Receive Daily Updates

Enter your email address:

Showing newest 32 of 81 posts from 4/1/10 - 5/1/10. Show older posts
Showing newest 32 of 81 posts from 4/1/10 - 5/1/10. Show older posts

Friday, April 30, 2010

Data Recovery Software Free Download Full Version

Try the Kernel TM Recovery range of Best Selling hard disk data recovery software & file repair products, for recovering deleted files or corrupt files data, which gets lost due to following reasons -

» Format of a hard drive partition
» Partition structures are damaged or deleted
» Unexpected system shutdown or software failure
» Accidental File Deletion
» Virus Infection or Corruption
» Various Kind of File System Corruption
» File Corruption
» Bad Sectors

Programs in the AIO:
  1. Digital Media Data Recovery 4.02
  2. Exchange OST to PST Conversion 4.04.03
  3. FAT Partition Recovery 4.03
  4. Foxpro DBF File Recovery 5.01
  5. IncrediMail Email Recovery 4.02
  6. Linux Data Recovery 4.03
  7. Linux JFS Partition Recovery 4.02
  8. Linux ReiserFS Partition Recovery 4.02
  9. Macintosh Data Recovery 4.04
  10. MS Access Recovery 4.04.05
  11. MS Backup File Recovery 4.05.01
  12. MS Powerpoint Recovery 4.05.01
  13. MS Publisher Recovery 4.04.01
  14. MS Word Recovery 4.03
  15. NFTS Partition Recovery 4.03
  16. Novell NSS Partition Recovery 4.03
  17. Novell Traditional Partition Recovery 4.03
  18. Outlook Express DBX Mail Recovery 4.02
  19. Outlook Express Password Recovery 4.02
  20. Outlook PST Password Recovery 4.02
  21. Palm Pilot Database File Recovery 4.03
  22. Paradox Database File Recovery 4.03
  23. SCO OpenServer Data Recovery 4.01
  24. Solaris Intel Data Recovery 4.04.01
  25. SPARC Data Recovery 4.01
  26. SQL Server Password Recovery 4.02
  27. Tape File Recovery 4.02
  28. Undelete 4.02
  29. VBA Password Recovery 4.02
  30. Universal keygen

  • Extract it
  • Mount it
  • Enjoy!
read more "Data Recovery Software Free Download Full Version"

How to Block Porn & Adult Websites | Download Anti-Porn Pro 2010

Multilingual contents filtering - Anti-Porn supports real-time filtering or blocking porn websites, which is writed in English, Japanese, Korean, Russian, German, Franch, Spanish, simplified Chinese, traditional Chinese. AI to restrict games - Anti-Porn can determine which program is a game by itself. The parents needn't to add any game to a blacklist. Hide completely - You could not find Anti-Porn whether in the explorer or in the task manager. Everyone could not close or remove Anti-Porn without password.

read more "How to Block Porn & Adult Websites | Download Anti-Porn Pro 2010"

CommView 'cv2k1.sys' Driver Local Denial of Service Vulnerability

Bugtraq ID: 39705
Class: Input Validation Error
CVE:
Remote: No
Local: Yes
Published: Apr 26 2010 12:00AM
Updated: Apr 27 2010 04:52PM
Credit: p4r4noid

CommView is prone to a local denial-of-service vulnerability. Successful exploits will allow attackers to cause a local denial-of-service condition; other attacks may be possible. The issue affects versions prior to CommView 6.1 Build 644.

Attackers can use standard tools to exploit this issue. CLICK HERE for code.

Solution:
Updates are available.
read more "CommView 'cv2k1.sys' Driver Local Denial of Service Vulnerability"

Thursday, April 29, 2010

The Next Big Thing - Bungie Activision join Forces

Halo is one of my  favorite games and I still duke with my friends in weekend LAN mayhem, the same can be said about Bungie - locked and loaded :) - theprohack.com COD4:MW & MW2 when it comes to gaming . It became bigger this Wednesday when Bungie, the celebrated Halo developer entered into a 10 year “alliance” with gaming biggie Activision, and now the next-big-post-Halo-Bungie-game will be a multiplatform title. As Thomas Tippl, Chief Operating Officer of Activision Blizzard commented -
"Today we are very proud to announce a ground breaking ten year partnership between Bungie, one of the greatest developers in the world and the makers of Halo, with Activision, the number one video game publisher, who will bring the new intellectual property to fans worldwide across all platforms"
In short, the equation goes like this -
The new equation of gaming - theprohack.com
The deal took over an year to finally come to a mutual point of interest, and personally, I can see some real Bungie stuff of Oni quality to be developed outside halo universe.
Meanwhile Bungie is currently preparing itself for Halo: Reach for Xbox 360,self dubbed as the "most ambitious game" it has ever made. Mean while you can enjoy the Halo Reach trailer :)

Like This post ?  You can buy me a Beer :)

Posted by XERO. ALL RIGHTS RESERVED.

read more "The Next Big Thing - Bungie Activision join Forces"

How to Limit Denial of Service (DOS) Attack Damage

You may not think you are at risk of a DOS attack, especially if you operate a small web site, but if you cross paths with the wrong person, you could end up in the cross hairs of someone who could take your site down. Many smaller sites are finding themselves under attack these days because they are most vulnerable.

Resisting off a DOS attack can be a very difficult task. Once your site is under attack, you are really pretty limited in the way you can respond. The following steps will not only help you minimize the damage a DOS attack can inflict on your business, but help reduce the chances of one taking place at all.

1. Be familiar with your hosting company

As part of your hosting selection process, be sure you have a complete understanding of their security measures. Check with them on how they will help you should your site come under attack. Do they have a team of security experts that will assist you? What kind of prevention measures do they take at the network level?

2. Keep Operating Systems and Software up to date

Your host isn't the only responsible party. Security holes in operating systems as well as software programs can also be responsible for allowing DOS attacks. Be sure your anti virus and spyware programs are up to date at all times on all the machines you use in your business. Be sure you've got your computers set to download security updates to your OS and other software programs automatically.

3. Increase server capacity

The more server capacity you have, the better off you'll be to handle your traffic and fend off a DOS attack. A DOS attack works by increasing the demand on your site and takes it to a point where there is no more capacity to allow more visitors on the site. With larger capacities, you can help stave off smaller DOS attacks.

