Friday, July 20, 2018

Dark Web...

What is Dark web?

deep-web-dark-web-differencesThen we have the Dark Web. This is a sub-set of the Deep Web that contains all sorts of websites, both legal and illegal. The types of sites include black markets that sell things like drugs, counterfeit goods, and weapons, you also have hacking sites, X-rated sites, bitcoin tumbling, and even sites for hitmen. The variety of sites on the Dark Web is quite astonishing. For now there is no dark web search engine that works as well as Google does for the clearnet.


Where did the dark web come from?

The dark web was actually created by the US government to allow spies to exchange information completely anonymously.
US military researchers developed the technology, known as Tor (The Onion Router) in the mid-1990s and released it into the public domain for everyone to use.
The reason was so that they could stay anonymous - it would be harder to distinguish the government's messages between spies if thousands of other people were using the same system for lots of different things. Tor now hosts roughly 30,000 hidden sites.
It's called The Onion Router because it uses the technique of onion routing - making websites anonymous through layers of encryption. Most websites are also hosted on the .onion domain.

What is the government doing about the dark web?

On April 11, Home Secretary Amber Rudd launched a multi-million pound cyber blitz on criminals selling guns on the dark web.
She announced a £9million fund to ensure every police force in the UK has a dedicated cyber crime unit to bust its "sickening shopping list of services and products".
The extra cash will tackle offenders who are exploiting the anonymity of the dark web - where users use freely available software to avoid being tracked - to trade in guns, drugs and child abuse images.
This anonymity has attracted criminals seeking to avoid detection by law enforcement agencies.

How does the dark web work?

The best explanation so far has been published by Daniel Prince, Associate Director Security at Lancaster University, on The Conversation.
Mr Prince says: "So just for a minute imagine that the whole internet is a forest – a vast expanse of luscious green as far as the eye can see. And in the forest are well-worn paths – to get from A to B.
"Think of these paths as popular search engines – like Google – allowing you as the user the option to essentially see the wood from the trees and be connected. But away from these paths – and away from Google – the trees of the forest mask your vision.
"Off the paths it is almost impossible to find anything – unless you know what you’re looking for – so it feels a bit like a treasure hunt. Because really the only way to find anything in this vast forest is to be told where to look.
"This is how the dark web works – and it is essentially the name given to all the hidden places on the internet.
"Just like the forest, the dark web hides things well – it hides actions and it hides identities. The dark web also prevents people from knowing who you are, what you are doing and where you are doing it."














Who uses the dark web and why?

The dark web is used by all sorts of people for all sorts of reasons  - but it's not surprising that it's used for illegal activity.
A study by the University of Portsmouth in 2014 found that the most wanted type of content on Tor was child porn, followed by black markets for goods such as drugs, personal details and even guns.
This type of site is regularly busted by police, who compromise them by distributing viruses and malware to users.
The dark web is also used for hiding online activity related to finance, extremism, arms, hacking, abuse and fraud.
However, for others the dark web has positive uses. For example, it can be used to avoid a national firewall, such as China, where users are normally blocked from accessing hidden sites.
It can also be used as a tool for whistleblowing - infamous website WikiLeaks is hosted on the dark web, allowing whistleblowers to anonymously upload classified information to the press.

Red Room Deep Web Complete Guide

(Links/How to access)

If your last Google search was anywhere near the “Red room” or “Red room deep web”, you’ve landed on the right runway. Red room is supposed to be a “myth”, and “urban legend”, and everyone who hasn’t themselves been on the Red room deep web will tell you so.
Although, contrary to popular belief, let me tell you they exist! (We’ve provided links as well as step-by-step guide on joining the same as well!) also will providing you every small and bing points about the Red Room on the deep web.
My humble request to you, If you are beginner on the red room than without direct visit on the red room, please read all below given points, because these points can give you complete idea about the red room, what you can find on the red room, how you can make safe on the red room and etc.

