Friday, 29 March 2013

Web Programming Series - HTML Tutorial 4




Hello Guys,

Here is the 4th HTML Tutorial 4


And, Of course Video available in HD :)


Wednesday, 27 March 2013

How To Pentest With Your Android Device - dSploit

Hello guys!
Today I have a video tutorial about pentesting with you android device. I will be using a program called dSploit, it's free and you can download it HERE.

For this tutorial you need a ROOTED android device. that's it! :)

Video is available in HD, just change the quality. Enjoy! :)


Monday, 25 March 2013

Web Programming Series - HTML Tutorial 3



Hello guys,
Here is the third tutorial in the HTML section of our Web Programming Series.
We will be uploading more shortly!



Video Available in HD, just change the Quality!
Enjoy =)

Video Download Link:


Thursday, 21 March 2013

Web Programming Series - HTML Tutorial 2



Hello guys,


Here is the second tutorial on Web Programming, HTML.
Remember there will be up to 4 tutorials posted per WEEK, stay tuned for more! :)


Tutorial Available in HD, just change the Quilty.
Enjoy :)

Video Download Link:


Wednesday, 20 March 2013

How To Install Backtrack In An Android Device - The Easiest Way



Hello guys, today I'm going to show you the easiest way to install backtrack on an android device.
For this tutorial you need:
  • Rooted android device
  • Linux installer (Can be found on Google play)
  • Zarchiver (Can be found on Google play)
  • Busybox (Can be found on Google play)
  • Android-VNC (Can be found on Google play)
  • Terminal  Emulator (Can be found on Google play)
All of the programs mentioned above are free.
Ok, now let's start,
The first thing you need to do is install Busybox from Google play:

Install it, then open it when it's done, it will install some more things.
When it's done, install Linux Installer from Google Play:


Open Linux installer, then click on Install Guides from the list on your right hand side:


When you click that, you'll see a list of Linux distros, click on Backtrack and you will see a screen with steps on how to install it. Now click on the second page of those steps, you will get a page that looks like this:

Just click on "Download Image", and let it finish downloading.
While it's downloading, open Google play and install Terminal Emulator, and Zarchiver.

Terminal Emulator:

Zarchiver:

When it finishes downloading, open Zarchiver, and look for the ZIP file that you downloaded, and extraxt the image into a root folder called "backtrack", extract the image into an external memory card not the internal one.
Once it's done, open Linux Installer again, and click on launch, you'll get a screen that looks like this:

If it didn't recognize any distro, click on Setting > Edit then change the file path there to your backtrack image, the .img file that you extracted.
When it finally say "backtrack" on the drop down list, click "Start Linux" 

Terminal Emulator will open, you just have to proceed with the installation steps, ask you for a new password, and some preferences. When it's done you will get a red "root@localhost~#" like the picture bellow:
You are now in backtrack!
Now if you want backtrack in GUI, open Google play, and install Android VNC:


Open It when it finishes installing, and it will look like this:


Set to the same settings in the picture, but not the IP address, you can get your IP by opening backtrack terminal, in terminal emulator, and running "ifconfig" command:


Settings for VNC are,
Username: backtrack
Password: backtrac
IP: from the "ifconfig" command or just put 127.0.0.1 
Color Format: 24-bit


Now click connect, and boom! You'r in backtrack Desktop! ;)

When you finis using it, remember to disconnect VNC  AND exit backtrack in Terminal Emulator, else it will be taking your battery in the background.


And note that Ubuntu can be installed in the same exact way, just the username and password for VNC will change.