4. Report all attacks

If you find your site under attack, report the attack to the FBI immediately. The FBI maintains a specific division to handle these situations. The Internet Crime Complaint Center, or ICC, handle a myriad of Internet complaints, from fraud to DOS attacks. They can be reach at ic3.gov.

5. Block the additional traffic

Working with your hosting company, you can actually block traffic coming from what appear to be suspicious IP addresses. Your hosting company will likely have a list of known problem IP addresses and can also find out where the majority of the increased traffic is coming from and block it. Sure, you could end up blocking legitimate customers, but this until the problem is resolved, at least your site would continue to operate.

6. Be on top of things

As these DOS attacks continue to increase, both in the type of attacks as well as the frequency, you've got to stay on top of security issues. The best way to prevent attacks may just be with your knowledge of what's going on at any given point in time. Do a search online for message boards / forums / blogs that discuss such issues and read them on a regular basis so you'll know what's happening regarding DOS attacks. A great site for keeping on top Internet security issues is the Computer Crime Research Center. You can find them at crimeresearch.org

This article has been posted by Warren. Warren has been writing articles and producing how to courses online since 2005. He specializes in online business issues and currently operates a number of websites in a number of different niches.
read more "How to Limit Denial of Service (DOS) Attack Damage"

Wednesday, April 28, 2010

How not to get Hacked – Choosing the Right Password

Its a digital nightmare when your password gets hacked. Password compromise = your are fucked, straight away. How not to get Hacked ? Choosing the Right Password - theprohack.comAnd if  you do happen to be at an important position in a firm, and unfortunately find yourself the root cause of company’s security problems, its time to learn a few basics of choosing the right password. Be it your Email ID, terminal login, voicemail or anything that uses a generic password protection system,you need to choose a secure password for your digital ventures. Nevertheless, this simple guide is applicable to every netizen online who wants to secure himself by choosing the right password. Cause in the end, its your password that makes it easy, or hard for attackers to gain access to your account.

About Bad Passwords

Poor weak passwords have the following characteristics (if you have even one,make sure to change it) -

  • Password size less than 15 characters
  • Password is a word from dictionary

The password is -

  • Name of family,pet,your favorite videogame character.
  • Computer terms,commands,website name,hardware,software etc.
  • Personal data like birthday,mobile phone numbers, address etc.
  • Any of the above spelled backwards! or succeeded or preceded by a number or letter (password1, 1 password)
  • In short any form of personal stupidity leads to tragic events :P

How to get hacked ?

  • Reveal your password to any one.
  • Reveal it in an email message,phone call,to your boss, give hints to others,share it with friends and co workers.
  • Write it down somewhere.
  • Keep same passwords for all your digital ventures, like emails, voicemails etc
  • NEVER CHANGE IT.

Passwords shall be hard to guess - theprohack.com

In any case, if you want the opposite, follow the opposite :)

Making a STRONG Password

use phrases to form passwords, these are much secure to form and hard to guess.

for eg, the phrase -

“ This is a super secure password and is hard to hack :P ”

will form a password given below by taking the first letter and substituting similar sounding words with numbers. See..its quite hard to hack :)

“ Tiassp&ih2h:P ”

Use numbers, letters, uppercase and lowercase and mix them freely to form you password. make sure its not a dictionary word and DOES NOT CONTAIN any characteristic of weak passwords stated earlier.

A more secure version is to use passphrases to form passwords. A passphrase is a longer version of password and hence its more secure. Make sure its easy to remember,not a famous quotation and hard to guess by intuition

As Clifford Stoll says,

Treat your password like your toothbrush. Don't let anybody else use it, and get a new one every six months

He is damn right..just make sure you change it every month or more often to be secure.

I guess you will now be able to form secure passwords and deploy them fully.

 

Like This post ?  You can buy me a Beer :)

 

Posted by XERO. ALL RIGHTS RESERVED.

read more "How not to get Hacked – Choosing the Right Password"

Google Applications Hacks by Philipp Lenssen

Title: Google Apps Hacks
Author: Philipp Lenssen
Publish date: April 17, 2008
Format: CHM
Language: English
Size: 11,8 MB
ISBN-10: 059651588X

Description:
I happily take advantage of a number of Google applications such as Gmail, iGoogle, Google Calendar, and a few other things. But there's more to the Google Apps family than that, and I know I'm not getting all I can out of the offerings. After going through Google Apps Hacks by Philipp Lenssen, I have a number of new tricks to try out both on stuff I already use as well as a few other apps. Fun stuff!

read more "Google Applications Hacks by Philipp Lenssen"

Windows XP Hacks Download Second Edition

By Preston Gralla | Publisher: O'Reilly Media | Released: February 2005 | Pages: 576 | Size: 13 MB

A smart collection of insider tips and tricks, Windows XP Hacks, Second Edition covers the XP operating system from start to finish. Among the multitude of topics addressed, this must-have resource includes extensive coverage of hot-button issues such as: security web browsing controlling the control panel removing uninstallable XP components pop-up ads You'll also find timesaving hacks for file distribution; digital media, such as iTunes; and high-visibility web software, services

read more "Windows XP Hacks Download Second Edition"

Free Hacking Softwares & Tools Download Here

ipEye 1.2 - ipEye is a TCP port scanner for Windows 2000 that can do SYN, FIN, Null and Xmas scans.

Click Here Read More

Click Here to Download

IPSecScan - IPSecScan is a tool that can scan either a single IP address or a range of IP addresses looking for systems that are IPSec enabled.

Click Here Read More

Click Here to Download

NetScanTools - NetScanTools consists of many independent network functions joined together in a single tabbed window.

Click Here Read More

Click Here to Download

SuperScan Network Scanner - SuperScan is a powerful TCP port scanner, that includes a variety of additional networking tools like ping, traceroute, HTTP HEAD, WHOIS and more.



Cheops (KEE-ops) is a Network management tool for mapping and monitoring the network. It has host/network discovery functionality as well as OS detection of hosts.


ARIN allows search on the whois database to locate information on networks autonomous system numbers (ASNs), network-related handles and other related point of contact (POC).

