Showing posts with label Backtrack5 R3. Show all posts
Showing posts with label Backtrack5 R3. Show all posts

Top 11 Free Online Video Converters

Top 10 Best Free Online Video Converters – Have a look at this ultimate list of the best free online video conversion tools to convert your videos from one format to another online for free: We often need to convert a video file for the sake of compatibility on various platforms / devices. Online video conversion offers significant advantages over any desktop app. As a cloud based service, it could be used anywhere and on many different platforms without the need to download or install anything. If you’re on the move, an online video converter serves your  needs perfectly.
I compiled a list of the best free online video converters on the web. These consist of both PC and Mobile oriented sites. Ease-of-use, learning curve and portability were taken into consideration.
This is the start of a series of web tools I will be doing in the coming days. I love web tools as they offer the utility of desktop apps with the reliability of the cloud and flexibility of platforms combined with the advantage of portability. You know something’s awesome when it has so many associated nouns that end in ‘-ity‘. Let’s roll

Best Free Online Video Converters


Cloud Convert :

Cloud convert, as the name suggests, brings the power of the cloud to your video conversion process. It offers options to upload files from Dropbox and Google Drive and the ability to send your converted files to the same upon completion. You can also opt to receive an email notification once your conversion is done. It’s list of services is quite extensive with support for Video, Audio, Cad files, Spreadsheets, Presentations, E-books and Documents.
Cloud Convert


Online Convert :

Online-Convert.com is one of the most comprehensive online media converter on the web. The site hosts not just video converters but also audio,document,image,archive and e-book converters. It also has a hash generator. Upload a file from your desktop or any site (direct link), select output format and quality and convert it with ease. It gives you a download link in mere seconds after upload. Highly Recommended.
Online-Convert


Media Converter :

Media Converter is a simple online video converter where you’re presented with a window to upload your file and convert it into desired format. However, you only get 5 free conversions per day. Output formats include WMV, AVI, MP4, OGG etc.

N°1 Free online Video Converter :

N1 Online video converter greets you with a homepage that asks you to select your region so as to provide a server closer to your location. You can convert videos from Youtube or upload files from your own PC (Video & Audio) to be converted. Click ‘Save as’ once finished. It is simple and free and the whole process takes just a few minutes.

Wap 4 :

Wap4 is an open-source online video converter site that specializes in mobile video formats. Max upload files size is 100MB. Upload. Convert. Save to PC instantly. Simple.

Files Conversion :

Files-conversion.com maybe the simplest online video converter yet. It offers options to set quality from low to very high and the ability to change video size. Converted files can be instantly saved to PC.

File Wiggler :

File Wiggler is another free online media converter that supports a large variety of formats. You can upload videos upto 200MB in size. If you refer 5 people you can upload upto 400MB of videos. The only gripe here is the conversion is not instant and links will be E-mailed to you in about 3 days after upload.
File Wiggler


You Convert It :

You Convert it offers free online video conversion in a simple one page setup. Just upload files from your computer and the converted files will be E-mailed to you upon completion. Supports 3GP, MOV, AVI, WMV, SWF etc.
Also check this out: Best 3GP & MP4 Video Converters for Free Download

Convert Videos Online :

Convert-video-online.com offers a clean, simple interface where you uplaod a file from your PC and convert it instantly with zero hassles. It offers HD formats to convert your files to and the conversion process itself is blazing fast and the download link is presented immediately.
Online Video Converter


MakeJar :

MakeJar is another site that specializes in mobile phone video formats. The output formats are given in the form of profiles i.e a list of phones is available from which you can select your phone to start converting your video. You can save the file to PC post conversion. HTC, Nokia and some Samsung models are presently listed on the site.
MakeJar

Convert Files :

It’s a free  online converter capable of processing files up to 250 MB in size. You can upload from your PC or a URL (direct link). You can also upload videos from popular video sharing sites like Youtube, Metacafe etc. The conversion support is extensive ranging from Videos to Archives and even Drawings.

Conclusion : To wrap things up, Online video conversion simply rocks and you should definitely give it a spin if you haven’t  used it yet. Choose a site from above that best suits your conversion needs. After all, why bother downloading an app and straining your PC when you can leave all the heavy-lifting to a cloud based service. The server does the grunt work while you get to download & enjoy your converted files in the desired format for free.
You might also love to check out this list of the: Best Video Converters for Windows & Mac OS X

Download for PC

How to Upload animated GIF image to blogger

 In fact many bloggers uses third party websites to upload animated (Gif format ) images to add in blog post. Blogger Image uploads are powered by picasa and it hasn't longer accepted animated images . 

