Tuesday, January 20, 2009

Outlaws of Technology! Hacker or Cracker

In order to study the comparison the between the hackers and crackers, it is important to understand the respective definitions. While apparently the words hacking and cracking seems synonymous, yet there exist certain points of distinctions between the two and the meaning of the words will always be heated topics of debate.
Since the very dawn of the civilization, man's hunger to attain the unattainable have went on opening new horizons in almost every aspects of life, and the technology is of no exception to this nature of human.
Aims of Hackers and Crackers

The computer hackers actually trespass or circumvent artistically, yet scientifically into the other computer system with a hunger to know the programmable systems, how they perform and their internal structures, while cracking is slight different in sense. Cracking means to break off the computer's security system. This is a subject matter of hard-core science with an aesthetic undertone of artistic skill that has attracted a few millions of teenagers and young adults all over the world.
Who Is A Hacker And What Is His Aim?

Delving deep into the concepts, we can compare the hackers and crackers. A hacker is a person who commits the fraudulent act or the penal offense of exploring into the other computers in order to know the details of the programmable system and how they work. On the other level, a cracker is a person just more secretive as compared to the hacker. The cracker breaks through the system's security and proves to be far more dangerous than the hackers who just quench his or her thirst by simply discovering the workings of a system. Hence the crackers can potentially be much more perilous as compared to the hackers. While it is often believed that the hacking is simply exploring into the other computer system with an intention to know how the programmable system works, which is not a fraudulent task unless any sort of vandalism and theft is done by this, another huge section stands strictly against the view and look at the act from the view point of a crime.
Who is A Cracker and What Is His Aim?

A cracker is a technical person who has mastered the art of breaking systems, often not for acquiring knowledge, by the dint of few programs and softwares used as tools. They are more interested in the system's security without the need of great deal of knowledge, thereby not benefiting much. On the other hand, a hacker who cracks and hacks systems is not only interested in breaking the security of the system but also in knowing about the system's details, by which he gains much more than by simply cracking systems. Unlike a cracker, a hacker generally does not have intention destroy data maliciously or to steel things. A cracker who is often termed to be a cyber burglar brings out significant harm to the network or steels the information like passwords or credit card numbers. A Trojan is capable enough to recognize and record even every single keystroke that you make. Hence even if you do not store any personal or financial records in your system, the hackers can still be able to obtain the information by recognizing the keystrokes.
NOTE: Article Initially Taken From

Credit Card Hackers Are Here - Have You Checked Your Credit Report Lately?

Credit card hacking has become one of the new security headaches of consumers. Although in face to face transactions the percentage of credit card fraud is almost a tenth of a percent, in online transactions it's as high as two or three percent.
That means that for every one hundred transactions you may do in the internet, you may suffer two or three breaches in your private information. Stopping credit card number hacking is, nowadays, one of the priorities of credit card brands around the world.One funny thing about many of these hackers; free credit card numbers are posted at the internet. Some of them don't want the potential money that can be acquired from this information, only the fame.
How Are Credit Cards Gained By Hackers?
A hacker has many ways to gain a credit card number from an innocent user. The most common one is known as phishing. In this technique, the hacker poses as an officer within an organization, let's say VISA. The hacker sends to a group of email accounts an alert, instructing the receiver to follow determined set of instructions before his credit card is cancelled.If the user is not aware of this kind of fraud, he will insert his credit card number, his name and expiration date without knowing he is going to be a victim of an online crime.Another way for hacking credit card numbers is through a website. The hacker only needs to hack the systems of an online retailer, let's say, Costco, and search for the database where the retailer stores the information of all of the users who have made recent transactions.The third way is through the online process of buying. Let's say an adult finds a website with adult content that he or she finds attractive. It's quite probable that the website is only a masquerade for acquiring credit card information from you.
What Is A Carder?
A carder is a criminal who specializes in stealing information from credit cards. Although the majority of them buy the information from online vendors, some of them are quite savvy on how to access that information by themselves.In the physical world, a carder will steal the information from a user while doing a face to face transaction. The criminal only needs to pass the card through a special scanner. This device will read from the magnetic strip all of the credit card information. Afterwards, the carder will trespass that information to a blank card available in many identity card stores. In the virtual world, credit card hacking is a bit more sophisticated and automatized. A hacker could install inside your system a credit card hacking software known as Bugbear. This program is a keystroke logger; it captures the keys that you have pressed in your keyboard and after some time, it transmits this information to the hacker. The criminal will navigate through this data, searching for any private information that can give him access to your credit card.Besides Bugbear, there is also the IRC bot. This automated software is used for determined functions, like a moderator for a chat room. But if it is used by a hacker, he may use it for stealing your credit card information. The IRC bot will pose as an official from a company, asking you to insert your credit card information. Another mean that hackers use for stealing money from your credit card is through unused ebay accounts. Once they find a possible victim, the hacker uses a program that starts bombarding the account until it breaks it. Once inside, the hacker will use it for posing as the real user, selling equipment that will never reach the buyer once he buys it.
Note: Article Taken From

