Saturday, October 2, 2010

A Demolishing analysis of Ankit Fadia's Ethical Hacking Seminar - Overrated, Overhyped & Pure waste of Time

And there we go, I came to know about the renowned Ankit Fadia coming to my humble college & I was wondering if he will be different from those other security organizations who teach computer security & ethical hacking. 
He was worse. 
No offense to Mr Fadia, but actually I was quite saddened by some of the questions which he asked-
How many of you use Google as a search engine ?
(Almost all of hands raised)
He Proclaimed - STOP USING THEM !!
How many of you use email services like Gmail, yahoo?
(A lot of hands raised)
He Exclaimed - STOP USING THEM !!
How many of you use internet ?
(again..some of hands raised)
STOP USING THEM !!
And behind the above "Stop Using Them!!" there were some cheesy reasons of privacy invasion & record tacking. I wondered why he was not educating about how to use services like Scroogle/TOR/SOCKS for safe surfing (albeit nothing is safe, but still, they provide a greater degree of anonymity). Then..it all begin. 
Part 1 - Screwing the Proxies
Then the hacking prodigy demonstrated his magical wits by recommending Russian proxy servers cuz "
they were maintained by criminals" & "they kept no logs" .
F**INGBULLSHIT !!
Why the hell ! We can never trust a proxy if it keeps logs or not, that's why we always use SOCKS & proxy chaining to get the work done, even when I start something casual, i chain 10 proxies using a TOR network to get the work done, & that guy was recommending 
anonymizer.com & anonymizer.ru . And we shall trust Russian proxy cuz its maintained by criminals ? what an oxymoron ! His ace in hole in the proxy demo was the Princeton university proxy list where he claimed that to black all of the proxies it will need 413 individual tries ! A friend of mine asked - 
"Well Mr Fadia, what if you block the Princeton university site ?"
pat came the nervous reply
" Appoint a junior of yours to go into local cybercafé to get the list, Xerox it and distribute in college"
Pure F**king Genius !
He went on to use SPYPIG to get IP of any person using an image. but he didn't get on the point that what if a person has disabled image viewing on email. Anyways..it all ended with a lot of questions which he dodged by saying that there will be a query session in the end. Ah well..
Part 2 - the infamous NETBUS DEMO
I patiently waited to ask him some questions regarding IP evasion & anonymity but he started to demo NETBUS Trojan, without any logic he went on to demonstrate how he can open his CD/DVD drive on his DELL Studio 14" (
by installing a Trojan server on his own laptop & executing commands on local loopback & he didn't explained it, that's why its in f**king brackets !) . I asked him, on getting chance from my trusted roommates & event co-ordinators Sumit Dimri & Varun Kumar Singh & asked him 2 simple questions (Of course I already knew the answers) - 
  • What happens if a person is behind a NATBOX/Router/Firewall, then there is no use of getting IP, it might not be forwarded at all. What then ?
  • Trojans are invalid against Linux. What can you do to break into Linux Security ?
He responded by dodging the first question & diverting it to a social awareness bullshit & some problem solving (which I cant seem to remember cuz it was irrelevant). The second question was answered by saying that Windows is insecure & I myself use Ubuntu linux at home

Again..Pure F**king Genius !


From that point i got the point that he has no point :D
We moved on to the Steganography / Final session then.

Part 3 - the Steganography / Final session

The steganography session was started by exclaiming that he was contacted by FBI on 9/11 attacks (
which i already knew as a matter of fact is fake courtesy of Attrition.Org & various LUG's out there) & they used images of sexy women to transmit data into them. He used a tool to hide text data into image & reverse it, nothing special, if you have been a reader of my blog I guess you probably know that Nettools allow you to do that. Then he demonstrated Bluetooth hacking by using bluesnarf (just a scan) & website hacking usingSQL injection (again..nothing special) with no logical explanation of how the injection worked. The session ended by "Roadside Sign hacking" in which he displayed pics on projector of hacked road signs by hackers at USA, Australia & other countries.

He then begin to advertise Dell laptops & the highly prestigious (
READ: BELOW AVERAGE) AFCEH course conducted at Reliance Webworld. Then he ran away cuz he was running short of time & no Query Session was conducted.