That's it guys, enjoy! :)


Monday, 18 March 2013

Web Programming Series - HTML Tutorial 1


Hello Guys,
So here we go, the first tutorial in our Web Programming Series!
Basic HTML, Tutorial 1
Video is also available in HD, just change the resolution.
Video Made By: Zeeshi7897

Video Download Link:
http://www.mediafire.com/?sh5si7gl6cp82ep


Saturday, 16 March 2013

iPhone App Development


IPhone application development is the development of software application for handheld devices like mobile phones, android phones. iPhone application is from the Apple Inc. Sometimes these applications are already installed on gadgets and sometimes the users can download the application to their mobile phones. iPhone development came into existence in the year 2004 when Apple Inc CEO Mr. Steve jobs started focusing on the development of iPhone and with the collaboration of AT&T they have developed the iPhone. The approximate cost in the development of the iPhone was $200 million and it has taken approximate 30 months to complete the project of development of iPhone.



Since the advent of Smartphones in the year 2007, the whole concepts of mobile phone have been changed. Mobile phone usages are not just limited to communication; they have changed into high-tech gadgets with lot of different features. Smartphones are much more developed than general cell phones – both functionally and technically.



iPhone applications are different from one platform to another platform and there is no application which can run on all platforms. Every company has developed their own platform; mobile platforms are dissimilar and certain application run with specified technologies only. In the past 5 years, various platforms have been introduced for mobile phone application development like Blackberry, I Pad, Android and windows mobile. IPhone application cannot run on blackberry mobile or windows mobile. Therefore it is important to select the ideal mobile platform for application. The iPhone application developed with the use of SDK (software development kit) which is free to download.



Today, the owners of iPhones or Smartphones can perform a lot of activities on their phones like play high end mobile games, listening music, surfing internet, shopping and a lot more. Smartphones also allow third party applications and these applications give extra benefit and advantages in usability. Its compatibility with various third party applications has helped the gadget to do multi-tasking. While on one hand Smartphones can help doctors also with a large inventory of generic and brand name drugs, on the other hand this device can be a great help to students in their educational projects and assignments.



The mobile application market is a growing industry and because of its high revenue generation opportunities. This industry has not only enticed customers but also a business man.

The mobile application market is rapidly growing and coming as a new job opportunities market. There is increasing demand of mobile applications and everyday there is an increase of Smartphones users. Because of the high demand of mobile application software new opportunities are opening for mobile application developer. As it can be seen there are not good mobile application developers. Companies are attracting mobile users through different applications, so the demand of application developers is growing and will grow.



Since mobile applications are IT based, so application developers should have Bachelor of Technology, Master In Technology or Master in Computer Application degrees with great knowledge and experience of gateways/servers(XML,VXML,WAP,WTA etc), browsers(WML,XHTML), stacks(WAP 2.0 and TCP/IP) and clients(SMS, EMAIL, CHAT etc). If a candidate want to become a mobile application developer than one should be an expert in a programming languages such as C, C++, Visual Basic, Java etc.

In mobile application there are 4 major technologies involved:-

1) Web–based (HTML5/CSS3/JS) and related Frameworks (JQuery, Sencha)

2) Native platforms (iOS, Android, Windows Mobile 7)

3) Hybrid WebKit/Native

4) Proprietary middleware and clients (Red Foundry)

The capabilities of Smartphones have been taken to the next level and in the coming years we can expect better and more robust applications to perform more complex functions in even better ways.



Today developers are developing new application everyday for attracting the users to use more iPhones application.



This article was submitted by a guest in SecurityGeeks.
Bio will be added if possible.


Sunday, 3 March 2013

Scan Your Home Network With Nmap




Who should read this article?

Everyone that is interested in computer security and computer networking should read this
article.

Introduction

If you run a network, a small or big one, you need a flexible and productive way to monitor it.
You need to provide security to machines connected to your network, especially if you have a
WI-FI network. Monitoring the ‘health’ of your network is an important step to keep attacks,
viruses and malwares out of your network perimeter. Ask yourself these questions: “Is there
anybody outside using my wireless internet connection?”, “Are my machines and devices
secured?”, “Is my router firewall working?”, “Why is this port open? Is there any virus in my
computer that opened that port?”

What is Nmap?

