Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc. Don't you want to get it back for your self? Here is the trick how to get 100% of your available bandwidth.Increase internet speed :ugeek:To get it back:Click Start then Run and type "gpedit.msc" without quotes.This opens the "group policy editor" and go to: "Local Computer Policy" Then "Computer Configuration" Then "Administrative Templates"Then select "Network" then "QOS Packet Scheduler"After that select "Limit Reservable Bandwidth". Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab i.e." By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20
Underground private hackerz tools downloads must see
http://www.toolbase.blogspot.com
* 007 Spy Software (1)
* 100 Million Words Password List 850MB (1)
* 101 Hacker Programs 2007 (1)
* 102 Bot Sources (1)
* 2 More Hacking AIO (1)
* 28GB wordlist (zipped is 70mb) (1)
* 539 IRC BOT (1)
* [RAT]Scream 1.3 (1)
* A HUGE list of Crackers (1)
* A new Hack pack from meeee (1)
* Ace Password Sniffer (1)
* Advance ip scanner 1.5 (1)
* Advanced HostMonitor 7.18+keygen (1)
* Advanced Instant Messengers Password Recovery V3.20 (1)
* AFX executable crypter v 2008 (mod haZl0oh) (1)
* AIM virus Spreader (1)
* AIO Addon Searchers 6 in 1 (1)
* AIO remote admin tools package (1)
* Air Crack (1)
* AirCrack-ng 0.6.2 -Windows (1)
* All-In-One Ultra Hacker (2008) (1)
* Angry IP Scanner (1)
* Anonymous Emailer(no download needed) (1)
* Arabian Attacker Hacker's CD V.1.0 (1)
* Ardamax Keylogger (1)
* assign a passsword to workgroup (1)
* Astalavista Security Toolbox DVD v4.0 (1)
* Aurora Binder v2 (1)
* Aurora Binder V2 Release (1)
* Auto Ph$her / fake Web Login Creator (1)
* Automated SQL Injection ( (1)
* Backdoor Injector (2)
* Backdoors Collection (1)
* BackTrack2final (1)
* BaKo's SQL Injection Scanner (1)
* Best Ddos Tool Ever (2)
* Best Hacking Tools - 85 in 1 (1)
* Best Hacking Tools - 85 in 1 | 31.1 MB (1)
* Best Of Network Tools 2007 AIO Plus Bootable PE (1)
* Bitfrost RAT all Versions (1)
* Blue|Smash (1)
* Botnet Collection (1)
* Bruteforce tools updated (1)
* Brutus (1)
* C.E.H CD (1)
* Cain and Able Passoword Cracker (1)
* Card Generator (1)
* CC2Bank (1)
* Cigicigi Crypter [Private Edition] (1)
* CMaster (1)
* Core Impact 4 (1)
* Core Impact 4.0 (LEAKED) -- $2450 Program (1)
* CrackDownloader Plus 2.2 (2)
* Cracking A Rapidshare Account (1)
* Credit Cards Hacking Toolz Full Version (1)
* Cryptic v2.1 Modded FUD (1)
* Cryptic v2.3 (mod) by Polifemo (1)
* Cryptoz v3 Public Version (1)
* Daemon Crypt V2 Non Public[Mod by NeoniX] (1)
* Daemon Tools Pro Advanced 4.10.218.0 (1)
* Dark Zone Trojan (1)
* Darkcode Crackerskit.v2.0 (1)
* DarkZone Trojan (1)
* DDOS tools (1)
* Deamon Crypt V2 Public- FUD MOD (1)
* Digital Keylogger v3.0 by Nytro (1)
* DoS 5.5 Annihiliation Edition (1)
* Downloader (FWB++) (1)
* E-Gold Freezer (1)
* Easy Binder V2 (1)
* EgyCrypter (1)
* Egyspy keylogger (1)
* Email Spider (1)
* Eraser (1)
* ERD Commander 2007 (1)
* Eventlogs ;) cover ur ass (1)
* Evidence Eliminator (1)
* Evil MSN 3.0.6 (1)
* Fastest Windows Password Cracker (1)
* FBI BootDisk (1)
* Feliks Pack 3 - Hacking toolkit (1)
* Firefox Password Stealer (1)
* Fishing Bait 2.5 By DaveDaDon (1)
* For The Professional In This Matter (1)
* Freezer Live (1)
* FTP for all General tools (1)
* Full Hack Pack 155in1 2008 (1)
* full windows softwares (5)
* Fun (1)
* Funny Computer Pranks (1)
* German Police - Special Windows Boot CD (1)
* GhostMSN (1)
* Good Shell Pack (1)
* GoodLuck 3.2.0.0. direct connection (1)
* Google d0rk tool (2)
* Google Hacks Version v1.6 (1)
* Great hacking tools (1)
* Habbo Broote Forcer (1)
