I am not sure that this will work 100 %.
But yes will work almost 70 percent of the times.
But before that you need to know some few things of yahoo chat protocol
leave a comment here after u see the post lemme know if it does works or not or u having a problem post here.
Following are the features : -
1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.
2) When we send files yahoo has 2 options
a) Either it uploads the file and then the other client has to down load it.
Either it connects to the client directly and gets the files
3) When we use video or audio:-
a) It either goes thru the server
Or it has client to client connection
And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.
So lets analyse
1) Its impossible to get a Attackers IP address when you only chat.
2) There are 50 % chances of getting a IP address when you send files
3) Again 50 % chances of getting IP when you use video or audio.
So why to wait lets exploit those 50 % chances .
I'll explain only for files here which lies same for Video or audio
1) Go to dos
type ->
netstat -n 3
You will get the following output.Just do not care and be cool
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->
2) Try sending a file to the Target .
if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is established
HMMMM then the first attacker first phase is over
This is the output in your netstat.The 5101 number port is where the Attacker is connected.
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED
3) so what next???
Hmmm........ Ok so make a DOS attack now
Go to dos prompt and
Just do
nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.
C:\>nbtstat -A 194.30.209.14
Local Area Connection:
Node IpAddress: [194.30.209.15] Scope Id: []
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------
EDP12 <00> UNIQUE Registered
XYZ <00> GROUP Registered
XYZ <20> UNIQUE Registered
XYZCOMP1 <1e> GROUP Registered
MAC Address = 00-C0-W0-D5-EF-9A
What to do next??
It is now ur job to tell me what u have done next...
So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.
Hacking pc while chating
mobile bluetooth hacker
Yes guys it is the super mobile bluetooth hacker
Once connected to a another phone via bluetooth you can:
- read his messages
- read his contacts
- change profile
- play his ringtone even if phone is on silent
- play his songs(in his phone)
- restart the phone
- switch off the phone
- restore factory settings
- change ringing volume
- And here comes the best
Call from his phone" it includes all call functions like hold etc.
Notes:
1.) When connecting devices use a code 0000
2.) At start of programm on smartphones do not forget to turn on bluetooth before start of the application
What else you want
Just go and downlaod it
download
enjoy and keep visiting us
All windows games cheats and cracks
Minesweeper
Secret - Reveal Mines
Instructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.
Pinball
Secret - Extra BallsInstructions - Type 1max at the start of a new ball to get extra balls.
Secret - Gravity WellInstructions - Type gmax at the start of a new game to activate the Gravity Well.
Secret - Instant PromotionInstructions - Type rmax at the start of a new game to go up in ranks.
Secret - Skill ShotInstructions - Launch the ball partially up the chute past the third yellow light bar so it falls back down to get 75,000 points. There are six yellow light bars that are worth a varying amount of points:
First: 15,000 pointsSecond: 30,000 pointsThird: 75,000 pointsFourth: 30,000 pointsFifth: 15,000 pointsSixth: 7,500 points
Secret - Test ModeInstructions - Type hidden test at the start of a new ball to activate Test Mode. No notification will be given that this is activated but you can now left-click the mouse button and drag the ball around.
Secret - Unlimited BallsInstructions - Type bmax at the start of a new ball. No notification will be given that this is activated but when a ball is lost a new ball will appear from the yellow wormhole indefinitely. Once this is activated you will be unable to activate other secrets without restarting
FreeCell
Secret - Instant WinInstructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.
Secret - Hidden Game ModesInstructions - In the “Game” menu choose “Select Game”. Enter -1 or -2 to activate the hidden game modes.
Solitaire
Secret - Instant Win
Instructions - Press Alt + Shift + 2 during game play to instantly win.
Secret - Draw single cards in a Draw Three game
Instructions - Hold down CTRL + ALT + SHIFT while drawing a new card. Instead of drawing three cards you will only draw one.
Infinite Points
In the Windows XP version of solitaire, draw from the deck at least twice. Hold control and drag a card down from the deck. Click the “A” key and then let go of the left mouse key. You will get 10 points for this. Continue doing this for infinite points!
Infinite points trick II
To do this trick, finish a game of solitaire with the time bonus option on. The cards will start bouncing. Click on the solitaire screen and the play again box will pop up. Select no, so the solitaire screen is just blank green. Use the instant win cheat (Alt+Shift+2) and you will recieve the time bonus you got last game will be added to your last game’s score. For example, if your time bonus was 5000, and your final score was 6000, after using this glitch, you will have a score of 11000. This glitch can be used as many times as you want.
