ကိုကြီးဇော် ( မုန်တိုင်း )

ဗဟုသုတဘဏ်

this site the web

2285.. Computer အတြက္ အေကာင္းဆံုး အျမန္ဆံုး Free VPN 5 ခု ( 2014 )

 
တစ္ခါတစ္ရံ VPN software ေတြ computer ေပၚမွာ သံုးဖို့လိုအပ္ရင္ မရွာ ရေအာင္ အေကာင္းဆံုးနဲ့ အျမန္ဆံုးေတြကို ေဖၚျပထားပါတယ္....



HotSpot Shield Free


               HotSpot Shield ကေတာ့္ Free ပါ....ေၾကာျငာခဏခဏ၀င္တာေတာ့္ နဲနဲဆိုးတယ္......အေတာ္အသင့္ သံုးရန္ အဆင္ေျပပါတယ္.... Elite Version ကိုလည္း၀ယ္သံုးႏိုင္တယ္....
Available on Windows, Mac, iOS, and Android.

  • Download: 6.53 + 6.31 + 6.36 = 6.40 Mbps
  • Latency: 90 + 89 + 91 = 90 milliseconds

Private Tunnel


                Private Tunnel, ကေတာ့္ US, UK, Switzerland, Canada, and Amsterdam စတဲ့ servers ေတြနဲ့ခ်ိတ္ဆက္ေပးပါတယ္....Register လုပ္ရန္လိုတယ္..... Available on Windows, Mac, iOS, and Android.
  • Download: 20.91 + 20.92 + 20.53 = 20.79 Mbps
  • Latency: 63 + 62 + 63 = 63 milliseconds

OkayFreedom VPN


            OkayFreedom  ကေတာ့္ USA servers ေတြနဲ့ခ်ိတ္ဆက္ေပးျပီး  free version limits တလ 500 MB ပါ...Windows တစ္မ်ိဳးမွာပဲ သံုး လို့ရပါတယ္....
  • Download: 20.86 + 20.44 + 20.95 = 20.75 Mbps
  • Latency: 69 + 72 + 73 = 71 milliseconds

CyberGhost


CyberGhost ကေတာ့္ ေတာ္ေတာ္ေကာင္းပါတယ္.....servers 200 ေက်ာ္တယ္....available on Windows
  • Download: 20.60 + 20.62 + 20.60 = 20.61 Mbps
  • Latency: 36 + 36 + 37 = 36 milliseconds

JustFreeVPN


JustFreeVPN ကေတာ့္ US, UK, and Canada, ေတြရဲ့ ၾကိဳက္ရာserver ေတြကို ေရြးခ်ိတ္ႏိုင္ပါတယ္...
  • Download: 1.44 + 0.45 + 0.28 = 0.72 Mbps
  • Latency: 119 + 82 + 137 = 113 milliseconds

Labels: , ,

Print ပဲထုပ်ပါ..pdf ထုပ်လျှင်.ဖောင့်လွဲနေလိမ့်မယ်



မာတိကာ ၁ မာတိကာ ၂ မာတိကာ ၃ မာတိကာ ၄ မာတိကာ ၅
0 comments

1805.. Cracker Guide v2.2 ျမန္မာလို eBook

 

 Cracker Guide v2.2 ျမန္မာလို eBook

Labels: , ,

Print ပဲထုပ်ပါ..pdf ထုပ်လျှင်.ဖောင့်လွဲနေလိမ့်မယ်



မာတိကာ ၁ မာတိကာ ၂ မာတိကာ ၃ မာတိကာ ၄ မာတိကာ ၅

1303..How to cross Windows XP Password ( 13.10.10 )

 


          1...Victim ရဲ႕ PC ကိုဖြင့္လိုက္ေတာ့ Logon Screen တက္လာၿပီး Password ေတာင္းပါတယ္။ ဒီေတာ့ Ctrl + Alt + Del Keys ကိုႏွိပ္လိုက္တာေပါ့။ Windows တစ္ခုထပ္တက္လာပါမယ္။ ၿပီးေတာ့ User Name နဲ႔ Password ထပ္ေတာင္းပါလိမ့္မယ္။ User Name မွာ administrator လို႔ရိုက္ထည့္ၿပီး OK လို႔သာေျပာပါ။ Victim ရဲ႕ Password Protected Computer Administrator Account ကိုေက်ာ္လႊားၿပီးၿပီ ျဖစ္ပါတယ္။


        2...Victim ရဲ႕ Computer ကို Boot လုပ္ F8 Key ကိုႏွိပ္ၿပီး Safe Mode ကေန၀င္ျပီး Administrator Account ကို၀င္လိုက္ေတာ့ Victim ရဲ႕ User Password ကို အလိုလိုေက်ာ္လႊားၿပီးသားျဖစ္သြားတာေပါ့။


            3...http://sites.google.com/site/blackmonsterscollections/black-monster-s-gadget/PASSWORD.rar?attredirects=0

                ကိုေဒါင္း RAR File ကို ဖြင့္ၿပီး အထဲက exe file ကို CD / USB ထဲထည့္ပါ။ ၿပီးရင္ Boot လုပ္ၿပီး ညႊန္ၾကားခ်က္ေတြအတိုင္းလုပ OK မယ္။

How to Hack a Window XP Admins Password


            This is a cool little computer trick for Microsoft Windows trick I’ve picked up in my travels and decided to share it with you fine and ethical individuals =). Log in and go to your DOS command prompt and enter these commands exactly:

cd\
cd\windows\system32
mkdir temphack
copy logon.scr temphack\logon.scr
copy cmd.exe temphack\cmd.exe
del logon.scr
rename cmd.exe logon.scr
exit


So what you just told windows to backup is the command program and the screen saver file. Then you edited the settings so when windows loads the screen saver, you will get an unprotected dos prompt without logging in. When this appears enter this command that’s in parenthesis (net user password). So if the admin user name is Doug and you want the password 1234 then you would enter “net user Doug 1234″ and now you’ve changed the admin password to 1234. Log in, do what you want to do, copy the contents of temphack back into system32 to cover your tracks.


Labels: , ,

Print ပဲထုပ်ပါ..pdf ထုပ်လျှင်.ဖောင့်လွဲနေလိမ့်မယ်



မာတိကာ ၁ မာတိကာ ၂ မာတိကာ ၃ မာတိကာ ၄ မာတိကာ ၅
0 comments

1156..Facebook အေကာင့္ hack ခံရရင္ ( 16.9.10 )

 

Hosted by FreeImageHosting.net Free Image Hosting Service

Follow these steps to recover your hacked Facebook account:

1...Facebook Home Page ေအာက္နားက Help ကိုကလစ္လုပ္ပါ...

2..Common Searches  မ်ားေအာက္က disabled ကိုကလစ္လုပ္ပါ..

3..

I was blocked or disabled.
   ( Information about feature blocks, disabled personal accounts, and disabled fan Pages. ) မွာ ကလစ္လုပ္ပါ...

4..

( There are different reasons why you may not be able to access your acc...)

Hosted by FreeImageHosting.net Free Image Hosting Service

5..Login and Password  မွာကလစ္

6..
My email address or my Facebook account has been compromised.    မွာကလစ္လုပ္ရင္ ေအာက္က စာသား ႏွစ္ခုေတြ့မယ္...

Please choose one of the options below.

  1. If you can send and receive emails from your login email address, click here.

  2. If you cannot send or receive emails from your login email address, click here.

7....( 2 )မွာ ကလစ္လုပ္ျပီး ေမးထားတဲ့ေမးခြန္းေတြေျဖ....ေအာက္မွာနမူနာေနာ္

Hosted by FreeImageHosting.net Free Image Hosting Service

8..ျပီးရင္ Submit...

You will receive a reply shortly after Facebook staff review your application.






Labels: ,

Print ပဲထုပ်ပါ..pdf ထုပ်လျှင်.ဖောင့်လွဲနေလိမ့်မယ်



မာတိကာ ၁ မာတိကာ ၂ မာတိကာ ၃ မာတိကာ ၄ မာတိကာ ၅

966..Phishing ဆိုတာ ( 17.8.10 )

 
       http://img58.imageshack.us/img58/6373/phishing1kn4.jpg


http://www.uberreview.com/wp-content/uploads/phishing.png

        Phishing ဆိုတာဟာ တရား၀င္ ၀က္ဘ္ဆိုက္ပံုစံမ်ဳိးအေယာင္ေဆာင္ၿပီး အသံုးျပဳသူေတြဆီကေန username, password, အေႂကး၀ယ္ကတ္နံပါတ္စတဲ့ ကိုယ္ေရးကိုယ္တာအခ်က္အလက္ေတြ ရယူႏိုင္ေအာင္ တိုက္ခိုက္တဲ့ နည္းစနစ္ကို ေခၚဆုိျခင္းျဖစ္ပါတယ္။ Phising နည္းကို e-mail နဲ႔ instant messaging စနစ္ေတြအသံုးျပဳၿပီး တိုက္ခိုက္သူေတြရဲ႕ အေယာင္ေဆာင္ ၀က္ဘ္ဆိုက္ေတြထဲ လမ္းၫႊန္သြားကာ ကိုယ္ေရးကိုယ္တာ အခ်က္အလက္ အေသးစိတ္ကို ရယူတာျဖစ္ပါတယ္။

