Tuesday, June 12, 2012

Learn Leet : Language Of Hackers

To speak leet, you more or less need to un-learn proper english. The history of leet goes back to the early days of online message boards, or forums, where users can post messages to carry on a threaded conversation. In an attempt to “Clean-Up” the language that users would sometimes post, admins added a filtering system to the message board which would replace restricted words with some type of alternative.


For example, the word “crap” might become “crud.” It didn’t take people long to figure out that you could get around this filter simply by altering the original word somehow, like changing “crap” to “c-r-a-p” or “krap” or “crrrap.” it was soon obvious that these filtering systems could never possibly cover every variation because people would just keep inventing new ones, and so leet was born.


In the most generic explanation, leet is merely replacing certain letters of the alphabet with numbers that bear a slight resemblance. l becomes 1, e becomes 3, t becomes 7, and so on… leet becomes 1337.


In a not so generic explanation, leet is also a play on words. The word leet itself is actually a shorter, easier way of saying the word “elite” which the dictionary defines as: the best or most skilled members of a group.


An odd thing about the internet is that when certain trends catch on, they seem to spread on a massive scale. Leet is one of those trends that just wouldn’t die; instead it grew and is still growing to this very day. Another popular trend to spread was aybabtu (all your base are belong to us) which is just one horribly translated line out of many from the video game “Zero Wing.” Then there was “Star Wars Kid” where a home video of some kid swinging a pole around was uploaded to the internet and altered to make it look like he was swinging a light saber. Nobody knows why these things spread like plagues but they each share a unique taste in humor. Anyway, back on topic, Every True Hacker Knows Leet.


Given below is a simple translation table to cover some common transitions and words. Please bear in mind that the syntax may vary:
Code:
A = @
B = |3
C = (
D = |)
E = 3
F = |=
G = 6
H = |-|
I = |
J = _|
K = |(
L = |_
M = /\/\
N = /\/
O = 0
P = |*
Q = 0,
R = |2
S = $
T = 7
U = |_|
V = \/
W = \/\/
X = )(
Y = ‘/
Z = 2     a = 4
b = 8
c = ©
d = |>
e = 3
f = #
g = 9
h = h
i = |
j = j
k = |<
l = 1
m = m
n = n
p = |*
q = 0.
r = ®
s = 5
t = +
u = 00
v = \/
w = \/\/
x = ><
y = j
z = 2     at = @
ck = x0r
the = teh
you = j00 or u
own = pwn
ck = x0r
programs = progz
god = r00t
fool = f00
heart/love = <3
what’s up = sup
that = dat
look at = peep
kill = frag
sweet = schweet
sleep = reboot
greater than = >
newbie = n00b
no = noes
woo hoo = w00t
why = y
be = b
are = r
dude = d00d
fear = ph34r
and = &
super = uber     blah/me = meh
yo = j0
rock = r0xx0r
hacker = h4x0r
cool = k3wl
software = warez
computer = pu73r
chick = chix0r
good = teh win
bad = teh lose
loser = l4m3r
aol = uh, 14m3r
money = monies
bye = bai
kick = punt
porn = pr0n
skill = m4d 5killz
hello = ping
robot = b0t
naked = n3k3d
what = wut
whatever = wutev
cool = c00
to/two = 2
with = wit
s** = cyb3r

Acronyms as well. lol (laughing out loud) becomes lawlz, rofl (rolling on floor laughing) becomes roffle, roflmao (rolling on floor laughing my arse off) becomes roffle-mayo. If you haven’t guessed it yet, leet is a complete mockery of the english language.

Typos are encouraged; in fact, an urban legend floating around the internet states that it deosn’t mttaer waht oredr the lteters in a wrod are, so lnog as teh frist and lsat ltteer are at teh crroect pclae. teh rset can be a taotl mses and yuo can uslauly siltl raed it wothuit any porbelm. of course, if you experiment with that you’ll soon find that it isn’t always true, but still interesting.

Note: Typing in various caps and multicolored text is not 1337.

Just because you know how to speak leet is no excuse to speak it all of the damn time. It is funny when used appropriately, but otherwise completely annoying. Leet should only be used when you’re feeling powerful and/or energetic. There are also many different flavors of leet: it can be used lightly (a few leet characters), or heavily (practically all leet characters).

Let’s practice a few leet sentences:

English: i didn’t really care for that movie.
Leet: dat dot mov wuz teh lose!

English: wow, i won.
Leet: omgz (oh my godz) lolz!! i pwned j00r @$$!

English: i am learning how to become an elite hacker.
Leet: i 4/\/\ 134|2/\/i/\/9 |-|0\/\/ 2 83c0m3 4 1337 h4x0r, roffle-mayo.

English: sigh, what in the world is that supposed to be?
Leet: *sighs* wtf (what the f—) b dat f00?