//—————————————————————–// registry hack which will allow you to see your opponents’ cards//—————————————————————– Launch REGEDIT.EXE and navigate to HKEY_CURRENT_USER Software Microsoft Windows CurrentVersion Applets Hearts. NOTE: You may have to create the Hearts key under Applets In the right-hand pane, create a new String Value. Immediately rename it to “ZB” (without the quotes); give it a value of “42″ (again, sans quotes). The next time you’re in a game of Hearts, press CTRL + SHIFT + ALT + F12.
hacking through yahoo
Hack a Yahoo Account While Chatting
This is only for education purpose.So who ever try this is at his risk.I am not sure that this will work 100 %.But yes will work almost 70 percent of the times.But before that you need to know some few things of yahoo chat protocolleave a comment here after u see the post lemme know if it does works or not or u havin a problem post here
Following are the features : -1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.2) When we send files yahoo has 2 optionsa) Either it uplo--- the file and then the other client has to down load it.b) Either it connects to the client directly and gets the files3) When we use video or audio:-a) It either goes thru the serverb) Or it has client to client connectionAnd when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remeber i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.So lets ----yse1) Its impossible to get a Attackers IP address when you only chat.2) There are 50 % chances of getting a IP address when you send files3) Again 50 % chances of getting IP when you use video or audio.
So why to wait lets exploit those 50 % chances.I will explain only for files here which lies same for Video or audio1) Go to dostype ->netstat -n 3You will get the following output.Just do not care and be coolActive Connections
Proto Local Address Foreign Address StateTCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHEDTCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHEDTCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHEDTCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Active Connections
Proto Local Address Foreign Address StateTCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHEDTCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHEDTCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHEDTCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->
2) Try sending a file to the Target .if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is establishedHMMMM then the first attacker first phase is overThis is the output in your netstat.The 5101 number port is where the Attacker is connected.Active Connections
Proto Local Address Foreign Address StateTCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHEDTCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHEDTCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHEDTCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHEDTCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED
Thats what is highlighted in RED. So what next3) Hmmm Ok so make a DOS attack nowGo to dos prompt andJust donbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.C:\>nbtstat -A 194.30.209.14
Local Area Connection:Node IpAddress: [194.30.209.15] Scope Id: []
NetBIOS Remote Machine Name Table
Name Type Status---------------------------------------------EDP12 <00> UNIQUE RegisteredSHIV <00> GROUP RegisteredSHIV <20> UNIQUE RegisteredSHIVCOMP1 <1e> GROUP Registered
MAC Address = 00-C0-W0-D5-EF-9A
Ok so you will ask now what next.No you find what you can do with this network than me explaining everything.
So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.
mobilecheat codes fr all phones
NOKIA:
CODES DESCRIPTIONS
*3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talk time is reduced my approx. 5%
#3370# Deactivate Enhanced Full Rate Codec (EFR)
*#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time
*#4720# Deactivate Half Rate Codec
*#0000# Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type
*#9999# Phones software version if *#0000# does not work
*#06# For checking the International Mobile Equipment Identity (IMEI Number)
#pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
#pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
#pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
#pw+1234567890+4# SIM Card Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
*#147# (vodafone) this lets you know who called you last
*#1471# Last call (Only vodofone)
*#21# Allows you to check the number that "All Calls" are diverted to
*#2640# Displays security code in use
*#30# Lets you see the private number
*#43# Allows you to check the "Call Waiting" status of your phone.
*#61# Allows you to check the number that "On No Reply" calls are diverted to
*#62# Allows you to check the number that "Divert If Unreachable (no service)" calls are diverted to
*#67# Allows you to check the number that "On Busy Calls" are diverted to
*#67705646# Removes operator logo on 3310 & 3330
*#73# Reset phone timers and game scores
*#746025625# Displays the SIM Clock status, if your phone supports this power saving feature "SIM Clock Stop Allowed", it means you will get the best standby time possible
*#7760# Manufactures code
*#7780# Restore factory settings
*#8110# Software version for the nokia 8110
*#92702689# Displays - 1.Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair (0000 for no repairs), 5.Transfer User Data. To exit this mode you need to switch your phone off then on again
*#94870345123456789# Deactivate the PWM-Mem
**21*number# Turn on "All Calls" diverting to the phone number entered
**61*number# Turn on "No Reply" diverting to the phone number entered
**67*number# Turn on "On Busy" diverting to the phone number entered
12345 This is the default security code
press and hold # Lets you switch between lines
*#3283# or *#DATE# Date of Manufacture
*#682371158412125# Software Version
__________________________________________________ ________________________
SIEMENS:
MODELS CODES & DESCRIPTIONS
*#0003*(secret code 8 digits)# All Siemens Phones: Service Provider Unlock
Siemens S25/C25
SP unlock *#0003*(secret code 8 digits)#
Show IMEI code: * # 06 #
Resets language to automatic selection : * # 0000 # then Green button
Pin Out
Data Cable schematics
Phone's connector pin-out:
1- GND
2- SB
3- POWER
4- NC
5- TX
6- RX
7- CLOCK
8- DATA
9- GND MIC
10- HF MIC
11- AUDIO
12- GND AUDIO
Siemens S1/S3/S3 Com
To view the software date and else with S3 com, S4, S4Power, Sony cmdx 1000e press with SIM removed *#06# and left softkey.