      အဓိကအားျဖင့္ေတာ့ PayPal, eBay, YouTube နဲ႔ online ဘဏ္ေတြဟာ phishing တိုက္ခိုက္သူေတြရဲ႕ ဦးတည္ရာျဖစ္ေနၾကတာကို ေတြ႕ရပါတယ္။ Phishing နည္းနဲ႔တိုက္ခိုက္ႏိုင္ေၾကာင္း နည္းပညာဆိုင္ရာ အေသးစိတ္ရွင္းလင္းေရးသားထားခ်က္ကို ၂၀၀၇ ခုႏွစ္အတြင္း Interex လို႔ေခၚတဲ့ International HP Users Group ဆီတင္သြင္းတဲ့စာတမ္းတစ္ခုမွာေဖာ္ျပထားၿပီး phishing ဆိုတဲ့စကားလံုးကိုေတာ့ ၁၉၉၆ ခုႏွစ္ ဇန္န၀ါရီလ ၂ ရက္ေန႔မွာ America Online ရဲ႕ Usenet newsgroup မွာ စတင္အသံုးျပဳခဲ့တာကို ေတြ႕ရပါတယ္။ အေစာပိုင္း phishing နည္းနဲ႔တိုက္ခိုက္သူေတြဟာ AOL ၀န္ထမ္းအေယာင္ေဆာင္ၿပီးအသံုးျပဳသူေတြဆီ instant message ကေနတစ္ဆင့္ password ေတြေတာင္းယူကာ spam message ေတြ ေပးပို႔ၾကတယ္လို႔ သိရပါတယ္။ ဒီလိုကိုယ္ေရးကိုယ္တာ အခ်က္အလက္ေတြ ရယူကာ တိုက္ခိုက္တဲ့လုပ္ရပ္ေတြက်ယ္ ျပန္႔လာတာေၾကာင့္ ေနာက္ပိုင္းမွာ ကုမၸဏီကေန ဘယ္ AOL ၀န္ထမ္းကမွ အသံုးျပဳသူရဲ႕ ကိုယ္ေရးကိုယ္တာအခ်က္အလက္နဲ႔ password ေတြ ေတာင္းယူျခင္း မျပဳဆိုတဲ့စာသားကို instant message တိုင္းမွာ ထည့္သြင္းေပးလာရတယ္လို႔ ဆိုထားပါတယ္။
        အဲဒီေနာက္မွာေတာ့ တိုက္ခိုက္သူေတြဟာ online ေငြေခ်စနစ္ေတြကို ေျပာင္းလဲတိုက္ခိုက္လာၾကတာကို ေတြ႕ရပါတယ္။ ၂၀၀၁ ခုႏွစ္ ဇြန္လမွာ E-gold ဟာ phising နည္းနဲ႔ ပထမဆံုး တိုက္ခိုက္ခံရတဲ့ ေငြေခ်စနစ္ ျဖစ္လာပါတယ္။ ၂၀၀၄ ခုႏွစ္ အေရာက္မွာေတာ့ phishing တိုက္ခိုက္မႈေတြဟာ တစ္ကမၻာလံုး အတိုင္းတာနဲ႔ က်ယ္ျပန္႔လာတဲ့ ရာဇ၀တ္မႈႀကီးတစ္ခုျဖစ္လာခဲ့ပါတယ္။ တိုက္ခိုက္သူေတြအေနနဲ႔ online ေငြေခ်မႈစနစ္ ဒါမွမဟုတ္ အေမရိကန္ျပည္တြင္းအခြန္မ်ားဌာနကေန ေပးပို႔တဲ့ပံုစံမ်ဳိးအေယာင္ ေဆာင္ e-mail ေတြကို သုံးၿပီး ကိုယ္ေရးကိုယ္တာအခ်က္အလက္ေတြကို ရယူလာၾကပါတယ္။     
လူတစ္ဦးခ်င္းစီကို သီးျခားရည္ရြယ္တဲ့ phishing တိုက္ခိုက္မႈေတြကို spear phishingု လုိ႔ေခၚဆိုၿပီး စီးပြားေရးလုပ္ငန္းရွင္ေတြနဲ႔ကုမၸဏီအမႈေဆာင္အရာရွိေတြကို ရည္ ရြယ္တိုက္ခိုက္တာေတြကိုေတာ့ whaling လို႔ ေခၚဆိုၾကတဲ့ အေၾကာင္းလည္း သိရပါတယ္။
           Social networking ၀က္ဘ္ဆိုက္ေတြဟာလည္း phishing တိုက္ခိုက္မႈေတြရဲ႕ ဦးတည္ရာျဖစ္လာေနတာကို ေတြ႕ရပါတယ္။ ၂၀၀၆ ခုႏွစ္ေႏွာင္းပိုင္းမွာေပၚထြက္ခဲ့တဲ့ worm က MySpace ရဲ႕ စာမ်က္ႏွာအတြင္းက linkက ေတြကို ေျပာင္းလဲကာ တိုက္ခိုက္သူ ေတြရဲ႕၀က္ဘ္ဆိုက္ထဲ redirect လုပ္ၿပီး login အခ်က္အလက္ေတြကို ခိုးယူခဲ့ပါတယ္။ ေလ့လာမႈေတြ အရလည္း social networking ၀က္ဘ္ဆိုက္ေတြကို ဦးတည္တဲ့ တိုက္ခိုက္မႈေတြရဲ႕ ၇၀ ရာခိုင္ႏႈန္းဟာ ေအာင္ျမင္တဲ့အေၾကာင္း သိရပါတယ္။
      Phishing တိုက္ခိုက္မႈေတြအတြင္း အမ်ားဆံုးအသံုးျပဳတဲ့နည္းလမ္းကေတာ့ အမွန္တကယ္ရွိေနတဲ့ ၀က္ဘ္ဆိုက္ေတြကိုစာလံုးမွား ေပါင္းထားတဲ့ URL ဒါမွမဟုတ္ subdomain ေတြကို အသံုးျပဳျခင္းအားျဖင့္ လွည့္စားထားၾကတာျဖစ္ပါတယ္။ ဒါ့အျပင္ မ်က္စိနဲ႔ ျမင္ေန ရတဲ့ link မွာ ယံုၾကည္စိတ္ခ်ရတဲ့ ၀က္ဘ္ဆိုက္နာမည္ထည့္ထားကာ ေနာက္ကြယ္မွာတိုက္ခိုက္သူေတြရဲ႕ အေယာင္ေဆာင္၀က္ဘ္ဆိုက္ထဲေရာက္ရွိသြားေအာင္ လုပ္ေဆာင္ၾကတာေတြလည္း ရွိပါတယ္။ ေနာက္ထပ္နည္းလမ္းေဟာင္းတစ္ခုကေတာ့ username နဲ႔ password ကို address bar ထဲမွာ တစ္ခါတည္း႐ိုက္ထည့္လို႔ရတဲ့နည္းကို သံုးတာပဲျဖစ္ပါတယ္။
         ဥပမာအားျဖင့္ သာမန္အသံုးျပဳသူတစ္ ေယာက္အေနနဲ႔ http: www.google.com@members.tripod.com ဆိုတဲ့လိပ္စာဟာ Google ၀က္ဘ္ဆိုက္ထဲေရာက္ရွိမယ္လို႔ ထင္ၾကေပမယ့္ အမွန္တကယ္အားျဖင့္ members. tripod. com ထဲ ေရာက္ရွိသြားကာ www.google.com ကေတာ့ username အျဖစ္၀င္ေရာက္သြားမွာျဖစ္ပါတယ္။ အခုအခါ Inter- net Explorerv မွာ ဒီလိုအသံုးျပဳတဲ့နည္းလမ္းကို disable ျပဳလုပ္ထားၿပီး Firefox နဲ႔ Opera တို႔မွာေတာ့ သတိေပးခ်က္ထုတ္ျပန္ေပးတာကို ေတြ႕ရပါတယ္။
                တခ်ဳိ႕ phishing တိုက္ခိုက္မႈ ေတြမွာဆုိရင္ JavaScript ကိုသံုး ၿပီး address bar အတြင္းက လိပ္စာကို ေျပာင္းလဲထားျခင္း URL အတြင္း အစစ္အမွန္၀က္ဘ္ ဆိုက္လိပ္စာအတုိင္း ဖန္တီးထားတဲ့ image ထည့္သြင္းျခင္းစတာမ်ဳိး ေတြလည္း လုပ္ေဆာင္တတ္ၾကပါ တယ္။ အခု ေနာက္ပိုင္းမွာေတာ့ cross-site scripting လို႔ေခၚတဲ့ တိုက္ခိုက္မႈ နည္းလမ္းသစ္ကို အသံုးျပဳလာၾကတာကို ေတြ႕ရပါ တယ္။ ဒီစနစ္ဟာ တျခား phi-shing တိုက္ခိုက္မႈေတြလိုမ်ဳိး အေယာင္ေဆာင္၀က္ဘ္ဆိုက္ေတြ ကို အသံုးျပဳတာမဟုတ္ဘဲ မူရင္း ၀က္ဘ္ဆိုက္ထဲ script ထည့္သြင္းကာ ကိုယ္ေရးကိုယ္တာအခ်က္အလက္ေတြကို ခိုးယူျခင္းျဖစ္ပါ တယ္။ Anti-phishing ကုမၸဏီ ေတြအေနနဲ႔ အေယာင္ေဆာင္ ၀က္ဘ္ဆိုက္ေတြကို ရွာေဖြမွတ္တမ္းတင္ကာ အသံုးျပဳသူေတြဆီ သတိေပးခ်က္ထုတ္ျပန္ေပးေနတာေၾကာင့္ phishing တိုက္ခိုက္သူေတြအေနနဲ႔ ၎တို႔ရဲ႕ ၀က္ဘ္ ဆိုက္ထဲမွာ ႐ိုး႐ိုးစာသားေတြအစား Flashး ကို အေျခခံထားတဲ့၀က္ဘ္ ဆိုက္ေတြ အသံုးျပဳလာေနၾကတဲ့ အေၾကာင္း သိရပါတယ္။    ၀က္ဘ္ဆိုက္အေျချပဳတိုက္ခိုက္မႈေတြအျဖစ္ မိုဘိုင္းဖုန္းေတြကေန message ေပးပို႔ၿပီး အသံုးျပဳသူ ေတြရဲ႕ ဘဏ္စာရင္းထဲျပႆနာ ေပၚေနတာေၾကာင့္ ဖုန္းဆက္ဖို႔ ေျပာဆိုကာ နံပါတ္တစ္ခုကိုေပးထားတတ္ပါတယ္။
                 အဲဒီနံပါတ္ကို ေခၚဆိုလိုက္တာနဲ႔တစ္ၿပိဳင္နက္ ဘဏ္စာရင္းနံပါတ္နဲ႔ PIN တို႔ကို ေတာင္းယူသြားတာျဖစ္ပါတယ္။ ဒီ Vishing (Voice Phishing) တိုက္ခိုက္မႈေတြမွာ တရား၀င္အဖဲြ႕ အစည္းေတြဆီကေန ဆက္သြယ္ ေျပာဆိုလာတယ္လို႔ ထင္ရေအာင္ caller ID ေတြကိုလည္း လိုသလိုေျပာင္းလဲအသံုးျပဳတတ္ၾကတဲ့ အေၾကာင္း သိရပါတယ္။ Phishing တိုက္ခိုက္မႈေတြ ေၾကာင့္ ၂၀၀၄ ခုႏွစ္ ေမလကေန ၂၀၀၅ ခုႏွစ္ ေမလအတြင္း အေမ ရိကန္ႏိုင္ငံအတြင္းက ကြန္ပ်ဴတာ အသံုးျပဳသူေတြ ထိခိုက္ခဲ့ရၿပီး ေဒၚလာ ၉၂၉ သန္း နစ္နာခဲ့ၾက ရတဲ့အေၾကာင္း သိရပါတယ္။ ယူ ေကႏိုင္ငံအတြင္းမွာလည္း ကြန္ပ်ဴတာအသံုးျပဳသူ ၅ ရာခိုင္ႏႈန္း ဟာ Phishing တိုက္ခိုက္မႈေတြ ခံေနၾကရေၾကာင္း သိရပါတယ္။
                   Phishing တိုက္ခိုက္ခံရမႈေတြ ကို ေလွ်ာ့ခ်ဖို႔အတြက္ ကြန္ပ်ဴတာ အသံုးျပဳသူေတြကို ပညာေပးျခင္း၊ Web browser ေတြအတြင္း anti-phishing လုပ္ေဆာင္ခ်က္ေတြ ထည့္သြင္းေပးျခင္းစတာေတြ လုပ္ေဆာင္လာၾကပါတယ္။ အေမရိကန္ျပည္ေထာင္စုမွာ Anti-Phishing Act of ၂၀၀၅ ကို ျပ႒ာန္းကာ အေယာင္ေဆာင္၀က္ဘ္ဆိုက္ ဖန္တီးသူနဲ႔ အေယာင္ေဆာင္ e-mail ေပးပို႔သူေတြကို ေထာင္ဒဏ္ ၅ ႏွစ္နဲ႔ ေငြဒဏ္ ေဒၚလာ ၂ သိန္း ၅ ေသာင္းအထိျပစ္ဒဏ္ေပးႏိုင္ေအာင္ လုပ္ေဆာင္ခဲ့ၿပီးယူေကႏိုင္ငံမွာလည္း ေထာင္ဒဏ္ ၁၀ ႏွစ္ အထိ ျပစ္ဒဏ္ေပးႏိုင္တဲ့ Fraud Act 2006 ကို ျပ႒ာန္းထားတဲ့အေၾကာင္း သိရပါတယ္။
Ref:Jumper ( myanmartutorials )


