app allows you to learn and practice web application attacks in a safe environment, It's latest version is DVWA 1.7.


    Web Hacking and Security related articles on RHA

    Vulnerabilities

    • SQL Injection
    • XSS (Cross Site Scripting)
    • LFI (Local File Inclusion)
    • RFI (Remote File Inclusion)
    • Command Execution
    • Upload Script
    • Login Brute Force
    • Blind SQL Injection 
    And much more.

    Official warning

    It should come as no shock..but this application is damn vulnerable! Do not upload it to your hosting provider’s public html folder or any working web server as it will be hacked. It’s recommend that you download and install XAMP onto a local machine inside your LAN which is used solely for testing.

    Installation Guide

    You can download DVWA 1.0.4 here, below I am posting a video which will tell you step by step how to install DVWA tools on your computer and practice website Hacking