Live Ddos View

Live DDoS Attack Map | Apakau

Live DDoS Attack Map

This map is the fruit of collaboration between Google Ideas and Arbor Networks in an effort to raise awareness about distributed denial of service attacks in the world everyday.

Exploring the Data

The Digital Attack Map displays global DDoS activity on any given day. Attacks are displayed as dotted lines, scaled to size, and placed according to the source and destination countries of the attack traffic when known. Some features include:

  • Use the histogram at the bottom of the map to explore historical data.
  • Select a country to view DDoS activity to or from that country.
  • Use the color option to view attacks by class, duration, or source/destination port.
  • Use the news section to find online reports of attack activity from a specified time.
  • View the gallery to explore some examples of days with notable DDoS attacks.

Sign Up

Friday, February 6, 2015

IP Thief - Simple IP Stealer in PHP



A simple PHP script to capture the IP address of anyone that send the "imagen.php" file with the following options:

[+] It comes with an administrator to view and delete IP
[+] You can change the redirect URL image
[+] Can you see the country of the visitor

DownLoad Ip Theif Source by 劈水

Team Priv8 Squad!!! is Now Hiring Members !!!

Admin:



Introduction to Telnet And Hacking

What is Telnet?

Telnet is the basic hacking tool, which every hacker must know how to use before he can even think about Hacking. It can be used to connect to remote computers and to run commands by simply typing them in it's
window.Telnet does not use the resources of the client's computer but uses the resources of the server to which the client has connected.
Basically it is a program that you will be using to connect to your victim's computer. It just requires that you and your victim are both connected to the internet.



How can I connect to a remote computers using telnet?

Telnet can be started by going to start -> run and typing telnet Once the Telnet windows pops up click on Connect->RemoteSystem then in the host name type the host i.e. the IP address of the remote computer or
the website you want to connect to . Then in the Port select the port you want to connect to . You can only connect to ports which are open on the host computer.Almost always leave the TermType to vt100.We use
vt100 as it is compatible with most monitors . Then click connect and you will be connected to the remote machine in some time.

The syntax of the telnet command from DOS prompt is
C:\>telnet
By default port is taken as 23. Scroll down and read more about ports.

What is an IP Address?

Like in this world , everyone has a Home Address so that he can be contacted on that address , similarly all computers connected to the Internet are assigned a unique Internet Protocol or IP address which
can be used to contact that particular computer. An IP is simply the address of a particular computer . Every computer connected to the internet has a differnet IP address.
An IP address is of the form: xxx.xxx.xxx.xxx .You can find your own IP by going to start->run and typing winipcfg.If you need to connect to a your friend's computer then you need the IP address of his computer . There are many ways of finding out the IP address of a person's computer without letting him know.

Ping : 7
Systat : 11
Time : 13
NetStat : 15
SSH : 22
Telnet : 23
SMTP : 25
Whois : 43
Finger : 79
HTTP : 80
POP : 110

You can connect to a remote computer at a particular port. When you are connected to that port then you can interchange information related to that particular port only. Ports can be open or closed. If a particular
port of a computer is closed then you can not connect to that computer on that port. Generally most of the computers have atleast 5 or 6 ports open.


Whats a Daemon?

A daemon is a program that runs at ports. You can consider it to be a software that manages the flow of information through the port . All the ports can have different daemon / services running on them.

 Port Scanning ?

It is the first step in finding a hackable server running a daemon. Like softwares can have bugs , similarly daemons can have a hole or a vulnerability .A hacker can utilize this hole for his purpose.
Say you want to hack into someone's server , what do you do ? You need the IP address of the computer you want to connect to . This is the first basic step . Once you have the IP , you need to know
which port is open so that you can connect to it . Every port may not be open so you need to find out a list of open ports which are running a daemon.Once you have the list of open ports on the victims computer then you can connect to any one of those ports .For this purpose we have port scanners. You just need to feed the IP address into the port scanner and it will give you the list of all the open ports of that IP.Some port scanners,alongwith the list of open ports also gives the service running on each port and its vulnerabilities.
Once you have got the list of open ports then connect to each of them one by one and see what daemon or service they are running.

 But one thing you need to be careful about before port scanning is that most port scanners are very easily detected and can easily be traced and you have no excuse if you are caught doing a port scan.
It a sure sign of Hacker Activity and if the host is running the right kind of Sniffer software maybe Etherpeek then the Port scan can be easily detected and the IP of the user logged . Once your IP is logged then you can be easily traced thru you internet service provider, so be careful with port scanning.


Yoshimura Heikichi(Priv Squad Web Security)Add or change other names

C# Tutorials

The C# tutorials provide an overview of the basics of the language and identify important language features. Each tutorial includes one or more sample programs. The tutorials discuss the sample code plus provide additional background information. They also link to the corresponding sample abstract topics, where you can download and run the sample programs.
Note   The C# tutorials do not teach how to create a graphical user interface for your program like a Windows Form or a Web Forms page. To get started in that area, see the Visual C# Walkthroughs.


TutorialDescriptionLevel
Hello WorldShows a Hello World application.Simple
Command Line ParametersShows simple command-line processing; also shows array indexing.Simple
ArraysShows how to use arrays.Simple
PropertiesShows how properties are declared and used; also demonstrates abstract properties.Simple
LibrariesShows how to use compiler options to create a DLL library from multiple source files; also, how to use them in other programs.Simple
VersioningShows the use of override and new to support versioning.Simple
Collection ClassesShows how to make collection classes that can be used with foreach.Intermediate
StructsShows how to use structs in C#.Intermediate
IndexersShows how to use array notation to access an object.Intermediate
Indexed PropertiesShows how to implement a class that uses indexed properties. Indexed properties allow you to use a class that represents an array-like collection of several different kinds of things.Intermediate
User-Defined ConversionsShows how to define conversions to and from user-defined types.Intermediate
Operator OverloadingShows how user-defined classes can overload operators.Intermediate
DelegatesShows how delegates are declared, mapped, and combined.Intermediate
EventsShows how to use events in C#.Intermediate
Explicit Interface ImplementationDemonstrates how to explicitly implement interface members.Intermediate
Conditional MethodsDemonstrates conditional methods, which provide a powerful mechanism by which calls to methods can be included or omitted depending on whether a symbol is defined.Intermediate
XML DocumentationShows how to document code by using XML.Intermediate
Platform InvokeShows how to call platform invokes (exported DLL functions) from C#.Advanced
COM Interop Part 1Shows how to use C# to interoperate with COM objects. Covers a C# client.Advanced
COM Interop Part 2Shows how to use C# to interoperate with COM objects. Covers a C# server.Advanced
AttributesShows how to create custom attribute classes, use them in code, and query them through reflection.Advanced
SecurityDiscusses .NET Framework security and shows two ways to modify security permissions in C#: permission classes and permission attributes.Advanced
ThreadingDemonstrates various thread activities such as creating and executing a thread, synchronizing threads, interacting between threads, using a thread pool, and using a mutex object.Advanced
Unsafe CodeShows how to use pointers.Advanced
OLE DBShows how to use OLE DB in C# by connecting to a Microsoft Access database.Advanced