GooGle Hacking For Panitration testers

A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because I’ve seen it with my own eyes. As the founder of the Google Hacking Database (GHDB) and the Search engine hacking forums at http://johnny.ihackstuff.com, I am constantly amazed at what the Google hacking community comes up with. It turns out the rumors are true-creative Google searches can reveal medical, financial, proprietary and even classified information. Despite government edicts, regulation and protection acts like HIPPA and the constant barking of security watchdogs, this problem still persists. Stuff still makes it out onto the web, and Google hackers snatch it right up. Protect yourself from Google hackers with this new volume of information.-Johnny Long
. Learn Google Searching BasicsExplore Google’s Web-based Interface, build Google queries, and work with Google URLs.. Use Advanced Operators to Perform Advanced QueriesCombine advanced operators and learn about colliding operators and bad search-fu.. Learn the Ways of the Google HackerSee how to use caches for anonymity and review directory listings and traversal techniques.. Review Document Grinding and Database DiggingSee the ways to use Google to locate documents and then search within the documents to locate information.. Understand Google’s Part in an Information Collection FrameworkLearn the principles of automating searches and the applications of data mining.. Locate Exploits and Finding TargetsLocate exploit code and then vulnerable targets.. See Ten Simple Security SearchesLearn a few searches that give good results just about every time and are good for a security assessment.. Track Down Web ServersLocate and profile web servers, login portals, network hardware and utilities.. See How Bad Guys Troll for DataFind ways to search for usernames, passwords, credit card numbers, social security numbers, and other juicy information.. Hack Google ServicesLearn more about the AJAX Search API, Calendar, Blogger, Blog Search, and more.
Download Here

SecureZIP Express (PKWare) Free Download to Zip and Encrypt Files

SecureZIP Express is a freeware
edition of SecureZIP developed by inventor of .ZIP format, PKWare. Previously, a free full version license of SecureZIP is giving away by PKWare for the freeware, but the free achieving and encryption software has been renamed as SecureZIP Express to differentiate it from paid version of SecureZIP and PKZIP.SecureZIP Express supports the following features:
ZIP and UnZIP files.
Encrypt and decrypt files to protect the files stored or sent.
SecureZIP Express does not support email or Office
integration as featured in paid version, so SecureZIP Express should not be installed over an existing version of SecureZIP or PKZIP.
Download SecureZIP Express from pkware.com or direct download the setup installer, sz122021r2enfc.exe.
After installing SecureZIP Express and digital certificate, user can play Decrypt and Drive Contest to win great prizes including a Honda scooter, Wii game systems with Mario Kart, bicycles and gas cards worth $12,000 by decrypting game play messages with SecureZIP at decryptanddrive.com.