What's phishing? How to be safe?



Phishing scams have rocked Internet users for some time now.

But phishing attacks especially intensified in 2004, making them a very serious emerging threat that rides on the surge of e-commerce and e-banking transactions through fraudulent means, says a study conducted by anti-virus software specialist Trend Micro.

What is phishing?

Phishing means sending an e-mail that falsely claims to be from a particular enterprise (like your bank) and asking for sensitive financial information.

Phishing is sending out a 'bait' in the form of a spoofed e-mail that closely mimics most bank notifications.

The fraudulent mail is socially engineered to convince recipients to divulge sensitive information such as credit card numbers, PIN, social security numbers and some such information, says Trend Micro.

Some phishing mails include a legitimate-looking URL that actually conceals the phishing URL, or the site where the stolen information is stored, while some include an image, which when clicked, directs the affected user to the phishing site.

There are ways to 'spoof' an e-mail so that it appears to have come from someone other than the person who is actually sending it. An e-mail can be spoofed by tweaking the settings of e-mail clients like Outlook Express, Netscape Messenger and Eudora. E-mail spoofing is a popular way of scamming online.

How to be safe

Trend Micro lists out the ways in which you can keep yourself safe from phishing scams:

  • Be wary of e-mail messages that ask for personal or financial information such as user names and passwords, credit card numbers, and other sensitive personal information, especially those that are alarming and upsetting in tone.
  • Do not click any links inside an e-mail that is suspected to be spoofed. Instead, go directly to the valid company's site then log on from there or call the company directly.
  • Ensure that any Web site visited is secure when submitting sensitive information such as credit card numbers. One indication that a Web address is secure is if it starts with https:// rather than http://. Another indication is a padlock icon at the bottom of the screen, which when clicked, displays a security certificate.
  • Ensure that your browser is up-to-date and security patches are always promptly applied. For IE (Internet Explorer) browsers, a special patch relating to certain phishing schemes can be downloaded at http://www.microsoft.com/ security/.
  • Avoid opening any file attachments of suspected phishing e-mail messages as it might execute a 'malware' programme that can steal personal information.
  • Consider installing a browser extension such as SpoofStick which can help detect a spoofed Web site. This utility is available at: http://www.corestreet.com/spoofstick/
  • Consider installing security software such as those offered by anti-virus specialists like Trend Micro, which can help detect malware programmes (antivirus), filter spam (spam filters), and/or ensure secure Internet usage (firewalls). These kinds of software can help preempt any damage to your system and can help protect you from hackers and scammers alike.
  • Knowledge is still the best protection from getting scammed. It is important to educate oneself on Internet fraud. There are several Web sites dedicated to giving free education regarding Internet fraud, one of which is Trend Micro's site on anti-phishing.
  • If you receive any suspicious e-mail but are unsure of what to do, there are several organisations that can help check out the e-mail for you. Trend Micro offers this kind of service free of charge.

How to find out if an e-mail is genuine

However, finding out whether an e-mail is genuine or not is not very difficult. Every e-mail message contains headers that have the following information:

  • Origin, which shows information about the machine that sent it,
  • Relay, which shows the sender machine relaying it to another, and
  • Final destination, which shows the machine that receives it, the IP address and the domain name.

Check out this URL: http://www.lse.ac.uk/itservices/help/e-mailheader.htm for an example of what the different things in an e-mail header mean.

By learning how to identify what the header components are you can distinguish whether an e-mail is genuine or spoofed.

From May 2004 to November 2004 alone, Trend Micro registered a total of 9,709 phishing mails. July generated the most number of phishing mail incidence with 2,932 received samples, which is a huge leap from the total of 104 phishing mails recorded in May.

Most phishing attacks from May to November 2004 targeted Citibank, covering a little more than half of the entire phishing incidence recorded. Citibank has banking, lending, and investment services worldwide making it a prime target for these types of attack.

US Bank, one of the largest financial services holding companies in the United States, comes in second in the list of most targeted banks, with 21 per cent.

Suntrust (one of the largest commercial banking institutions in the US) and Ebay (an international online "marketplace") are next on the list with 10 per cent and 8 per cent, respectively.

Even in India, ICICI Bank, Citibank and other financial institutions have been targetted by 'phishers.'

A legitimate financial institution will never ask for details of your account via an e-mail. You must never e-mail financial information over the Internet as it is not a secure method for transmitting such sensitive information.

