RSS
email
0

Bluetooth mobile hacking

Bluetooth technology is great, No doubt. It provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires. However, despite its obvious benefits, it can also be a potential threat for the privacy and security of Bluetooth users (remember Paris Hilton?). If you are planning to gain a deeper understanding of Bluetooth security, you will need a good set of tools with which to work. By familiarizing yourself with the following tools, you will not only gain a knowledge of the vulnerabilities inherent in Bluetooth-enabled devices, but you will also get a glimpse at how an attacker might exploit them. This hack highlights the essential tools, mostly for the Linux platform, that can be used to search out and hack Bluetooth-enabled devices. Discovering Bluetooth Devices BlueScanner - BlueScanner searches out for Bluetooth-enabled devices. It will try to extract as much information as possible for each newly discovered device. BlueSniff - BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices. BTBrowser - Bluetooth Browser is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 - the Java Bluetooth specification. BTCrawler -BTCrawler is a scanner for Windows based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfing attacks. Hacking Bluetooth Devices BlueBugger -BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other private information. CIHWB - Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack. Bluediving - Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode. Transient Bluetooth Environment Auditor - T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools. Bluesnarfer - Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing. Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without alerting the owner, and gain access to restricted portions of the stored data. BTcrack - BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges. Blooover II - Blooover II is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable. BlueTest - BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices. BTAudit - BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices. UPDATE: Hey folks, due to massive response the download links to above Mobile Hacking Premium Pack were moved to our must-have downloads page which is only available to MakeUseOf subscribers. So you will need to subscribe before youcan get them. For the Subscribers : To get your free Mobile Hacking Premium just write comment with your email address that you have used to subscribe and the above Premium Pack will be mailed to you. You need to be a subscriber to get the premium pack. Before Sending the Premium Pack we will be checking for your Authenticity. You will Receive your Premium Pack within 24 hours. What’s next? Let everyone know to disable Bluetooth until they really need it. Additionally, make sure to update your phone software on a regular basis.
Read more
0

Google Sederhanakan Navigasi GPS Untuk Android 2.0 smartphone

googlenavigationfp

Google baru saja telah mengumumkan Maps Navigasi versi Beta yang diperuntukkan perangkat Android 2.0. Aplikasi tersebut mendukung handsfree pencarian suara, menawarkan 3D view, langkah-langkah panduan suara dan otomatis rerouting.

googlenavigation2

“Sejak tahun 2005, jutaan orang telah mengandalkan Google Maps untuk perangkat mobile untuk mendapatkan petunjuk saat melakukan perjalanan. Namun, selalu ada satu masalah yaitu sekali waktu anda di belakang kemudi, sebuah daftar petunjuk arah mengemudi saja tidaklah mudah digunakan”, jelas Google software engineer Keith Ito.

Menurut Ito, aplikasi Navigasi menyediakan pengguna dengan tujuh fitur-fitur yang canggih, termasuk:

  • peta yang diperbaharui beserta data bisnis
  • pilihan pencarian yang lebih fleksibel
  • Live traffic data
  • Pencarian rute yang akurat
  • Tampilan satelit
  • Tampilan jalan

Google Maps Navigasi diharapkan akan tersedia pada Verizon Droid smartphone ketika tanggal rilisnya pada 6 November 2009 mendatang.

Read more
0

Lenovo Luncurkan IdeaPad S12 Berbasis Windows 7 dan NVIDIA Ion

lenovo-ideapad-s12-black

Sempat janjikan kehadirannya di bulan Agustus lalu, akhirnya Lenovo hadir dan siap dimiliki oleh khalayak ramai. Laptop IdeaPad S12 berbasis Ion ini sudah menggunakan sistem operasi Windows 7.

Dibandrol dengan kisaran harga 599 USD atau sekitar 6 juta rupiah saja, laptop yang menggunakan processor N270 berkecepatan 1.6GHz, 256MB Ion GPU, memori 2GB DDR2. Laptop berukuran 12.1 inchi ini memiliki resolusi 1280 x 800 px dan memiliki kapasitas hardisk 250GB.

Selain itu laptop ini juga memiliki Bluetooth 2.1+EDR, Wi-Fi dan menggunakan baterai 6-cell. Laptop ini menggunakan sistem operasi Windows 7 Home Premium (32-bit). Cukup menarik untuk dimiliki bukan?