NeoTrace is a diagnostic and investigative tool. It traces the network path across the Internet from the host system to a target system anywhere on the Internet.

VisualRoute is a graphical tool that determines where and how traffic is flowing on the route between the desired destination and the user trying to access it, by providing a geographical map of the route, and the performance on each portion of that route.

SmartWhois is a network information utility that allows the user to find all the available information about an IP address, hostname, or domain, including country, state or province, city, name of the network provider, administrator and technical support contact information.

VisualLookout provides high level views as well as detailed and historical views that provide traffic information in real-time or on a historical basis.



I will post more hacking softwares & tools soon. Till then keep visiting. Don't forget to subscribe my feeds, so that you won't miss any latest post from this site. You can VISIT HERE for more similar hacking tools & softwares.

If you are looking for any specific software or tool, leave a comment here. I will try to get it.
read more "Free Hacking Softwares & Tools Download Here"

CommView cv2k1.sys Denial of Service Vulnerability

Description
p4r4noid has reported a vulnerability in CommView, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

The vulnerability is caused due to an error in the cv2k1.sys kernel driver when processing IOCTLs. This can be exploited to cause a system crash via a specially crafted 2578h IOCTL.

The vulnerability is reported in version 6.1 Build 642 and prior.

Solution
Update to version 6.1 Build 644.

Provided and/or discovered by
p4r4noid, Corelan

Original Advisory
http://www.corelan.be:8800/advisories.php?id=CORELAN-10-030

read more "CommView cv2k1.sys Denial of Service Vulnerability"

Tuesday, April 27, 2010

Safari 4.0.5 (531.22.7) Denial of Service

# Title: Safari 4.0.5 (531.22.7) Denial of Service
# EDB-ID: 12408
# CVE-ID: ()
# OSVDB-ID: ()
# Author: Xss mAn
# Published: 2010-04-26
# Verified: yes
# Download Exploit Code
# Download N/A
read more "Safari 4.0.5 (531.22.7) Denial of Service"

Hackers Target iPad & Windows Users With Bogus Update

Dupe Windows users into downloading backdoor Trojan; Mac owners not at risk. Hackers are targeting iPad users with bogus update messages that dupe them into downloading malicious code onto their Windows PCs.

It is very important to keep the software on your iPad updated for best performance, newer features and security. To get the latest version of iTunes software, please go to ... and install the application.

The link in the message leads to a copycat of the legitimate iTunes download site, where users are asked to approve the download of a file dubbed "itunessetup.exe."

The file masquerading as the iTunes update is actually a Trojan horse that injects code into Windows' "explorer.exe" process and opens a backdoor for hackers, who then use that entrance to add more malware to the PC. The "Backdoor.Bifrose.AADY" Trojan also tries to snatch activation keys from various programs on the hacked machine and steals passwords for instant messaging clients and e-mail accounts.

Apple last refreshed the Windows and Mac software on March 30, when it updated iTunes to version 9.1; it has yet to release an update for the iPad.

Mac users are not vulnerable to the attack, even if they head to the bogus iTunes download site, the impact of the malware-planting campaign will likely be low. If hackers were able to target Mac customers, it would have spread like wildfire, but because most antivirus companies detect this [Trojan], it's aimed at Windows users who have bought an iPad and who also don't run a security product.
read more "Hackers Target iPad & Windows Users With Bogus Update"

Monday, April 26, 2010

Blizzard Kicked Over 320,000 Hackers from Battle.net

Having trouble logging into your Blizzard account, well just remember cheaters never prosper. Anyone caught violating the TOS has been summarily and properly booted. This is not the first time Blizzard has done something like this. In November of 2008 they banned over 350,000 accounts from Battle.net stating, "Cheating ruins the game experience for legitimate players.
read more "Blizzard Kicked Over 320,000 Hackers from Battle.net"

How to Convert Youtube Videos to mp3, mp4, 3gp, avi & mpeg Format

Alive YouTube Video Converter v2.3.0.8 | 3.37 MB

Alive YouTube Video Converter is a professional YouTube video downloader to download and convert youtube videos to popular formats directly, the output formats include AVI, MPEG, MP4, DivX, XviD, ASF, WMV, MOV, QuickTime, VOB, iPod, PSP, 3GP, iPhone, Zune, MP3, AAC, AC3 and M4A. So you are able to burn a CD or DVD for those videos, copy them to other computer, or upload them onto your iPod/iPhone, mobile phone, PocketPC, PDA, PSP or any other portable devices.

Alive YouTube Video Converter is a multi-thread program and supports batch conversion. This feature lets you download and convert diferrent videos at the same time. In addition, The intuitive interface makes Alive iPod Video Converter the perfect tool for both new and experienced users. It gives advanced users the ability to convert youtube videos with width*height, video size, bit rate, and frame rate adjusting! It makes downloading videos from the internet and watching them from your PC, cell phone, iPod, PSP, Zune, MP4 player or TV quick and easy.


read more "How to Convert Youtube Videos to mp3, mp4, 3gp, avi & mpeg Format"

WIFI Hacking Software Free Download

This tool has many different tools to hack and cr@ck wifi so you can use your neighbours internet and do whatever. Tools for Windows and Linux also some nice extra tools!