More Specials

http://www.rediff.com/money/2004/dec/20spec.htm



Labels: ,

Print ပဲထုပ်ပါ..pdf ထုပ်လျှင်.ဖောင့်လွဲနေလိမ့်မယ်



မာတိကာ ၁ မာတိကာ ၂ မာတိကာ ၃ မာတိကာ ၄ မာတိကာ ၅
0 comments

956..Cracker သမားမ်ားအတြက္ လမ္းညႊန္ eBook (ျမန္မာ ) 16.8.10

 

 Cracker Guide 2.0 (Full Version)

http://floridacrackerairboatride.com/wordpress/wp-content/uploads/2009/07/FLCracker.jpg
ဒီ eBook ေလးကေတာ့ က်ြန္ေတာရဲ့ ဆရာလို့ေျပာရမယ့္ ဆရာရသမ္က အပင္ပန္းခံျပီးေရးသား
တင္ေပးထားပါတယ္.....အလြန္ပဲေက်းဇူးတင္ထိုက္သူပါ........
လိုခ်င္ရင္ေတာ့ ဒီမွာေဒါင္းပါ.....

http://s456.photobucket.com/albums/qq281/ywarthar/Download/Download.gif


OR


မုန္တိုင္း

Labels: , ,

Print ပဲထုပ်ပါ..pdf ထုပ်လျှင်.ဖောင့်လွဲနေလိမ့်မယ်



မာတိကာ ၁ မာတိကာ ၂ မာတိကာ ၃ မာတိကာ ၄ မာတိကာ ၅
0 comments

949..Crack File အေၾကာင္း တစ္ေစ့တစ္ေစာင္း 14.8.10

 
         Crack File ဆိုတာ  က်ေနာ္တို႔ Software ေတ ၀ယ္မသုံးႏိုင္တဲ့အတြက္ Internet ေပၚကေန ေဒါင္းလုတ္လုပ္ၾကပါတယ္။crack, patch, keygen ေတြက သူမ်ား ေရာင္းတဲ့ဟာကို အလကား ဖရီးသံုးလို႔ ရေအာင္ လုပ္ထားတဲ့ နည္းေတြပါ။ License Software ေတြမွာရွိတဲ့ License Activation ကို ေက်ာ္ခြႏိုင္ေအာင္ လုပ္ေဆာင္ထားတဲ့ Serial Key ေတြကို Crack File လို့ေခၚတယ္...

Activation Cracking ဆိုတာ

            Software company ေတြက Serial Key က ျပန္႔သြားႏိုင္ ဒါေၾကာင့္ Acivation ထပ္လုပ္ပါတယ္။ Activation ဆိုတာက Serial Key ကို အင္တာနက္ကတစ္ဆင့္ သူတို႔ဆီပို႔ရင္ အစစ္ ဟုတ္တယ္္ဆိုမွ  ကြၽန္ေတာ္တို႔သံုးေနတဲ့ Software မွာ ျပန္လာထညဖို့ ့္Activation code ျပန္ထုတ္ေပးတာကို ေခၚပါတယ္.....


        

Serial Number Cracking
      ေငြေပး၀ယ္ရတဲ့ Software တစ္ခုကို တင္ၿပီးတဲ့အခါမွာ Serial Number ေတာင္းပါတယ္။ ကြၽန္ေတာ္တို႔ Installer CD ေတြ၀ယ္တဲ့အခါ CD ထဲမွာ Software အျပင္ Keygen ဆိုတဲ့ Program အေသးစားေလးပါေလ့ရိွပါတယ္။ Software ကို Install လုပ္ၿပီးတဲ့အခါမွာ ေတာင္းတဲ့ Serial Key ကိုသိခ်င္ရင္ အဲဒီ Keygen ေလးကိုႏိွပ္၊ Generate ကိုႏိွပ္လိုက္ရင္ Serial Key ထြက္လာပါမယ္။

ဘယ္လိုရွာလဲ ဘယ္လိုလုပ္

      အရင္ဆံုးအေနနဲ႔ သူတို႔ရဲ႕ Protect လုပ္ထားတဲ့ Code ေတြကို ဘယ္ေနရာမွာေရးထားတယ္ဆုိတာ Debugger သံုးၿပီး အရင္လိုက္ရွာရပါတယ္ ... ေတြ႔ၿပီဆိုရင္ အဲဒီ့စစ္ေဆးတဲ့ေနရာကို ဘာလုပ္မလဲဆိုေတာ့  Key တစ္ခုနဲ႔ ညီမွအလုပ္လုပ္မယ္ဆိုပါေတာ့ အဲဒါကို ဘာလာလာ အလုပ္လုပ္တယ္ဆိုတာမ်ိဳး Disassembler နဲ႔ျပင္လိုက္တာေပါ့ဗ်ာ။  Keygen လိုလုပ္ခ်င္ရင္ေတာ့ အဲဒါထက္နည္းနည္းပိုသြားၿပီ Key ကိုစစ္ေဆးတဲ့ေနရာမွာေရးထားတဲ့ Code ကိုအကုန္လံုးနားလည္ဖို႔လိုတယ္။ အဲဒါေတြကိုဖတ္ၿပီးေတာ့မွ ကိုယ္တိုင္ျပန္ေရးရပါတယ္။


လိုအပ္ခ်က္

      Crack လုပ္ဖို႔အတြက္ Assembly ကို ကြ်မ္းက်င္ရပါမယ္...Keygen ၿပန္ထုတ္ခ်င္ရင္ C/C++တတ္ကြ်မ္းရပါမယ္...VB, VB.net, C# စတာေတြကို Crack လုပ္ရတာ လြယ္ကူပါတယ္။ Decompiler သံုးလုိက္ရင္ မူရင္း Code အကုန္ၿပန္ထြက္ပါတယ္။ Key စစ္ထားတဲ့ Routing ကို ၾကည့္ၿပီး အေၿဖထုတ္ရံုပါဘဲ....


 ျပဳလုပ္နည္းမ်ား

            Software company ေတြက Serial Key က ျပန္႔သြားႏိုင္ ဒါေၾကာင့္ Acivation ထပ္လုပ္ပါတယ္။ Activation ဆိုတာက Serial Key ကို အင္တာနက္ကတစ္ဆင့္ သူတို႔ဆီပို႔ရင္ အစစ္ ဟုတ္တယ္္ဆိုမွ  ကြၽန္ေတာ္တို႔သံုးေနတဲ့ Software မွာ ျပန္လာထညဖို့ ့္Activation code ျပန္ထုတ္ေပးတာကို ေခၚပါတယ္.....


              တစ္ခ်ိဳ႕ Software ေတြက်ေတာ့ ဘာမွမေတာင္းပဲ သံုးၿပီး တစ္ပတ္ေလာက္ေနမွ register လုပ္ခိုင္းပါသည္။ အင္တာနက္ႏွင့္သာ လုပ္ခိုင္းပါသည္။ ထိုကဲ့သို႔ software မ်ိဳးဆိုလွ်င္ Exe file replace လုပ္ျခင္းျဖင့္ Crack လုပ္ရပါသည္။


          တစ္ခ်ိဳ႕  Software ေတြက်ေတာ့ သူတို႔ software ကို သံုးႏိုင္ရန္ registration file ,  License Key ဆိုေသာ ဖိုင္တစ္ဖိုင္ကို ထည့္ေပးရပါသည္။  ကြန္ပ်ဴတာတစ္လံုးႏွင့္တစ္လံုး License Key တူ၍မရပါ။ Kaspersky ကို Crack လုပ္ရန္ ထို License key ကို အင္တာနက္ထဲရာွ  ထည့္ျပီးမွ Automatic Updates ကို disable လုပ္ရပါ....အဲဒီလိုမလုပ္ရင္ Automatic Updates လုပ္တဲ့အခါ ခုိးသံုးထားမွန္း သိသြားႏိုင္ပါသည္။


              Crack ျပဳလုပ္ျခင္းျဖင့္ Software ကို Free သံုးရ ေသာ္လည္း ဗိုင္းရပ္စ္အကိုက္ခံရျခင္း၊ အခ်က္အလက္မ်ား အခိုးခံရျခင္းမ်ိဳးမ်ား ျဖစ္ႏိုင္ပါတယ္......


How to Crack Folder Lock

1....ပထမဆုံး Registry ထဲဝင္ပါ... အဲဒီမွာ (regedit) လို႕ရိုက္......
2....(HKEY_CURRENT_USER >Software > Folder Lock

3....ညာဘက္မွာ (Bar Code) ကိုDelete ႏွိပ္လိုက္ (Yes) ဆက္ႏွိပ္ပါ...
4....ၿပီးရင္ Folder Lock ကို၀င္ပါ Enter Password ေနရာမွာႀကိဳက္တဲ႕ပာာရိုက္ဝင္သြားပါလိမ္႕မယ္...
5...Option ထဲဝင္ပါ Change Password မွာ ကိုေပးခ်င္တဲ႕ပာာသာေပးလိုက္ပါ ၿပီးရင္ထြက္လို႕ရပါျပီ...
5.... Folder Lock ထဲျပန္ဝင္ပါ Please Read Carefually ဆိုတာေတြ႕ပါလိမ္႕မယ္
6....(Login) ထဲသြားပါ (Enter your UserID : Peter Schalk ) (Password : ***********) ၿပီးရင္ (OK) ေပါ႕ (Exit) ကိုထပ္ႏွိပ္ပါ
7....Folder Lock ထဲျပန္ဝင္ပါ  အခုနကိုယ္ေပးခဲ႕တဲ႕ Password ကိုျပန္ရိုက္ပါ အဆင္ေျပစြာနဲ႕ Folder Lock ထဲဝင္သြားပါလိမ္႕မယ္...


