Gadgets Security

Keep your mobile gadget secure

Secure Your Server

We must study how to harder our servers

Internet Security

Secure your computer, Secure your browser, and enjoy to browsing to internet

This is default featured post 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Monitor your System Network

Make your network in your hand and under control

Showing posts with label Hardware Hacking. Show all posts
Showing posts with label Hardware Hacking. Show all posts

Saturday, July 23, 2011

Top 5 Tips for protecting your mobile from phone hacking

Phone hacking can happen to anyone. Here's how to secure your phone.

As you've no doubt heard by now, phone hacking is the new ‘in' thing with newspapers and scrupulous media types.
But it's not just celebrities having affairs who need to worry; you too could be the victim of phone hacking. So it's time to tighten up security on your mobile phone and start protecting it in the same way you would protect your PC.
Here is PC Advisor's Top 5 Tips for protecting your mobile from phone hacking.
1. Change your voicemail pin 
If you have got an old phone or phone contract, then there's a good chance that your service provider originally set your voicemail up with their standard pin – 1234, 0000, 4444 etc. Therefore if a hacker called you when your phone was engaged, they would simply have to enter your service provider's standard pin and they would have free reign over your inbox. It's been suggested that this is how the majority of the celebrities' phones were hacked.

2. Turn your Bluetooth Off 
Apart from needlessly wasting your phone's battery when you're not using it, Bluetooth also gives potential hackers the opportunity to access your phone and its precious information.
If however, you do want to leave your Bluetooth on throughout the day, make sure you set your phone as 'not discoverable' and don't accept connections from phones you do not know.

3. Stop downloading untrusted Apps
It's reported that roughly one third of Apps will automatically obtain and send your phone number, device ID and sim card serial number back to the developers (along with lots of other data). Whereas iTunes Apps are thoroughly policed, the Google Android Apps have experienced some Trojan Horse attacks which are being used to send location and user information back to the hackers.

4. Take your Battery Out 
 
If you're convinced that your phone has been hacked then you should do this immediately. Taking out the battery won't stop hackers having access to your voicemails, but it will stop them gaining access to your phone (and what's stored on it). Without power to your phone, there is nothing to hack.
 
5. Don't lend your phone to people you don't know!
It takes a matter of seconds for somebody to send a SMS from your phone. From that one simple SMS a hacker can do all of the following things:
• Remotely access the phones microphone and use it as a listening device wherever you are.
• Intercept a call and listen in to it in complete secrecy.
• Automatically add a BCC to all emails and SMS messages sent from your phone.
• Use your GPS to locate where you are at all times (particularly nasty when used for organised robberies on your house.)

Friday, July 15, 2011

USBsploit 0.3b – Generate Reverse TCP Backdoors & Malicious .LNK Files

PoC to generate Reverse TCP backdoors (x86, x64, all ports), running Autorun or LNK USB infections, but also dumping all USB files remotely on multiple targets at the same time. USBsploit works through Meterpreter sessions with a light (27MB) modified version of Metasploit. The interface is a mod of SET (The Social Engineering Toolkit). The Meterpreter script usbsploit.rb of the USBsploit Framework can otherwise be used with the original Metasploit Framework.
You can download USBsploit here:
usbsploit-0.3-BETA-linux-i686.tar.gz

GNS3 – Graphical Network Simulator

GGNS3 is a graphical network simulator that allows simulation of complex networks. It’s an excellent complementary tool to real labs for network engineers, administrators and people wanting to pass certifications such as CCNA, CCNP, CCIP, CCIE, JNCIA, JNCIS, JNCIE. It can also be used to experiment features of Cisco IOS, Juniper JunOS or to check configurations that need to be deployed later on real routers.
To allow complete simulations, GNS3 is strongly linked with:
  • Dynamips, the core program that allows Cisco IOS emulation.
  • Dynagen, a text-based front-end for Dynamips.
  • Qemu, a generic and open source machine emulator and virtualizer.
Features Overview
  • Design of high quality and complex network topologies.
  • Emulation of many Cisco IOS router platforms, IPS, PIX and ASA firewalls, JunOS.
  • Simulation of simple Ethernet, ATM and Frame Relay switches.
  • Connection of the simulated network to the real world!
  • Packet capture using Wireshark.
This project is an open source, free program that may be used on multiple operating systems, including Windows, Linux, and MacOS X.
You can download GNS3 v0.7.2 here:
Windows All-in-one – GNS3-0.7.2-win32-all-in-one.exe
Windows Binary – GNS3-0.7.2-bin-win32.zip
Mac DMG Package – GNS3-0.7.2-intel-x86_64.dmg
Linux/Source – GNS3-0.7.2-src.tar.gz