Windows

* Aircrack
* Wireshark
* Ettercap
* Netstumbler
* Airsnare
* WIFIfofum
* Wdriver
* Pong
* CommView
* Airsnort
* AiroPeek
* Knsgem 2
* Aptools
* And A Nice PDF File

Linux Hacks:

* Airpwn
* WEPcrack
* Prismstumbler
* WIFIscanner
* Airfart
* Magicmap
* WPA-cracker
* Wellenreiter
* Void
* Kismet
* Cowpatty
* WIFIzoo
* And A Nice PDF File

read more "WIFI Hacking Software Free Download"

Sunday, April 25, 2010

Apple imposes lifetime ban for purchasing iPads (to a blogger ofcourse)

A blogger who goes by the name of “Protocol snow” has been banned by Apple for buying iPads.The story goes like this, as Apple launched iPads and people went crazy for it, there was a shortage of iPads all over the world. Since Mr Snow was lucky enough to live near an Apple store which had plenty of iPads available, and “coincidently” was a member of NeoGaf gaming forums, he ordered iPads and decided to sell and ship them to his fellow NeoGAFians by covering all the shipping costs,tax,Paypal insurance fees along with the iPad. The prices were quite reasonable and he limited his purchases to no more than 2 per day because he heard that there was a limit per person.
no more Apple iPads for Mr Snow - theprohack.com
Then he went shit out of luck on April 17, when Mr Snow’s fateful visit at Apple store limited his purchases to an end for the rest for his life. The unexpected conversation between Mr Snow (Me) and Apple folks (Guy#1, Guy#2),that concluded his ban went like this -
Me (nonchalantly) — “Is there an issue?”
Guy #2 — “There is a limit to the number of iPads that customers can buy.”
Me (playing dumb) — “Oh, is that right? What’s the limit?”
Guy #2 — “Only 2 per customer.”
Guy #1 — “I’m sorry sir, but you have reached your lifetime limit of iPad purchases and will not be allowed to buy any more.”
Me (anticipating that statement) — “Is the iPad limit per person? Per credit card? Per household?”
Guy #1 — “All I can say is that you have reached your lifetime limit.”
Me — “What does that mean? Can I use a different credit card to buy it? I’m buying this for a friend.”
Guy #1 — “You are not allowed to buy this iPad.”
Me — “Uhh… is it ok if I have a family member or friend come to buy it for me? My reservation doesn’t expire until 6:00 PM.”
Guy #1 — “All I can say is that you have reached your lifetime limit.”
Me (suddenly realizing what he’s saying) — “Wait, what? Lifetime? What does that mean?”
Guy #1 — “All I can say is that you have reached your lifetime limit of iPads and will not be allowed to buy any more.”
Me — “I’m banned from buying iPads? I know there’s a shortage right now, but I can’t buy any more once there’s plenty of stock?”
Guy #1 — “All I can say is that you have reached your lifetime limit.”
Me — “Ok buddy, I’m not going to make a scene so I’m leaving. How many iPads is the limit by the way?”
Guy #1 — “That information is not available.”
Me (looking at Guy #2, who has been silent this whole time) — “He tells me that the limit is two.”
Guy #1 — “I wish I could say but I do not have that information.”
Me — “I’ve already purchased more than 2 iPads. Why didn’t anybody else stop me in the past?”
Guy #1 — “I wish I could say but I do not have that information.”
Me — “Alright, I’ve had enough. Have a good day.”
Guess Apple is tightening its grip on iPad and is reworking its watch on the grey market. Meanwhile, Mr Snow’s blog has been hammered by 240 plus comments and shit load of traffic :)

Like This post ?  You can buy me a Beer :)

Posted by XERO. ALL RIGHTS RESERVED.

read more "Apple imposes lifetime ban for purchasing iPads (to a blogger ofcourse)"

Saturday, April 24, 2010

Blackhat Search Engine Optimisation (SEO) Techniques

How hackers exploit hot trending news stories using blackhat search engine optimisation (SEO) techniques to poison search engine results ??

Often this is with the intention of spreading scareware (also known as fake anti-virus attacks).

In fact, SEO poisoning is one of the major methods of attack that we are seeing being used by online criminals at the moment.
Fraser and Onur in our labs have written an excellent technical paper (PDF) which discusses the problem, and lifts the lid on how the bad guys are using automated kits to do their dirty work for them.


It's a great read. Check it out now.
read more "Blackhat Search Engine Optimisation (SEO) Techniques"

McAfee False-Positive Attack: Exploited By Hackers

Criminals have been keen to take advantage of the critical update bug that affected McAfee users in the past few days.

A false-positive in McAfee's detection of the Wecorl.A virus caused hundreds of thousands of computers around the world to repeatedly reboot themselves, as the antivirus software mistakenly zapped the critical svchost.exe file.

To its credit, McAfee is discussing the problem on its online community forum, has apologized, withdrawn the buggy update, and advised customers on how to manually fix the affected computers.

But that hasn't stopped blackhat SEO hackers from creating poisoned Web pages that appear high in the search rankings if you hunt for information on the McAfee false-positive.

Clicking on one of these dangerous links can take you to a Website that harbors the Mal/FakeAV-BW scareware (also known as fake antivirus) attack, designed to trick you into believing you have a serious security problem on your computer -- and urging you to purchase or install other code from the hackers behind the scam.

If you have suffered from the false positive, then I suggest you visit McAfee's Website for advice -- and not to go clicking on unknown links.

More details about the fake antivirus attack associated with the McAfee false alarm can be found on this blog.
read more "McAfee False-Positive Attack: Exploited By Hackers"

Friday, April 23, 2010

Windows XP Hacking Tricks Download EBook



DOWNLOAD HERE

Password: www.freehacking.net

If you face any problem, leave a comment here.
read more "Windows XP Hacking Tricks Download EBook"

Google Hacks Download in PDF

Google Hacks
By Paul Bausch, Tara Calishain, Rael Dornfest

Publisher: O'Reilly
Pub Date: August 2006
Print ISBN-10: 0-596-52706-3
Print ISBN-13: 978-0-59-652706-8
Pages: 543

Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information.

Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them. We've found ways to get these new services to do even more.

The expanded third edition of Google Hacks is a brand-new and infinitely more useful book for this powerful search engine. You'll not only find dozens of hacks for the new Google services, but plenty of updated tips, tricks and scripts for hacking the old ones. Now you can make a Google Earth movie, visualize your web site traffic with Google Analytics, post pictures to your blog with Picasa, or access Gmail in your favorite email client. Industrial strength and real-world tested, this new collection enables you to mine a ton of information within Google's reach. And have a lot of fun while doing it:

  • Search Google over IM with a Google Talk bot
  • Build a customized Google Map and add it to your own web site
  • Cover your searching tracks and take back your browsing privacy
  • Turn any Google query into an RSS feed that you can monitor in Google Reader or the newsreader of your choice
  • Keep tabs on blogs in new, useful ways
  • Turn Gmail into an external hard drive for Windows, Mac, or Linux
  • Beef up your web pages with search, ads, news feeds, and more
  • Program Google with the Google API and language of your choice

For those of you concerned about Google as an emerging Big Brother, this new edition also offers advice and concrete tips for protecting your privacy. Get into the world of Google and bend it to your will!