ATM Hacking and Cracking to Steal Money with ATM Backdoor Default Master Password (initally taken from MyDigitallife)

You should know what a Automated Teller Machine (or Automatic Teller Machine or cash machine) which commonly known as ATM is. Yes, ATM is commonly used to access bank accounts in order to make cash withdrawals or credit card cash advances, where after keying in your PIN number, ATM will disburse cash notes to you. You should also know that when you withdraw let’s say 100 dollars, the ATM should dispense 5 USD notes in 20-dollar denomination. But what if now the ATM dispenses 20 20-dollar USD bills instead? It happened not because the bills and notes are not been stocked in correct denomination, but because you can actually make it happens at the ATM cash machines that leave its backdoor opened by not changing default factory administrative passwords and default combinations for the safe.So what you going to do in order to hack and crack the ATM so that the cash machine will give you more money than it suppose to? It’s unlikely common ATM trickery or fraud scam that uses various high-tech devices to capture identity of your ATM card and PIN number. Firstly, identify the ATM maker and model from the video on news about ATM reprogramming scam fraud at at a gas station on Lynnhaven Parkway in Virginia Beach.

Unable to identify what model of ATM cashpoint is it? Matasano has revealed the brand and model of the ATM to be Tranax Mini Bank 1500 series. So it’s this type of cash machine is possible for hacking. 27B Stroke 6 reported that Triton’s ATMs’ manuals also contains factory default pass-code and backdoor key sequence, although no successful fraud story been reported on Triton’s ATM machines. Matasano also details the step that needed to be taken in order to be able to hack into the ATM for re-programming. That’s to get hold on a copy to Tranax Mini Bank 1500 Series (MB1500) operator manual or installation manual, which contains a lot of security sensitive information includes:
Instructions on how to enter the diagnostic mode or operator function menu.
Default Master, Service or Operator passwords.
Default Combinations For the Safe.
The manual that was found on the web Tranax_MB_Operator_Manual.pdf has been taken down, however, Google should be able to help you with its cache. Inside the Tranax Mini-Bank 1500 user guide manual, you can also learn how to set the denomination of the type of bill (the value of the cash notes i.e $1, $5, $10, $20, $50 or $100) that the ATM’s cassettes will be dispensing. That’s all you probably need to trick the ATM to think that the $20 bills it dispensed are actually of the $5 or $1 bill, possibly earning you a hefty profit. So, the only thing left now if you trying your luck to find an ATM cash machine that haven’t been changed its factory default passcodes and passwords. Tranax has shipped 70,000 ATMs, self-service terminals and transactional kiosks around US, where majority of those shipments are of the flagship Mini-Bank 1500 machine that was rigged in the Virginia Beach heist, according to eWeek.
The ATM scammer in Virginia Beach case successfully to re-program and trick the Tranax MB1500 series ATM to act as if it had $5 bills in its dispensing tray instead of $20 bills, and the withdraw cash using a pre-paid debit card with a 300% profit. However, he forgot to reprogram back the ATM to correct denomination, and the ATM was left misprogrammed for next 9 days before somebody reported the misconfiguration, and hence revealed the fraud.
Disclaimer: This article is not an instruction.

Some Credit Card Hacking Softwares

Credit Card Fraud
Credit Card Maker 1.1b
Credit Card Number Finder
Credit Card Verification
Credit Carding
Credit Cards Trojan
Credit Probe v1.0
Credit Wizard
Credit Wizard 1.0
Credit Wizard 1.1
CreditMaster
CreditMaster 2.0
CreditMaster 4.0
FakaTool
FakeID 3.0
Fraud Utilities 1.1.01
Fraud3r 1.0
Getting the Cards
How The PIN Is Computed For A Visa Card
How To Make Your Own VALID American Express Numbers In One Easy Step
Luhnccgen123
MPI Credit Master 3.0
Official Guide to Carding
Recognizing credit cards
Some Unchangable Digits in Visa Credit Cards
THCCRED
THCCRED 1.30
THCCRED 1.80
THCCRED 1.90
THCCRED 1.91
The Art of Carding
The Bible of Fraud
The Cardists Utils 1.01a
The Dropsite
V-Card 1.25
What You Need To Know About Smart-Cards And Electronics Phonecards
XLab