Picasa says animated images are some PSD files are exception .
But today i have uploaded an animated image on picasa via blogger (Like , usual upload static images to blog post)  and works fine. 

Just check out Here. This is True !!!!!!





- Picasa web Album supports major image file formats.Click here to know  supported image formats .


Troubleshoot :
  • How To Upload Animated Image in Blogger ? 

                Just Like you upload Static Images to blog Post.

  • My Images aren't animating in Blog post.
               Ensure your image is in GIF format ( extension .gif) and animated before uploading to blog.

  • White Background for animated Images,which aren't before uploading to blog post.
               Make Transparent Image Show Up As Transparent In Blogger

  • Still doesn't animated, feel free to ask in Picasa Web forum.
  • Still, then sorry .Your animated file aren't supported by Picasa.Tryt Third party websites ( Like Photobucket,imgur ) to upload animated images and Get html code and paste in blog post (HTML mode) .

I successfully Uploaded animated GIF image in this post (created in Adobe Photoshop cs5 Extended ) .
What about You ? Comment on it.

Has your website or WordPress blog been hacked?

Is your site displaying the “This site may be hacked ” warning at Google.com or Bing.com?
Web site hacked or web site blocked by Google?
With over 15 years experience, and a long list of “verifiable” satisfied customer service testimonials, The Hack Repair Guy™ will remove malware, work to fix website security issues, recommend free techniques to monitor and prevent future attacks, install WordPress security plugins, and even repair basic WordPress errors; all for a reasonable flat rate, no matter how long it takes to resolve. Heroic Customer Service— it’s what we do! 

We clean most infected sites of malware within two hours and unblacklist websites within 24 hours. Why choose HackRepair.com?

  • Service
    We’ll discuss your situation by phone to determine how quickly we can repair your website.
  • Expedience
    We’ll clear your website of malicious scripts and malware then get your web site back up and running quickly. We are WordPress CMS experts as well.
  • Comprehensive
    We’ll help recover and unblock your site within Google and help you in clearing any Google.com or Bing.com website listing issues.
  • Education
    Our goal is to help prevent your website from being hacked again. We install security and security monitoring plugins, and will train you on how to use them free of charge as well.
  • And don’t forget our money back guarantee!


How can we guarantee we will clear & recover your hacked website?

video testimonial for hackrepair.com
  • We’ve been securing websites since 1997.
  • We have developed a range of tools to help quickly identify and clear malicious scripts or hacker code from your website pages.
  • Our friendly, knowledgeable staff is ready and available to assist you on your schedule.
  • We do not outsource our work; everything is done in-house here, in the USA.
  • We will work directly with Google on your behalf to ensure your website is unblocked within Google.com or Bing.com as quickly as possible.

Don’t let your reputation be ruined as a reported attack page. Call
(619) 479-6637 or toll-free (800) 639-6442, and let us help to repair your reputation immediately!



Other Common hack related terms and information relating to how to clear hacked websites:
  • iframe hack – sometimes called an iframe injection is often used by hackers to redirect visitors to other websites or force a software download upon visiting the hacked website.
  • Base64 code – is a common means hackers code their web page hacks. This obfuscated code makes it harder to find hacker code on a web page. A server admin searching a server for hack related text may often miss files injected with obfuscated base64 PHP code because the obfuscated code conceals the usual suspect phrases. The “pharma hack” often uses base64 or obfuscated coding.
  • Botnet – is a large collection of hacked PCs, sometimes called zombie computers. These PCs once controlled may be used to send junk e-mail or bring down web services. Botnet’s are often the means by which denial of service attacks are initiated.
  • ‘hacked by hacker’ – was a well known server wide compromise which took advantage of a vulnerability relating to the symbolic links setting within cPanel configured web servers. A number of web hosts fell prey to this cPanel related exploit, which allowed hackers to replace most of the “index” type pages of accounts configured on server with a text file containing the words, ‘hacked by hacker’.
  • Zero-Day exploit – Affecting both websites and computers, the zero-Day exploit is a term describing not yet documented security threats or vulnerabilities.
  • Denial of service attack – or distributed denial of service attack (DDoS), is a distributed attack on a network or service. Because these types of attacks originate from so many locations simultaneously they often result in hours of downtime until mitigated.
  •  
  • Common search engine and web browser alert messages include:
    Google – ‘This site may be hacked.’
    Google – ‘This site may harm your computer.’
    Google – ‘This site may harm your device’
    Google – ‘This site may be compromised’
    Bing and Twitter – ‘unsafe link’
    Chrome – ‘Warning: Something’s Not Right Here!’
    Chrome – ‘Danger: Malware Ahead!’
    Firefox – ‘Reported Attack Site!’
    Internet Explorer – ‘This website has been reported as unsafe’
    Opera – ‘Fraud Warning’
    Safari – ‘Warning: Visiting this site may harm your computer’
    Yahoo – ‘Warning: Hacking Risks’