DOWNLOAD HERE

Password: www.freehacking.net

If you face any problem, leave a comment here
read more "Google Hacks Download in PDF"

Google Hacking for Penetration Testers EBook Download







Password: www.freehacking.net

If you face any problem in downloading, just leave a comment here.
read more "Google Hacking for Penetration Testers EBook Download"

How to Hack Mobile Phones & Reveal Mobile Phone Data

Researchers in the US have shown that owing to the way GSM mobile networks work, it's possible to track down the number of almost anyone, and find out where they are.

In what sounds like a stalkers dream, researchers built on information released in 2008 by Tobias Engel, showing how to gain access to mobile network databases in order to track mobile phones. This time, however, researchers from mobile security firm iSec Partners demonstrated that it was possible to track a single mobile phone user, even without knowing his or her number. They were also able to gain access to other information which most mobile users assume is secure.

Commenting on the revelation, Nick DePetrillo of iSec said:  "The scary thing is that you can give me a random cellphone number and I can tell you, usually, who owns it. So if I want to find Brad Pitt's number I can dump all the cellular phone caller ID information out of California and hunt for his number."

The hack works by utilising the GSM caller-ID system, tricking it into creating a full directory of almost every mobile number. Further crunching of that data then allowed the researchers to figure out which individuals are associated with what numbers; and furthermore access to the 'home location register' which allows mobile providers to find any handset in order to communicate with it. And because the hack uses base functionality of the network - i.e the ability to route calls and data to a handset regardless of its location, by knowing where it is, there is no way to restrict the information without preventing the network from doing its job.

Chris Paget, of reverse-engineering consultancy company H4RDW4RE commented: "They've discovered some pretty scary stuff. They looked behind the towers and found a whole other wrongness. You're literally down to the situation where you can't be secure unless you pull the battery out of your phone."
read more "How to Hack Mobile Phones & Reveal Mobile Phone Data"

Hackers Selling 1.5 Million Social Networking Accounts

Cyber criminals are selling on data from social networking accounts to help the spread of malware and money scams.

Social networking accounts are a favoured target for cyber criminals, and a report released today has shown the crime is going global.

iDefense, the cyber security intelligence division of VeriSign, has discovered that more than 1.5 million account details are being put up for sale by hackers on just one online forum called “kirllos” as the black market for personal data continues to explode.

“The trend for harvesting information from social networking sites has been around for some time now, however cyber criminals typically limited their attacks to social media sites within their own geography,” said Rick Howard, director of intelligence at iDefense.

“However the increasing exploitation of users of popular international platforms is important as it signifies that criminals are becoming more and more internationalised – these sites provide a convenient platform for criminals to expand their trade around the globe.”

Prices for the data can vary depending on how many contacts the user has on their account, ranging from $25 (£16) per 1,000 accounts with 10 contacts or less to $45 for accounts with over 10 online friends.

Even accounts where the user has no contacts are still popular sellers as they can help with the spread of malware through friend finder tools and friend requests.

The data stolen can then enable criminals to commit money scams and data mining as well as start malware or spam campaigns.

Howard warned users of social networking sites to be vigilant with their privacy measures and to immediately report any unusual activity to the website in question.

SOURCE
read more "Hackers Selling 1.5 Million Social Networking Accounts"

PayPal Patches Critical Security Vulnerabilities

PayPal in the news again for a series of fairly high-profile vulnerabilities discovered by the same guy that found the XSS bugs in Google Calendar and Twitter (Nir Goldshlager).

The volume of monetary transactions that pass through their site on a daily basis is huge. It’s still the leading payment processing solution, especially for International transactions.

Seems to be more on the business side rather than effecting users, but exposing so much customer is never a good thing.

A security researcher has uncovered multiple vulnerabilities affecting PayPal, the most critical of which could have enabled attackers to access PayPal’s business and premier reports back-end system.

The vulnerabilities were patched recently by PayPal after security researcher Nir Goldshlager of Avnet
Technologies brought the vulnerabilities to the site’s attention. The most critical bug was a permission flow problem in business.paypal.com, and could have potentially exposed a massive amount of customer data.

“An attacker was able to access and watch any other user’s financial, orders and report information with unauthorized access to the report backend application,” Goldshlager explained. “When users have a premier account or business account the transaction details of their orders are saved in the reports application … an attacker can look at any finance reports of premier or business accounts in the PayPal reports application and get a full month [and] day summary of the orders reports.”

That includes information such as the PayPal buyer’s full shipping address, the PayPal transaction ID of the buyer and the date and amount of transaction.

It’s good to see responsible disclosure by the researcher and swift action on behalf of PayPal fixing the flaws. It seems pretty rare these days with the walls of bullshit companies push our via their PR/comms channels try to create enough smoke and mirrors to distract everyone from the real issues.

Hijacking a users account on PayPal is a pretty serious issue as the attacker could simply transfer all the persons funds to their own account, if they weren’t very active they wouldn’t even notice. Even more dangerous if their account is linked to a Credit or Debit card.

The other vulnerabilities Goldshlager found included an XSS (cross-site scripting) vulnerability affecting the paypal.com and business.paypal.com sites that an attacker could use to steal session IDs and hijack user accounts, as well as a CSRF (cross-site request forgery) bug that exposed user account information. The CSRF vulnerability impacts the IPN (Instant Payment Notification) system, a PayPal service that sends a message once a transaction has taken place.

Once IPN is integrated, sellers can automate their back offices so they don’t have to wait for payments to come in to fulfill orders, Goldshlager explained.

“This CSRF exploit method exposes the same information from the buyer as the first vulnerability … to exploit a CSRF attack that adds a Instant Payment Notification access, the attacker will make an attack that adds his own Website address to the victim account IPN settings, and when there is transaction on PayPal the victim’s transaction details will be sent to the attacker’s Website,” he said.

The IPN issue is dangerous too as you could develop some software to place bogus orders on ecommerce sites then generate a fake IPN back to the site to get the goods for free without any actual payment taking place.