English: i’m tired.
Leet: i’m 80u7 2 m4k3 1ik3 ie (internet explorer) & cr45h. /m3h y4wn5

Hopefully you’ve got a pretty good idea by now of how leet is used; it’s not an entirely complex language. As with any language, the more you’re subjected to it the more it will sink in.
Read More

Monday, June 11, 2012

Working Of Zenmap ( Network Scanning Tool )

Zenmap is the official graphical user interface (GUI) for the Nmap Security Scanner. It is a multi-platform, free and open-source application designed to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Frequently used scans can be saved as profiles to make them easy to run repeatedly. A command creator allows interactive creation of Nmap command lines. Scan results can be saved and viewed later. Saved scans can be compared with one another to see how they differ. The results of recent scans are stored in a searchable database.

CHOSEN SETUP
As Zenmap runs on a windows/Linux so i chose the following setup :
 Windows  OS – Windows 7 installed on a system
 Version- Zenmap 6 (http://nmap.org/dist/nmap-6.00-setup.exe)
 Scanning
Begin Zenmap by typing zenmap in a terminal or by clicking the Zenmap icon in the desktop environment.
Firstly, select the Target. Target could be any domain name or the IP Address, so right now my target is  10.0.0.2.




Profile
Profile combo box. Profiles exist for several common scans. After selecting a profile the Nmap command line associated with it is displayed on the screen. Of course, it is possible to edit these profiles or create new ones.
It is also possible to type in an Nmap command and have it executed without using a profile. Just type in the command and press return or click “Scan”.
 In Zenmap there are 10 Types of Profile :
a.  INTENSE SCAN
Command = nmap -T4 -A 10.0.0.2
Description  = An intense, comprehensive scan. The -A option enables OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (–traceroute). Without root privileges only version detection and script scanning are run. This is considered an intrusive scan.
SCAN RESULT TABS
Each scan window contains five tabs which each display different aspects of the scan results. They are:
a) Nmap Output
b) Ports / Hosts
c) Topology
d) Host Details
Each of these are discussed in this section:
NMAP OUTPUT
The “Nmap Output” tab is displayed by default when a scan is run. It shows the familiar Nmap terminal output.
PORT/HOSTS
When a service is selected, the “Ports / Hosts” tab shows all the hosts which have that port open or filtered. This is a good way to quickly answer the question “What computers are running HTTP?”



TOPOLOGY

The “Topology” tab is an interactive view of the connections between hosts in a network.



HOST DETAILS

The “Host Details” tab breaks all the information about a single host into a hierarchical display. Shown are the host’s names and addresses, its state (up or down), and the number and status of scanned ports. The host’s uptime, operating system, OS icon. When no exact OS match is found, the closest matches are displayed.
Read More

Importing contacts (VCF) to Gmail (To sync with your Android Phone)

I have seen some users here having difficulties to import their contacts to their new Android phone. This trick is to help those.

1. You need to be able to pass all your contacts to a .vcf file.

This is how you do it on a Nokia phone but this also applies to other phones on which the process is similar.
Quote :

1. On your Nokia phone go to Contacts
2. Go to Options > Mark/Unmark > Mark All
3. Options > Copy > To Memory Card
4. Connect your phone to PC
5. Browse to /Other/Contacts/ on your phone’s memory card
6. Copy all the .vcf files to a folder in your PC


2. Now you have all your contacts in separate vcf files. Importing to your Gmail account would be a nightmare because you would have to do it one by one. To avoid this painful process, you should now unite all in one vcf file. To be able to do this, you need to open a DOS window on your PC by making "Start > Run" write "cmd" and it should open a window. Now browse to the folder you copied the vcf file by using the comand "CD".  For example, if you have copied to the drive E: on the folder Documents>Contacts, you should type: "E:" and then "CD Documents/Contacts". To certify that you are on the right folder, you can type "Dir" and it should show you the vcf files.

To convert to a unique vcf file type this command (as it is):

Code:

for /F "delims=" %i in ('dir /b *.vcf') do @more "%i" >> all.vcf

Now, all your contacts are under one unique vcf file called "all.vcf" and you just need to import them.

3. To import to Gmail just need to:
Quote :

1. Sign in to Gmail.
2. Click Contacts on any Gmail page.
3. Click the More actions dropdown menu and select Import...
4. Click the Choose File button and locate the all.vcf
5. Select the file and click the Import button.


4. Now you can sync the Gmail contacts with you phone and they should appear on your phone.

Good luck and I hope I helped. 
Read More

Sunday, June 10, 2012

MTNL website takes down by Anonymous

Click to enlarge image
The hacker-group Anonymous has struck again in India. This time the victim was the MTNL website. The group posted on their website, saying, ”We are against Internet Cencorship. Instead of blocking few URLs the ISP blocked the whole domain of various file sharing websites. The HC Madras, DoT didn’t isssue any list of websites to be blocked still ISP supported internet censorship.”