ေဆာ့၀ဲလ္တစ္ခုမွာ crack လုပ္ဖုိ႔ ဖိုင္ေလးပါလာရင္



အဲဒီ crack folder (0r) file ေလးမ်ားကို ေကာ္ပီကူးျပီး ၀င္းဒိုးထဲက သက္ဆိုင္ရာ ပရုိဂရမ္ဖိုင္မွာ သြားထည့္လိုက္ရံုပါပဲ။ အဲဒီအခ်ိန္မွာ မူရင္းဖိုင္ေတြအေပၚမွာ replace လုပ္မလားလို႔ မ်ားေသာအားျဖင့္ ေမးတတ္ပါတယ္။ အဲဒီအခ်ိန္မွာ Yes ဆိုျပီး click နွိပ္ေပးလိုက္တာနဲ႔ crack လုပ္တဲ့ ကိစၥ ျပီးဆံုးသြားပါျပီ။ သက္ဆိုင္ရာ ေဆာ့၀ဲလ္ကို full version အျဖစ္ အသံုးျပဳနိုင္ျပီ ျဖစ္ပါတယ္။
ဥပမာ- babylon dictionary ကို crack လုပ္ရမယ္ ဆိုၾကပါဆို႔....


crack file ကို copy လုပ္ျပီး C:\Program Files\Babylon\Babylon-Pro ထဲမွာ paste လုပ္လိုက္ရင္ crack ခ်ိဳးတဲ့ ကိစၥ ျပီးသြားျပီ ျဖစ္ပါတယ္။

မွတ္ခ်က္။ ။ crack ခ်ိဳးတဲ့ အခ်ိန္မွာ သက္ဆိုင္ရာ software ကုိ ပိတ္ထားရမွာ ျဖစ္ပါတယ္။



patchဆိုတဲ့ဖိုင္ေလး ေဆာ့၀ဲလ္တစ္ခုမွာ ပါတယ္ဆိုရင္



သူက crack နဲ႔ သိပ္မကြာပါဘူး။ patch ဖိုင္ေလးကို ၀င္းဒိုးတင္ထားတဲ့ သက္ဆိုင္ရာ program file ေလးထဲ ထည့္ျပီး double click နွိပ္ျပီး ဖြင့္လိုက္ပါ။ ဒါဆုိရင္ patch ဖိုင္ပြင့္လာပါလိမ့္မယ္။ အဲဒီ patch ဖိုင္မွာ patch (သို႔) register ဆိုတဲ့ button ေလးပါလာပါလိမ့္မယ္။ အဲဒါေလးကို ကလစ္လိုက္ရင္ patch လုပ္လို႔ ျပီးဆံုးျပီ ျဖစ္ပါတယ္။



ဥပမာ- babylon dictionary ကို crack လုပ္ရမယ္ ဆိုၾကပါဆို႔....

patch file ကို copy လုပ္ျပီး C:\Program Files\Babylon\Babylon-Pro ထဲမွာ paste လုပ္ျပီး double ကလစ္နွိပ္ ဖြင့္လိုက္ပါ။ ျပီးရင္ အဲဒီ patch ဖိုင္မွာ patch (သို႔) register ဆိုတဲ့ button ေလးပါလာပါလိမ့္မယ္။ အဲဒါေလးကို ကလစ္လိုက္ရင္ patch လုပ္လို႔ ျပီးဆံုးျပီ ျဖစ္ပါတယ္။

မွတ္ခ်က္- အခ်ိဳ႕ patch ဖိုင္ေတြက မ်ားေသာအားျဖင့္ vista နဲ႔ window 7 ေတြမွာ အလုပ္မလုပ္တတ္ၾကပါဘူး။

Keygenဆိုတာပါရင္



keygen ဆိုတဲ့ ဖိုင္ေလးက လိုအပ္တဲ့ ေဆာ့၀ဲလ္စတင္ကတည္းက အသံုးျပဳရတာ မ်ားပါတယ္။ application software စတင္တဲ့ အခ်ိန္ serial key ေတာင္းပါလိမ့္မယ္။ အဲဒီအခ်ိန္ keygen ေလးကို double click နွိပ္ျပီး ေပၚလာတဲ့ ကီးလ္ေလးေတြကို သက္ဆိုင္ရာ ေနရာမွာ ျဖည့္ေပးလိုက္ရင္ ရပါတယ္။ တစ္ခ်ိဳ႕ ေဆာ့၀ဲလ္ေတြမွာ က်ေတာ့ software တင္ျပီးတဲ့ အခ်ိန္မွ serial key ကုိ ေတာင္းတတ္ပါတယ္။ အဲဒီအခ်ိန္မွာ သြားျပီး ျဖည့္ေပးလည္း ရပါတယ္။ ( အေပၚမွာေျပာခဲ့သလိုေပါ့... )



How To: Crack a File


I did not write this myself but i found it extremely useful. Enjoy it

PART 1:
0. Introducion:

I have read many cracking tutorials lately. Frankly speaking, I myself learned cracking from tutorials (and some book, but this doesnt really matter). The majority of the cracking tutorials out there have a few disadvantages: either they are too long and contain a lot of garbage, or they are too short, and don't contain the basics.

I decided to write a tutorial which will not have those two disadvantaged.

Anyway, I divided the tutorial into 3 parts:

Part 1: Introduction, tools and The basics of cracking.
Part 2: Practical training, using W32Dasm, and HIEW
Part 3: Key-generators.

Welcome to the first part. ;-)

1. Disclaimer:

I created this tutorial for informational purposes only!
Much of the information in this document can be used to perform illegal activities!
Don't attempt to do anything stated in this document!
If you do attempt to do anything, you are solely and fully responsible for what you do!
If you get caught and get in any kind of trouble, it's your own fault!
If you intend to use this information to impress your friends, leave it and grow up!
If you don't agree to this, do not read any more!
If you crack a program, and either sell the crack or offer it for free, it is a crime!


2. What is Cracking?

For me, cracking is:
"Letting a program, which is on your computer behave as you want it to behave and not behave as someone else (the programmer) wants"


As INTERN said:
"Hey, it is your stuff right? your numbers, your bits, you should be able to do anything you wish to do with it "


Actually, I agree to this.


So cracking is modifying your programs, and making them work they way you want them to. U can get a free demo program, crack it, and use it. BUT!!!! I repeat, if you crack a program, and start selling the cracked version or even offering it for free, it is a crime!


After reading those three tutorials (this is the first one in thsi series), you will feel the power you have in your hands (I mean, in your head).

well, let's get started?

3. Tools
There are very few tools you need by now...
It is very easy to find them over the web, cause they are quite popular:


The first one is "Win32 Disassembler", which is also know ans W32Dasm.


The Win32 Disassembler allows you to:

Disassemble files - translate the program to it's assembly origin, or machine code.
The file types which can be disassambled in Win32 Disassembler:
exe, 386, com, cpl, drv, dll, fon, mpd, ocx, vbx, vbx and sys.
Load the program proccess and trace the program.
Browse the disassembled file and go to any code location that you want.
Find text.
Execute, insert or remove jumps and calls.
Import and export functions.
Show a HEX display of a code area.
Show the list of the STRINGS, DIALOGS and REFERENCES.
Save the Disassembly source in text format.
Well, u can get it in almost any cracking site, but I'll give you some URLs:

http://wowsites.com/meiner/w32dsm89.zip
I think that's about enough. If any of these links goes down, please alert me.

The second tool you need is Hiew, which is also known as Hacker's View. The Hacker's View Tool allowes you to:

Disassemble files.
Make changes in the disassembled file, such as:
write commands, modify commands and reassemble the file.
View the file in ASCII, Hex or assembly mode.
You can also download an excellent program for cracking called Soft-ICe. Anyway, we won't need it in this part of the tutorial. Anyway, here are some URLs for Soft-ICe.

Please use the (Astalavista.com) search engines to find this programs!

4. The Main steps of cracking

There are 7 steps in the process of cracking:

Run the program you want to crack and learn it's standard behavior. Try to locate strings and keywords, try to enter the password and see how the program responds.
Open up the program with the W32Dasm and disassamble it.
Find typical and common strings in the disassembly that appeared in the program. In most cases, you have to look for keywords such as: password, name, date, expired, time limit, wrong, entered and so on.
Find and observe the password generator, find the learn protection routine and the API calls.
Try to understand the jumping mechanism of the protection.
Open up the program in HIEW. Change the jump of the flow control to it's oposite jump command, or nop it out.
Run and see how the change you have made in the original program affected it. Feel the power you have, the power of cracking, letting programs behave as you want them to.
Learn those steps very well, until u dream of them, u will use them in every program you crack.

5. Basic terms in Assembly

A. Registers:

Registers are variables which are stored in your processor. The processor uses these variables for basic mathimatical and logical operations. The mostly used registers are: eax, ebx, ecx and edx. Sometimes you will see edi, esi, esp, ebp. There are three types of registers: 32Bit registers, 16Bit registers and 8Bit registers. The 32Bit registers start with e, such as eax. There are 16Bit equivalents of these registers. The only Difference between the two types is the veriable size. These registers are: ax, bx, cx, dx, di, si, sp, bp. There are also 8 bit registers. Tthe 8Bit registers are: al, ah, bl, bh, cl, ch, dl, dh. l - means the lower 8 bits of the 16Bit register. h - means the higher 8 bits of the 16Bit register. Here the l stands for the lower and h for the higher 8 bits of a 16 bit register.
B. Flags:

Flags are Boolean variables (get 0 or 1 values). Flags are used by the processor for internal logical and mathimatical operations, in order to get the result of the operation. The most important flag is the Zero Flag, which can get zero or non-zero (1) values.
C. Code Flow

When you are analyzing a piece of code, you must understand that the processor is actually quite stupid, and all it does is to simply follow the basic instructions, line by line. It does anything the code tells it to do, and cannot do anything that is not written in the code (unless it has been run over by a herd of cows and abducted by aliens). This is why you have to think like the processor when you're analyzing a piece of code, and to act like it (just don't get used to it! Inhale, exhale, inhale, exhale... nevermind, stupid joke) You have to do everything the processor does, you have to compare registers and variables, execute jumps and calls, calculate Basic mathimatical operations, store and load register values and adresses, and so on... The processor has an instruction pointer especially for this, which is also called IP (it has nothing to do with IP addresses in the Internet Protocol, trust me). Using the instruction pointer, the processor points to the instruction that is about to be executed. The processor also has and executes instructions which change the code flow.
These instructions can be function calls, any other routine calls, jumps, conditional jumps, which depend on the zero flag, negative conditional jumps...
6. Conclusion

In this part of the tutorial we have learnt the meaning of the word cracking. Making programs behave as you want them to, and not the way the programmer wants them to. We have also learnt about the basic and the popular tools of cracking: W32Dasm, Hiew and SoftICE. And finally we have learnt the 7 main steps of cracking.