What is the Red Room Deep Web?

I will put it as simply as possible. “A live video streaming website on the TOR hidden network (deep web), which streams live violence, rape, murder, and other such kinds of ‘negative’ videos for the entertainment of others”.
It’s not a free service, instead of a highly expensive one, and at times also lets the users type in “commands” or “Suggestions” for the protagonist to play out for them.
So in other words, we can call it an exclusive video portal for anything and everything which you won’t find on the clearnet, specifically violence and pain inflicting live videos.
The name is believed to be a pun to the word “Redrum” (that’s what it sounds like when you say the word Red Room), which if spelled backwards spells “Murder”!
Red Room is such type sites which deliver streaming live shows, these live shows have mind disturbing contents like as previously define Murder, rape, tortures, snuff and so on, here site admin sale shows access in very high Bitcoin price. These access plans have specific on demand features, like as client can request for any type actions like slapping, cutting any body part or anything else.
When I tried to explore these type site then I saw they charge more than 0.5 BTC(Approx $1500$) for single candidate access. Now I think, you are aware of the red room deep web. Now Let’s go ahead!
You are highly interested to know really is red room available on the deep web and want to get access by bitcoins, but don’t have any bitcoins in your Bitcoins wallets and looking place where you can buy Bitcoins or any other crypto coins then below listed some links can provide you all step by step guide to you.

What is Available on the Red Room Deep Web?

Broadly, the Red Room can be classified as a “Video portal”. So you can expect all and any kind of videos out there which are related to inflicting pain on others.
It’s like the “more advanced”, “real-time” deep web market for criminally intentioned videos.

1). Child Pornography

It deserves a special mention because most normal-minded people wouldn’t go for it, and that’s the reason why Child Pornographic material is also banned from most deep web markets!
So where do you find a video which isn’t even available on the deep web? The Red Room!
Child Pornography may include:
  • Torture: Physically harming the child, and taking sadistic pleasures from their pain.
  • Rape: Sexually assaulting the child, regardless of their gender.
  • Non-activity: It’s a special kind of pornography where nothing is actually done with or to the child, the victim is just tied to a bed or chair, generally without clothes and a camera streams that to the audience.

2). Murder

As the myth goes, you can either watch a random guy killing a random guy, or you can pay the administrators a specific amount to kill or torture a specific person.
The act is then streamed on the Red Room, and it’s believed that the killer takes orders from you regarding which steps to perform next.
You can also choose from “categories” such as “slow death”, “neck-slicing” and all other unthinkable methods of killing a person.

3). Rape

As if Child Pornography and Murder weren’t enough “Rape” seems to be an available “commodity” as well as “in-demand” service over the Red room deep web as well.
Rape on the Red room isn’t gender specific, both a man as well as a woman can be victimized and video-recorded for the viewer’s entertainment.
Again the rape has different categorizes as well, as you can well imagine ways to inflict sexual pain to a person, almost everything going through your brains right now is said to be possible and available on the Red room

4). General Torture

It’s not so that only crimes that have been “categorised” can be streamed on Red room, there are videos of general torture as well.
For e.g. pulling off the nails, slicing the tongue, scooping out eyes, basically anything and everything which falls under the “extremely painful” category.

5). Chat

Some Red rooms also facilitate a “chat” option. Meaning in case you’re not interested in the videos, you can connect to “like-minded” people over there without revealing your identity.
Considering it’s extremely hard finding such “like-minded” people in the real-world on your own, it serves as a social network for people who fall under the various “sadistic” categories.
There are various packages and plans which separate the “video-watchers” from the “chat-users” and so on, the pricing plans differ as well for different uses.
For anonymous chat servers, you may visit active Tor Chat Rooms Link

How to Join the Red Room Deep Web?

