Thursday, May 22, 2014

Airtel Night Store Offers Unlimited Plan and Data Pack



Airtel has launched Night Store for its prepaid customers. The Night Store includes various unlimited voice and data night packs between the price ranges of Rs. 7 to Rs. 49. All the packs in the Airtel Night Store are valid between 12 midnight and 6AM.

Rs. 7 - Unlimited Local Airtel to Airtel Calls
Rs. 8 - Unlimited 2G internet
Rs. 15 - Unlimited Local A2A Calls + Unlimited 2G
Rs. 29 - 500 MB 3G Data
Rs. 49 - 1GB 3G Data
Rs. 1  - Unlimited Facebook Access (3G Speed upto 250 MB and throttling post that)

How to Activate Plan -
1. Open Airtel Official Website Click Here then Choose Your Circle and Click on Select your Night Pack.

2. Choose your plan from the Plan List and Click on Active.

3. Write Your Mobile Number and Email ID then Click on Proceed

4. Click on Confirm

5. Wait a second you will get a One Time Password (OTP) on your mobile number. Write your OTP and check Term & Condition box then Click on Submit
*Amount of the pack will be deduct from main balance. It means you have to maintain sufficient balance in your mobile number for recharging Airtel Night Store.

You can also activate these packs through USSD or IVR 
USSD for activating Airtel Night Store Plans  -  *129#
IVR for activating Airtel Night Store Plans     -     129 

*****************Terms and Conditions****************

All Packs
  • Pack applicable between 12 AM to 6 AM valid for 1 night only. If pack is bought between 12 AM to 6 AM, benefits applicable for same night till 6 AM
  • Pack applicable for Airtel Prepaid customers only
  • Packs can be bought anytime during the day (24 hours) but can be consumed only between 12AM to 6AM
Rs 7 Local A2A Unlimited
  • Free local A2A calls applicable for Home circle only. Benefits do not apply while roaming.
  • Multiple recharges of this pack on same day are not allowed.
Rs 8 2G Unlimited
  • Mobile internet at 2G speeds between 12AM to 6 AM even if customer has any other 3G normal pack
  • 3G night store pack, 29/49, will take priority over 2G unlimited circles- (Only in 3G circles)
  • Multiple recharges of this pack on same day are not allowed.
Rs 9 Local A2A Unlimited + 2G Unlimited
  • Free local A2A calls applicable for Home circle only. Benefits do not apply while roaming.
  • Multiple recharges of this pack on same day are not allowed.
Rs 15 Local A2A Unlimited + 2G Unlimited
  • Free local A2A calls applicable for Home circle only. Benefits do not apply while roaming.
  • 3G night store pack, 29/49, will take priority over 2G unlimited circles- (Only in 3G circles)
  • Multiple recharges of this pack on same day are not allowed.
Rs 29/49 3G packs
  • None
Facebook Unlimited  Rs 1 – 2G Circles
  • Free benefit only for Facebook browsing. Any additional 3rd party content/videos etc. which redirect a customer to another 3rd party site will be chargeable
  • After 250MB Facebook data browsing speed 40kbps for all mobile internet usage till 6 AM.
  • Pack not applicable if customer has any other active Unlimited data pack
  • Pack will be available only post activating the Facebook pack on Night store and will not be given to all by default
  • Multiple recharges of this pack on same day are not allowed.
  • Facebook pack not applicable if customer already has an active unlimited 2G or 3G pack
Facebook Unlimited  Re 1 – 3G Circles
  • Free benefit only for Facebook browsing. Any additional 3rd party content/videos etc. which redirect a customer to another 3rd party site will be chargeable
  • After 250MB Facebook data browsing speed 40kbps for all mobile internet usage till 6 AM.
  • Till 250MB facebook data usage, 3G speed applicable for all other mobile internet usage
  • Pack not applicable if customer has any other active Unlimited data pack
  • Pack will be available only post activating the Facebook pack on Night store and will not be given to all by default
  • Multiple recharges of this pack on same day are not allowed.
  • Facebook pack not applicable if customer already has an active unlimited 2G or 3G pack