Now, Before you go to the next chapter, you have to learn these 7 steps and download the tools mentioned above, because we can't go on to the next chapter unless you have those tools and know the steps.

PART 2:

0. Introduction:

In this part, the second part of the cracking tutorial, you will learn to use the most important tools of the common cracker: W32Dasm and HIEW. You will also learn to crack some simple programs.

The tutorials are divided into 3 parts:

Part 1: Introduction, tools and the basics of cracking.
Part 2: Practical training, using W32Dasm, and HIEW.
Part 3: key-generators.

Welcome to the second part. :-)

1. Disclaimer:

I created this tutorial for informational purposes only!
Much of the information in this document can be used to perform illegal activities!
Don't attempt to do anything stated in this document!
If you do attempt to do anything, you are solely and fully responsible for what you do!
If you get caught and get in any kind of trouble, it's your own fault!
If you intend to use this information to impress your friends, leave it and grow up!
If you don't agree to this, do not read any more!
If you crack a program, and either sell the crack or offer it for free, it is a crime!

2. The main steps of cracking

You have already seen these steps in the previous part of the tutorial, but it's very important to know them. Remembering these steps and following them is 40% of the way towards success in cracking the program!!!

There are 7 steps in the cracking process:

Run the program you want to crack and study it's behavior. try to locate strings and keywords, try to enter the password and see how the program responds.
Open the program with the W32Dasm and disassemble it.
Find typical and common Strings in the disassembly that appeared within the program.
in most cases, you have to look for keywords such as: password, name, date, expired,
Time limit, wrong, entered and so on.
Find and observe the password generator, find the learn protection routine and the API calls.
Try to understand the jumping mechanism of the protection.
Open the program in Hiew. change the jump of the flow control to it's opposite jump command, or NOP it out.
Run and check how the change you have made in the original program affected it.
Feel the power you have, the power of of cracking, making programs behave the way you want them to.
Learn those steps very well, until u dream of them, u will use them in every program you crack.

3. Additional programs you need to have for this part of the tutorial

By now, in this part of the tutorial, you have learnt the main steps of cracking. Now, you are going to crack your first program.

But before that, you need to get a little program called: "Sweet Little Piano" You can download it from: http://www.ronimusic.com/

Now, when you have the program, let's start!

4. Cracking the first program (Sweet little Piano)

Now we will follow each step and crack the program:

Step 1: Running the program:

Well, Run it! Duh... :-)

Well, what do we see here..... The program opens two text files. Also we see "Unregistered Shareware" on the caption bar... Now let's open the Help menu for any registration options... Humm, what do we see here now...
oh, it's a password option... Well, select it and enter something (don't hope it will be right :-)). To see what happens... Click OK.. Hmm, nothing happens.... Maybe it accepted it? Hmm.. no way... the caption bar still says Unregistered... Ok close it... bah ... more text files ... and a notification that the settings are not saved in the unregistered version ... well ... kind of irritating those text files! Let's fix it :-)

Step 2: Disassemble the program:

Disassemble the program. Good, small is fast :-) Always.... Now, we don't have any strings that pop up when we want to register something... Let's browse for strings like registered, unregistered, the string about the unsaved settings. Hmm... evaluation time left ... password.txt.... passworddialog.... sweet little piano - Unregistered <<-- looks like our caption bar ;-) go on...Thanks for registering ... cool! So it thanks you anyway :-) Let's jump to that place ... Double click on it an we will pop right on top of the registration routine...

Step 3: Analyzing the protection routine.... / Understanding the jumping Mechanism...

Let's analyze the protection routine.

////////////////////// Code snip ///////////////////////////
ADDRESS MACHINE CODE ASSEMBLER INSTRUCTIONS
* Possible Reference to Dialog: PASSWORDDIALOG, CONTROL_ID:0064, ""
|
:00401715 6A64 push 00000064
:00401717 53 push ebx
* Reference To: USER32.GetDlgItemTextA, Ord:0000h
|
:00401718 E8A5B50000 Call 0040CCC2
:0040171D E822FFFFFF call 00401644
:00401722 85C0 test eax, eax
:00401724 741E je 00401744
:00401726 6A30 push 00000030
* Possible StringData Ref from Data Obj ->"SweetPiano"
|
:00401728 6866D24000 push 0040D266
* Possible StringData Ref from Data Obj ->"Thanks for registering!"
|
:0040172D 68FED14000 push 0040D1FE
:00401732 53 push ebx

////////////////////// Code snip ///////////////////////////

PasswordDialog ... a call to GetDlgItemTextA ... another call.... a test... and depending on the test a je.... The je jumps over the thank you ... And just ends the dialog box ... without telling you that you entered something wrong... So this is right ... we did indeed not see that we typed something wrong ... but apparently we are supposed to see if we type something right :-)

Again execute the je jump, and look where it goes to ... return from the jump.... Now lets try to rewrite what goes on here...

call ShowPasswordDialog
call GetEnteredText
call IsEnteredTextGood
test value in eax
je QuietExit

ShowThanksForRegistering

QuietExit:

the source code must have looked like this :

GetDlgItemText(_ID_Serial);
if (EnteredTextGood) ShowThanksForRegistering

// else nothing....

This is another interesting piece of code.... test eax, eax ... this assembler instruction tests if the value of eax is equal to itself ... if it is it is equal ... so a je instruction jumps ... if it is not equal, it does not jump.... To crack this program we can change the je instruction into two nop instructions... and we are done...

We have seen here, that the call has put a value in eax.... something which is not equal to zero or a zero... In our previous example we saw that the called Is_Serial_Valid call set some value in memory ... Here we see that the called Is_Serial_Valid call sets the eax register of our processor to some value....


Step 4: Changing the original program...

So modify it :-)

Open Hiew.
Open the file within Hiew.
Find the Adress of the line in W32Dasm (it's on the status bar beginning with '@').
Press F5 in Hiew.
Enter the address you have found in (4) and press ENTER.
Press F3 - for activating the write option.
Press F2 - to change the instruction.
Replace the command by 'NOP' (without quotes), which means NO OPERATION.
Now a new command appeared in the next line.
Replace it by NOP too.
If another new instruction hasn't appeared, Press F9 to update the file.
Press F10 to exit.
Run the program and see the result.
If you didn't succeed, have any questions or need any additional information, E-Mail me and I will answer all of your questions.

5. Conclusion

I gave this quite 'hard' cracking example so that u know that if you crack this program, you can crack almost every program, and most of them are much simpler to crack. In the next part you will learn to detect key generators and crack them.

Before you go to the next chapter, go over the steps again, and also go over the protection mechanism detection and modification.

This tutorial was written by Tech Lord <http://blacksun.box.sk>
-Spyda








Labels: ,

Print ပဲထုပ်ပါ..pdf ထုပ်လျှင်.ဖောင့်လွဲနေလိမ့်မယ်



မာတိကာ ၁ မာတိကာ ၂ မာတိကာ ၃ မာတိကာ ၄ မာတိကာ ၅
0 comments

882..Dangerous Malicious Codes and Vulnerability Websites [ 2.8.10 ]

 



Malicious Code Taxonomy


         ယခုအခ်ိန္ေတြမွာ  website ေတြ အဟက္ခံရတယ္။ တစ္ခုၿပီးတစ္ခုပါပဲ။ ဒါေတြက website တစ္ခု အဟက္ခံရလုိ႔ အဲ႔ site တစ္ခုတည္းထိတာမဟုတ္ပါဘူး။ ဟက္ကာေတာ္ေတာ္မ်ားမ်ားက site တစ္ခုကုိရသြားရင္ defacement တစ္ခုလုပ္တာကလြဲရင္ က်န္တာဘာမွမလုပ္ပါဘူး။ ဒီအတြက္ လာေရာက္လည္ပတ္တဲ႔သူကုိလည္း မထိခုိက္ပါဘူး။ ဒါေပမဲ႔ အႏၱရယ္ရွိတာက Mailicous Code ေတြ ထည့္သြားမ့ဲ Hacker ေတြကုိေတာ့ အလြန္ကုိ ေၾကာက္စရာ ေကာင္းတယ္ ဆုိတာ သိေစခ်င္လုိ႔ ဒီ Post ကုိ Korea Information Security Agency နဲ႔ ကၽြန္ေတာ့္ မိတ္ေဆြ bot hacker (တရုတ္ၿပည္မွ Game Password Hacker) တစ္ေယာက္ တုိ႔အား ကုိးကားၿပီးေရးထားတာပါ။

