Best Ethical Hacking & Security Blogs You Should Always Follow

Last time I have collected some of the best ethical hacking tutorials from my own blog, which got quite a god response from you people. So I decided to get a great collection of some of the best security blog I have ever came across. Hope you like it as well.

– Don’t Learn to Hack , Hack to Learn. Its their slogan & also giving out one of the well known truth that you can never learn hacking without getting into it. He writes about phishing, web hacking, general, wireless hacking, vulnerabilities & exploits. Its a good one to follow to know the latest exploits.

Insane Security

– Security Through Distorted Eyes, This guy,  is keeping a close eye on security happening s & you must fllow him to get the latest news about hacking, more than that you would love the way he writes because he got the ingredient of fun within his hacking.

Roger’s Informative Security Blog

This blog is not just about security its also about security updates & technology. Within past few days he have written great articles regarding facebook & security updates. Its a good one two follow as a security news blog.

SecuriTeam Security Blog

Securiteam security blog is about coding, vulnerabilities, bus & exploits. They are also regularly posting the unique exploits & you should follow this blog if you are more interested into exploits & vulnerabilities (I am wondering, who is not ?) – Computer Hacks & Security

I have missed this blog for long time, and wondered why I don’t got anything like that in my early hacking days. It is one of the best blogs for anarchists who wish to start their career as hacking. It includes various topics from computer tweaks to hardcore hacking. So Beginners, never miss this one please.

Tech Republic IT Security

Another great collection of ethical hacking & security news & articles, It is online from 4-5 years now, they are giving out some of the best news in IT perspective. There content is great to follow & also to become a strong minded ethical hacker.

So this is it guys, I guess if you follow all this blog you can survive a lot much in security industry than others. Not just for survival but for learning & hacking , DO FOLLOW THESE TOP ETHICAL HACKING & SECURITY BLOGS – ALWAYS.

China’s Cyber Attacks on Indian Networks : HE News

China’s cyber army is making some suspicious attacks on Indian networks and they worrying India definitely. They are making attacks on private networks. What are there aims? , What are their reasons nobody knows. Chinas government is refusing to answer any questions related to this but sill this is issue can be much more serious than it looks.

They are answering like ‘hacking’ is a routine activity and it happens a lot all over the world everyday. Its not like china is planning some attack on all Indian cyber networks.

They are constantly scanning our networks and if this thing is avoided it can be a great issue of controversy in he future. Because such regular scanning will give them idea of all Indian networks and their security which in hacking termed as a fingerprinting. With the help of these fingerprints they can attack on Indian networks very fluently and go back without leaving many traces of the attack.

Many Indian government networks as NIC(National Infomatics science ) and MEA was under attacks in past few months but they were never disabled as a security was good enough till that point. But who knows they all back again with a bang.

One thing I wanted to say that Indian government ,Military and Indian cyber patrol should come together to face these issues to avoid the inconvenience in the future. These scans should be recorded and asked to Chinas government officials about such attacks.

Tools used in the attacks:

General tools of hackers like keyloggers, BOTs , and network mapping accessories are used in such attacks which is on low scale if we consider criminal hacking . But threatening fact is with he help of such tools they are getting very clear idea of Indian networks as I explained before.

As every hacking knowledgeable person knows BOTS are parasite programs that help hackers to hijack networks and make the network run as hackers wishes it. SO Bots is a considerable issue and action can be taken legally if they keep trace of these scanners.

Also random scans on networks with tools like superscanner can be done in these case by these Chinese hackers, SO cases are different but if we make think overall these Chinese attacks can be a serious issue.

So Indian government you should work on now , and be fast because things will not be under control if you get little late.

Reference : Times Of India , 6 May 2008

Writen By : Amol Wagh

IP Address Explaination : Ip Tracing , Scanning ports , And concept

This one is special article written for all of you to understand and use the IP . ( Internet Portal address
Before you can change your IP you need some information. This information includes your IP range, subnet mask, default gateway, dhcp server, and dns servers.