Aftermath : Pure F**king Genius ! 
I guess you realize what I felt for the whole seminar & the whole Ankit Fraudia oops.. Fadia hype.

and the last but not least....__________________source:-www.prohack.com
Part 4:- he lively  hacked a site:- 
watch out this vedio....


A Demolishing analysis of Ankit Fadia's Ethical Hacking Seminar - Overrated, Overhyped & Pure waste of Time


Ankit Fadia's Ethical Hacking Seminar True Analysis: Review by Rishabh Dangwal

SOURCE: PROHACK


according to mrprohack(rd)

And there we go, I came to know about the renowned Ankit Fadia coming to my humble college & I was wondering if he will be different from those other security organizations who teach computer security & ethical hacking.
He was worse.
No offense to Mr Fadia, but actually I was quite saddened by some of the questions which he asked-
How many of you use Google as a search engine ?
(Almost all of hands raised)
He Proclaimed - STOP USING THEM !!
How many of you use email services like Gmail, yahoo?
(A lot of hands raised)
He Exclaimed - STOP USING THEM !!
How many of you use internet ?
(again..some of hands raised)
STOP USING THEM !!
And behind the above "Stop Using Them!!" there were some cheesy reasons of privacy invasion & record tacking. I wondered why he was not educating about how to use services like Scroogle/TOR/SOCKS for safe surfing (albeit nothing is safe, but still, they provide a greater degree of anonymity). Then..it all begin.
The Session Began - theprohack.com
Part 1 - Screwing the Proxies
Then the hacking prodigy demonstrated his magical wits by recommending Russian proxy servers cuz "they were maintained by criminals" & "they kept no logs" .
F**INGBULLSHIT !!
Why the hell ! We can never trust a proxy if it keeps logs or not, that's why we always use SOCKS & proxy chaining to get the work done, even when I start something casual, i chain 10 proxies using a TOR network to get the work done, & that guy was recommending anonymizer.com & anonymizer.ru . And we shall trust Russian proxy cuz its maintained by criminals ? what an oxymoron ! His ace in hole in the proxy demo was the Princeton university proxy list where he claimed that to black all of the proxies it will need 413 individual tries ! A friend of mine asked -
"Well Mr Fadia, what if you block the Princeton university site ?"
pat came the nervous reply
" Appoint a junior of yours to go into local cybercafé to get the list, Xerox it and distribute in college"
Pure F**king Genius !
He went on to use SPYPIG to get IP of any person using an image. but he didn't get on the point that what if a person has disabled image viewing on email. Anyways..it all ended with a lot of questions which he dodged by saying that there will be a query session in the end. Ah well..

Part 2 - the infamous NETBUS DEMO
I patiently waited to ask him some questions regarding IP evasion & anonymity but he started to demo NETBUS Trojan, without any logic he went on to demonstrate how he can open his CD/DVD drive on his DELL Studio 14" (by installing a Trojan server on his own laptop & executing commands on local loopback & he didn't explained it, that's why its in f**king brackets !) . I asked him, on getting chance from my trusted roommates & event co-ordinators Sumit Dimri & Varun Kumar Singh & asked him 2 simple questions (Of course I already knew the answers) -
  • What happens if a person is behind a NATBOX/Router/Firewall, then there is no use of getting IP, it might not be forwarded at all. What then ?
  • Trojans are invalid against Linux. What can you do to break into Linux Security ?
He responded by dodging the first question & diverting it to a social awareness bullshit & some problem solving (which I cant seem to remember cuz it was irrelevant). The second question was answered by saying that Windows is insecure & I myself use Ubuntu linux at home.

Again...Pure F**King genius - theprohack.com

Again..Pure F**king Genius !


From that point i got the point that he has no point :D
We moved on to the Steganography / Final session then.


Part 3 - the Steganography / Final session

The steganography session was started by exclaiming that he was contacted by FBI on 9/11 attacks (which i already knew as a matter of fact is fake courtesy of Attrition.Org & various LUG's out there) & they used images of sexy women to transmit data into them. He used a tool to hide text data into image & reverse it, nothing special, if you have been a reader of my blog I guess you probably know that Nettools allow you to do that. Then he demonstrated Bluetooth hacking by using bluesnarf (just a scan) & website hacking usingSQL injection (again..nothing special) with no logical explanation of how the injection worked. The session ended by "Roadside Sign hacking" in which he displayed pics on projector of hacked road signs by hackers at USA, Australia & other countries.