Malicious Codes မ်ား ထည့္သြင္းမႈအတြက္ ဟက္ကာေတြ တုိက္ခုိက္ရာတြင္



၁. တုိက္ခုိက္ေရးသမားေတြက မိမိတုိ႔ရဲ႕ Target ကြန္ပ်ဴတာ၊ အဖြဲ႕အစည္း၊ Website ေတြထဲကုိ SQL Injection ေတြနဲ႔ ၀င္ေရာက္ၾကပါတယ္။ SQL Injection ေတြတစ္ခုတည္းလားဆုိေတာ့လည္း ဒီတစ္ခုတည္းေတာ့မဟုတ္ပါဘူး။ တစ္ၿခားတုိက္ခုိက္လုိ႔ရတဲ႔ နည္းလမ္းေတြအမ်ားၾကီးရွိပါတယ္။ ဘယ္လုိပင္ ၿဖစ္ပါေစ သူတုိ႔ လုိခ်င္တဲ႔အပုိင္းကေတာ့ user ေတြ အမ်ားအၿပား ၀င္ေရာက္လည္ပတ္တတ္တဲ႔ ေနရာေတြပါ။ ဒီလူေတြဆီကေန Cookies ေတြခုိးမယ္။ IP ေတြယူမယ္ စသည္ၿဖင့္ေပါ႔။

၂။ တုိက္ခုိက္ေရးသမားေတြက Vulnerability Website ေတြထဲမွာ ၄င္းတုိ႔ရဲ႕ Malicious Code ေတြ ထည့္သြင္းထားေသာ Attacker ရဲ႕ Web Link ေတြ ခ်ိတ္ဆက္ေပးပါတယ္။ ဒီလုိခ်ိတ္ဆက္တဲ႔ေနရာမွာ iframe ဆုိတာနဲ႔သုံးၾကပါတယ္။
iframe ဆုိတာ webpage element တစ္ခုၿဖစ္ၿပီး တစ္ၿခား web page ေတြကုိ ၄င္းရဲ႕ သတ္မွတ္ထားတဲ႔ ေဘာင္အတြင္းမွာ အလုပ္လုပ္ရန္အတြက္ အသုံးၿပဳၾကပါတယ္။ ....


ဥပမာ . . Planet Myanmar Website မွာ Iframe ကုိထည့္သြင္းထားပုံကုိၾကည့္ပါ။

ဆုိတာကုိၾကည့္ပါ။

၃. အဲ႔အခ်ိန္မွာ အင္တာနက္ အသုံးၿပဳသူေတြက Attacker (Hacker) ေတြ ဟက္လုပ္ထားတဲ႔ Website ေတြကုိ ၀င္ေရာက္လည္ပတ္ပါတယ္။

၄. အကယ္၍ အင္တာနက္ အသုံးၿပဳရဲ႕ ကြန္ပ်ဴတာက လုံၿခံဳေရးမရွိၿခင္း၊ Up to Date မၿဖစ္ေနတဲ႔ Internet Security or Antivirus မရွိဘူးဆုိရင္ ထုိကဲ႔သုိ႔ေသာ Website မွေန အလြယ္တကူ မိမိရဲ႕ ကြန္ပ်ဴတာကုိ Trojan ေတြ၀င္ေရာက္လာပါလိမ့္မယ္။

၅. ၿပီးရင္ မိမိရဲ႕ Information ေတြ၊ user ID, Password ေတြကုိ သတ္မွတ္ထားတဲ႔ လမ္းေၾကာင္းလိပ္စာအတုိင္း ၿပန္လည္ခုိးယူပုိ႔ေပးပါလိမ့္မယ္။

ဒီလုိတုိက္ခုိက္မႈမ်ိဳးက ယေန႔ေခတ္မွာေတာ္ေတာ္ေလးကုိ ေတြ႔ရၿပီး Porn / Unsecure site ေတြကုိ ၀င္ေရာက္လည္ပတ္က Antivirus အသြင္၀င္ေရာက္လာတတ္တဲ႔ Malware ေတြနဲ႔ ဆင္တူပါတယ္။ ဒါေပမဲ႔ဒီေကာင္က နဲနဲအဆင့္ပုိၿမင့္သြားတယ္။ ဒီလုိပုံစံေတြက Website ေတာ္ေတာ္မ်ားမ်ားမွာ ၿဖစ္ၾကၿပီးေတာ့ ၿဖစ္လုိက္တဲ႔ Website ေတြရဲ႕ ၉၀ ရာခုိင္းႏႈန္းကေတာ့ SQL Injection vulnerability မွေန ဟက္ကာေတြ ၀င္ေရာက္ကာ malicious codes ေတြ ထည့္သြင္းသြားၿခင္းၿဖစ္ပါတယ္။
ေနာက္တစ္ခုကေတာ့ Upload Vulnerability ပါ.. သူကေတာ့ WebBoard ေတြမွာ user ေတြအတြက္ image upload ေတြေပးထားတာကေနၿဖစ္တာပါ။
i. ထုိ Web Board က extension ဖုိင္ စီစစ္မႈကုိမထားၿခင္း။ ( Webmaster ေတြသတိၿပဳရမွာက ထုိကဲ႔သုိ႔ေသာ Upload setting မွာ extension filtering ကုိစစ္ဖုိ႔လုိပါတယ္)
ii. Upload လုပ္ထားေသာ file ၏ လမ္းေၾကာင္းကုိ user ႏွင့္ Attacker မွ အလြယ္တစ္ကူ ရယူသိရွိႏုိင္ၿခင္း။
iii. Upload လုပ္ထားေသာ file မ်ားရွိ folder အား execute လုပ္ခြင့္ ခြင့္ၿပဳခ်က္ေပးထားၿခင္းေၾကာင္းၿဖစ္သည္။

ဒီေတာ့ Trojan File ေတြနဲ႔ user ေတြကုိ ဘယ္လုိ တုိက္ခုိက္လဲဆုိတာကုိ အနည္းငယ္ ထပ္ၿပီးရွင္းပါမယ္..

Ice Fox Prodigal Web Trojan Generator ဒါက Website ေတြကုိ တုိက္ခုိက္တဲ႔ေနရာမွာ အလြယ္တကူ အသုံးၿပဳႏုိင္တဲ႔ Virus Creator တစ္ခုပါပဲ။ (ဟက္ကာေတာ္ေတာ္မ်ားမ်ားကေတာ့ သူတုိ႔ကုိယ္တုိင္ Code လုပ္တာမ်ားပါတယ္။)


၄င္းအထဲမွာ iframe ကုိ width=0 ဆုိၿပီး ၿမွဳပ္ထားပါတယ္။ ၿပီးရင္ icyfox.htm ဆုိတာက icyfox.js ပါတဲ႔ Backdoor/Trojan ဖုိင္ေတြကုိ ဆြဲယူသုံးတဲ႔သူေတြပါ။ တစ္နည္းအားၿဖင့္ ၄င္း .js အထဲမွာ Hacker ေရးဆြဲထားတဲ႔ လမ္းေၾကာင္းအတုိင္းကုိ လုပ္ေဆာင္မယ့္ Code ေတြရွိပါတယ္။

Malicious Code ေတြကုိထည့္တာကေတာ့ ဒါပဲ... ဒီအထဲမွာ Malicious Website ကုိ လာေရာက္လည္ပတ္တဲ႔သူေတြရဲ႕ Computer တုိင္းလုိလုိမွာ Trojan ေတြထည့္လုိက္တယ္။ ၿပီးရင္ ၄င္း ကြန္ပ်ဴတာေတြထဲကေန File / Folder ေတြကုိ ခုိးယူလုိ႔ရေအာင္ Remote Access သုံးလုိ႔ရေအာင္ အသုံးၿပဳတဲ႔ Web Base UI Program ေတြနဲ႔ Internet User ေတြရဲ႕ ကြန္ပ်ဴတာကုိ လုိအပ္သလုိ ထိန္းခ်ဴပ္တယ္။ ဒီအတုိင္းနဲ႔ 2005 ေလာက္က တရုတ္ၿပည္မွာ oct 16 ကေန oct 17 အထိ ၃၄ နာရီအတြင္းကုိ ၁၂၁၆ ေယာက္ေလာက္ ထိသြားတယ္။

Web Adminstrator တစ္ေယာက္အေနနဲ႔ မိမိ website ရဲ႕ ReWrite Rule ေတြကုိသိထားရမယ္။ Security Holes ေတြကုိ အၿမဲစစ္ၾကည့္ေနရမယ္။ user ေတြဘက္ကေန script uploading နဲ႔ execution ေတြကုိ block လုပ္ထားရမယ္။ Attacker တစ္ေယာက္ malicious script တစ္ခု run တာနဲ႔ site တစ္ခုတည္းမဟုတ္ဘူး server ရဲ႕ root ထဲအထိကုိေရာက္ႏုိင္တယ္။ web board ေတြမွာ image uploading module ေတြကုိ သတိထားရတယ္။






Ref:worldwidemyanmar

***********************************************************************************************************************************************************************************************

Malicious Codes in Depth


Abstract



Malicious code refers to a broad category of software threats to your network and systems. Perhaps the most sophisticated types of threats to computer systems are presented by malicious codes that exploit vulnerabilities in computer systems. Any code which modifies or destroys data, steals data , allows unauthorized access Exploits or damage a system, and does something that user did not intend to do, is called malicious code. This paper will briefly introduce you to the various types of malicious code you will encounter, including Viruses, Trojan horses, Logic bombs and Worms.


Taxonomy of malicious Code



A computer program is a sequence of symbols that are caucused to achieve a desired functionality; the program is termed malicious when their sequences of instructions are used to intentionally cause adverse affects to the system. In the other words we can't call any "bug" as a Malicious Code. Malicious codes are also called programmed threats. The following figure provides an overall taxonomy of Malicious Code.