1. Getting your IP range – Getting information about your IP range is not difficult, I recommend using Neo Trace on your own IP. But for my test just look at your IP address, say it’s you can definitely use the IP’s found between < [new IP] <, don't use x.x.x.1 or x.x.x.255. To find your IP simply open a dos/command prompt window and type ipconfig at the prompt, look for "IP Address. . . . . . . . . . . . : x.x.x.x". 2. Subnet Mask, Default Gateway, DHCP Server - These are very easy to find, just open a dos/command prompt window and type 'ipconfig /all' without the ' '. You should see something like this: Windows IP Configuration: Host Name . . . . . . . . . . . . . . : My Computer Name Here Primary Dns Suffix . . . . . . . . . : Node Type . . . . . . . . . . . . . . .: Unknown IP Routing Enabled. . . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . . . . . . .: xxxx.xx.x Description . . . . . . . . . . . . . . . . . . . . : NETGEAR FA310TX Fast Ethernet Adapter (NGRPCI) Physical Address. . . . . . . . . . . . . . . . . : XX-XX-XX-XX-XX-XX Dhcp Enabled. . . . . . . . . . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . . . . . . : Yes IP Address. . . . . . . . . . . . . . . . . . . . . : Subnet Mask . . . . . . . . . . . . . . . . . . . .: Default Gateway . . . . . . . . . . . . . . . . . : DHCP Server . . . . . . . . . . . . . . . . . . . .: DNS Servers . . . . . . . . . . . . . . . . . . . . : Lease Obtained. . . . . . . . . . . . . . . . . . .:Monday, January 20, 2003 4:44:08 PM Lease Expires . . . . . . . . . . . . . . . . . . . .:Tuesday, January 21, 2003 3:43:16 AM This is all the information you will need for now, I suggest you either keep your dos/command prompt window open or copy & paste the information somewhere, to copy right click the window and select text and click once. III. Changing your IP Address To change your IP address first pick any IP you like out of your IP range and remember it or write it down. It is usualy a good idea to make sure the IP is dead (except for what we are going to do later on) so just ping it via "ping x.x.x.x" and if it times out then you can use it. Now go to My Computer, then Control Panel. In Control Panel select Network Connections and pick your active connection, probably Local Area Connection or your ISP name. Open that connection by double clicking on the icon in Network Connections, then select Properties under the General Tab. In the new window that pops up select Internet Protocol (TCP/IP) and click properties, it's under the general tab. In this new window select the General tab and choose "Use the following IP address" and for the IP address enter the IP you would like to use (the one you picked from your subnet earlier) and for the Subnet Mask enter the subnet mask you got when your ran ipconfig /all, same goes for the Default Gateway. Now select "Use the following DNS server addresses" and enter the information you got earlier. Now just click OK. Test that it worked, try to refresh a website and if it works you know everything is okay and you are connected. To make sure the change worked type ipconfig again and the IP address should have changed to your new one. IV. DDoS & DoS Protection If your firewall shows that you are being DDoSed, this is usually when you are constantly getting attempted UDP connections several times a second from either the same IP address or multiple IP addresses (DDoS), you can protect your self by changing your IP address via the method I described above. V. Web servers & Other Services If you know someone on your IP range is running a web server and he or she has pissed you off or you just like messing around you can "steal" their IP address so any DNS going to that IP will show your site instead because you would be running a web server yourself. To "steal" an IP is to basically use the changing IP address method above and picking an IP that someone that is running a web server has in use. Often you will be able to keep that IP at least for some time, other times you wont be able to use it so just keep trying until it works. You your self will need to have a web server on the same port with your message. You can do this with other services too. You can also DoS or DDoS the IP address you are trying to steal to kick him off the net, but I don't recommend as its pretty illegal, an your ISP will get pissed 😉

Free Download LG KG/Dynamite 200 Modem Drivers/ PC suite

If you are facing the problem of modem drivers for LG’s KG 200 which is now termed as dynamite 200 then I have solution for you.