Like it ? Share it.
Key Match : Airtel Unlimited 2G, Airtel 3G Pack, Airtel Unlimited calls, Airtel Unlimited Facebook 

Wednesday, May 21, 2014

How to configure burp suite with firefox or Iceweasel


Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities.
Burp Suite allows you to combine manual and automated techniques to enumerate, analyse, scan, attack and exploit web applications. The various Burp tools work together effectively to share information and allow findings identified within one tool to form the basis of an attack using another.
BurpSuite allow us to forward all of the web traffic from your browser through BurpSuite so that you can see each HTTP Request and Response and manipulate it to your heart’s content. We will configure burp suite with firefox or Iceweasel in Kali Linux or Backtrack.


1. Open Firefox or Iceweasel and Click on Edit then Preferences
(Click image for large view)

2. Preference Window will be open Now go to Advance → Network → Setting 


3. Select Manual Proxy then write localhost or 127.0.0.1 in HTTP Proxy area and port should be 8080. Use this proxy server for all protocols by checking the box. Clear the No Proxy field then Finally Click OK.

4. Now open burp suite 
    A. GUI Method
         Application → Kali Linux → Web Application → Web Vulnerability Scanners → burpsuite


    B. Open Terminal and type burpsuite.jar and Press Enter


5. If you are running burpsuite first time in your Kali Linux you will see this window Click on I Accept.


6. Burp Suit has been opened. Now Click on Proxy Tab then Click on Option Subtab and watch carefully local host interface running box should be check in Proxy Listeners. 


7. Scroll down in the same tab (Proxy Tab → Option subtab) 
    Intercept Client Requests
    → Select URL Match type and keep Clicking UP button till URL Match type reach at the top.
    → Check Box 'Intercept requests based on the following rules.'


8. As we can see URL match type now at the top. Now select 'File Extension' and click on Edit


9. Edit Window will be open. Here we will add 'jpeg' file extension. You can add or remove file extension as per your need. So, Write code and click on OK.


10. Scroll Down in the same tab (Proxy Tab → Option subtab)
       Intercept Client Responses 
       → Check Box 'Intercept Responses based on the following rules.'
       → Select URL Match type and keep Clicking UP button till URL Match type reach at the top.


11. Click on Add - we are going to add a new rule.


12. We will Add file extension match type according to below details:
      Boolean Operator : And
      Match type : File Extension
      Match relationship : Does not match
      Match condition: (^gif$|^jpg$|^png$|^css$|^js$|^ico$|^jpeg$)


13. Select 'File extension'  and keep Clicking UP button till 'File extension' reach at the 2nd top.


14. We have organized it.


15. Now Open Your Firefox or Iceweasel and write www.google.com in the web address area. You may see a message 'This Connection is Untrusted' if you’re using Google over HTTPS. 
You can add an exception everytime this happens when you’re using a proxy, but that can be irritating. We can also set Firefox or Iceweasel to trust the burp certificate so that we don’t get this error.The Pro version of burp allows us to get the certificate easily, but in the free version we have to do little work. You can browse any https enable website for doing this. After opening https enable website Click on 'I Understand the Risks'


16. Click on Add Exception...


17. Click on View


18. Click on Details Tab, Select PortSwigger CA then Click on Export.


19. Choose Your Save location, (must remember the location where you are saving your certificate.) Click on Save.


20. Open Your Browser Click on Edit then Click on Preferences.


21. Click on Advance Tab then Click on Encryption Subtab and Click on View Certificates.


22. Click on Authorities Tab then Click on Import.


23. Find the location where you saved your PortSwiggerCA. If you are unable to view saved file from the location, change your file type as 'All File'. Select your PortSwiggerCA and Open It.


24. A new window will appear, Check box 'Trust this CA to identity websites' then Click on OK.

25. If you will scroll down your Certificates Name You will Notice your Added Certificate there. Click OK. Now, you should be able to navigate to any SSL site in burp without being prompted to trust the certificate.

