Now you all can invite me on skype for any kind of help required as my username is krackoworld

30 April 2013

How to Make Money with Google Chromium Bounty Programs

Google bug bounty for Chrome bugs Now a days its becoming trend to pay to those smart hackers who can find and fix vulnerability in their systems. Recently Google has also opened that type of program in which they already paid around $300,000 etc. Therefore, every person will get the bounty of $500 for each vulnerability they report in the Chrome browser and its underlying open-source code. This is known as Chromium Vulnerability Rewards Program.

The Purpose of The Program

This Vulnerability Rewards Program was created to help reward the contributions of security researchers who invest their time & effort in helping us to make Chromium more secure. Through this program we provide monetary awards and public recognition for vulnerabilities responsibly disclosed to the Chromium project and many more.

Some FAQ’s

What reward might I get?

Our base reward for eligible bugs is $500, but the typical payout is usually at least $1000. If the rewards panel finds the bug particularly severe, the value can be as much as $3133.70. Or if the rewards panel finds a report really impressive, the value can be as much as $10,000 or even beyond. To ensure the greatest chance at the maximum possible award please adhere to the guidelines provided in the Reporting Security Bugs.

What bugs are eligible?

Any security bug may be considered. We will typically focus on High and Critical impact bugs, but any clever vulnerability at any severity might get a reward. Obviously, your bug won't be eligible if you worked on the code or review in the area in question.

Who pays for the awards program?

As a consumer of the Chromium open source project, Google sponsors the rewards.

How do I find if out my bug was eligible?

You will see a provisional comment to that effect in the bug entry once we have triaged the bug etc.

What if someone else also found the same bug?

Only the first report of a given issue that we were previously unaware of is eligible. In the event of a duplicate submission, the earliest filed bug report in the bug tracker is considered the first report.

For more information, please Visit Here.

Also Read- How Hackers can Make Money with PayPal Bug Bounty Programs?

24 April 2013

Pirate Bay Co-founder Charged for Hacking Machines & Stealing Money

The Pirate Bay co-founder charged with hacking and stealing money Recently Pirate Bay co-founder Gottfrid Svartholm Warg was charged with hacking the IBM mainframe of Logica, a Swedish IT firm that provided tax services to Swedish government, and IBM mainframe of the Swedish Nordea bank, the Swedish public prosecutor. Also Besides Svartholm Warg, the prosecution charged three other Swedish citizens as well.

According to the prosecutors, IBM mainframes belonging to Logica and the bank were targeted in the attacks, which are said to have begun in 2010, and continued until April 2012. The Swedish authorities have claimed that it is the biggest investigation into a data intrusion ever conducted in the country.

Prosecutor Henrik Olin Says that,

"A large amount of data from companies and agencies was taken during this hack including a large amount of personal data, such as personal identity numbers of people with protected identities... I'd say that Svartholm Warg is the main person and brains behind the hacker attack."

In total, the four men allegedly attempted to transfer a little over 680,000 Euros to different bank accounts. Therefore Court proceedings against Svartholm Warg and the other three are expected to begin at the Nacka district court at the end of May, Olin said.

That’s it!

17 April 2013

WordPress Blogs Under Botnet Attack and Prevention

botnet attack All the world knows that WordPress is one of the best blogging platform ever, now due to it its Hacking is becoming common now a days. In a recent post, Matt Mullenweg posted about the recent attack on WordPress sites. This is a botnet attack, and is performing brute force attack using default WordPress login (admin). A large botnet with more than 90k servers is attempting to log in by cycling through several passwords and usernames. So lets learn more on it below-

What is Botnet Attack?

  • Bot master: Usually the hacker who operates all infected computer.
  • Zombies computer/Bot: System which are infected by the Bot master, and helps in spamming. Usually owner of computers are unaware of the fact, that they are compromised. It could be anyone computer, including yours etc.

    How to Prevent WordPress from brute force attack?

    1. Install Limit login attempt plugin, hence it blocks individual I.P., in this botnet attack, hackers are running the attack using 90,000+ I.P.

  • 2. Use .htaccess to protect your admin pages and rename the login pages.

    3. Change your WordPress default username also

    4. Enable two-step authentication and

    5. Always use a complex password etc.

    That’s it! Also don’t forgot to make a backup of your blog for some extra security. Peace!

    10 April 2013

    Download free Phrozen Keylogger to capture all Keystrokes

    keylogger 2013 Are you fed up with all paid keyloggers? if yes, then today I will provide you a absolutely free software named as Phrozen Keylogger which is 100% free and full version. It is actually developed by Dark comet RAT developer. Now Phrozen Keylogger Lite is also compatible with Windows 8. Phrozen Keylogger Lite has been especially created to capture all keystrokes from any type of keyboard (PS/2, USB and even Virtual Keyboards). The captured keystrokes are stored into a local database. There they are sorted by their process name and the active window into a log.

    How it works?

    This software is silently activated in background. When the program is successfully installed on a computer, it will capture all keystrokes fully stealthily & the program will remain hidden from every user. It will not slow down the computer it is installed on etc.

    Now if you want to consult the logs of the current/previous days just hit the so-called “Magic Shortcut” and enter your personal password and the logs will be made visible in a new window. With this, You can easily manage, export, delete, mark as important, mail, etc. these logs.

    Download Phrozen Keylogger Lite v1.0

    04 April 2013

    World's biggest DDoS Attack Ever in the World

    DDoS attack Do you know my friends that last week it has been seen probably the largest distributed denial-of-service (DDoS) attack ever on Internet. Around 300Gbps was thrown against Internet blacklist maintainer Spamhaus' website but the anti-spam organisation , CloudFlare was able to recover from this attack and get its core services back up and running etc.

    The Spamhaus Project is an international organization based in both London and Geneva, founded in 1998 by Steve Linford to track email spammers and spam-related activity. The name spamhaus, a pseudo-German expression was coined by Linford for an Internet service provider, or other firm, which spams or knowingly provides service to spammers.

    “In the Spamhaus case, the attacker was sending requests for the DNS zone file for to open DNS resolvers. The attacker spoofed the CloudFlare IPs we'd issued for Spamhaus as the source in their DNS requests. The open resolvers responded with DNS zone file, generating collectively approximately 75Gbps of attack traffic. The requests were likely approximately 36 bytes long (e.g. dig ANY @X.X.X.X +edns=0 +bufsize=4096, where X.X.X.X is replaced with the IP address of an open DNS resolver) and the response was approximately 3,000 bytes, translating to a 100x amplification factor."

    Read also- How to Flood a Website with Denial of Service Attack

    Thats it!


    Recent Posts

    Review this blog on

    Recent Comments

    | KrackoWorld (KoW) © 2014. All Rights Reserved | Style By All Web Designing | | Contact |