This LG phone do not comes with PC suite or drivers installation CD, SO its hard to cnnect internet through it.

So you can do it by manual installation of Drives for this model.

Here you go:

Download Link :

Intrusion Attack Through Port Scanning

Port scanning determines which ports are listening to the active connections on the subjected host. These ports represent potential communication channels. With the help of port scanning we get close to the network communication scenario. We get to know more about victim’s network which is useful for further attacks. Internet does not exclusively rely on TCP port 80, used by hypertext transfer protocol (HTTP). Any surfer surfing any website can gain the same level of proficiency as your average casual surfer. Port scanning can be efficiently done to reveal the secret’s about the host.

Automated port scanners are necessary to perform such scanning, which are available in the market for very small cost.

Port scanning is done so as to gather information passively about the victim. This help’s intruder to eavesdrop into Victim’s Network.

Such scanning also helps in gathering information so as to form a network map. Network map are useful to get to know the victim network architecture or hierarchy.

There are thousands of ports available for communication on a network some well known are FTP, HTTP, SMTP etc., Which ports remains open or close depends on the network’s requirement. Like any web server will always have an FTP port open.

Every port has its unique number which is targeted after the successful port scanning. Various bugs, backdoors are installed on these ports and tested whether the system is vulnerable.

And this is how a successful attack through port scanning is done.

Hope you have enjoyed this informative article about port scanning. We are covering requirements of a good port scanner in next post.

To know more about port scanning comment here or mail us at

Port Scanners Selection Factors

We have covered brief introduction about port scanning and its techniques in our previous topic. Here we are, with requirements of a good port scanner.

Dynamic delay time calculations: Delay time is necessary for some scanners to send the data chunks.  So you need to check whether it is working properly or not with ping, which gives replies to every execution. But that is some time cumbersome, so you can use connect ( ) to a closed port on target. Which can gives you an initial delay time you’re your scanner. Simple, isn’t it!!!
Parallel Port Scanning: Scanners generally scans orts linearly and one by one till total ports are reached, but this old technique only works better with TCP on a faster network. So you need to test whether your port scanner has parallel port scanning or not because we have to scan over larger area or wide area network.

Port Scanners
Port Scanners

Flexible Port Specification: Can you believe we need to scan all 65535 ports. It will be slow and tiresome process. Also, the scanners which only allow you to scan ports 1 – N often fall short of an intruder’s need. Test whether your scanner has ranges option available which can allow you to scan the ports in better manner.

Flexible target specification: On a larger network you may surely want to scan more than one or two hosts.  So you should have flexible target specification available on your port scanner.

Retransmission: Sending chunks and collecting for response is a way old technique for scanners. But this can lead to false positives or negatives in the case where packets are dropped. So, check whether your scanner have automated retransmission available.

So these are some of the primary facts of considerations. Some secondary consideration includes Down Host Detection, Own IP detector, and IP scanner etc.

Firewall Responses Detection & Breaking The Firewalls

The behavior of packets and its responses explained last post has been noted by a number of firewall vendors. By understanding such enumerations,  the have modified their security system’s for high anonymity by spoofing the source address of the RST/ACK packet to be that of the target host. As such, the response received by an inquisitive attacker is supposed to be a RST/ACK from the target, rather than the gateway.

This is, of course, uncertain as it implies that the packet has reached the target before being rejected, when we may have already assume that there is. But actually there is a gateway that is filtering the traffic.

Breaking any firewall need a vast knowledge on how any firewall works. But rather than that we can also have knowledge on how firewall vendors roved stealth to their systems.
Firewalls Break in

Firewalls Break in Generally in modifies Firewall and Intrusion Detection Systems (IDS) environments, rather than denying unacceptable policies, they will simply drop the packet without any comment. As the scanner never receives a positive or negative response, there is no way of telling whether the packet did not reach the target because of network problems or whether the target no longer exists or if the packet was intentionally drop en route.