Some other minor CSRF flaws were also discovered, but according to Paypal ‘nearly all‘ have been fixed.

SOURCE
read more "PayPal Patches Critical Security Vulnerabilities"

Facebook Password Hack: County Commissioner Tom Keigher's Computer Infected With a Virus

One look at Tom Keigher's Facebook page and it's pretty clear something went wrong.

"Mr. Keigher sir you have been hacked," one friend posted.

"Looks like Nancy Pelosi is running your FB (Facebook)," another wrote.

Last week, many of Keigher's Facebook friends received posts from the conservative Gaston County commissioner with derogatory or offensive comments.

At the same time, hundreds of his friends and constituents received a note from an e-mail address that claimed to belong to Keigher. It endorsed his Republican opponent in the upcoming May 4 primary election, and claimed that Keigher likes to raise taxes. The address was not Keigher's, but it was similar, and whoever sent the e-mail clearly had access to Keigher's address book.

His opponent Jack Brown said, "My folks, I'm sure, didn't do anything like that."

Keigher agrees.

He suspects the hacking is related to a burglary at his home this fall. Several computers were stolen and Keigher thinks the thieves accessed his accounts.

"Just some small, little person that wanted to make fun of my nearly 12 years of service," he said.

"It's just not me, anybody that knows me knows it's not coming from me but those that really don’t know me," Keigher said, "that's where the damage is done, and I feel bad for those people. I apologize for the inconvenience, but it's nothing I had any control over. I didn’t do it, and it's just all bogus."

Keigher said his computer is infected with a virus. County IT officials have taken it and are working to repair it.
read more "Facebook Password Hack: County Commissioner Tom Keigher's Computer Infected With a Virus"

Cyber Crime in UK Hitting Small Business

Small businesses thinking of making the move to accept payments from customers via the internet need to seek advice before doing so, according to Tony Neate, managing director of Get Safe Online.

Research taken by the organisation reveals that 44 per cent of small businesses in the UK have been a victim of cybercrime, including internet scams, identity fraud, phishing and data theft. Of those businesses affected, more than a third (36 per cent) had suffered a computer virus and almost one in five (18 per cent) had been a victim of internet scams such as phishing, spyware or hacking in the last two years.

In such an environment, Mr Neate said that as soon as your company is responsible for handling other people’s confidential information, then new rules and regulations come in to play.

He reveals that there are now regulations that have been brought in by the credit card companies, and small business outfits probably need to have a look at those because they will likely be imposed on them as a result of taking credit card details.

The message is that if you are not an expert in relation to computers and computer security and you have your own e-commerce site or server, then you need to get advice. Furthermore, if you are taking people’s credit card details and transacting online, make sure you have listened to the correct advice.

However, Get Safe Online reveals only five per cent of small businesses have access to dedicated IT support, either internally or via an outsourced provider. Instead, many business owners have to take it upon themselves to keep up with the latest online security issues. Of those who had experienced online crime or other IT-related problems, almost a fifth (19 per cent) said they lost revenue as a result of downtime – the average figure cited as £1,540 – or an estimated £750 million in losses across the UK small business population as a whole.

Furthermore 60 per cent of small businesses said they would grind to a halt altogether if their PCs were taken down by cybercrime or IT related issues.

While businesses must look at access control, data encryption and secure password practices, as well as looking at other measures such as staff training, it’s also important to remember that by taking a few simple precautions should mean that online risks needn’t overshadow the huge benefits that the internet brings to UK businesses.
read more "Cyber Crime in UK Hitting Small Business"

Thursday, April 22, 2010

WEP Cracking: Wireless Hacking Live CD Download (FBI Version)


This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
  • Live CD with all the tools you need to hack a WLAN / wireless Access point. Linux Live-CD OS runs from CD. 635 MB ISO.
  • Also used by the FBI
WEP Hacking. The Next Generation

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104. The IV is placed in encrypted frames header, and is transmitted in plain text.

Traditionally, cracking WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets. A process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, It doesĆ¢€™nt matter if you use 128 bit WEP keys, you are vulnerable!

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.

WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.

A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104.

The IV is placed in encrypted frames header, and is transmitted in plain text.

Traditionally, cracking WEP keys has been a slow and boring process.

An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.

After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.

This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.

How to use?

1) Boot from cd
2) Get the wep key
3) Write it down
4) Reboot into windows
5) Connect using wep key.

    read more "WEP Cracking: Wireless Hacking Live CD Download (FBI Version)"

    Wednesday, April 21, 2010

    Zeus Botnet in Action Exploiting PDF for Hacking


    Botnet are exploiting an Adobe's PDF vulnerability and are using PDF documents for the "Launch" design flaw to spread the malware onto computers.

    The virus infects the computer when the users open an email with the attached PDF file. Once the computer is infected to sends sensitive information to malware creators somewhere in China.

    A spokesperson for the Websense, a security firm that detected the hacking warned people against opening PDF file attachment email with the name Royal_Mail_Delivery_Notice. pdf.

    Dan Hubbard, CTO of Websense said, "When recipients open the PDF, it asks to save the file. The user falsely assumes that the file is just a PDF, and, therefore, safe to store on the local computer. The file, however, is really a virus. The malicious PDF launches the dropped file, taking control of the computer. It was discovered that the latest anti-viruses have an 80% chance of mistaking the file as a harmless one."

    Zeus is the first major malware to exploit the PDF format /Launch feature. The flaw is not security vulnerability but actually a by-design function of the program. Belgium researcher Didier Stevens had earlier showed how a multistage attack could exploit /Launch.

    The users can protect their computer by disabling Javascript or the launch feature within Adobe Reader. Both the Reader and Acrobat display a warning when an executable inside a PDF file is launched.


    A demo video of this attack can be viewed here

    read more "Zeus Botnet in Action Exploiting PDF for Hacking"

    How to Trace IP Address Location From Email, Gmail, Hotmail, MSN & Yahoo Mail

    This Guest post has been shared by Mr.Amey. He and his friends running a very good technology blog

    We will explain how you can track your friends IP address. You will need to do some social engineering in this trick. You will need to ask your friend to mail you something or send him some mail to which he will reply.