To view some other stuff with S4Power, Sony cmdx 1000e press with SIM removed *#06# and left softkey twice.
To view the software date with S3 com, S4, S4Power, Sony cmdx 1000e press with SIM installed menu 98 and left softkey twice.
ACTIVATE MONITOR MODE
Siemens S1/S3
Menu, 9 (Phone Options), 7 (Phone Status), Left Display Button (left MENU key), 5553756, Hang-Up Button (Red Handset key)
Siemens S3 COM/S4:
Menu, 9 (Phone Options), 7 (Phone Status - 8 on Some), Left Display Button (left MENU key), 7684666, Hang-Up Button (Red Handset key)
Note: Now Monitor should appear at the bottom of the Network Options menu.
MONITOR MODE
Pressing the right Display Button when in monitor mode will toggle into 1 and 2 modes
Pressing the right Display Button when in monitor mode will show a list of the six cells with the strongest signals.
Test Mode Indicators: (* = only available when call in progress )
CH Channel Number
RX Signal Strength (dB)
N NCC (Colour Code)
B BCC (Colour Code)
CI Cell ID (in Hex)
C1+ How long before phone does forced hand over. (see RX and RXAM)
LAI Location Area Identity. Display Network ID code (42F010 = 240.01) and MSC
TXPWR Transmit Power (dB)
RXAM Receive signal strength cut-off point
TS* Time Slot Number
TA* Timing Advance. Distance from tower in Km X 2
PL* Power Level
POWER table
PL: 5 6 7 8 9 10 11 12 13 14 15
dB: 33 31 29 27 25 23 21 19 17 15 13
Watts: 2 1.3 .8 .5 .3 .2 .13 .08 .05 .03 .02
LF* C1 value with continuous transmission from tower
LS* C1 Value with discontinuous transmission from tower
QF* Bit Error Rate with continuous transmission from tower
QS* Bit Error Rate with discontinuous transmission from tower
BER (bit error rate) table
QF/QS register: 0 1 2 3 4 5 6 7
% of bit sent: 0.2 0.8 0.4 1.6 3.2 6.4 12.8 25.6
Siemens S1/S3:
Here's a trick to play Tetris, also known as Klotz on a Siemens S1.
Turn the phone on. Enter PIN. Before the telephone has logged in to the your GSM net do the following steps.
1: Choose F 9 (function settings)
2: Choose send own number and push the right button for choose.
3: Push 9
USE 2 as <> , rotate the klotz with 5 and drop with 4.
[I have just heard from one of the programmers of the phone that Tetris was in the phone during development, but it was removed before it was produced. Apparently someone has the patent on games in mobile phones and Siemens didn't want to pay the licensing fees. It was either in Menu F-9-9 or it's not there at all.]
Siemens S3 Comfort
MONITOR MODE:
The Siemens S3 Com series have a Monitor mode that can be activated directly from the standard user keypad. In order to activate this mode, you must enter the special access code currently programmed into the phone.
TO ACTIVATE MONITOR MODE:
Turn the phone on.
Enter the PIN access code on press OK. (Only if is enabled).
Press Menu. (Left top button).
Press 9. (Phone Options).
Press 8. (Phone Status) (May be button 7 in some phones).
You may see your IMEI Number
Left Display Button (Top left MENU key).
7684666
Hang-Up Button. (Red Handset key).
Note: Monitor should appear now at the bottom of the Network Options menu.
MONITOR MODE
Pressing the right Display Button when in monitor mode will toggle into 1 and 2 modes
Siemens S4/S4 Power:
In phonebook under "Own Phone No." enter +12022243121 (which is the number to the White House) and you'll get a greeting from the people who programmed the phone.
MONITOR MODE
The Siemens S4 series have a Monitor mode that can be activated directly from the standard user keypad. In order to activate this mode, you must enter the special access code currently programmed into the phone.