You might have guessed, the Red Room isn’t something that you can just browse over the normal Internet as you know it.
It’s exclusively available on the “Deep web” and can be accessed with the help of TOR browser only. TOR is an anonymous browser designed to keep your activities private and anonymous.
It’s mostly used to access the deep web, and that’s wherein lies the Red room as well. Obviously, you wouldn’t want people to check your history and stumbleupon your activities if you’re into this kind of stuff, right?
Also, TOR makes your IP address untraceable, although using a VPN while browsing the Red Room deep web is advised for an extra layer of security. For better security or anonymity must use NordVPN (Onion Over VPN server).
NordVPN offers no log policy, also have dedicated onion server that migrated your all internet traffic from tor nodes. Nord VPN  servers are available in more than 60+ countries and 3600+ active IP’s. If you are interested to get your premium plan then you may save 72% money on 2-year subscription, only $11.95/Month ($3.25/Month).
Note: If you are a beginner on the deep web and don’t know how to access the deep web then you need to check out below-given step by step guide, There I define every small or big point that can help you to set up your secure deep web access network also how you can access the dark web in Android.
Anyway once you’ve got the TOR browser, use any of the links provided in the introduction section to land on a Red room.
Also, note that the steps might slightly vary depending on the exact platform, but here’s an overview:
The below screenshot is an example of what you might expect on any of the Red room deep web home pages. There may or may not be the “join” button at all the Red rooms, anyway I’ll click on the Join for now to take you to the next step.
On the next page, I’m shown the different “plans” so as to say, for e.g. there’s the “spectator” plan which let’s me just “watch”, or there’s a more expensive “Commander” plan which let’s me command the person in the video with what to do next.

So I click on the Spectator option just for the sake of this article, and the next page that pops up is the “Payments” page. I’m shown a Bitcoin address, and the exact amount I need to pay.
Once the payment is done, we’re granted access to the Red room deep web and can proceed from there.
Basically, every other Red room platform has a Bitcoin address listed on its homepage, and you need to make a payment to the address and wait for further instructions.

Red Room Deep Web Pricing Plans and Payment Methods

Red Rooms only accept Bitcoin as the mode of payment. That is so for the obvious fact of Bitcoins being the leading crypto-currency in the market, and that they’re untraceable.
So you can make payments without risking your identity or privacy, and at the same time, the administrators at the Red rooms can accept payments without being worried about law enforcement problems.
The Packages differ based on the individual platforms, some platforms have a single package for everyone, while others as shown in the above steps might have different packages with different access-levels.

Is Accessing Red Room Deep Web Illegal?

Totally! Yes.
“Paying” to witness a crime is the definition of “illegal”. That’s the reason it’s on the “deep web” and using the TOR browser along with a VPN is advised to be on the safe side.
Note that if you do not take the security measures, or even if you do and are caught, you’ll be charged as “accessory to the crime” because of the fact that not only you “didn’t” report the crime, you encouraged its proceedings.

Deep Web Links to Access the Red Room

A close real-life example of the red room is the case of Peter Scully, who made a website where people paid five-figures to watch him torture a child.
Although it wasn’t on the TOR network, and was instead streamed on the clearnet, but this is a classic case of exactly what you can expect to witness on the Red Room Deep Web.
for more updated active red room links you may visit my another blog post Red room dark web links

Final Words

So I believe that clarified quite a number of doubts regarding the existence of the Red Rooms, if you feel there’s something we’ve left out, or there’s something you’d like us to add, feel free to let us know.
Also we would love to lend our ears if you’ve past experience with Red room deep web, or know someone who does...

Wednesday, July 18, 2018

WiFi Advance hacking Operating System.

What Is SQL Injection??

What is SQL Injection??

SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server (also commonly referred to as a Relational Database Management System – RDBMS). Since an SQL Injection vulnerability could possibly affect any website or web application that makes use of an SQL-based database, the vulnerability is one of the oldest, most prevalent and most dangerous of web application vulnerabilities.
By leveraging an SQL Injection vulnerability, given the right circumstances, an attacker can use it to bypass a web application’s authentication and authorization mechanisms and retrieve the contents of an entire database. SQL Injection can also be used to add, modify and delete records in a database, affecting data integrity.
To such an extent, SQL Injection can provide an attacker with unauthorized access to sensitive data including, customer data, personally identifiable information (PII), trade secrets, intellectual property and other sensitive information.

(What is SQL Injection Link : https://youtu.be/sOIcebDD-bY)

How SQL Injection works

In order to run malicious SQL queries against a database server, an attacker must first find an input within the web application that is included inside of an SQL query.
In order for an SQL Injection attack to take place, the vulnerable website needs to directly include user input within an SQL statement. An attacker can then insert a payload that will be included as part of the SQL query and run against the database server.
The following server-side pseudo-code is used to authenticate users to the web application.
# Define POST variables uname = request.POST['username'] passwd = request.POST['password'] # SQL query vulnerable to SQLi sql = “SELECT id FROM users WHERE username=’” + uname + “’ AND password=’” + passwd + “’” # Execute the SQL statement database.execute(sql)
The above script is a simple example of authenticating a user with a username and a password against a database with a table named users, and a username and password column.
The above script is vulnerable to SQL Injection because an attacker could submit malicious input in such a way that would alter the SQL statement being executed by the database server.
A simple example of an SQL Injection payload could be something as simple as setting the password field to password’ OR 1=1.
This would result in the following SQL query being run against the database server.
SELECT id FROM users WHERE username=’username’ AND password=’passwordOR 1=1
An attacker can also comment out the rest of the SQL statement to control the execution of the SQL query further.
- MySQL, MSSQL, Oracle, PostgreSQL, SQLite
' OR '1'='1' --
' OR '1'='1' /*
-- MySQL
' OR '1'='1' #
-- Access (using null characters)
' OR '1'='1' 
' OR '1'='1' %16
Once the query executes, the result is returned to the application to be processed, resulting in an authentication bypass. In the event of authentication bypass being possible, the application will most likely log the attacker in with the first account from the query result — the first account in a database is usually of an administrative user.

The anatomy of an SQL Injection attack

An SQL Injection needs just two conditions to exist – a relational database that uses SQL, and a user controllable input which is directly used in an SQL query.
In the example below, it shall be assumed that the attacker’s goal is to exfiltrate data from a database by exploiting an SQL Injection vulnerability present in a web application.
Supplying an SQL statement with improper input, for example providing a string when the SQL query is expecting an integer, or purposely inserting a syntax error in an SQL statement cause the database server to throw an error.
Errors are very useful to developers during development, but if enabled on a live site, they can reveal a lot of information to an attacker. SQL errors tend to be descriptive to the point where it is possible for an attacker to obtain information about the structure of the database, and in some cases, even to enumerate an entire database just through extracting information from error messages – this technique is referred to as error-based SQL Injection. To such an extent, database errors should be disabled on a live site, or logged to a file with restricted access instead.
Another common technique for exfiltrating data is to leverage the UNION SQL operator, allowing an attacker to combine the results of two or more SELECT statements into a single result. This forces the application to return data within the HTTP response – this technique is referred to as union-based SQL Injection.
The following is an example of such a technique. This can be seen on testphp.vulnweb.com, an intentionally vulnerable website hosted by Acunetix.
The following HTTP request is a normal request that a legitimate user would send.
HTTP request a legitimate user would send
Although the above request looks normal, the artist parameter in the GET request’s query string is vulnerable to SQL Injection.
The SQL Injection payload below modifies the query to look for an inexistent record by setting the value in the URL’s query string to -1 (it could be any other value that does not exist in the database, however, an ID in a database is less likely to be a negative number).
In SQL Injection, the UNION operator is commonly used to allow an attacker to join a malicious SQL query to the original query intended to be run by the web application. The result of the injected query will be joined to the result of the original query, allowing an attacker to exfiltrate data out of a database by obtaining values of columns from other tables.
SQL injection using the UNION operator
The above example proves that the query to the database can be modified to return data which an attacker may want to extract. The following example shows how an SQL Injection payload could be used to exfiltrate data from this intentionally vulnerable site.
SQL injection using the UNION operator with a FROM clause



What is SQL Injection???