How To Deface A Website With Basic HTML Coding In Just 5 Minute

I was browsing the net when i saw this tutorial:

Source: http://naijadudes.com


Steps:

Open the site you want to hack. Provide wrong username/password combination in its log in form. (e.g. : Username : me and Password: ' or 1=1 --)An error will occur saying wrong username-password. Now be prepared your experiment starts from here.


Right click anywhere on that error page =>> go to view source.

3. There you can see the HTML coding with JavaScript.• There you find somewhat like this....<_form action="...Login....">• Before this login information copy the URL of the site in which you are. (e.g. :"< _form..........action=http://www.targetwebsite.com/login.......>")

4. Then delete the JavaScript from the above that validates your information in the server.(Do this very carefully, your success to hack the site depends upon this i.e. how efficiently you delete the java scripts that validate your account information)

5.Then take a close look for "<_input name="password" type="password">"[without quotes] -> replace "<_type=text> “there instead of "<_type=password>". See there if maximum length of password is less than 11 then increase it to 11 (e.g. : if then write )

6. Just go to file => save as and save it anywhere in your hard disk with ext.html(e.g.: c:\chan.html)

7. Reopen your target web page by double clicking 'chan.html' file that you saved in your hard disk earlier.• You see that some changes in current page as compared to original One. Don't worry.

8. Provide any username [e.g.: hacker] and password [e.g.:' or 1=1 --] You have successfully cracked the above website and entered into the account of List user saved in the server's database.

Warnings

Do the coding and changes very carefully, your success to hack the site depends upon this i.e. how efficiently you delete the java scripts that validate your account information.

Please like this post if it worked for you

How to Spoof your MAC address

Do you know that each and every computer/laptop having Network Interface Card (NIC) also known as Ethernet card has a Unique MAC Address?

What is the need and Significance of Unique MAC address?

MAC address also known as Media Access Control is a 48 bit hexadecimal key which identifies a machine of Network when connected to LAN/WAN. 



The Unique MAC address is burnt in the ROM of the Ethernet card. Whenever any request is sent on Network, The ARP packets contain IP address of the Machine along with the MAC address which uniquely identifies a Machine on Network. 
 
Let’s take up a scenario to explain the significance of the MAC address

In today’s world of digitalization, whatever electronic devices you have, it has connectivity features like Bluetooth or Wi-Fi. Whether it may be Mobile Phone, IP cameras, Printer/Scanners, PDAs, Laptops, Network HDDs, etc…

So each and every above such devices should have a unique MAC address.


Consider the above Image scenarios wherein many devices are connected to a Wi-Fi router. Whenever you try to connect the Device with router an ARP (Address resolution Protocol) packets is sent from the device to the router.

The ARP packet which is sent from the device contains the MAC address of its Network Interface controller. As soon as the ARP packets are received by the router, the router checks for Authentication of the device and if the device is Authentic then it sends RARP Packet (Reverse ARP).

RARP Packet contains the MAC address and the IP which has to be assigned to the device. Since there can be many devices simultaneously trying to connect the router, the RARP packet will be broadcasted to all the devices.

But only those devices which match with the MAC address of the RARP packet will be able to accept it and get the Assigned IP address to the device. Since the packets are broadcasted, if the devices doesn’t have a unique MAC address it won’t be able to interact with the Layer 3 devices on Network and Hence will be unreachable from the network.

 How MAC address spoofing can result in Hacking and IS breach

Nowadays everywhere Wi-Fi routers are used to connect to devices like Laptops, PDA, Mobile Phones, etc… replacing the old CAT5 cable.

In case of Wi-Fi, since it is an air interface the signals are reachable to surrounding areas also and thus can be used by any intruder who has the Wi-Fi signal reachability to enter in to the secured network and gain access to the important/crucial information thus resulting in Information security breach.

