Sometimes, some people upload the document to the net. and through that, they want to make money and. sharecash is one of the best website. but before we download in this side, normally, we have to do the survey. and some country doesn't support.
here is a video tips for someone who want to get the data and make money.
Replace location to the location where you want the file to be
This is not actually a virus but a practical joke. It will make your victim believe that his system is under seize and is infected. Remember you need to compile it only (.ie click on compile option ) and not run it(i.e click on run option). This will generate the .EXE file.
Even though this is just a prank just be careful to whom you spread it as you could still get into minor trouble.
This is a simple code that changes system time . It is written using c/c++ but can be easily converted to java.
Now You need to compile it but not run it i.e just click on compile but not on run option or you will only get infected by the virus.
To set back to the old date you can use before the "return o;" statement setdate(&old_date); You might need time.h header file but i am not very sure about it.
Although the code is extremely simple be very careful what you do with this virus as you can go to jail for spreading this.
So we gave a talk and a live demo at ekoparty last week to show how BEAST exploits a weakness in SSL to decrypt secret cookies.
Please note that BEAST does not do any harm to remote servers. In fact, no packet from BEAST has ever been sent to any servers. We chose PayPal because they do everything right when it comes to server-side SSL, and that is good to demonstrate the power of BEAST, which is a client-side SSL attack. We reported the vulnerability to browser, plugin and SSL vendors several months ago (CVE-2011-3389).
Current version of BEAST consists of Javascript/applet agents and a network sniffer. We have some choices for the agent. At the time we reported the bug to vendors, HTML5 WebSockets could be used to build a BEAST agent but, due to unrelated reasons, the WebSockets protocol was already in the process of changing in such a way that stopped it. We can't use the new WebSockets protocol shipped with browsers. We use a Java applet in this video, but please be aware that it may be possible to implement a Javascript agent with XMLHttpRequest as well. Why don't you take a look? ;-)
It is an advance form of phishing. Kindly read my previous post on normal phishing here before proceeding.Difference between phishing and desktop phishing is as follows.
In phishing :-
1. Attacker convinces the victim to click on the link of fake login page which resembles a genuine login page.
2.Victim enters his credentials in fake login page that goes to attacker.
3.Victim is then redirected to an error page or genuine website depending on attacker.
But main drawback in phishing is that victim can easily differentiate between fake and real login page by looking at the domain name. We can overcome this in desktop phishing by spoofing domain name.
If you do not know what exactly phishing means , I highly recommend you to read my post on basics of phishinghere.
I could simply give you the fake page generators or already made fake web pages but I want you to manually create yourself.
First, I shoud tell you the basic methodology of making phishing page of any website. In a website where the users are supposed to enter/submit any data (data might be email,password or anything), there is a piece of code in html code called as action form. It looks like this <form method="POST" action="something">.
You can find this out by simply viewing the source of web page. Right click on webpage to do so. "something" here in the action field is name or path of the file where submitted data goes. So the idea of fake login page is simple. Just download the webpage on your computer, modify the action field to change the path where data goes according to yourself, upload this modified webpage on any web hosting site and you are done. :)
Phishing is a technique of obtaining sensitive data such username,password,credit card details etc by an attacker by claiming to be a trusted or genuine organisation/company.
The most common type of phishing is Fake Login Pages. The basic methodology of this attack is written below
1.Suppose an attacker wants to hack gmail/yahoo/facebook/bank account of the victim. Attacker creates a fake login page of that website . This fake login page looks exactly like real/genuine login page.
Introduction: DarkComet-RAT (Remote Administration Tool) is software design to control in the best condition and confort possible any kind of Microsoft Windows machine since Windows 2000.
This software allow you to make hundreds of functions stealthly and remotely without any kind of autorisation in the remote process.
This software is a long time project , started the August 2008 , DarkComet-RAT is now one of the best and one of the most stable RAT ever made and totally free.
Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.
This invisible spy application is designed for 2000, XP, 2003, Vista and Windows 7.
Email log delivery - keylogger can send you recorded logs through e-mail delivery at set times - perfect for remote monitoring!
FTP delivery - Ardamax Keylogger can upload recorded logs through FTP delivery.
Network delivery - sends recorded logs through via LAN.
Clipboard logging - capture all text copied to the Windows Clipboard.
Invisible mode makes it absolutely invisible to anyone. Ardamax Keylogger is not visible in the task bar, system tray, Windows 2000/XP/2003/Vista/Windows 7 Task Manager, process viewers (Process Explorer, WinTasks etc.), Start Menu and Windows Startup list.
Visual surveillance - periodically makes screenshots and stores the compressed images to log.
Chat monitoring - Ardamax Keylogger is designed to record and monitor both sides of a conversation in following chats:
AIM
Windows Live Messenger 2011
ICQ 7
Skype 4
Yahoo Messenger 10
Google Talk
Miranda
QiP 2010
Security - allows you to protect program settings, Hidden Mode and Log file.
Application monitoring - keylogger will record the application that was in use that received the keystroke!
Time/Date tracking - it allows you to pinpoint the exact time a window received a keystroke!
Powerful Log Viewer - you can view and save the log as a HTML page or plain text with keylogger Log Viewer.
Small size – Ardamax Keylogger is several times smaller than other programs with the same features. It has no additional modules and libraries, so its size is smaller and the performance is higher.
Ardamax Keylogger fully supports Unicode characters which makes it possible to record keystrokes that include characters from Japanese, Chinese, Arabic and many other character sets.
It records every keystroke. Captures passwords and all other invisible text.
Other Features:
Windows 2000/2003/XP/Vista/Windows 7 support
Monitors multi-user machines
Automatic startup
Friendly interface
Video for Tutorial Ardamax