Saturday, 31 December 2011

How to Like all things on a Facebook Wall at Once

You Can Like All Status/Links/Updates with Single Link…Very Easy


Method 1 :
[With Google ChromeExtention]
You must Need a Google Chrome Browser For This Method.
1) Go to http://www.chromeextensions.org/social-communications/facebook-like-all/ and Install This Extention into your Google Chrome Browser
2) After Installation Go to any wall and click on like button from chrome see screenshots below

Method 2:
[With Greasemonkey on Firefox]
1) Go to http://addons.mozilla.org/en-US/firefox/addon/greasemonkey/ and Install GreaseMonkey FireFox Addon its almost Free.
2) After Installation 1st Start your FireFox Browser. (its Recomended)
3) After Restart http://userscripts.org/scripts/show/120770 and Install this Script
4) Now go to any Facebook Wall
you can see a popup at the end of page left side
Happy Tweaking :)

Google servers as a DDoS tool

Google’s servers can be used by cyber attackers to launch DDoS attacks, claims Simone “R00T_ATI” Quatrini, a penetration tester for Italian security consulting firm AIR Sicurezza Quatrini discovered that two vulnerable pages – /_/sharebox/linkpreview/ and gadgets/proxy? – can be used to request any file type, which Google+ will download and show – even if the attacker isn’t logged into Google+. By making many such request simultaneously – which he managed to do by using a shell script he’s written – he practically used Google’s bandwidth to orchestrate a small DDoS attack against a server he owns. He points out that his home bandwidth can’t exceed 6Mbps, and that the use of Google’s server resulted in an output bandwidth of at least 91Mbps. “The advantage of using Google and make requests through their servers, is to be even more anonymous when you attack some site (TOR+This method); The funny thing is that apache will log Google IPs,” says Quatrini. “But beware: igadgets/proxy? will send your IP in apache log, if you want to attack, you’ll need to use /_/sharebox/linkpreview/.” He says he has discovered the flaws that allow the attack and contacted Google’s Security center about it. After 19 days of receiving no reply from Google, he published his findings.

Researcher reveals flaw in Wi-Fi Protected Setup


Security researcher Stefan Viehbock has found a major flaw in Wi-Fi Protected Setup that can enable access to PIN-protected networks in just a few hours.
Security researcher Stefan Viehbock has revealed a flaw with Wi-Fi Protected Setup that could enable attackers to brute-force their way into PIN-protected networks in a short period of time. Although WPS-enabled routers can be protected by 8-digit pins, Viehbock’s attack works by exploiting poor design decisions in the WPS handshaking process that reduces the number of possibilities. Instead of having to test 108 combinations, the attack code really only has to try about 11,000.
Viehbock reported the vulnerability to the U.S. Computer Emergency Readiness Team (US-CERT) (which released a vulnerability note yesterday), and earlier this month contacted makers of routers confirmed to be vulnerable to the attack. However, Viehbock says no hotspot makers have issued fixes.
“To my knowledge none of the vendors have reacted and released firmware with mitigations in place,” Viehbock wrote in his blog. Routers affected include models made by D-Link, Belkin, Linksys, Netgear, ZyXel, TP-Link, Technicolor, and Buffalo.
Wi-Fi Protected Setup

You Can Download A Recent Tool Released Which Exploits This Vulnerability HERE

Related Posts Plugin for WordPress, Blogger...