And this is where firewalls succeeds & hide from intruder the way network ports are responding and further attack chances are reduced. The resulting ambiguity and timeouts will slow down the scanning process, and prevent many tools from revealing information of any kind.

But this does not mean that this firewall is unbreakable, experiences one’s always have something strong in their hand named – Experience

Bluebugging: Type of Bluetooth Hacking

Bluebugging is also one form of Bluetooth hacking .It was first discovered German researcher Martin Herfurt . He got the motivation from the Bluesnarf attack.

Bluebugging is very much different from the bluesnarfing. In bluebugging allows an individuals to access the mobile phone commands using Bluetooth wireless technology without knowing the phone’s user .The hacker can access the phone memory and connect internet without knowing the user . Hacker can also initiate phone calls, send and read SMS, listen the phone conversion. But here the hacker must be at range of 10 meters while in bluesnarf it is upto 100 meters.


Initially bluebugging was carried using the laptops. But as the technology as boomed it can be carried on powerful PDA’s and mobile devices. Futher development of bluebugging tools the hacker can also take the control of victim’s phone. The hacker not only make call’s ,send MSG’s essentially do anything to the cell phone.

In bluebugging ,the hacker search for the establishment of connection i.e it searches for switch on bluetooth cell phone . Once the connection is established by pairing of device . It can do anything with the device.

Bluebugging cannot harm all the cell phones ,due to less range. But this can be avoided by switching OFF the Bluetooth to non discoverable mode.
This article is to inform the people about consequences of bluebugging. And also include how to protect from it.

Firewalk Attack: Beyond The Boundaries of Security.

Firewalk which was developed by two masterminds known as developed by Mike Schiffman and Dave Goldsmith furthers the techniques used both by static port traceroutes and hping.

It can be successfully implemented to scan a host downstream from a security gateway to assess what rules relate to the target system, without any packets having to reach it.

Firewalk utilizes the TTL functions to carry out the whole attack. This was different to analyze by any firewall. And so it was called as beyond the boundaries of security.


Some of the fact that should be true for any kind of firewall responses are:

If the packet is passed by the Firewall, a TTL expired should be received.

If the packet is blocked by the Firewall, this could be caused be either of the following:
An ICMP administratively prohibited response is received or The packet is dropped without comment. Again, uncertainty is introduced through packets lost in transit. Some security gateways will detect the packet is due to expire and send the expired message whether the policy would have allowed the packet or not.

Firewalls and intruders are always the big rivals as firewalls updates with technologies implemented by intruders. Which sometimes makes it harder for firewall vendors and sometimes for hackers.

Nokia Developer Conference 2009 In India

Nokia is ready to set another benchmark this year for mobile application developers and IT industry by announcing its ‘Nokia Developer Conference 2009’ In Bangalore, India.

The basic concept behind this conference is creating a forum where knowledge of developers across the nation will be shared. Presentation on various mobile technologies, developers success stories and future plans of the developers will be shared by experts from industry in this conference.

With rapid growth in mobile technologies all over the world it is very necessary for all the developers to share the knowledge to face the challenges in the development.

Technologies like Next Generation Network (NGN), Value added services, GPRS are wdely accepted by mobile users so it also one of the necessity that development increases in this field. This forum will provide a space where industry experts and student or professional level developers will together can grow with their knowledge and skills.  Highly skilled persons also will get chance to prove themselves and tie up with biggies for development by means of this forum.

This is not  only good opportunity for mobile developers but also for application developers from Gaming, Media, Music, IT, Aggregators, Content Providers, Network Providers, Broadband Operators as well as students.

Scope for 3G technology is also likely to be discussed in this conference. So I guess, It’s a very outstanding opportunity for all of you to attend  this Forum ‘Nokia Developer Conference 2009’

The venue for the conference is at Trinity, Taj Residency, Bangalore on 20th January, 2009.

Register Here for The Forum ‘Nokia Developer Conference 2009’.