How To Create Your Own VPN

Don't buy a VPN, Instead Make your own



Don't waste your money on a VPN. They're expensive, slow and you don't know if they're truely not logging you. Just make your own. This takes less than 5 minutes to do and is very easy. I did this a few days ago and actually forgot it was on, the speeds are very close. Here's proof...



My Speed without a VPN


My Speed with a VPN


VPN Speed when I bought from a commercial VPN Provider : 


t's extremely simple to set up. First, buy a cheap vps from a data center. I have worked with a lot of data centers and found that you get what you pay for. Cheap hosts often put way too people on a single server and have low internet speeds. My VPS provider of choice is RamNode or Digital Ocean, however you can use whoever you want (but remember, less cost usually means less speeds). You need around 96mb ram (64mb ram won't cut it!) and 0.5GB disk space (as you need to install an OS as well) minimum, so keep that in mind if you buy a non-ramnode VPS. 

If you chose to go with Ramnode, the VPS you need is $16 per year with the coupon code IRC33, which is much lower than all VPN providers' ( All VPN Providers charge $5 [minimum] per month so, that totals to $60 Per Year, where as using Ramnode, You are spending $16 per year) . The VPS you want is either of the OpenVZ/SVZ servers. You can chose if you want a better processor and an SSD for 10GB storage space, or a lesser processor with SSD-cached storage for 50GB storage space. Either will result in the same speeds. Chose then one you want and chose "View Plans". Chose the location closest to you, then buy the 128MB CVZ-E5 option (it says $24 but that's before the IRC33 code, which gives 33% off recurring). Hit order now, and buy it like any other WHCMS system. When you're choosing the operating system, chose "Debian 7.0 32 bit" (not 64bit because that uses slightly more ram, and is useless unless you have more than 4GB ram) Once you pay, you'll get an email that looks like this:

Log into the Ramnode SolusVM control panel and chose your server. Click "Boot" if it's not online already, and scroll down to the bottom. Turn the "TUN/ATP" box to On, so it looks like this:


Your server may reboot.

Download PuTTY and put the IP address (in the email) in the host name, then "22" in the port. Log in with the username "root" and the password supplied in the email. 

Run the following commands in the order I put them here. Wait for the old command to end, obviously. You can right-click in putty to paste:
 wget http://swupdate.openvpn.org/as/openvpn-as-1.8.4-Ubuntu10.i386.debdpkg -i openvpn-as-1.8.4-Ubuntu10.i386.debpasswd openvpn (change the pass to whatever you want)

Go to [your ip]:943/admin and ignore the SSL warning. Login with the username "openvpn" and the password you entered in the previous command. Click agree. Turn the server on if it's not on yet.

Download and install the openvpn client. Put your IP in the host box, then the username and password you used in the admin page as the login. That's it, you're done!

The only downside to this is that you have 500GB bandwith per month before you're charged an extra $4 per 1TB bandwith you use. I've never run into this issue. 


0 comments:

How to steal SSL Encrypted Passwords on WiFi Using Backtrack 5 & Ettercap


I am simply teaching how Arp Spoof and Ettercap work.


What does ettercap do?

Well it does a lot of things but today we are going to show how a hacker can steal SSL encrypted passwords over wifi! SSL encrypted sites are like Gmail, Yahoo, Paypal etc! Anything with https:// in front of it. 

How does it do this you ask? Confused

It works by ARP Spoofing your Victims IP and when the site they visit tries to serve an SSL Cert ettercap injects it's own fake cert and captures the password! Brilliant! 

1. Let's get started!

 First scroll to your dolphin file browser. It is the little icon in the bottom that looks like a file cabnet.