TO ACTIVATE MONITOR MODE:
Menu, 9 (Phone Options), 7 (Phone Status), Left Display Button (left MENU key), 7684666, Hang-Up Button (Red Handset key)
Now "Monitor" should appear at the bottom of the Network Options menu.
Pressing the right Display Button when in monitor mode will show a list of the six cells with the strongest signals.
Test Mode Indicators: (* = only available when call in progress )
--------------------
CH Channel Number
RX Signal Strength (dB)
N NCC (Color Code)
B BCC (Color Code)
CI Cell ID (in Hex)
C1+ how long before phone does forced hand over. (see RX and RXAM)
LAI Location Area Identity. Display Network ID code (42F010 = 240.01) and MSC
TXPWR Transmit Power (dB)
RXAM Reeceive signal strength cut-off point
TS* Time Slot Number
TA* Timing Advance. Distance from tower in Km X 2
PL* Power Level
Power Table
PL: 5 6 7 8 9 10 11 12 13 14 15
dB: 33 31 29 27 25 23 21 19 17 15 13
Watts: 2 1.3 .8 .5 .3 .2 .13 .08 .05 .03 .02
LF* C1 value with continuous transmission from tower
LS* C1 Value with discontinuous transmission from tower
QF* Bit Error Rate with continuous transmission from tower
QS* Bit Error Rate with discontinuous transmission from tower
BER (bit error rate) table
QF/QS register: 0 1 2 3 4 5 6 7
% of bit sent: 0.2 0.8 0.4 1.6 3.2 6.4 12.8 25.6
Siemens S6/S10:
In Phonebook, store as your own number: +12022243121
Then you get the sun and two palms in the display, also a greeting message of the "MMI-team".
It has been said that the phone number is the number of the Capitol building in Washington, DC (but not sure).
Siemens S15 Secret Menu's
Press * -> # -> 7 -> 4 -> 3 -> 6 -> 3 -> 6 -> 7 -> * -> 8 -> 3 ->
7 -> 8 -> # ,press clear key to clear screen and return to
stand-by mode
press Menu, it will show additional menu
Menu 3.3.4 Band selection,
Menu 3.3.4.1 Automatic band selection,
Menu 3.3.4.2 select GSM 900 only,
Menu 3.3.4.3 select GSM 1800 only,
Menu 10 Engineering,
Menu 10.1 MS info,
Menu 10.2 software detail,
Menu 10.2.1 software version,
Menu 10.2.2 EEPROM version,
Menu 10.3 Test/production details
Menu 10.3.1 Hardware deta
Menu 10.3.2 production deta
Menu 10.3.3 Service deta
Menu 10.3.4 Mechanical deta
Menu 10.1.1 MS info on, then on the screen show these, for example:
FCN RXL C1 C2
642 011+11+91 -> PAGE 1
CID DSC CB
11211 045 000 -> PAGE 2
BCC NCC TN
000 002 00 -> PAGE 3
RXf RXs RQf RQs
00 00 00 00 -> PAGE 4
ATa APa Hn Hf
001 000 05 00 -> PAGE 5
DTU DTD HP CI
+ ? - - -> PAGE 6
MM CC RR
IdNS Nul Idl -> PAGE 7
__________________________________________________ ________________________
PANASONIC:
CODES DESCRIPTIONS
*#06# For checking the International Mobile Equipment Identity (IMEI Number)
__________________________________________________ ________________________
MOTOROLA:
CODES DESCRIPTIONS
*#06# For checking the International Mobile Equipment Identity (IMEI Number)
[][][] 119 [] 1 [] Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talk time is reduced my approx. 5%
[][][] 119 [] 0 [] Deactivate Enhanced Full Rate Codec (EFR)
__________________________________________________ ________________________
ERICSSON:
CODES DESCRIPTIONS
*#06# For checking the International Mobile Equipment Identity (IMEI Number)
Shortcuts:
Save a Missed Call into your phone directory Scroll to "Missed Call", press "Yes" to display the required number. Press any number (i.e. 0 to 9), then press "clear" once to clear that number, then press & hold "<" until you see "Store". Press "Yes"
Hide your number when calling when you don't want the other party to know your number) After dialling the required number & before pressing "Yes", press ">" twice to choose "Hide Id?" & then press "Yes". Also works for pre-programmed & last dialled numbers just press "No" & wait for the number to appear on the screen first then follow same procedure
Check you battery level when phone is off Press "No" quickly one time & wait for the battery meter to show up!
Save a number into your phone memory (not SIM card) Follow normal procedures to store a phone number. When prompted to set a storage position, press "#" once & key in desired location, or press "#" twice for next available position
Call a phone number from SMS message You can call from within a SMS message if the phone number is written in it. Just scroll the message until the phone number appears on the display, then press "Yes" to call.
