Sunday, June 29, 2008

Connect to Your Friends PC

Well as I already mentioned you can hack any system as it is conected to what we call “INTERNET”. To connect internet a system allocates a port for communication and Data Transfer. So we got to do is to get into that port that is to be hacked.


Steps: -

1. Software PORT SCANNER from google.
2. The IP address of the victim whose port is open.
3. NETLAB which gives u all information includes victim IP address,Area from where
he is accessing internet….
4. The IP of victim u found initially into NETLAB .
5. Thats it now you can access his system.

Note : This is really Hardcore Hacking and you should be very much careful while doing all this and you do all this on your own responsibility. This site is never responsible for anything you after reading any article from this site and there are almost 50-50 chances that you may get caught so don’t try this unless you are aware of everthing. Yes you can freak some of your friends by telling them that you can hack their systems very easily.

The above is only for Education Purpose

Phishing

This goes into more detail on how to create a fake page to login, and get redirected while it is sending a email of the password and username to your inbox. If you found this easy, then try out the post, “How to Hack Gmail, Yahoo, Hotmail, Orkut or Any Other”


Fake login page is a fake page which you can use to hack others username and password. Fake login page looks exactly like the original page and if someone login in your page using his original username and password, the username and password will be mailed to you
The process of Hacking anyone’s id using fake login pages is known as Phishing

Now let’s learn how to create your very own fake login page.

{1} Open www.jotform.com and Sign Up.
{2} then Login there with your newly registered account.
{3} now click on ‘ Create your first form’.
{4} Now delete all the pre-defined entries, just leave ‘First Name:’ (To delete entries, select the particular entry and then click on the cross sign.)
{5} Now Click on ‘First Name:’ (Exactly on First Name). Now the option to Edit the First Name is activated, type there “username:” (for Gmail) or YahooId: (for Yahoo)
{6} Now Click on ‘Power Tool’ Option (In right hand side…)
{7} Double click on ‘Password Box’. Now Click the newly form password entry to edit it. Rename it as ‘Password:’
{8} Now Click on ‘Properties’ Option (In right hand side…). These are the form properties.
{9} You can give any title to your form. This title is used to distinguish your forms. This Title cannot be seen by the victim.
{10} Now in Thank You URL you must put some link, like http://www.google.com or anything. Actually after entering username & password, user will get redirect to this url.(Don’t leave it blank…)
{11} Now Click on ‘Save’. After saving, click on ‘Source’ Option.
{12} Now you can see two Options, namely ‘Option1′ & ‘Option2′. Copy the full code of ‘Option2′.
{13} Now open Notepad text editor and write the following code their.
Paste the Option2 code here
{14} And now save this as index.html. And then host it, mean you will have to put it on the internet so that everyone can view it. Now i think that you would be knowing it and if in case you do not know it please leave a comment with your email-id and i will mail you how to do it.
Now you can view it by typing the url in the address bar.
NOTE: If u want to send it to the internet, then first you will have to create a hosting account which you can create on www.110mb.com and there are many other sites which you can find on the internet very easily.
I suppose that you created your account at 110mb.com
now login to your account then click on “File Manager”, then click on “upload files” or just “upload”. Then select the file which you want to send to the internet and click on upload. And you are done.
Now you can access you file on the net by just typing the url ofthe file.
And you will receive password of the users that login to your site through email-id which you’ve entered while creating the form.

Note: Guys this is totally a Crime thing to do

Phishing is Crime do not do. The above is only for Educational Purpose

Login and View Locked Scrapbook

There are three ways to use this hack.You can choose the one that best suits you.

a> Login To Your Sandbox Profile and Directly View The Locked Scrapbook

or

b> Using this Javascript :

* Navigate to the profile which has disallowed non-friends to view his/her scrapbook
* Run this script in the address bar

* javascript:document.location=’http://scraphack.cspbrasil.com/ViewScraps.php?uid=’+encodeURIComponent(location.href);void(0)

* Wait for 4-5 seconds and you will get to see the scraps.

or

c> Userscript (Credits - D3 ) - The Recommended Method because you need not run any script again and again. Kindly follow the instructions stated below:

* Install Grease Monkey in case you don’t have it - Search for it on google (another way to resort to Firefox)
* Install View Locked Scrapbook Script
* In case you have any problems downloading or operating these scripts, you must read this tutorial.