26. Here we want to make is to disable Google Safebrowsing. Safebrowsing is enabled for a reason but it can cause unwanted traffic during tests so we will disable it. Go to Security Tab and uncheck two boxes 'Block Reported Attack sites' and 'Block Reported web forgeries' Click Close.
(Click image for large view)

Like it ? Share it.

Key Match: How to setup burp suite with firefox, How to setup burp suite, burp suite configuration, How to use burp suite in Kali Linux, How to use burp suite in Backtrack 

Monday, May 19, 2014

How to Stop Sharing in Windows 7

If it's not necessary for you to share folders on your machine with other users, turn off file sharing.You can stop sharing a folder at any time. However, any data downloaded by folder members remains on those computers. Files in the shared folder are not deleted from any location (your computer or folder members' computers).



1. Right Click on Computer and Click on Manage
(Click on image for large view)

2. Click on Share Folders then Click on Shares

3. Right Click on Admin then Click on Stop Sharing

4. Click on Yes

5. Click on Yes
(Click on image for large view)

Like it ? Share it.

Sunday, May 18, 2014

How to install Mutillidae in Kali Linux


Mutillidae II is a free, open source, deliberately vulnerable web-application providing a target for web-security enthusiest. Mutillidae can be installed on Linux and Windows using LAMP, WAMP, and XAMMP. Mutillide gives you penetration testing environment where you can check your skill in a legal way. This is an easy-to-use web hacking environment designed for labs, security enthusiast, classrooms, CTF, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, corporate web sec training courses, and as an "assess the assessor" target for vulnerability assessment software.


Features
  • Has over 35 vulnerablities and challenges. Contains at least one vulnearbility for each of the OWASP Top Ten 2007 and 2010
  • Actually Vulnerable (User not asked to enter “magic” statement)
  • Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. Mutillidae is confirmed to work on XAMPP, WAMP, and LAMP. XAMPP is the "default" deployment.
  • Installs easily by dropping project files into the "htdocs" folder of XAMPP.
  • Will attempt to detect if the MySQL database is available for the user
  • Preinstalled on Rapid7 Metasploitable 2, Samurai Web Testing Framework (WTF), and OWASP Broken Web Apps (BWA)
  • Contains 2 levels of hints to help users get started
  • Includes bubble-hints to help point out vulnerable locations
  • Bubble-hints automatically give more information as hint level incremented
  • System can be restored to default with single-click of "Setup" button
  • User can switch between secure and insecure modes
  • Secure and insecure source code for each page stored in the same PHP file for easy comparison
  • Provides data capture page and stores captured data in database and file
  • Allows SSL to be enforced in order to practice SSL stripping
  • Used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software
  • Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools
1. Download Mutillidae : Click Here
(Click image for large view)

2. Downloaded Zip File

3. Unzip download file

4. Go to Latest-mutillidae-2.6.10 → var → www → mutillidae then copy "mutillidae" folder. We will paste this folder in our Kali Linux OS. If your Host OS is not shared with your Guest OS then you can use a Pendrive for moving this folder. (If your folder has different name then rename it as mutillidae)

5. In Kali Linux Go to Computer → File system → var → www then Paste mutillidae folder. Please be sure your folder path is same as mine and Folder name should be also same.


6. Set permission of mutillidae into 0777. Open Terminal and type
chmod -R 0777 /var/www/mutillidae and Press enter

7. Run Apache, Go to Application → Kali Linux → System Service → HTTP → apache2start

8. Apache run successfully

9. Run My SQL, Go to Application → Kali Linux → System Service → MySQL → mysql start

10. My SQL run successfully

11. Now Create Database for mutilliade
→ Open Terminal  
→ type mysql –u root –p  and Press enter
→ when it ask for Password leave it blank and simply Press enter
→ now type create database mutillidae; and Press enter
→ Type exit and Press enter

12. Open Your Internet Browser and Write 127.0.0.1/mutillidae in your web address then Press Enter. If You have done everything correct you will get the Mutillidae Interface. Now, Click on Reset DB

13. Click OK
(Click image for large view)

14. Done

Note - You have to repeat Step 7 - Step 10 each time whenever you will restart your Kali Linux only then 127.0.0.1/mutillidae will be work in your browser. 

Like it ? Share it.