G and Benq
BenQ mobile codes
Language Menu for BenQ-Siemens mobile
English menu:
*#0001#
Deutsch menu:
*#0049#
Secret Code for BenQ
*#0606# remove sim card before
Unlock Sim:
*#0003*(secret code)#
Bonus Screen:
*12022243121
Factory settings:
Type *#9999# to reset factory settings.
=============
=============
LG Mobile Codes
On the main screen type *#06#
Information you get from the IMEI (International Mobile Equipment Identity)
XXXXXX XX XXXXXX X
TAC FAC SNR SP
TAC = Type approval code of your LG Mobile
FAC = Final assembly code of your cellphone
SNR = Serial number of your LG Phone
SP = Spare
Other secret tricks for LG mobile or cellphone
LG all models test mode:
Type 2945#*# on the main screen.
2945*#01*# Secret menu for LG
IMEI and SW (LG 510): *#07#
Software version (LG B1200): *8375#
Recount cheksum (LG B1200): *6861#
Factory test (B1200): #PWR 668
Simlock menu (LG B1200): 1945#*5101#
Simlock menu (LG 510W, 5200): 2945#*5101#
Simlock menu (LG 7020, 7010): 2945#*70001#
Simlock menu (LG 500, 600): 2947#*
LG-U81XX SPECIAL CODES
Code to read phone version :
- Phone without SIM
- Enter 277634#*# or 47328545454#
- Select 'SW Ver.info'
Code to reset phone :
- Phone without SIM
- Enter 277634#*# or 47328545454#
- Select 'Factory Reset'
Code to enter UNLOCK MENU :
- Phone wit SIM inside
- Enter 2945#*88110#
Test Menu 8330 : 637664#*#
Test Menu 8180 V10a: 49857465454#
Test Menu 8180 V11a: 492662464663#
Test Menu 8130-8138: 47328545454#
Test Menu 8110-8120: 277634#*
samsung.....
*#1111# S/W Version
*#1234# Firmware Version
*#2222# H/W Version
*#8999*8376263# All Versions Together
*#8999*8378# Test Menu
*#4777*8665# GPSR Tool
*#8999*523# LCD Brightness
*#8999*377# Error Menu
*#8999*327# EEP Menu
*#8999*3825523# Don't Know.
*#8999*667# Debug Mode
*#92782# PhoneModel (Wap)
#*5737425# JAVA Mode
*#2255# Call List
*#232337# Bluetooth MAC Adress
*#5282837# Java Version
#*4773# Incremental Redundancy
#*7752# 8 PSK uplink capability bit
#*7785# Reset wakeup & RTK timer cariables/variables
#*1200# ?
#*7200# Tone Generator Mute
#*3888# BLUETOOTH Test mode
#*#8999*324# ??
#*7828# Task screen
#*5111# ??
#*#8377466# S/W Version & H/W Version
#*2562# Restarts Phone
#*2565# No Blocking? General Defense.
#*3353# General Defense, Code Erased.
#*3837# Phone Hangs on White screen
#*3849# Restarts Phone
#*3851# Restarts Phone
#*3876# Restarts Phone
#*7222# Operation Typ: (Class C GSM)
#*7224# !!! ERROR !!!
#*7252# Operation Typ: (Class B GPRS)
#*7271# CMD: (Not Available)
#*7274# CMD: (Not Available)
#*7337# Restarts Phone (Resets Wap Settings)
#*2787# CRTP ON/OFF
#*2886# AutoAnswer ON/OFF
#*3737# L1 AFC
#*5133# L1 HO Data
#*7288# GPRS Detached/Attached
#*7287# GPRS Attached
#*7666# White Screen
#*7693# Sleep Deactivate/Activate
#*7284# L1 HO Data
#*2256# Calibration info? (For CMD set DEBUGAUTONOMY in cihard.opt)
#*2286# Databattery
#*2527# GPRS switching set to (Class 4, 8, 9, 10)
#*2679# Copycat feature Activa/Deactivate
#*3940# External looptest 9600 bps
#*4263# Handsfree mode Activate/Deactivate
#*4700# Please use function 2637
#*7352# BVMC Reg value (LOW_SWTOFF, NOMINAL_SWTOFF)
#*2558# Time ON
#*3370# Same as 4700
#*3941# External looptest 115200 bps
#*5176# L1 Sleep
#*7462# SIM Phase
#*7983# Voltage/Freq
#*7986# Voltage
#*8466# Old Time
#*2255# Call Failed
#*5187# L1C2G trace Activate/Deactivate
#*5376# DELETE ALL SMS!!!!