Read more
0

Crome Hadir di Mac dalam versi BETA

chromecrash

Google telah mengumumkan ketersediaan secara resmi browser Chrome untuk Mac preview, yang berdasarkan pada versi 4 yang telah tersedia untuk Windows, tetapi bukan untuk Linux atau OSX, tapi yang menasihati orang untuk tidak mencobanya.

Pada halaman ini, Google mengatakan: “Google Chrome untuk Mac sedang dalam pengembangan dan sebuah tim insinyur yang bekerja keras untuk membawanya kepada Anda sesegera mungkin. Silahkan masukkan alamat email Anda di bawah ini dan kami akan memberitahu Anda tahu kalau sudah dirilis. “

Google kemudian menambahkan: “Sebuah versi saluran developer lebih awal sekarang tersedia! Sedangkan versi yang tidak pada kualitas beta (khususnya, hal itu tidak dapat mencetak dukungan plugin yang memang belum dan tidak cukup stabil), Chrome tersebut hadir dengan baik. Jika Anda ingin mencoba sekarang, lihat Early Access Release Channels untuk petunjuk downloadnya”.

apple_ii_e

Google co-founder Sergey Brin telah membuat pengumuman atas ketersediaan membangun versi 4.0.223.8 di Web 2.0 Summit di San Francisco, tetapi mengakui ia kecewa dengan seberapa lama telah kemunculannya.

“Jangka waktu yang telah salah satu kekecewaan proyek Chrome bagi saya”, kata Brin dalam menanggapi pertanyaan dari para penonton. “Saya menggunakan Chrome untuk Mac [dan] versi Mac yang tersedia untuk publik, melainkan hanya versi developer awalnya, dan bukan dalam pengujian beta secara nyata bagi masyarakat”.

Read more
0

Learn Hack by Angga



How to Hack a MySpace Account:


MySpace is one of the most widely used Social Networking website by many teenagers and adults acropss the globe. I have seen many cheaters create secret Myspace accounts in order to exchange messages with another person and have secret relationships. So, it’s no wonder many people want to know how to hack a Myspace account. In this post you’ll fine the real and working ways to hack a Myspace.
THINGS YOU SHOULD KNOW BEFORE PROCEEDING
With my experience of about 6 years in the field of Hacking and IT security, I can tell you that there are only TWO ways to hack a Myspace: They are Keylogging and Phishing. All the other ways are scams! Here is a list of facts about Myspace hacking.
1. There is no ready made software or program that can hack Myspace just by entering the target username or URL. If you come accross a site that claims to sell a program to hack Myspace then it’s 100% scam.
2. Never trust any Hacking Service that claims to hack a Myspace account just for $100 or $200. Most of them are scams.
The following are the only 2 foolproof methods to hack Myspace.