Figure 1 Malicious Code Taxonomy

Malicious Code Taxonomy

Taxonomy is a system of classification allowing one to uniquely identify something. As presented in the above figure, threats can be divided into two categories:
  • Independents: are self contained program that can be scheduled and ran by the operating system.


  • Needs host program: are essentially fragments of programs that can not exist independently of some actual application program, utility or system program.
You must also differentiate between these software threats that do not replicate and these that do. (Replication is a process that a code reproduces or duplicates itself.)The former are fragments of programs that are to be activated when the host program is invoked to perform a specific function , the latter consist of either a program fragment or an independent program (worm , zombie ) that when executed may produce one or more copies of itself to be activated later on the same system or some other system . In the following, I briefly survey each at these parts of malicious software.


Trap doors



defined - 1.syn.Back doors a bad thing. 2. A Trap door function is one which is easy to compute but very difficult to compute the inverse of [Jargon Dictionary]
A trap door is a secret entry point into a program that allows someone that is aware at the trap door to gain access without going through the usual security access procedure. In many cases attacks using trap doors can give a great degree of access to the application, important data, or given the hosting system. Trap doors have been used legitimately by programmers to debug and test programs, some of the legitimate reasons for trap doors are:
  1. Intentionally leaves them for testing, and make testing easier.

  2. Intentionally leaves them for covert means of access. In the other words, allows access in event of errors.

  3. Intentionally leaves them for fixing bugs.
But they may use illegitimately, to provide future, illegal access. Trap doors become threats when they are used by unscrupulous programmers to gain unauthorized access.

Back door is another name for a trap door, back doors provide immediate access to a system by passing employed authentication and security protocols, Attackers can use back doors to bypass security control and gain control at a system without time consuming hacking.


Logic Bombs



defined - The logic bomb is code embedded in some legitimate program that execute when a certain predefined events occurs, these codes surreptitiously inserted into an application or operating system that causes it to perform some destructive or security – compromising activity whenever specified conditions are met [Jargon Dictionary]

A bomb may sent a note to an attacker when a user is logged on to the internet and is using an specific program such as a word processor, this message informs the attacker that the user is ready for an attack, figure 2 shows a logic bomb in operation .Notice that this bomb dose not actually begin the attack but tells the attacker that the victim has met needed state for an attack to begin.

Figure 2 Logic Bombs

Logic Bombs

  1. Attacker implants logic bomb
  2. Victim reports installation
  3. Attacker sends attack message
  4. Victim dose as logic bomb installation
Examples of conditions that can be used as triggers for a logic bomb are the presence or absence at certain files, a particular day of the week or date, or a particular user running the application. One triggered a bomb may alter or delete data or entire files, cause a machine half or do some other damage.


Trojan Horses



defined - A malicious, security –breaking program that is disguised as something benign, such as directory lister, archiver, game, or (in one notorious 1990 case on Mac) a program to find and destroy viruses!" [Jargon Dictionary]

A Trojan horse is a useful, or apparently useful program or command procedure containing hidden code that when invoked performs some unwanted or harmful function. Trojan Horses can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. For example, to gain access to the files of another user on a shared system, a user could create a Trojan Horse program that when executed, changed the invoking user's file permissions so that the file are readable by any user, the another example of Trojan horse program is a compiler that has been modified to insert additional code into certain programs as they are compiled such as a system login program, the code creates a trap door in the login program that permits the author to log on to the system using a special password. Another common motivation for the Trojan horse is data destruction.
The program appears to be performing a useful function but it may also be quietly deleting the victim's files.


Zombie



A zombie is a program that secretly takes over another internet-attached computer and then uses that computer to launch attacks that are difficult to trace to the zombie's creator. Zombies are used in Denial of service attacks, typically against targeted web sites. The zombie is planted on hundreds of computers belonging to unsuspecting third parties and then used to overwhelm the target website by launching on overwhelming onslaught of internet traffic.




More Malicious Code tutorials and guides

********************************************************************************************************************************************************

Labels:

Print ပဲထုပ်ပါ..pdf ထုပ်လျှင်.ဖောင့်လွဲနေလိမ့်မယ်



မာတိကာ ၁ မာတိကာ ၂ မာတိကာ ၃ မာတိကာ ၄ မာတိကာ ၅
0 comments

512..Hacking အေၾကာင္းကိုလက္ေတြ့က်က်သင္ယူေလ့လာခ်င္ရင္

 
Hacking အေၾကာင္းကိုonline မွာလက္ေတြ့က်က်သင္ယူေလ့လာခ်င္ရင္

ဒီဆိုဒ္မွာ

၀င္ေရက္ေလ့လာသင္ယူႏိုင္ျပီး

ဒီစာအုပ္ကို

ေဒါင္းျပီးေလ့လာလို့လည္းရပါတယ္....




Labels: , ,

Print ပဲထုပ်ပါ..pdf ထုပ်လျှင်.ဖောင့်လွဲနေလိမ့်မယ်



မာတိကာ ၁ မာတိကာ ၂ မာတိကာ ၃ မာတိကာ ၄ မာတိကာ ၅
0 comments

164..Hacking.......2(1000 Hacking Tutorials )

 
1000 Hacking Tutorials


ေအာက္မွာ ေဒါင္းလုတ္ယူႏိုင္ပါတယ္။

1000 HACKING TUTORIALS


မေနာ္သားမွသင္ယူသည္.....





Labels: ,

Print ပဲထုပ်ပါ..pdf ထုပ်လျှင်.ဖောင့်လွဲနေလိမ့်မယ်



မာတိကာ ၁ မာတိကာ ၂ မာတိကာ ၃ မာတိကာ ၄ မာတိကာ ၅

163..Hacking...1

 

ဒီပညာရပ္ေတြဟာလဲ တစ္ေန႔တျခား ဒီေရအလား တိုးတက္ေနတဲ႔ နည္းပညာေတြနဲ႔အတူ ထပ္ခ်ပ္မကြာ လိုက္ပါေနတဲ႔ ပညာရပ္ေတြလို႔လဲ ေျပာလို႔ရမယ္ထင္ပါတယ္။ ဘယ္လိုပဲ ျဖစ္ျဖစ္ ဒီပညာရပ္ေတြကို ေလ႔လာေတာ႔မယ္ဆိုရင္ ေကာင္းတဲ႔စိတ္ထားျပီး ေကာင္းတဲ႔ အလုပ္ပဲ လုပ္ေစခ်င္ပါတယ္။

ဒီ Hacking Video Tutorial မွာ ပါ၀င္တာေတြကေတာ႔ -

Nslookup and Other Tools.swf
airpcap-cain-wpa-cracking.swf
anonymos.swf
backdoor_Proyek
backtrackplaintext.swf
cracking-windows-vista-passwords-with-ophcrack-and-cain.swf
creating-an-auto-hack-usb-drive-using-autorun-and-batch-files.swf
data-carving-with-photorec-to-retrieve-deleted-files-from-formatted-drives-for-forensics-and-disaster-recovery.swf
dspeech-text-to-speech-to-mp3-freeware.swf
finding-promiscuous-and-arp-poisoning-sniffers-on-your-network-with-ettercap.swf
firefox-user-agent-googlebot.swf
from_raw_database_to_userpass__noob_style_-bosmouz09.mp4
md5-password-cracking.swf
procmon1.swf
remote-password-auditing-using-thc-hydra.swf
samdump2auditor.swf
sshdynamicportforwarding.swf
truecrypt-windows-system-drive-encryption.swf
webgoat-sql-injection.swf
Bacdoor_Proyek
metasploitwmf.swf
universal-plug-and-play-upnp-1.swf
win2000MSF.swf
winXP SP2 MSF.swf

ေလ႔လာ လိုသူမ်ား ေအာက္မွာ ေဒါင္းလုတ္ယူႏိုင္ပါတယ္။

အပိုင္း (၁)
အပိုင္း (၂)
အပိုင္း (၃)

အပိုင္း (၃) ပိုင္း စလံုးကို ေဒါင္းျပီး ဖိုဒါ တစ္ခုထဲမွာထည္႔ ။ ျပီးရင္ အပိုင္း (၁) ကေန ဖိုင္ကို စျဖည္လိုက္ပါ။ က်န္တဲ႔ (၂) ပိုင္း သူ႔အလိုလို ျဖည္သြားပါလိမ္႔မယ္။

မေနာသားမွသင္ယူသည္.....





Labels: ,

Print ပဲထုပ်ပါ..pdf ထုပ်လျှင်.ဖောင့်လွဲနေလိမ့်မယ်



မာတိကာ ၁ မာတိကာ ၂ မာတိကာ ၃ မာတိကာ ၄ မာတိကာ ၅

KKZ Myanmar Unicode Keyboard

Mone Tine On Android

►Version 1.1

►Version 1.0

MoneTineKeyboard

Like လုပ်ထားနိုင်ပါတယ်

Mone Tine Knowledge Bank

Labels

အောက်ကကြေငြာလေးကလစ်ပေးပါဦး

Usage Policies

သင်၏ Facebook  တွင် ဖတ်နိုင်ရန် LIKE လုပ်ခဲ့ပါ..
( အမှန်ခြစ် ပေါ်နေပြီး LIKE ပြီးသားပါက CLOSE ကိုသာနှိပ် ပိတ်ပါ )

ကျေးဇူးတင်ပါတယ် မုန်တိုင်း

ကျန်းမာကြပါစေ