#*6837# Official Software Version: (0003000016000702)
#*7524# KCGPRS: (FF FF FF FF FF FF FF FF 07)
#*7562# LOCI GPRS: (FF FF FF FF FF FF FF FF FF FF FF FE FF 01)
#*2337# Permanent Registration Beep
#*2474# Charging Duration
#*2834# Audio Path (Handsfree)
#*3270# DCS Support Activate/Deactivate
#*3282# Data Activate/Deactivate
#*3476# EGSM Activate/Deactivate
#*3676# FORMAT FLASH VOLUME!!!
#*4760# GSM Activate/Deactivate
#*4864# White Screen
#*5171# L1P1
#*5172# L1P2
#*5173# L1P3
#*7326# Accessory
#*7683# Sleep variable
#*8465# Time in L1
#*2252# Current CAL
#*2836# AVDDSS Management Activate/Deactivate
#*3877# Dump of SPY trace
#*7728# RSAV
#*2677# Same as 4700
#*3797# Blinks 3D030300 in RED
#*3728# Time 2 Decod
#*3725# B4 last off
#*7372# Resetting the time to DPB variables
#*7732# Packet flow context bit Activate/Deactivate
#*6833# New uplink establishment Activate/Deactivate
#*3273# EGPRS multislot (Class 4, 8, 9, 10)
#*7722# RLC bitmap compression Activate/Deactivate
#*2351# Blinks 1347E201 in RED
#*4472# Hysteresis of serving cell: 3 dB
#*2775# Switch to 2 inner speaker
#*9270# Force WBS
#*7878# FirstStartup (0=NO, 1=YES)
#*3757# DSL UART speed set to (LOW, HIGH)
#*8726# Switches USBACM to Normal
#*8724# Switches USBACM to Generator mode
#*8727# Switches USBACM to Slink mode
#*8725# Switches USBACM to Loop-back mode
#*3838# Blinks 3D030300 in RED
#*2077# GPRS Switch
#*2027# GPRS Switch
#*0227# GPRS Switch
#*0277# GPRS Switch
#*22671# AMR REC START
#*22672# Stop AMR REC (File name: /a/multimedia/sounds/voice list/ENGMODE.amr)
#*22673# Pause REC
#*22674# Resume REC
#*22675# AMR Playback
#*22676# AMR Stop Play
#*22677# Pause Play
#*22678# Resume Play
#*77261# PCM Rec Req
#*77262# Stop PCM Rec
#*77263# PCM Playback
#*77264# PCM Stop Play
#*2872# CNT
*#8999*283#
#*22679# AMR Get Time
*288666#
*2886633#
*#8999*364# Watchdog ON/OFF
#*8370# Tfs4.0 Test 0
#*8371# Tfs4.0 Test 1
#*8372# Tfs4.0 Test 2
#*8373# Tfs4.0 Test 3
#*8374# Tfs4.0 Test 4
#*8375# Tfs4.0 Test 5
#*8376# Tfs4.0 Test 6
#*8377# Tfs4.0 Test 7
#*8378# Tfs4.0 Test 8
#*8379# Tfs4.0 Test 9
#837837# error=...
#*36245# Turns Email TestMenu on.
*2767*22236245# Email EPP set (....)!
*2767*837836245# Email Test Account!
*2767*29536245# Email Test2 Account!
*2767*036245# Email EPP reset!
*2767*136245# Email EPP set (1)!
*2767*736245# Email EPP set (7)!
*2767*3036245# Email...
*2767*3136245# Email...
*2767*3336245# Email...
*2767*3436245# Email...
*2767*3936245# Email...
*2767*4136245# Email...
*2767*4336245# Email...
*2767*4436245# Email...
*2767*4536245# Email...
*2767*4636245# Email...
*2767*4936245# Email...
*2767*6036245# Email...
*2767*6136245# Email...
*2767*6236245# Email...
*2767*6336245# Email...
*2767*6536245# Email...
*2767*6636245# Email...
*2767*8636245# Email...
*2767*85236245# Email...