He then begin to advertise Dell laptops & the highly prestigious (READ: BELOW AVERAGE) AFCEH course conducted at Reliance Webworld. Then he ran away cuz he was running short of time & no Query Session was conducted.

Aftermath : Pure F**king Genius !

I guess you realize what I felt for the whole seminar & the whole Ankit Fraudia oops.. Fadia hype..

Friday, September 17, 2010

How to Import RSS feed into Facebook Fan Page

If you have a new Facebook Fan Page, you are probably wondering where the heck the import blog feature went.. Facebook now has it hidden in a tricky little spot.. (for those with existing Fan Pages, yours is still in the same spot, but new pages, without any ‘notes’, can’t see this feature straight up).

Step 1.) Login to Facebook

Head over to http://www.facebook.com/ and login.

Step 2.) Ads and Pages

Once logged in, click on Ads and Pages. If you have any ads going, it will start on the “ads” page, and you’ll need to click on pages again from the menu, otherwise, it should now give you a list of pages where you are an admin.

Step 3.) Edit Page

Click on “Edit Page” under the Fan page where you wish to import your RSS feed.

Step 4.) Notes

Now scroll down to the Notes application and click on Edit

Step 5.) Write a Note

If you have not written any notes yet on your Fan page, then you will not see the option to Import a blog. I’m going to assume that you haven’t written any notes, as otherwise, you probably wouldn’t be seeking this information in the first place. Click on the “Write a New Note” button.

Step 6.) Notes icon

Click on the little Notes icon as per image above.

Step 7.) Import a blog

You will now see the Import a blog option. Click on the Import a Blog option.

Step 8.) Type in Feed URL and Start Importing

Now type in your blog Feed URL (ie: http://www.yourdomain.com/feed) , agree to the terms, and click on Start Importing. If you have a self-hosted Wordpress blog, you can also import a specific category of your blog, as I have done in the image above. Click on Start Importing.

Step 9.) Confirm Import

You should see a preview listing of all your blog posts – and if all looks well, click on Confirm Import.

Step 10.) Finished

You’ve now finished setting it up.

Final Result: Notes tab

Visit your Fan Page and click on the Notes tab. This tab will now automatically contain all the posts that it imported and any future notes you write to your blog (or category if you chose category feed).

Final Result: Wall tab

The home page (Wall tab) of your Fan Page will also get a copy of the new notes. 

Create sexy easing buttons in Photoshop (Part-2 Jquery markup)


photoshop

In this part of the tutorial we are going to add the HTML, CSS and Jquery to the image we created. The hover effect is based on the Easing Plug-in.


Step 1: HTML
This is the simple HTML markup for the button. You can also add more buttons by just copying the below code and changing the class button to some other.This will go in body of page.
<div id="nav">
<a class="button" href="#"></a>
</div>
Step 2: CSS
Add the following CSS to the head of your HTML document.
body{
    background:#4d4d4d;}
#nav{
    width:auto;
    height:200px;}
.button{
    background-image:url(buttonease.jpg);
    background-position:0px 0px;
    width:180px;
    height:110px;
    display:block;}
.button .hover {
    background-image:url(buttonease.jpg);
    background-position: -0px -109px;
    height:110px;
    display:block;
    opacity: 0;}
Creating new class
If you are creating new button class then remember to add opacity:0; to its hover otherwise the hover image will come first on refreshing the page
Step 3:Jquery
Our button is powered by Jquery and Jquery.Easing.v1.3
Add the following to the head section of your HTML page.



Step 4: Knowing Jquery



If you are adding more buttons then you will also need more classes for that button. Therefore for hover effect you will have to link that class with jquery. Suppose I createdbutton2 as new class so the new jquery will be as below 


  $(function(){     
    $('.button .button2').append('')       
      $('.button .button2').hover(function() {        
        // Function performed on hover
         $('.hover', this).stop().animate({
         'opacity': 1
          }, 700,'easeOutSine')
          },function() {
          //Function performed on removing the cursor
         $('.hover', this).stop().animate({
        'opacity': 0
       }, 700, 'jswing')
     })
  });



easeOutSine and jswing are two easing effects. There are more effects which you can see at Jquery.Easing.v1.3