Page hits flooder

This small program can flood ur page hits.

but you have to dedicate one browser for it.. like internet explorer
method:
make a batch file with these lines

@echo off
:1
start C:\Progra~1\Intern~1\iexplore.exe “http://yoursite.com“
ping -n 10 127.0.0.1 >nul
taskkill.exe /im iexplore.exe
goto 1

depending upon your net speed u may increase the 10 secs time wait

with 10 sec time u may have 360 hits in an hour
with 5 sec time u may have 720 hits in an hour

Track I P Address fo Email

When you recieve an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.



First of all, the IP address is generally found in the headers enclosed beween square brackets, for instance, [129.130.1.1]
Finding IP address in Gmail

1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the email headers,

* Click on the inverted triangle beside Reply. Select Show Orginal.

4. manually find the IP address, proceed to 5.
5. Look for Received: from followed by the IP address between square brackets [ ].

Received: from [69.138.30.1] by web4587.mail.***.yahoo.com

6. If you find more than one Received: from patterns, select the last one.
7. Track the IP address of the sender

Finding IP address in Yahoo! Mail

1. Log into your Yahoo! mail with your username and password.

2. Click on Inbox or whichever folder you have stored your mail.

3. Open the mail.

4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,

* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail

5. You should see similar headers like above

Or if you want to manually find the IP address, proceed to 6.

6. Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.

That is be the IP address of the sender.
If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.


7. Track the IP address of the sender

Finding IP address in Hotmail

1. Log into your Hotmail account with your username and password.

2. Click on the Mail tab on the top.

3. Open the mail.

4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,

* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked
* Click on Ok button
* Go back to the mails and open that mail

5. You should see the email headers now.

6. manually find the IP address, proceed to 7.

7. If you find a header with X-Originating-IP: followed by an IP address, that is the sender’s IP address

Hotmail headers

In this case the IP address of the sender is [68.34.60.59].

8. If you find a header with Received: from followed by a Gmail proxy like this

Hotmail headers

Look for Received: from followed by IP address within square brackets[
In this case, the IP address of the sender is [69.140.7.58].

9. Or else if you have headers like this

Hotmail headers

Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [61.83.145.129] (Spam mail).

10. If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.

11. Track the IP address of the sender


Actually Frankly Speaking the above works only when the mail is sent from some Some Outlook or such third pary softwares. But if its sent from the Web Browser then you can try the above but not for sure if thats going to help..

Tuesday, June 17, 2008

Enable / Disable the Task Manager

1) Start Regedit

2) Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System

3) Create the Dword value DisableTaskMgr

4) Give it a value of 0 to enable it

5) Give it a vaule of 1 to disable it

Cleaning the Prefetch Directory

WindowsXP has a new feature called Prefetch. This keeps a shortcut to recently used programs.
However it can fill up with old and obsolete programs.

To clean this periodically go to:


1) Star / Run / Prefetch
2) Press Ctrl-A to highlight all the files
Delete them

DOS Printing

Faster DOS Printing


If you are experiencing slow printing for DOS programs with Windows2000
1) Go Start | Run | Regedit
2) Click Hkey_Local_Machine
3) Click on System
4) Click CurrentControlSet
5) Click Control
6) Go to the bottom of this part of the list and click WOW
7) Click LPT timeout and change it to a 3

Services You Can Disable

There are quite a few services you can disable from starting automatically.
This would be to speed up your boot time and free resources.
They are only suggestions so I suggestion you read the description of each one when you run Services
and that you turn them off one at a time.

Some possibilities are:

1) Alerter - Sends alert messages to specified users that are connected to the server computer.
2) Application Management - Allows software to tap directly into the Add/Remove Programs feature via the Windows Installer technology.
3) Background Intelligent Transfer Service - The Background Intelligent Transfer service is used by programs (such as Windows AutoUpdate) to download files by using spare bandwidth.
4) Clipbook - ClipBook permits you to cut and paste text and graphics over the network.
5) Error Reporting Service - Allows applications to send error reports to Microsoft in the event of an application fault.
6) Fast User Switching - Windows XP allows users to switch quickly between accounts, without requiring them to log off.
7) Help and Support - Allows the XP Built-in Help and Support Center to run.
8) IMAPI CD-Burning COM Service - You don't need this if you have other software to create CDs.
9) Indexing Service - Indexes contents and properties of files on local and remote computers; provides rapid access to files through flexible querying language.
10) IP SEC - Manages IP security policy and starts the ISAKMP/Oakley (IKE) and the IP security driver. If you are not on a domain, you likely don't need this running.
11) Messenger - Transmits net send and Alerter service messages between clients and servers. This is how a lot of pop-up windows start appearing on your desktop.
12) Net Logon - Supports pass-through authentication of account logon events for computers in a domain. If you are not on a domain, you don't need this running
13) Network DDE - Provides network transport and security for Dynamic Data Exchange (DDE) for programs running on the same computer or on different computers.
14) NT LM Security Support Provider - Provides security to remote procedure call (RPC) programs that use transports other than named pipes.
15) Performance Logs and Alerts - Collects performance data from local or remote computers based on preconfigured schedule parameters, then writes the data to a log or triggers an alert. If you don't need to monitor your performance logs, then you don't need this service.
16) Portable Media Serial Number - Retrieves the serial number of any portable music player connected to your computer
17) QOS RSVP - Provides network signaling and local traffic control setup functionality for QoS-aware programs and control applets.
18) Remote Desktop Help Session Manager - Manages and controls Remote Assistance. If you are not using Remote Desktop you don't need this service.
19) Remote Registry - Enables remote users to modify registry settings on this computer.
20) Routing & Remote Access - Offers routing services to businesses in local area and wide area network environments. Allows dial-in access.
21) Secondary Login - Enables starting processes under alternate credentials. This is what allows you to run an application as another user.
22) Smart Card - Manages access to smart cards read by this computer.
Smart Card Helper - Enables support for legacy non-plug and play smart-card readers used by this computer.
23) SSDP Discovery Service - Enables discovery of UPnP devices on your home network.
24) TCP/IP NetBIOS Helper - Enables support for NetBIOS over TCP/IP (NetBT) service and NetBIOS name resolution. This should not be needed in today's network environment.
25) Telnet - Enables a remote user to log on to this computer and run programs, and supports various TCP/IP Telnet clients.
26) Uninterruptible Power Supply Service - Manages an uninterruptible power supply (UPS) connected to the computer.
27) Universal Plug and Play Device Host - Provides support to host Universal Plug and Play devices
28) Upload Manager - Manages synchronous and asynchronous file transfers between clients and servers on the network.
29) Volume Shadow Copy Service - Manages and implements Volume Shadow Copies used for backup and other purposes.
30) Web Client - Enables Windows-based programs to create, access, and modify non-local files across the Internet.
31) Wireless Zero Configuration - Provides automatic configuration for the 802.11 adapters
32) WMI Performance Adapter - Provides performance library information from WMI HiPerf providers.

Fixing Cryptographic Services Error

Fixing Cryptographic Services Error

If you get an error about the Cryptographic services when trying to apply the Security Updates or Service Pack 1,

run the following from
Start / Run - note,

you might want to just cut and paste the text.

net stop cryptsvc
ren %systemroot%\system32\catroot2 oldcatroot2
net start cryptsvc
regsvr32 softpub.dll
regsvr32 wintrust.dll
regsvr32 initpki.dll
regsvr32 dssenh.dll
regsvr32 rsaenh.dll
regsvr32 gpkcsp.dll
regsvr32 sccbase.dll
regsvr32 slbcsp.dll
regsvr32 cryptdlg.dll

Running Network Diagnostics

Running Network Diagnostics


Network Diagnostics scans your system to gather information about your hardware, software, and network connections.

Start / Run / NETSH DIAG GUI


The following is the type of information that can be displayed:

1) Ping
2) Connect
3) Show
4) Verbose
5) Save to Desktop
6) Mail Service
7) News Service
8) Internet Proxy Server
9) Computer Information
10) Operating System
11) Windows Version
12) Modems
13) Network Clients
14) Network Adapters
15) Domain Name System (DNS)
16) Dynamic Host Configuration Protocol (DHCP)
17) Default Gateways
18) Internet Protocol Address
19) Windows Internet Naming Service (WINS)

Hiding a XP Computer from Network Neighborhood

If you want to share files from a XP computer,
yet want to remove it from showing up in the Network Neighborhood,

Run net config server /hidden:yes

Identify Faulty Device Drivers

Identify Faulty Device Drivers


If you are having problems with lockups, blue screens, or can only get to safe mode,
often the problem is due to a faulty device driver.

One way to help identify them is through the use of the Verfier program
1) Start / Run / Verifier
2) Keep the default of Create Standard Settings
3) Select the type of drivers you want to confirm
4) A list of drivers to be verified on the next boot will be shown.
Reboot
5) If your computer stops with a blue screen, you should get an error message with the problem driver
6) To turn off the Verifier, run verifier /reset