*2767*3855# = E2P Full Reset
*2767*2878# = E2P Custom Reset
*2767*927# = E2P Wap Reset
*2767*226372# = E2P Camera Reset
*2767*688# Reset Mobile TV
#7263867# = RAM Dump (On or Off)
*2767*49927# = Germany WAP Settings
*2767*44927# = UK WAP Settings
*2767*31927# = Netherlands WAP Settings
*2767*420927# = Czech WAP Settings
*2767*43927# = Austria WAP Settings
*2767*39927# = Italy WAP Settings
*2767*33927# = France WAP Settings
*2767*351927# = Portugal WAP Settings
*2767*34927# = Spain WAP Settings
*2767*46927# = Sweden WAP Settings
*2767*380927# = Ukraine WAP Settings
*2767*7927# = Russia WAP Settings
*2767*30927# = GREECE WAP Settings
*2767*73738927# = WAP Settings Reset
*2767*49667# = Germany MMS Settings
*2767*44667# = UK MMS Settings
*2767*31667# = Netherlands MMS Settings
*2767*420667# = Czech MMS Settings
*2767*43667# = Austria MMS Settings
*2767*39667# = Italy MMS Settings
*2767*33667# = France MMS Settings
*2767*351667# = Portugal MMS Settings
*2767*34667# = Spain MMS Settings
*2767*46667# = Sweden MMS Settings
*2767*380667# = Ukraine MMS Settings
*2767*7667#. = Russia MMS Settings
*2767*30667# = GREECE MMS Settings
unblock removeble disk in school
Sorry if this is a bit obvious and easy but i thought id post it anyway.
Right-click on the bar at the bottom (right of the start button) and select Toolbars>New Toolbar
In the box type "D:\" (make sure the slash is "\" not "/")
Click on the small arrows and there you have it, your flash drive with hackin programs on it
PS If D:\ doesnt work, try E:\
Types of Attacks on Web Servers
Types of Attacks on Web Servers
By Najmi
Newspapers Internet magazines came with cover stories when Denial of service (DoS) attacks assaulted a number of large and very successful companies' websites last year. Those who claim to provide security tools were under attack. If Yahoo, Amazon, CNN and Microsoft feel victim to DoS attacks, can any site-owner feel safe?
In this article we'll try to make site owners understand the "In and Outs" of DoS andDDoS attack methods, vulnerabilities, and potential solutions to these problems. Webmasters are usually seen searching for solutions to new security threats and ways of patching-up before it is too late.
DoS:
In a Denial of Service (DoS) attack, the attacker sends a stream of requests to a service on the server machine in the hope of exhausting all resources like "memory" or consuming all processor capacity.
DoS Attacks Involve:
Jamming Networks
Flooding Service Ports
Misconfiguring Routers
Flooding Mail Servers
DDoS:
In Distributed DoS (DDoS) attack, a hacker installs an agent or daemon on numerous hosts. The hacker sends a command to the master, which resides in any of the many hosts. The master communicates with the agents residing in other servers to commence the attack. DDoS are harder to combat because blocking a single IP address or network will not stop them. The traffic can derive from hundred or even thousands of individual systems and sometimes the users are not even aware that their computers are part of the attack.
DDoS Attacks Involve:
FTP Bounce Attacks
Port Scanning Attack
Ping Flooding Attack
Smurf Attack
SYN Flooding Attack
IP Fragmentation/Overlapping Fragment Attack
IP Sequence Prediction Attack
DNS Cache Poisoning
SNMP Attack
Send Mail Attack
Some of the more popular attack methods are described below.
FTP Bounce Attack
FTP (File Transfer Protocol) is used to transfer documents and data anonymously from local machine to the server and vice versa. All administrators of FTP servers should understand how this attack works. The FTP bounce attack is used to slip past application-based firewalls.
In a bounce attack, the hacker uploads a file to the FTP server and then requests this file be sent to an internal server. The file can contain malicious software or a simple script that occupies the internal server and uses up all the memory and CPU resources.
To avoid these attacks, the FTP daemon on the Web servers should be updated regularly. The site FTP should me monitored regularly to check whether any unknown file is transferred to the Web server. Firewalls also help by filtering content and commands. Some firewalls block certain file extensions, a technique that can help block the upload of malicious software.
Port Scanning Attack
A port scan is when someone is using software tosystematically scan the entry points on other person’s machine. There arelegitimate uses for this software in managing a network.
Mosthackers enter another’s computer to leave unidentifiable harassing messages,capture passwords or change the set-up configuration. The defense for this isthrough, consistent network monitoring. There are free tools that monitor forport scans and related activity.
Ping Flooding Attack
Pinging involves one computer sending a signal to anothercomputer expecting a response back. Responsible use of pinging providesinformation on the availability of a particular service. Ping Flooding is theextreme of sending thousands or millions of pings per second. Ping Flooding cancripple a system or even shut down an entire site.
APing Flooding Attack floods the victim’s network or machine with IP Pingpackets. At least 18 operating systems are vulnerable to this attack, but themajority can be patched. There are also numerous routers and printers that arevulnerable. Patches cannot currently be applied throughout a global networkeasily.