MTNL's corporate website could not be accessed, following the attack since afternoon and officials said efforts were underway to restore it. MTNL Delhi, Deputy - GM (Internet), Deepak Sharma said it was not hacking but 'denial of service attack' under which the server is unable to provide services to the customers.



Anonymous has called for non-violent protests across several cities in India on June 9 to protest against what it alleges as ‘censorship’ of the internet. It accused the department of telecom of instructing the Internet Service Providers (ISPs) to block file-sharing websites unilaterally, while the courts had ordered blocking of certain websites.


As part of the protests, Anonymous has also asked all citizens to wear Anonymous’ (Fawkes) mask, dress completely in black and step out on the streets to protests.




This is the latest in a series of such attacks in the over the past month by the group, which has targeted the websites of the Internet Service Providers Association of India, the Trinamool Congress and Reliance Communications.


The government has so far refrained from making any comments on the concerted campaign by Anonymous over the last 15 days.
Read More

Access Banned Torrent and Video Sites in India

Some of the ISPs like Airtel,Reliance started blocking torrent website (ThePirateBay,Torrentz etc) as well as some legal video sharing websites (Vimeo, Dailymotion) . Nowadays,when someone tries to access these websites they got receive an annoying message:


"Access to there sites has been blocked as per Court Orders."


Click to enlarge




















Currently, two of the Indian ISPs – namely Reliance and Airtel – have blocked specific websites. The reason for blocking is yet unclear but the citing of a Court order in the display message gives us a clue. The US Government has already blocked websites in the past on grounds of copyright infringement and it is certain that other countries have also started to follow suit. Torrents have regularly provided users access to copyrighted content worldwide; particularly new movie releases which could be downloaded through torrents.
However, websites like Vimeo and DailyMotion are legal video sharing websites like Youtube and the reason is still unclear as to why these websites have been blocked as per “Court Orders”. In the coming days, we might also start seeing other service providers blocking number of websites on Governmental issues.


There is, however, a way users can still access these blocked websites legally without using a proxy. The trick lies in the protocol used for accessing the website. The sites being blocked in India are generally done so by using filters through the network that prevent the sites from opening. More often, these filters generally work on normal channels and don’t block secured websites.


You can access the Secured Version of the blocked websites using “https” instead of “http” in the address bar. When you open the blocked site with “https”, the website opens without any errors and you get a fully functional website.


Website with https


Click to enlarge
















Most people try to access these websites via Proxy; but using a proxy has its own disadvantages. The proxy network that a person is using maybe insecure. Moreover, proxys slow down network access speeds considerably. This is because all requests are channeled through the proxy server which handles a large number of clients, which causes slow response times.

Using https does not need a proxy and sites can be opened directly and response times are also quick as it is not channeled through any public server.



Read More

Sunday, June 3, 2012

Track Your And Other's Website IP

IP understands for Internet Protocol. It is unique physical address assign to every user who are using internet services. In Ip,data travels through internet by using packet which contains both Header(that specifies source,destination and other information about Data) and the message data itself.

Most network uses the Internet Protocol Version 4(IPv4) that features IP addresses 4 bytes(32bits) in length. The newer version i.e. Internet Protocol Version 6(IPv6) that features Ip Addresses 16 bytes(128bits) in length.

So now,here I'm going to tell you about how to find Your IP address.

Find Your IP Address :

It is very easy to dind IP address by following these two ways :


1. By using some website featuring IP address Finder. One of them are:

Most famous website : What Is My IP .

2. By Using Command Prompt :

Here i'm expailing it this method by pic :


First press WIN+R.
Type "CMD" .
Press Enter.
Click to Enlarge Image















After that a CMD will be open.

Write ipconfig then press enter.

Then an output will be look like this :
Click to Enlarge Image



Hope you have clearly Understand that how to track your IP address. In next post i'll tell you how to track IP address of others site.

Find Other's Website IP Address :

Suppose you want ot find IP address of any site for instance Gmail . When you open that site it shows you web address like www.gmail.com .



So,now to get IP of any website just follow these steps :



Go to Run by pressing WIN+R . Write CMD and press Enter .

Click To Enlarge Image













Now type ping in CMD

now add website name in front of CMD like this ping www.websitename.com .

Now you'll get the IP address of that site. Ex:- i'm taking www.facebook.com as websitename .

Click To Enlarge Image













The digit marked in Red color is the IP address of www.facebook.com .

for any other help related to IP tracking then you can comment below.

OR 

You can use website providing IP information like http://whatismyipaddress.com .
You'll get information of any IP.
Your IP is pre-defined there.



Read More