1. How to Hack Myspace – The Easiest Way

The easiest way to hack Myspace is by using a keylogger (Spy Software). It doesn’t matter whether or not you have physical access to the target computer. To use a keylogger it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers.
1. What is a keylogger?
A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer’s keyboard. A keylogger is also called as a Spy software or Spy program.
2. Where is keylogger program available?
There exists tons of keyloggers on the internet, but most of them are useless and doesn’t turn out to be effective. But with my experience I recommend the following keylogger as the best to hack Myspce since it supports remote installation. This can also be used on local computer.
SniperSpy
3. How to install a keylogger?
Keyloggers can be installed just like any other program. At the installation time, you need to set your secret password and hotkey combination, to unhide the keylogger program whenever it is needed. This is because, after installation the keylogger becomes completely invisible and start running in the background. Because of it’s stealth behaviour the victim can never come to know about that the presence of the keylogger software on his/her computer.
4. I don’t have physical access to the target computer, can I still use Sniperspy?
It doesn’t matter whether or not you have physical access to the victim’s computer. Because
SniperSpyoffers Remote Installation Feature. So, you can hack Myspace remotely installing the keylogger on the target PC.
You can attach the keylogger with any file such as image, MS excel file or other programs and send it to the victim via email. When the victim runs the file, it will automatically get installed without his knowledge and start recording every activity on his computer. The logs containing these activities are sent to you by the keylogger software via email or FTP.
5. What is the best way to deploy the keylogger onto remote PC?
Instead of sending the keylogger as an email attachment, it is recommended that you place the file in .ZIP/.RAR format and upload it to
www.hotlinkfiles.com. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.
6. How can a keylogger hack Myspace account?
You can hack Myspace using keylogger as follows: You install the keylogger on a Remote PC (or on your local PC). The victim is unaware of the presence of the keylogger on his computer. As usual, he logs into his Myspace account by typing the Myspace username and password. These details are recorded and sent to your Sniperspy account. You can login to your Sniperspy account to see the password. Now you have successfully hacked the Myspace account.
In case if you install the keylogger on your local PC, you can obtain the recorded Myspace password just by unhiding the keylogger program.
7. Why SniperSpy is the best?
n my experience of more than 6 years I have tested almost 50 spy softwares. Out of these one of my favorite Spy software is
SniperSpy. The following are some of the reasons for which I recommend SniperSpy for you.1. SniperSpy can be used to Spy on your local PC as well as a remote PC since it supports remote installation feature.
2. On the whole Internet there exists only a few spy softwares that support remote installation and SniperSpy is the best among them.
3. You can view the LIVE screenshot of the remote computer. Not only screenshots, but also you can see every activity on the remote comuter LIVE.
4. With SniperSpy you can take a complete control of the remote PC. You can logoff, restart or shutdown the remote PC right from your PC.
5. SniperSpy records every activity of the remote computer.
6. SniperSpy is completely stealth and remains undetected.
7. SniperSpy captures every keystroke that is typed. This includes email passwords, login passwords, instant messenger passwords etc.
8. SniperSpy has the ability to bypass any firewall.
How it Works?

After you purchase the SniperSpy software, you will be able to download the a program that allows you to create a remotely deployable module.
To deploy the module you can attach the exe file to any regular email and send to the remote PC. Modules can be dropped into a Word, Wordpad or Works document, or even a ZIP or RAR file. When the module is executed it will not display anything on the screen if you chose the “Do Not Alert User” option during module creation.

After you have sent the email, wait until the remote user checks their email and executes the module. After the module is executed, activity will begin recording immediately. After activity starts recording it will then be uploaded to your personal SniperSpy web space.
Wait about fifteen minutes after the module has been executed. Then login to your online account. You will be able to view any recorded activity there using a secure https connection. Logs are updated every six minutes. No matter where you are, you can log into your SniperSpy account from any Internet connection.
How effective is SniperSpy?
Once you’ve got the module executed on the target machine, it begins logging keystrokes, websites visited, internet searches, file changes, instant message chats, and taking screenshots of computer activity. I decided to install the module remotely on my friend’s laptop. A few hours after it’s successful installation, I was able to login to the control panel to see the screenshots, keystrokes (includes passwords), websites visited and many more. Whenever he used to come online I was able to monitor has activity LIVE. It was quite amazing to sit at my place and watch his activities remotely.
Improvements in the latest version of SniperSpy
In the older versions of Sniperspy the online control panel was pretty slow taking upto a minute to communicate with the remote computer. This was a bit annoying.
But this problem is fixed in the latest version. In fact it’s extremely fast now!
How is SniperSpy different from other spy softwares?
The following features makes SniperSpy stand out from the crowd
1. Sniper Spy is more reliable than other spy softwares since the logs sent will be received and hosted by SniperSpy servers. You need not rely on your email account to receive the logs.
2. SniperSpy offers excellent customer support.
3. SniperSpy has got recognition from media such as CNN, BBC, CBS, Digit etc. Hence it is more reputed and trustworthy.
Verdict: Sniperspy Internet Monitor Software
This review can only give you an idea of just how powerful SniperSpy really is and how it can help you to monitor internet activity. There is not much that can be hidden from SniperSpy and if you visit theirwebsite you will get the complete picture.
There are a few computer remote spying programs available but Sniperspy is without doubt one of the best ones you can buy. Customer support is excellent and if you want peace of mind then this will allow you to find out the truth very quickly.
Check
SniperSpy out right now and discover for yourself how much is worth to you compared with the few dollars it costs.
You can get SniperSpy from the following link:
SniperSpy Homepage
SniperSpy
***************************END********************************
Read more
 

Friends