Nmap is a free and open source tool for network discovery, helping us to map the network.
Network administrators find it very useful in their daily job, so if you are planning to be a
network administrator you should learn how to use Nmap. Nmap can help us to discover how
many hosts are in a network, what operating systems are they running, what open ports do they
have and services running in these open ports. It is a command line tool but for those that do not
like to remember many commands there is a graphical version of Nmap that is called Zenmap.
Both Nmap and Zenmap are multi-platform (Linux, Windows, Mac OS X, BSD, etc.), so you do
not have to worry about the operating system you need in order to use these tools. Nmap has the
ability to save scan results to files and we can use these files for later analyzes. The great thing
that i like about Nmap is its scripting engine (NSE). We can write our own scripts and use them
with Nmap.

Download and install Nmap

a) Installing Nmap on Ubuntu

Installing NmaponUbuntu is very easy. Fire up the terminal and type this command “sudo
apt-get install nmap” without the quotation marks.This simple command does everything; it
downloads and installs the Nmap for you.
NOTE: You will need root privileges to use Nmap tool on Linux machine.

b) Installing Nmap in windows

Download the latest release self-installer from the official Nmap page (nmap.org) and double
click it.After the installation is completed open command prompt (cmd), type this command
“cd C:\Program Files\Nmap” like shown in Figure 1 and hit enter.

Type “nmap” like shown in Figure 2 and hit enter.This command gives us information about
Nmap usage like options and target specifications so every time we do not remember a command
we can type “nmap” in the command prompt and read the output.

Scanning with Nmap

Performing a simple scan with Nmap requires a target and the target can be specified as an IP
address or a hostname. A simple scan does not require any options and the syntax for it is “nmap
IP or HOSTNAME”. My router is the target in this case; if you need another target then think
about your computer; do not scan machines that are not yours.
Figure 1 – Simple nmap scan



The nmap scan report tells us that the host is up and is running a web service in port 80, the port
for http (hypertext transfer protocol) traffic. A simple nmap scan will check for the 1000 most
commonly used TCP/IP ports and based in the respond that these ports do to the probe Nmap
will classify them into one of six port states: open, closed, filtered, unfiltered, open|filtered,
closed|filtered.To perform a simple scan in your machine type this command in the command
prompt “nmap localhost”.

Can Nmap be used to scan multiple hosts? Yes,Nmap can be used to scan multiple hosts and the
easiest way to do this is to string together the target IP addresses or hostnames separated by a
space, like shown in Figure 2.
Figure 2



Figure 2 demonstrates using Nmap to scan two addresses at the same time (host1 and host2).
If the number of hosts is big, than the scanning process will take more time and is good to save
the results in a file. Sometimes you want to scan an entire subnet and to do that you need some
information about Classless Inter-Domain Routing (CIDR).I will not explain you in this tutorial
what CIDR is so feel free to Google it.For now only remember that to scan an entire subnet you
need an ip address in the subnet.If you want to scan your entire subnet get your ip and use this
syntax: “nmap [IP/CIDR]”.What is the value for your CIDR?To find out the CIDR value we will
use an online subnet calculator. You can find it here http://www.subnet-calculator.com/.Put your
ip address in the ip box and copy the number in the Mask Bits box.My CIDR is 24.To scan the
entire subnet we use this command: “nmap [IP/24]” without quotation marks.This process will
take some time and the speed of scanning will depend on your internet connection. If you have a

slow connection, feel free to get a coffee.
Figure 3



Nmap accepts text file input, so if you have a large number of machines to scan, you can enter
the ip addresses in a text file and use it as input for Nmap. Each entry in the text file must
be separated by a space, tab or new line. The syntax for performing this scan is “nmap –iL
filename.txt”, where the –iL parameter is used to instruct Nmap to extract the list of targets from
the filename.txt.