So as to avoid this, almost all the Wi-Fi router comes with MAC filtering. Which means that the network admin of the Router can already specify that only the listed MAC address are authentic and should be allow to be connected and rest other devices should be blocked.

See below the Screenshot of my Home Router in which I have specified only two MAC address. So whenever anyone else with other than this mentioned MAC address is in the range on the network and tries to connect to the device it will be blocked because the MAC address filtering is enabled.

So in this case we can spoof the MAC address with the one which is allowed and can enter in to the network and use the network resources.

Procedure to Spoof the MAC address

 There are many third party applications available, some free and some paid with which you can easily spoof your MAC address. But I will let you know how we can use Windows predefined functionality to Spoof the MAC address.
     1) First click on start, then click on run And type “control netconnections” and click ok

    2) The above command will open network connections, in network connections find your  Network Adapter of which you have to change the MAC address.

    3)  Right click on the Network adapter and click on Properties and you will see a window similar to below
     
     
      4) Click on Configure button








                                            


      5)      Click on Advanced Tab as highlighted in the above image.





   


    6)  After click on Advanced tab, choose Network Address as in above image and then on right hand screen enter a Hexadecimal MAC address with which you want to spoof your present MAC address

      7)   Once you have entered the MAC address, click on OK and you are done. Yes! Indeed you are done.
You have successfully spoofed your MAC address.

Check the below screenshot which shows the router settings page on which MAC filtering is Enabled.
Only PC or devices with the below mentioned MAC address will be allowed or denied as per the option chooses in the Admin settings of the router. In case your MAC address is blocked by network Admin, then you can spoof up and change your MAC address to connect and gain access to the Network resources.



Even Most of the ISP bind your Login ID and Password to your PC and in any case you want to access internet on any other PC, other than in which the MAC Address is binded by ISP, you can use this method to use internet on other devices as well. 

Many software applications which are licensed to single user single PC, is binded using MAC address and that can be reused in many PC using MAC spoofing.

Credit Card Generating Sequence

This file is for educational purposes ONLY to show how insecure is our world! I take no responsibility for your actions! I'm NOT responsible for any damages you make! The information in this file may be incorrect. You can copy this file but you are not allowed to change anything in this file without the author's permission. This is a personal file which you are not supposed to read, so just go away.

TURN WORD WRAP ON IF YOU USE TEXT EDITOR Wink

-------------------------------------------------

How to generate valid credit card numbers by yourself (Credit Cards Algorithm)

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

If you desperately need a valid credit card number because you don't have
your credit card generator - generate a valid credit card number by
yourself!

The way of doing it, is simple - you just need to remember it. First of all
let me fast explain you about the credit card number. Credit cards use the
Luhn Check Digit Algorithm. The first number depends on the credit card
type, such as : Visa, Master Card, Discover etc. The folowing few numbers
depend on which bank the credit card belong to. The other numbers can be
any numbers. The last number will be the most important number. Here are a
few examples that will be useful later:

1. Visa [Citibank] - 4013 **** **** **** {Lenght: 16 numbers}
(Visa Cards begin with number 4. Number 013 - represents Citibank)

2. Gold Visa [Bank of America] - 4024 0238 **** **** {Lenght: 16 numbers}
(the number 4024 0238 in the beggining tells us that this is Gold Visa of
the Bank of America)

3. Visa - 4*** **** **** ** {Lenght: 14 numbers}
(All Visa cards begins with number 4. This is an ordinary Visa card. It
can be also 16 numbers)

4. Master Card [Bank of America] - 5254 **** **** **** {Lenght: 16 numbers}
(Master cards begin with 5 in the beggining and the other few numbers
depend on the bank)

5. Master Card [Citibank] - 5424 **** **** **** {Lenght: 16 numbers}
(Master card that belongs to Citibank)

There are lots and lots of other credit cards numbers but this will be
enough for now. So as you should understand by now - the first numbers
depend on which bank it belongs to and what credit card it is. The lenght
of the numbers depends on the credit card type too.
All the other numbers except the last one can be whatever you wish! The last
numbers is the one that will determine the validation of the credit card number.

Example #1:
-=-=-=-=-=-

So lets take for example the first Visa [Citibank]:

4013 **** **** *** X
|__| |___________| |________________All depends on this number!
| |
| |___Any numbers you wish.
|
|_____This number says it belongs to Citibank and it's a Visa card.