Click on the root folder 

Then open the etc folder and scroll down until you find a file called "etter.conf"

scroll down until you see this:

#---------------
#     Linux
#---------------
# if you use ipchains:
   #redir_command_on = "ipchains -A input -i %iface -p tcp -s 0/0 -d 0/0 %port -j REDIRECT %rport"
   #redir_command_off = "ipchains -D input -i %iface -p tcp -s 0/0 -d 0/0 %port -j REDIRECT %rport"
# if you use iptables:
   redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
   redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"

Now we need to remove 2 # symbols to allow the Redir command to work in iptables. Make yours looks like this:


Change this: 
# if you use iptables:
   #redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
   #redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"

To This:
# if you use iptables:
   redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
   redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"

Great now the two # symbols are deleted just close and save!

2. Let's Open Ettercap!

Click the backtrack logo on the bottom left -> backtrack tab -> privilege escalation -> protocol analysis-> network sniffers -> ettercap-gtk



3. Now click Sniff and select unified sniffing.





4. Select your Network interface. In my case it is wlan0 my wifi but yours may be diferent!




5. Now click the Host tab and Scan for hosts.




6. Now click the host tab and select the host list option.

7. Now it's time to select your targets from the host list! Select your router mine was 192.168.1.1 and add it to host 2.
Next select your victim mine was 192.168.1.6 and add it to host 1.




8. Next go to the Mitm tab and select arp poisoning and check the box for remote sniffing and click ok!




9. Click the Start button and then the Start Sniffing option.


NOTE THIS TUTORIAL IS FOR EDUCATIONAL PURPOSES ONLY!!!

0 comments:

Jailbreaking PS3
















►►►Read First◄◄◄ * WATCH IN 1080p* !

Hey guys and welcome to my new video. Today i want to show you how to jailbreak your Sony playstation 3 ( PS3 ) . This does not work on the Playstation 4 ( PS4 ) . 

Currently there is no Jailbreak for the PS4 , and only PS3´s with a OFW of 3.55 or below are jailbreakable.

Also the new super slim is currently NOT jailbreakable.

Download Links:

CFW & OFW :

http://www.tortuga-cove.com/forums/vi...

CFW comparison :

http://www.ps3hax.net/showthread.php?...
http://www.ps3hax.net/showthread.php?...
http://www.ps3hax.net/forumdisplay.ph...

PS3 hacking guide :

http://www.youtube.com/watch?v=by0QGE...

Written Tutorial :

Q: What can a jailbroken Playstation 3 system do?
A: When a PS3 is jailbroken, it allows the use of installing package files, which can range from Emulators or programs that allow you to install free games from a black market marketplace. You can also mod games such as Call of Duty , download free movies with the removal of Cinavia, which disallowed the downloading of movies onto the system after 3.10 , and run FTP clients, and much more!

Q: Can I jailbreak 4.50?
A: You can in a sense. You must downgrade first, and in order to downgrade you must have had a console on 3.55 at one time. Super slims cannot be jailbroken.
Q: I have the E3 Installed an downgraded, what's the next step to get online?
A: To get online you use a spoof, which in retrospect, makes your system think it's on the current version, but isn't.

One common question I find on here time and again is "Can I jailbreak my PS3?" The answer is simple. You MUST be on version 3.55, and you MUST have 2 PS3 consoles, just to make this easier on yourself. Some PS3 slim models will not be able to be downgraded, so please refer to the Next Steps part, and check the compatibility there. To check your current version, on the XMB Main screen navigate to Settings-System Settings-System Info. The "System Version" is where your current version will be. Consoles that have not at one time been on 3.55 cannot be jailbroken either. So, if you bought a PS3 from Walmart and it came out of the box on 3.60, your out of luck. You may also check the requirements here.

The USB Step:

In order to jailbreak, download the CFW, and plug in your USB flash drive. In your flash drive, right-click and format your flash drive to FAT32. Once that is done, go into your USB, and create a new folder. Name this folder "PS3" without the quotations. Inside the PS3 folder, create a folder called "Update" without the quotations. In this folder, you should place the PS3UPDATE.PUP, which is found in the download for the Kmeaw 3.55 download. You can now safely eject your USB, and plug it into your PS3.

Source: 

http://www.se7ensins.com/forums/threa...

●▬▬▬▬▬▬▬▬▬▬▬▬▬●

Just follow the steps shown in the Video :- )

0 comments:

Pages