Smurf Attack
A Smurf Attack is modification of the "ping attack"and instead of sending pings directly to the attacked system, they are sent to abroadcast address with the victim’s return address. A range of IP addressesfrom the intermediate system will send pings to the victim, bombarding thevictim machine or system with hundreds or thousands of pings.
One solution is to prevent the Web server from being usedas a broadcast. Routers must be configured to deny IP-Directed broadcasts fromother networks into the network. Another helpful measure is to configure therouter to block IP spoofing from the network to be saved. Routers configured assuch will block any packets that donor originate in the Network.To be effective this must be done to all routers on the network.
SYN Flooding Attack
This attack exploits vulnerability in the TCP/IPcommunications protocol. This attack keeps the victim machine responding back toa non-existent system. The victim is sent packets and asked to response to asystem or machine with an incorrect IP address. As it responds, it is floodedwith the requests. The requests wait for a response until the packets begin totime out and are dropped. During the waiting period, the victim system isconsumed by the request and cannot respond to legitimate requests.
When a normal TCP connection starts, a destination hostreceives a SYN (synchronize/start) packet from a source host and sends back aSYN ACK (synchronize acknowledge) response. The destination host must the hearan acknowledgement, or ACK packet, of the SYN ACK before the connection isestablished. This is referred as the "TCP three-way handshake”.
Decreasingthe time-out waiting period for the three way handshake can help to reduce therisk of SYN flooding attacks, as will increasing the size of the connectionqueue (the SYN ACK queue). Applying service packs to upgrade older operatingsystems is also a good countermeasure. More recent operating systems areresistant to these attacks.
IPFragmentation/Overlapping Fragment Attack
To facilitate IP transmission over comparatively congestednetworks. IP packets can be reduced in size or broken into smaller packets. Bymaking the packets very small, routers and intrusion detection systems cannotidentify the packets contents and will let them pass through without anyexamination. When a packet is reassembled at the other end, it overflows thebuffer. The machine will hang, reboot or may exhibit no effect at all.
Inan Overlapping Fragment Attack, the reassembled packet starts in the middle ofanother packet. As the operating system receives these invalid packets, itallocates memory to hold them. This eventually uses all the memory resources andcauses the machine to reboot or hang.
IPSequence Prediction Attack
Usingthe SYN Flood method, a hacker can establish connection with a victim machineand obtain the IP packet sequence number in an IP Sequence Prediction Attack.With this number, the hacker can control the victim machine and fool it intobelieving it’s communicating with another network machines. The victim machinewill provide requested services. Most operating systems now randomize theirsequence numbers to reduce the possibility of prediction.
DNSCache Poisoning
DNS provides distributed host information used for mappingdomain names and IP addresses. To improve productivity, the DNS server cachesthe most recent data for quick retrieval. This cache can be attacked and theinformation spoofed to redirect a network connection or block access to the Web sites),a devious tactic called DNS cache poisoning.
The best defense against problems such as DNS cachepoisoning is to run the latest version of the DNS software for the operatingsystem in use. New versions track pending and serialize them to help preventspoofing.
SNMP Attack
Most network devices support SNMP because it is active bydefault. An SNMP Attack can result in the network being mapped, and traffic canbe monitored and redirected.
The best defense against this attack is upgrading toSNMP3, which encrypts passwords and messages. SinceSNMP resides on almost all network devices, routers, hubs, switches, Servers andprinters, the task of upgrading is huge. Some vendors now offer an SNMP Managementtool that includes upgrade distribution for global networks.
UDP Flood Attack
AUDP Flood Attacks links two unsuspecting systems. By Spoofing, the UDP floodhooks up one system’s UDP service (which for testing purposes generates aseries of characters for each packet it receives) with another system’s UDPecho service (which echoes any character it receives in an attempt to testnetwork programs). As a result a non-stop flood of useless data passes betweentwo systems.
Send Mail Attack
In this attack, hundreds of thousands ofmessages are sent in a short period of time; a normal load might only be 100 or1000 messages per hour. Attacks against Send Mail might not make the front page,but downtime on major websites will.
For companies whose reputation dependson the reliability and accuracy of their Web-Based transactions, a DoS attackcan be a major embarrassment and a serious threat to business.
Conclusion
Frequent denial-of-service attacks and achange in strategy by "Black-Hat Hackers" are prompting enterprises todemand technology that proactively blocks malicious traffic.
Tools and services that reflectapproaches to combat such DoS attacks have been introduced with time. These arenormally upgrades to what was produced before. No solution is ever said to be anultimate solution to defend DoS attacks. Despite the new technology coming everyday, the attacks are likely to continue.
Source :- http://www.techiwarehouse.com/cms/engine.php?page_id=21b0d480