    Now there can be two scenarios. Your friends/victims IP can be static or dynamic.

    Scenario 1: Static IP

    Static IP is assigned by the ISP to a specific user, that is, you have one unique IP whenever you log on to the internet. In this case, here's how you can find the IP. We will consider three major email services, viz. gmail, yahoo and hotmail.

    Gmail:

    Open the mail you have recieved from your friend and click on the down arrow to the right of the reply button. Now click on Show Original.
    You will get to see the complete headers of the mail from which you have to find the IP from which this mail was sent. Mostly in case of a static IP, the IP is shown as in the figure

    Hotmail:

    Right click on the recieved mail and select 'view message source'


    You will get the complete message with source. This is how the originating IP looks in hotmail
    Yahoo:

    Open the mail and at the right bottom of the mail, click on 'Full headers'

    Again over here you will get to see the IP in the same format as in hotmail and gmail, shown above.

    Scenario 2: Dynamic IP

    In case of dynamic IP, hotmail and yahoo wont help much. Whereas Gmail shows the private IP of the sender. Just follow the procedure above as shown for static. On the source page you have to look for the following:



    Here the IP 10.141.12.9 is the private IP of our victim. This is how you can get IP information of victims behind subnets. Well sometimes the private is not shown by any of the email services because instead of sending detailed email information a DKIM-signature is sent for authentication.

    There are other numerous ways using which we can track our victims IP. Will soon be posting on that. Stay subscribed. Till then..

    Happy Tracking!!!


    read more "How to Trace IP Address Location From Email, Gmail, Hotmail, MSN & Yahoo Mail"

    Tuesday, April 20, 2010

    Fans go Gaga over Marvel Vs Capcom 3

    At Captivate 2010, fighting crossover giant Capcom has announced what fans have been wanting form a long time – Marvel vs Capcom 3. For those who don't know what it is all about, its the series that defined crossover fighting games and is the fifth installment in its series. As usual, the game will feature a whole array of Marvel and Capcom characters including fan favorites Ryu, Morrigan from Capcom fighting roster and Wolverine,Hulk,IronMan from Marvel’s side. The best part? Chris Redfield is included in the upcoming installment and trust me, its going to be awsummmm !!!! MVC3 is the first to feature 3D graphics in its series and like its predecessor, will be featuring a 3-on-3 tag-team based fighting system. The game will be powered by Capcom’s MT framework engine which has previously illustrated its prowess in Resident Evil 5, Devil may Cry 4 and Lost Planet.

    Marvel vs Capcom 3 - theprohack.com

    On a personal note, I prefer Street Fighter more..but I m a fighting game junkie and I still remember duking out with my friends in Marvel vs Capcom 2 and the whole experience wants some more bashing :)

    MVC3 will be released on PS3 and Xbox 360..Who knows it might also be released on PC too, as its powered by MT framework and we already have Street Fighter 4 with us.

    You can check out the cool trailer below :)

     

    Like This post ?  You can buy me a Beer :)

     

    Posted by XERO. ALL RIGHTS RESERVED.

    read more "Fans go Gaga over Marvel Vs Capcom 3"

    Facebook Password Cracker | Hack Facebook Account Using Keylogger

    The first line of defense for many computers is a password. Although passwords restrict access to a computer, they're the weakest link in any security system. The most secure passwords are lengthy, consisting of random characters, but most people tend to choose simple, easy-to-remember passwords and use the same password for several different systems.


    Also visit here:
    When a computer requires a password, but you don't know what that password may be, you have several options:
    • Steal a valid password
    • Guess the password
    • Discover the password with a brute-force attack
    Stealing a password

    If you can get physical access to a computer, the easiest way to steal a password is by shoulder surfing-peeking over someone's shoulder as they type in a password. If that option isn't available, poke around the person's desk. Most people find passwords hard to remember, so they often write them down and store them where they can easily find them, like next to their monitor or inside their desk drawer.

    Still can't find that pesky password? Try one of these methods:
    • keystroke logger
    • desktop-monitoring program
    • remote desktop-monitoring program
    • password-recovery program
    Note - All of these programs require that you have access to the victim's computer so you can install or run the programs without the user's knowledge.

    Using a keystroke recorder or logger

    Keystroke recorders or loggers record everything a person types, and either sends their typing to a monitoring computer or saves it to a file. The simplest keystroke loggers record anything a user types which can include incriminating email messages, credit card numbers, and passwords. When the user leaves the target computer, you can remove the keystroke logging program from their machine and retrieve the logging file that contains the password and anything else they typed. The more advanced keystroke loggers can email the log file of a user's keystrokes to you so you can monitor their activities from another location.

    To avoid detection, keystroke loggers run in stealth mode, which means that they hide their presence from the user, although they can still be spotted if you know what and where to look. Unless someone suspects that someone has planted a keystroke logger on their computer, chances are good they will never look for, let alone find, a keystroke logger hidden in stealth mode.

    To avoid giving away their presence at all, some keystroke loggers are available as hardware devices that plug in between the computer and the keyboard. Such hardware keystroke loggers can be spotted easily just by looking at the back of the computer, but their presence is completely invisible to any software running on that computer. Best of all, unlike their software equivalents that only work under specific operating systems, hardware keystroke loggers work with any operating system running on that computer, such as FreeBSD, Linux, Windows XP, or OS/2.

    Some popular hardware keystroke loggers include KeyGhost (http://www.keyghost.com), Hardware KeyLogger (http://www.amecisco.com), and KEYKatcher (http://www.tbotech.com/key-katcher.htm). To find a software keystroke logger, visit Keylogger.org (http://www.keylogger.org), which rates the different keystroke loggers by their features and ease of use.

    Spying with a desktop-monitoring program

    More powerful than keystroke loggers are desktop-monitoring programs. Like a computer surveillance camera, desktop-monitoring programs secretly record the programs a person uses, how long the person uses each program, the websites viewed, and every keystroke the user types. To show you what a user might be doing, some desktop-monitoring programs can periodically capture the contents of the screen or secretly turn on a webcam to record the person sitting in front of the computer.

    Many desktop-monitoring programs can store days of recordings, and some can be set to record at specifically designated times, when certain applications are run, or when a user logs on to the Internet.