Now we want to generate our own valid credit card number. The number must
begin with those numbers (4013 or any other number which belongs to credit
card company/bank). Without them it won't be valid. As i said, there are a
lot of credit cards - you can use one of the list above.
We took the Visa [Citibank] number for the first example.

[1] The "*" represents any number. So lets choose them (ANY 11 numbers!):

Before we choosed any numbers: 4013 **** **** *** X
|||| |||| |||
We get this after choosing the numbers: 4013 5426 7346 375 X

[2] We need to add together every second number:

4013 5426 7346 375 X
| | | | | | | |
0+3 +4+6 +3+6 +7 +X

We need to find the "X" so it will create a valid credit card number, so
for now we don't count it. We get:

0+3+4+6+3+6+7=29 < -= Final sum of section #2

[3] Now we need to multiply by 2 any other numbers and add them together. If
the number bigger than 9 - we subtract 9 from the number, this to get a
one digit number.

4013 5426 7346 375 X
| | | | | | | |
4 1 5 2 7 4 3 5

Multiply by 2:

4*2=8
1*2=2
5*2=10-9=1 (the number is bigger then 9)
2*2=4
7*2=14-9=5 (the number is bigger then 9)
4*2=8
3*2=6
5*2=10-9=1 (the number is bigger then 9)

Add them together:

8+2+1+4+5+8+6+1=35 < -= Final sum of section #3

[4] Now we take the final sum of section #2 and add it to the final sum of
section #3. We get:

29+35=64

[5] Now we need to take a bigger number that can be devided by 10. The
closest one is 70. (if we get 64 then we go up to the next number that
can be devided by 10 - we get 70. The same with others: 37...40, 24...30,
59...60 etc). If we get number that can be devided by 10 (in section #4)
then we leave it unchangble. In other words, numbers like 10, 20, 30, 40
etc are left the same because they can be devided by 10.

64...70

[6] Now we subtract the smaller number from the bigger number and we get:

70-64=6

Waaallla! 6 is the last number [X=6]. Then the final VALID credit card
number is:

4013 5426 7346 375 X
|||| |||| |||| ||| |
4013 5426 7346 375 6

Yes! The number 4013 5426 7346 3756 is a valid credit card number!
The expire date and the name are not related to the credit card number, thus
the expire date or the name can be whatever you want.
You can check a validation of a credit card number by the same method and if
you get the same last number as it is in the credit number
(the one you want to check) then it is a valid credit card number.

Here are another few examples so you will take a little practice and
understand the whole process:

Example #2:
-=-=-=-=-=-

Gold Visa [Bank of America] - 4024 0238 **** ****

[1] Choose any numbers:

4024 0238 3425 642X

[2] Add together every second number (Except "X"):

0+4+2+8+4+5+4=27 < -= Final sum of sec. #2

[3] Multiply by 2 any other numbers (subtract 9 if it's bigger than 9) and
add them together:

4*2=8
2*2=4
0*2=0
3*2=6
3*2=6
2*2=4
6*2=12-9=3
2*2=4

8+4+0+6+6+4+3+4=35 < -= Final sum of sec. #3

[4] Adding sum of sec. #2 to sum of sec. # 3:

35+27=62

[5] Take the closest bigger number that can be devided by 10:

62...70

[6] Subtract:

70-62=8

X=8

Final VALID credit card number:

4024 0238 3425 6428
===================

Example #3:
-=-=-=-=-=-

Visa - 4*** **** **** **

[1] Choose any numbers:

4921 2354 4364 0X

[2] Add together every second number (Except "X"):

9+1+3+4+3+4=24

[3] Multiply by 2 any other numbers (subtract 9 if it's bigger than 9) and
add them together:

4*2=8
2*2=4
2*2=4
5*2=10-9=1
4*2=8
6*2=12-9=3
0*2=0

8+4+4+1+8+3+0=28

[4] Adding sum of sec. #2 to sum of sec. # 3:

24+28=52

[5] Take the closest bigger number that can be devided by 10:

52...60

[6] Subtract:

60-52=8

X=8

Final VALID credit card number:

4921 2354 4364 08
=================

That's not that hard after you practice it a bit.
Ohh... Btw the number 4123 456 789 1235 is a valid credit card number, but if you will use credit cards like this one, you will loose the game faster then you think.