Friday, July 6, 2018

FBI Operating System....

FBI agent wearing FBI uniformRecently, Dark Web News published a story about the Federal Bureau of Investigation (FBI)’s very public Joint Criminal Opioid Darknet Enforcement (dubbed the J-CODE team), and their targeting of high profile vendors on darknet markets.




It’s unquestionably a politically charged initiative on the back of the Trump administration’s rhetoric which seems to consist of his left hand of being tough and hard on drug users, while using the right hand to tweet.
In a coordinated media effort, the FBI has released a video on YouTube seemingly in an attempt to both instil fear in all those that might be in their crosshairs, and satisfy those that crusade in the 40-year so-called “War on Drugs.”
The clip is relatively tame, showing the internals of a darknet market and the reviews left on a very popular vendor’s listing.
What’s more interesting in these types of videos is the window the audience briefly gets to see from the outside world into what’s beyond their narrative—right into their office.
Even if it is all for show, there are little things to notice here:
  1. An FBI Cyber Team Member Uses a 11” MacBook Air
From this information, simply the type of computer used, we immediately understand that this isn’t a run of the mill, stock standard team, issued with some enterprise Windows 7 box. These agents may get to select their own gear, or the FBI may trust Apple’s source code a little more than Microsoft.
What can we take away from this? We can take away that if the FBI cyber team puts their faith in a Mac, maybe we should too.
But wait, they are clearly running what appears to be a Windows 10 desktop? Yes, they are. And interestingly, it’s an unauthorized version.
We can see the unmistakable watermark of an unregistered Windows operating system in the bottom righthand corner of their screen.
  1. But, the Video Shows the Windows OS
Since it’s clearly a Windows operating system on Apple hardware, the agent is either dual booting the MacBook Air, or more likely, this person is running a virtual machine.
This, again, reveals an important piece of information to us, and something darknet market users need to take note of: running a virtual machine should be the minimum for accessing marketplaces. More secure would be booting an operating system like Tails from a USB, but it seems that the FBI is happy with the level of operational security a virtual machine, that is sandboxed from the rest of the computer’s file systems, provides them.
There is another element of trust which arises when using a virtual machine on a computer: the host computer does have the final say when it comes to the security of your virtual operating system since traffic passes through.
If the host system is compromised, so too can the virtual box. It isn’t failsafe. That’s why you’ll find that Tails is a very secure method of accessing the dark web and using darknet markets.
It appears as though the FBI team trusts Apple’s source code to a pretty high degree. But who knows whether the FBI has had access to Apple’s source code and have been able to perform their own audit.
They do have the ability to break Apple’s pretty reasonable encryption (insofar as massive consumer grade products go).
The Overall Message
The clip progresses to a bunch of heavily armed agents and officers from a variety of organizations, presumably to get a pretty clear message across. They are coming. We can deduct from this that they still see the War on Drugs as an actual war, as opposed to a societal issue not addressed.
It’s abundantly clear from multiple sources that addiction should not be a crime, nor does imprisonment treat issues.
Case in point is Portugal. They are a model of what the future should be. Freedom, choice, and safety.
Perhaps we’re reading into it all too much. It’s a short promotional clip. Perhaps it all is what it is and the short clip means very little.
Perhaps. But I guarantee that every piece of information the FBI and other investigatory organizations get their hands on is examined, twisted, hypothesized and stereotyped.
Every chunk of metadata is used and processed to profile their targets. Those of us who are not targets, who are law-abiding and reasonable, need to put the magnifying glass back to where it belongs: the government and all its arms and legs.