Operation Brotherhood Shutdown : Multiple Sites taken down by Anonymous Hackers

Anonymous Hackers take down the 
The Muslim Brotherhood websites. The hacking group had made an announcement Tuesday in which they threatened to launch “Operation Brotherhood Takedown,” on all Brotherhood sites at 8pm on Friday, 11 November.

According to a video released by them on youtube. They claim to taken down following sites:
As of 2:24 PM EST, ikhwanonline.com IS DOWN.
As of 2:26 PM EST, ikhwanweb.com IS DOWN.

The Brotherhood claimed in a statement released on Saturday morning that

certified ethical hacker.

An ethical hacker are usually peoples employed by an organization who trusts him or her to attempt to penetrate networks or computer systems, using the same methods as a hacker would deploy for hacking into networks or computer systems. The purpose of a n ethical hacker is of finding and fixing computer security vulnerabilities and preventing the hack .
Illegal hacking (i.e., gaining unauthorized access to computer systems) is a crime in most countries, but penetration testing done by request of the owner of the targeted systems or networks is not considered as a crime infact ethical hackers are paid for it.

A Certified Ethical Hacker are those people who have obtained a certification in how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a hacker would use.

The EC-Council 's Certified Ethical Hacker (C|EH) is a professional certification in the field of ethical hacking. C|EH is just a starting step in Information security field.

Port Scanning

Port Scanning is one of the most popular techniques used by hackers to discover services that can be compromised.

  • A potential target computer runs many ‘services’ that listen at ‘well-known’ ‘ports’.
  • By scanning which ports are available on the victim, the hacker finds potential vulnerabilities that can be exploited.
  • Scan techniques can be differentiated broadly into Vanilla, Strobe, Stealth, FTP Bounce, Fragmented Packets, Sweep and UDP Scans.

Port Scanning Techniques

 
Port Scanning Techniques can be broadly classified into:

  • Open scan
  • Half- open scan
  • Stealth scan
  • Sweeps
  • Misc

Commonly used hacking tools for port scanning
1. Tool: SuperScan 4.0

  




















How to Trace Any IP Address

Tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com.
Just go to http://www.ip2location.com/demo.aspx and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.
1. Country in which the IP is located
2. Region
3. City
4. Latitude/Longitude
5. Name of the ISP
6. Area Code and
7. Domain name associated with the IP address.
You can also visually trace route any IP address back to it’s location. For this just visit http://www.yougetsignal.com/tools/visual-tracert/ and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination.

Nessus Remote Security Scanner

Nessus is the worlds most popular vulnerability scanner used in over 75,000
organizations world-wide. Many large organizations are
realizing significant cost savings by using Nessus to audit business-critical
enterprise devices and applications.Nessus features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs and across physically separate networks.

Download :- nessus

How to Hack Windows Administrator Password

This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.
Most of us have tried to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here's a way using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. This can be done with a small tool called  Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.
  • You do not need to know the old password to set a new one
  • Will detect and offer to unlock locked or disabled out user accounts!
  • There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.

How it works?

How to use Keyloggers

I know most of you are new to the concept of keyloggers.Many of them may be hearing term “keylogger” for first time. So to make you understand better i am posting it  in the form of FAQs.


1). What are Keyloggers?

A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard.

2). How a Keylogger works?

Once the keylogger is installed on a PC, it starts operating in the background like in stealth mode and captures every keystroke on that PC. For example: The victim goes to https://www.gmail.com and types his “username” and the “password” the keylogger silently records these keystrokes and stores them in the logs. These logs when opened shows the captured “username” and “password” and will also tell you that they were typed in the Gmail login page.


3). How to install the keylogger?

 keylogger's can be installed just like any other program. Just follow the screen instructions.

 Anyone with a basic computer knowledge can install and use the keyloggers.