Installing backtrack 5 R3 in virtual machine step by step











In this tutorial i will show you how to install Backtrack 5 R3 which is recently  released by offensive security team . if you've previously installed backtrack then you might be familiar with backtrack installations  . its easy and simple just follow given simple steps.

Stage 1 
Requirements
1 : Download backtrack ISO from here
2 :  Download VMware Workstation or  VMplayer
3 : Install any of above 


Stage 2

Installation 

1 : Create A new virtual machine
2 : choose installer ISO ( choose backtrack 5 ISO ) 

3 : choose Linux as your guest operating system type and Ubuntu as version
4 : give a name and location of your backtrack VM 
5 : Specify virtual hard drive space ( 20 GB is good enough )
then click finish from ready to create vm window 
hit enter to go boot screen then choose default boot text mode and hit enter
HIT ENTER AT THIS POINT

type startx to start GUI ( x server ) 

click on Install backtrack icon or open terminal type sh -c "ubiquity" 
and continue like normal installation choose keyboard type and provide location info 

if you are installing just backtrack then go normally and erase and use entire disk 

or if you installing backtrack with other OS then specify partition accordingly ( in this tutorial m using virtual hard-drive ) 
click on forward and click on install



wait until it finish installing 



it will take up-to 30 minutes depend on your system
  













Stage 3
Network Configuration 
virtualbox guest audition installation 
vmware tools installation 
backup and recovery

The Hacker’s Choice releases SSL DOS Tool



______________ ___ _________ \__ ___/ | \ \_ ___ \ | | / ~ \/ \ \/ | | \ Y /\ \____ |____| \___|_ / \______ / \/ \/ http://www.thc.org THC-SSL-DOS is a tool to verify the performance of SSL. Establishing a secure SSL connection requires 15x more processing power on the server than on the client. THC-SSL-DOS exploits this asymmetric property by overloading the server and knocking it off the Internet. This problem affects all SSL implementations today. The vendors are aware of this problem since 2003 and the topic has been widely discussed. This attack further exploits the SSL secure Renegotiation feature to trigger thousands of renegotiations via single TCP connection. Download: Windows binary: thc-ssl-dos-1.4-win-bin.zip Unix Source : thc-ssl-dos-1.4.tar.gz Use "./configure; make all install" to build. Usage: ./thc-ssl-dos 127.3.133.7 443 Handshakes 0 [0.00 h/s], 0 Conn, 0 Err Secure Renegotiation support: yes Handshakes 0 [0.00 h/s], 97 Conn, 0 Err Handshakes 68 [67.39 h/s], 97 Conn, 0 Err Handshakes 148 [79.91 h/s], 97 Conn, 0 Err Handshakes 228 [80.32 h/s], 100 Conn, 0 Err Handshakes 308 [80.62 h/s], 100 Conn, 0 Err Handshakes 390 [81.10 h/s], 100 Conn, 0 Err Handshakes 470 [80.24 h/s], 100 Conn, 0 Err Comparing flood DDoS vs. SSL-Exhaustion attack: A traditional flood DDoS attack cannot be mounted from a single DSL connection. This is because the bandwidth of a server is far superior to the bandwidth of a DSL connection: A DSL connection is not an equal opponent to challenge the bandwidth of a server. This is turned upside down for THC-SSL-DOS: The processing capacity for SSL handshakes is far superior at the client side: A laptop on a DSL connection can challenge a server on a 30Gbit link. Traditional DDoS attacks based on flooding are sub optimal: Servers are prepared to handle large amount of traffic and clients are constantly sending requests to the server even when not under attack. The SSL-handshake is only done at the beginning of a secure session and only if security is required. Servers are _not_ prepared to handle large amount of SSL Handshakes. The worst attack scenario is an SSL-Exhaustion attack mounted from thousands of clients (SSL-DDoS). Tips & Tricks for whitehats 1. The average server can do 300 handshakes per second. This would require 10-25% of your laptops CPU. 2. Use multiple hosts (SSL-DOS) if an SSL Accelerator is used. 3. Be smart in target acquisition: The HTTPS Port (443) is not always the best choice. Other SSL enabled ports are more unlikely to use an SSL Accelerator (like the POP3S, SMTPS, ... or the secure database port). Counter measurements: No real solutions exists. The following steps can mitigate (but not solve) the problem: 1. Disable SSL-Renegotiation 2. Invest into SSL Accelerator Either of these countermeasures can be circumventing by modifying THC-SSL-DOS. A better solution is desireable. Somebody should fix this www.blogbari.com