Figure 4



Figure 4 show us that nmap failed to open input file hostlist.txt, which is a text file that contains
a list of hosts.In order for this scanning technique to work you need to copy the text file in the
Nmap folder.By default, before scanning for open ports, Nmap sends ICMP echo requests to
the host to see if it is online and if the host in not ‘alive’ Nmap does not probe the host.This can
save time when scanning a lot of machines as Nmap will not waste time probing hosts that are
not ‘alive’. The –sP option is used to perform a simple ping and is very useful when you want
to see which hosts are online without scanning for open ports. To see which hosts are online in
your network type this command “nmap –sP [IP/CIDR]” in the command line and wait for the
output. Figure 5 shows that 256 ip addresses in my subnet are pinged and there are only three
hosts ‘alive’.

Figure 5



Determining the operating system of your target is very important because many exploits
are specific to a specific platform. The process of discovering the host operating system is
called fingerprinting.The syntax for performing operating system detection is “nmap –O [IP or

hostname]”. Figure 10 shows the output of my os scan detection.

Sometimes Nmap is unable to detect the operating system and it will provide only a
fingerprint,but you can force the os detection by using the –osscan-guess option. But what is
the reason that some port is closed or open? The –reason parameter helps us to understand the
reason why a port is considered to be open or closed. Figure 6 shows how this option can be
used.

Figure 6



If you want to keep your nmap scanning output simple you can use the –open parameter which
helps you to display only the open ports on your target.Sometimes is hard to remember all these
commands and to do the job right you can use the –A parameter, which can be used to perform
an aggressive scan. This parameter selects some of the most commonly options used with Nmap.
Now that we have learned the basics of Nmaplet me takesome examples.

Example 1

I want to know if there is any SSH or web server in my subnet.

The most popular ports for SSH and web servers are 22 and 80 so we need to use the --open
parameter to check only for open ports and from these open ports we are only interested
about 22 and 80 ports.

Figure 7



As you can see from figure 7, we used -p 22,80 to perform a scan on TCP ports 22 and 80.

Example 2

How can Nmap help me to discover FTP servers in my subnet?

File transfer protocol (FTP) is known for its weak security. The issue with file transfer protocol
is that all the traffic is sent in plain text meaning that all data can be easily intercepted. An Nmap
scan can helps us to identify ftp servers. The command syntax for this scan is “nmap -sP -p 21
[target/CIDR]”.

Example 3

How to tell if your wireless router has been “hacked”

Most wireless routers allow administration through a web page interface. Open a web browser
and connect to your router by typing in its IP address. The default IP set for many routers is
192.168.0.1 or 192.168.1.1. If you are not sure about your router’s IP open the command prompt,
type “ipconfig” and then press enter. This command gives you information about the internet
connection. The IP address under “Default Gateway” should be your router’s IP.

After you have entered router’s IP address in the web browser, a pop-up window will ask for
your username and password. Enter your username and password to log into your router. Search
through the administrative menus that your router offers and try to find the place that shows a
list of devices using the network. Figure 8 shows all devices connected to my network. Now
it is very easy, isn’t it? If the page shows more DHCP clients than you have, it means that your
wireless router has been compromised and you should immediately improve its security.

Figure 8


But how can you tell if your wireless router has been “hacked” if you are not the administrator of
the router? Nmap does the magic for us. We learned to perform simple ping scan in a subnet by
using -sP option. If the command result displays more hosts than you expect, it means that your
router has been “hacked”. Figure 9 shows the output of my simple ping scan.

Figure 9



Figure 9 shows that 2 hosts are up. One of these hosts is my computer and the other one is my
router. If the scan shows more than two hosts up itmeansthat someoneis using my wireless
network.

Conclusion

We’ve looked at the basics we need to know about Nmap. In the next tutorial we’ll takea look at
more advanced stuff and use Nmap in real world examples.



About The Author:

Oltjano is pursuing Computer Engineering from Polytechnic University of Tirana. He is passionate about Information Security, Computer Forensics , game development and
drawing.
Website:http://thisisoltjano.blogspot.com