Showing posts with label bypass-firewall. Show all posts
Showing posts with label bypass-firewall. Show all posts

List-of-remote-Administration-Tools/Trojans


Remote Administration Tools/Trojans

  • [BUGFIX]SS-RAT 0.4 Final
  • A32s (fifth) RAT
  • Apocalypse 1.4.4
  • Arabian-Attacker v1.2.2
  • Arabian-Attacker v1.4.0


Unblocking download limits with MAC spoofing.



Every computer has various network interfaces on it like Ethernet card, Wireless card and other that allow it to communicate with the other computer on the internet. Each network interface on every computer on the internet has a unique MAC address or media Access control address. MAC addresses are defined by the manufacturer of the computer at the time of manufacturing. Different network interfaces on the same computer will usually have a different unique MAC addresses. It is possible to view the MAC addresses of your own machine by going to the MS DOS prompt and typing the command getmac –V:

how to unblock access to use ports



Unblocking access to use ports

Many system administrators block USB ports and do not allow users to use their personal USB pen drive on college or company computers. This can be quite annoying if you want to copy files back and forth or want to run applications from your pen drive. One of the most common techniques of blocking a pen drive is through the windows registry by following the below steps:

what is tails operating system



The tails operating system

The tails operating system (http://tails.boum.org) is available as a free download on the internet and has been specifically designed keeping security in mind. It is an OS that can run from a bootable live CD or pen drive and gives a user absolute anonymity on the internet. Not only does it protect your privacy on the internet, it can also be used to bypass restrictions that may have implemented by your local system administrator. Tails uses tor to provide users with secure encrypted anonymous access to the internet. It has various in built encryption capabilities which allow user to use encryption to store files, send instant message, do email and browser the internet. It is possible to install tails OS on a bootable CD instead of a pen drive, but I personally prefer using tail on a pen drive in such a manner that the pen drive is bootable is slightly complicated for newbie's and described in detail below:

The onion router (tor)



Tor stands for the onion router

Tor stands for the onion router and is free of charge software that is one of the best anonymity (obscurity), privacy and unblocking tools existing on the internet. Tor has thousands of volunteer relay servers in different parts of the world through which a user’s data is routed and completely anonymous. Not only does it defend your freedom on the internet by allowing you to access all your favorite websites on the internet, it keeps all your communications in the internet completely secure. It can be downloaded free off cost from https://www.torproject.org.

Archived pages



Archived pages


The cache pages and links on search engines give the most recent cached version of webpage. However, sometimes you may want to access an even older version of the same webpage for research purposed or just out of curiosity.oif you want to see what a webpage looked like several years ago, then there is a very cool tool called the WAYBACKMACHINE that is available for free at www.archive.org. Since the year 1996, archive.org has been spidering the internet with the intention of creating a permanent digital library of the internet for researches, historians and the general public. This is a fantastic tool that allows you to search for and view an old archived version of popu8lar WebPages on the internet from several months or even years back!