id33b1: KrackoWorld

sâmbătă, 2 iunie 2012

KrackoWorld

KrackoWorld


How to Track your Stolen Laptop?

Posted: 01 Jun 2012 11:03 AM PDT

Track laptop with PreyLast month i buy a new Dell Inspiron 15R Laptop worth Rs 45,000 from Dell showroom with Intel i5 processor and NVidia 1 Gb dedicated graphics. It was all possible with my own pocket money generated via this blog and thanking God/Parents for that. But sometimes i thought if my laptop gets stolen or lost, what should i do then? All my personal information and data gets erased for forever. This lead me to scroll at Google search engine again and successfully founded an result. Hence the result comes with an software named as Prey which is known to be a free stolen laptop tracking tool. So lets explore it in more details and learn how to use it for various safety measures in our future.

 

What is Prey?

Prey lets you keep track of your laptop, phone and tablet whenever stolen or missing -- easily and all in one place. It's lightweight, open source software that gives you full and remote control, 24/7. It helps you to find your stolen laptop by sending timed reports to your email with a lot of information includes general status of the computer, a list of running programs, active connections, Wi-Fi information, a screenshot of the running desktop and if your laptop has an integrated webcam it will include a picture of the thief also.

Salient Features of Prey:

1. 100% Geo-location aware

Prey uses either the device's GPS or the nearest Wi-Fi hotspots to triangulate and grab a fix on its location. It's shockingly accurate.

2. Know your enemy

Take a picture of the thief with your laptop's webcam so you know what he looks like and where he's hiding. Powerful evidence.

3. No unauthorized access

Fully lock down your PC, making it unusable unless a specific password is entered. The guy won't be able to do a thing!

4. Wi-Fi auto connect

If enabled, Prey will attempt to hook onto to the nearest open Wi-Fi hotspot when no Internet connection is found.

5. Watch their movements

Grab a screenshot of the active session -- if you're lucky you may catch the guy logged into his email or Facebook account!

6. Scan your hardware

Get a complete list of your PC's CPU, motherboard, RAM, and BIOS information. Works great when used with Active Mode.

7. Light as a feather

Prey has very few dependencies and doesn't even leave a memory footprint until activated. We care as much as you do.

8. Keep your data safe

Hide your Outlook or Thunderbird data and optionally remove your stored passwords, so no one will be able to look into your stuff.

9. Full auto updater

Prey can check its current version and automagically fetch and update itself, so you don't need to manually reinstall each time.

10. And many more…

How to Use it?

1. First of all download and install this software from here. It is also available for Mac users.

demo

2. Then open it and run. Now configure this soft with your name, device, email id and create a new account at Prey along with password.

3. All Done! Check your mail and confirm account respectively. After that, Login to your web panel and manage your settings as per your choice at prey.

How it Works?

prey-overview

Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic. This signal is sent either from the Internet or through an SMS message, and allows you to gather information regarding the device's location, hardware and network status, and optionally trigger specific actions on it.

What to do if laptop lost?

Just go to web panel and change the laptop status to missing. Select report timing, operating system and add webcam in modules. Then Save your all settings and check mail after 5 min.

Now Prey will try to hook onto the nearest open Wi-Fi hotspot when no internet connection is found, prey automatically communicate with web panel and check your status in panel. If panel showing missing status software automatically start working in your laptop. It will take details of your laptop like opened software details, network details, screen shot and take a picture of the thief with your laptops webcam so you know what he looks like and where he's hiding and send to your email id already configured in this software. Pray also hide your Outlook or Thunderbird data from thief. Hence you will get the stolen details in your mail ID by which your laptop thief can be detected very easily. Enjoy freedom!

I Hope this article will be very helpful to the Hostel boys in their college. Please share and award proper credits to this blog.

What is Tabnabbing and How to Hack Account Passwords using it?

Posted: 01 Jun 2012 02:06 AM PDT

tabnabbingHi friends how are you? I hope all are fine and enjoying these summer days very much. Today i focus on a new topic which is known to be Tabnabbing- A New Type of Phishing Attack. Well Tabnabbing is a computer exploit and phishing attack, which persuades users to submit their login details and passwords to popular websites by impersonating those sites and convincing the user that the site is genuine. In other words, It basically refers to a website that is changing its look and feels to a fake website after some time of inactivity. It is about a page we've been looking at, but will change behind our backs, when we aren't looking. These attacks are commonly target towards Online Banking websites.

PS: Before reading this TUT in more details, i personally recommend to read my previous article on Hack Orkut,Facebook,Gmail,Yahoo Accounts via Phishing Attacks to better understand the concept.

Tabnabbing- Video Tutorial:

 

How it Works:

This attacks works when a user opens multiple tabs.

    • When User navigates to attacker normal looking page.
    • When User switches to another tab, the attacker redirect their site to a phishing page.
    • When User came back to attacker page, they'll see the phishing page.(User assumed he open the site previously)
    • User entered their login information and this login information is sent to your server and the phishing page is login successful, so the user don't have any clue that their information was hacked.

How to Protect Against Tabnabbing:

Below are some quick and reliable steps to safeguard us from this type of attack.

  • Install The NoScript extension for Mozilla Firefox which defends both from the JavaScript-based and from the scriptless attack, based on meta refresh, by preventing inactive tabs from changing the location of the page.
  • Always Use Anti Phishing Mozilla Firefox Add-ons like Wot, Don't Phish me, FirePhish etc.
  • Make an habit to check the Address Bar always before login.
  • Never open or click any hide link plus ignore pop ups message box.

That's it! Any Doubts and queries are Welcomed below.

Niciun comentariu:

Trimiteți un comentariu