    To find a desktop-monitoring program, visit Computer Monitoring Software http://www.computer-monitoring.com or try these programs:
    1. AppsTraka http://appstraka.hypermart.net
    2. Desktop Surveillance http://www.omniquad.com
    3. iSpyNOW http://www.ispynow.com
    4. Net Vizor http://www.mi-inc.com/netvizor.htm
    5. Spector http://www.spectorsoft.com
    6. SpyBuddy http://www.agent-spy.com
    7. WinWhatWhere Investigator http://www.winwhatwhere.com
    8. WinGuardian http://www.webroot.com
    Remotely viewing another computer's desktop

    Desktop-monitoring programs are useful if you have regular access to the computer you want to watch. But if you don't, you can use a remote desktop-monitoring program instead. Just install a program such as Q-Peek (http://www.qpeek.com), Spector (http://www.netbus.org), or PC Spy (http://www.softdd.com) on the computer you want to monitor. Then, anything anyone types, views, or manipulates on that computer will appear live on your computer's screen.

    Using a password-recovery program

    Because typing a password over and over again to access a program can be a nuisance, many programs let you store passwords directly in the program, hidden behind a string of asterisks. Because people often forget these passwords and then can't access their programs or files, password-recovery programs have been developed to retrieve these lost or forgotten passwords. You can, of course, also use these programs to retrieve other people's passwords.

    There are many commercial and free versions of password-recovery programs, such as these:
    1. iOpus Password Recovery XP http://www.iopus.com
    2. Passware Kit http://www.lostpassword.com
    3. Peek-a-boo http://www.corteksoft.com
    4. Revelation http://www.snadboy.com
    Besides blocking access to a program, passwords can also block access to files, like WordPerfect documents or Microsoft Excel spreadsheets.
    1. AccessData http://www.accessdata.com
    2. Alpine Snow http://www.alpinesnow.com
    3. Crak Software http://www.crak.com
    4. ElcomSoft http://www.elcomsoft.com
    5. Password Crackers http://www.pwcrack.com
    6. Passware http://www.lostpassword.com
    Guess a password with a dictionary attack

    Most people choose easy-to-remember passwords, which means the odds that someone will choose an ordinary word for a password are extremely high. To find passwords that use ordinary words, hackers have created special password-cracking programs that use dictionary files (sometimes called word lists), which contain actors' names, names of popular cartoon characters, popular rock bands, Star Trek jargon, common male and female names, technology-related words, and other common words found in most dictionaries.

    The password-cracking program takes a word from the dictionary file and tries this word as a password to access a computer. If the first word isn't the right password, the password-cracking program tries another word from its dictionary list until it either finds the right password or runs out of words. If the password works, you have access to the program you want. Of course, if it runs out of words in its dictionary file, you can try another dictionary file until you find a valid password or run out of dictionary files. If a password is an ordinary word, it's only a matter of time before a dictionary attack will uncover it.

    To increase the odds of uncovering a password, some password-cracking programs will not only try every word in a dictionary file, but also subtle variations of each word, such as spelling the word backwards or adding different numbers on the end. So even though a password like SNOOPY12 won't be found in an ordinary dictionary file, the password-cracking program can still uncover this password by manipulating each word in its dictionary file.

    For an example of a dictionary attack tool sold commercially for people to test the security of their networks, visit SolarWinds (http://solarwinds.net). For one of the largest collections of word lists, visit the Wordlist Project (http://wordlists.securityon.net), which offers word lists in various languages, including English, Spanish, Japanese, and Russian.

    Brute-force password attacks

    Dictionary attacks can find ordinary words or variations of words, but sometimes a password may consist of random characters. In these cases, the only solution is to use a brute-force attack.

    As the name implies, a brute-force attack is like prying a password out of a computer by smashing it with a sledgehammer. Instead of trying common words that most people use as passwords, the brute-force method simply tries every possible combination of characters in varying lengths. So, if someone's password is as obscure as NI8$FQ2, a brute-force attack will find that password (and every other password on that computer) eventually.

    Brute-force attacks are especially popular when cracking Unix systems, because most Unix systems store the list of account names and passwords in the /etc/passwd file. To provide a small degree of security, Unix encrypts each person's password using an encryption algorithm (also called a hash function), usually using the Data Encryption Standard (DES).

    To gain access to Unix computers, hackers simply copy the /etc/passwd file to their own computer so that they can run a dictionary or brute-force attack on that file at their convenience, without risk of being spotted. With a copy of the passwd file on their own computer, hackers can take as much time as they need until either the dictionary or brute-force attack succeeds. Once it finds just one password, the hacker can use that password to gain access to that unlucky person's account.

    To find password-cracking programs that use word-list or brute-force attacks, visit these sites:
    1. BlackCode http://www.blackcode.com
    2. AntiOnline http://www.antionline.com
    3. New Order http://neworder.box.sk
    OTHER USEFUL LINK RELATED TO THIS POST:


    read more "Facebook Password Cracker | Hack Facebook Account Using Keylogger"

    Zune HD Hacks Mods & Tricks | Download OpenZDK

    Zune HD is the only digital media player with a touchscreen, HD Radio, HD video out, and wireless sync.

    The guys at Zuneboards have released a first ever hack for the Microsoft Zune HD, named OpenZDK which allows full access to Zune hardware previously denied by XNA framework, this translates to the beginning of the development of third party apps and software like emulators, games etc just like the case is today with the jailbroken iPhone and iPod Touch. OpenZDK can be used to hack ZuneHD and all the previous Zune models.

    Download OpenZDK Quickstart Kit Edition 1

    OpenZDK allows developers to make applications using the powerful Tegra APX2600 graphics chip using custom vertex and fragment shaders with OpenGL ES 2.0, without any limitations imposed by closed Microsoft XNA Framework. Quickstart kit contains sample programs along with a 3D Demo showing the 3D graphics capability of the hacked Zune device.

    Download from OpenZDK from Hotfile, More download mirrors available here

    OpenZDK Torrent Download Link

    Find latest information about Zune HD Hacking at the Official ZunedevWiki


    read more "Zune HD Hacks Mods & Tricks | Download OpenZDK"