* Hach Crackers List (1)
* Hack all messenger passwords (1)
* Hack Hotmail and Windowslive Passwords (1)
* Hack Hound File Binder (1)
* Hacker's Tool Set (45 Hacking Tools) AIO (1)
* Hackers Black CD (1)
* Hackers Manifesto -550in1 (1)
* Hackers ToolKit Suite (1)
* Hacking and Cracking Matrix edition 2CD (1)
* Hacking e-Book -34in1- (AIO) (1)
* Hacking GMail (1)
* Hacking Pack AIO [1] (1)
* hacking tool sites links (2)
* Hacking Toolbox 2007 (1)
* hacking+programming Bulk Pack (1)
* HackShadow UltraPhish Phishing Generator (2)
* Hiren's Boot CD 9.5 (1)
* History (1)
* Html Worm Source Code (1)
* httprecon - Advanced Web Server Fingerprinting (1)
* Huge Pack Of Cryptors (1)
* Icon extractor+Icon Changer (1)
* IntoXonia 2 - LKM rootkit for Linux Kernel 2.6.x (1)
* Invisible Keylogger (1)
* IP Locator (2)
* Keylogger collection (8 in 1 keyloggers with cracks) (1)
* Keyloggers Collection (1)
* Kismet (1)
* l3vel-69's Advance Cookie Stealer v1.0 (1)
* LaLa Cryptor (1)
* LaLa RAT 1.3 (1)
* LCP (2)
* Linkin Binder (1)
* linux hacking (1)
* Linux Live-CD (1)
* Mail Bomber 9.3 Retail (1)
* Messenger Detect 2.70 (1)
* Millions Of Hacking Tools Direct Link No Rapidshare (4)
* Mini Ville Tools - Hacking toolkit (1)
* mIRC spammer (2)
* MorTal TeaM Yahoo Virus Psw (1)
* Msn AIO Pack 2007 (3)
* Msn AIO Pack 2008 (1)
* MSN Booter (1)
* Msn contact list sender (1)
* MSN Freezer (1)
* MSN Hack T00ls [2007] (1)
* MSN Hacks Nice Toolz To Trouble Buddies Much More... (1)
* MSN Pass Steal (1)
* Msn Password Hacker (1)
* Msn Phish v1 (1)
* Myspace Cracker v2 (1)
* myspace pass word cracker (1)
* Nessus Remote Security Scanner (1)
* Net Speed optimizer (1)
* Net Tools 5.0.70 (2)
* netcraft (1)
* NetCut 2.01 (1)
* Netstumbler (1)
* NetStumbler (for Wireless) (1)
* Network Hacking Tools (1)
* New Release (1)
* new tools (1)
* Nikto (1)
* Nmap - the Network Mapper (1)
* NmapView (win32) (1)
* NWTS VT ****er (1)
* Overdoz Modd Neronix [99%UD] (1)
* P0f - Passive OS Fingerprinting tool.. (2)
* Passw0rd Craking All in One 2oo7 (1)
* Password Bruteforcing AIO (1)
* Perfect Keylogger V1.6.8.2 (1)
* Ph03nx Auto Clicker (1)
* Phishing Letters (1)
* Phishing Pages (1)
* phpBB tools AIO (1)
* Poison Ivy 2.3.2 (1)
* Portable Windows Admin pass hack (1)
* Power HTTP FLooder (1)
* Professional Hackers Linux Assault Kit[DIRECT LINKS] (3)
* ProRat 1.9 Fix18 SE (SPECIAL EDITION) (1)
* Proxy Switcher Pro v3.9.0 4059 (1)
* PuTTY (1)
* Qsniffer (1)
* r00tKiT Wind0wz - all in one (2)
* Rapid Hacker v3 Final Maximum Edition (1)
* RapidLeecher v.5.0 (1)
* Rapidshare Account Bruteforcer (1)
* Rapidshare Generator (1)
* Rapidshare Hack Pack (1)
* RapidShare Perimum Gen (1)
* Rapidshare Solution Hack 2008 Edition (1)
* Rapidshare toolkit [2007] (1)
* RAR Password Cracker (1)
* Rar Password Cracker v4.12 (2)
* Red Binder 1.3 Modd by iNs (1)
* Redbinder V1.3 Mod (1)
* Reh Team Keylogger V1.0 -95%ud (1)
* Remote Desktop Protocol Scan (1)
* Remote password stealer 2.7 retail (1)
* RFC's pack (1)
* RLPack 1.20 (1)
* SC Keylogger Pro Full (1)
* School/College Hacking (1)
* See Password 2.05 (1)
* service (1)
* Shark RAT all Versions (1)
* ShkoShiko hacker AIO (1)
* Skd Undetectabler 3.0 Binder (1)
* Skull Crypter V 1 (2)
* Skype Hacks: Tips Tools for Cheap (1)
* Small Hacking Kit (1)
* SMS Flooder (1)
* Solid Binder (1)
* Some Tools in one Archive (1)
* Spamming AIO Tools +30m Email DB (1)
* Spider Binder 1.3 (1)
* Spider Pack (1)
* Spider Packer (1)
* SpyBoss KeyLogger PRO 4.2.2 (1)
* SQL Injection Tool v2.1 (2)
* sqlmap 0.5 - Automated SQL Injection Tool (1)
* SslNetcat [by Gomor] (1)
* Steam Acc Checker (1)
* Steam Account Stealer FUD - BETA (1)
* StreetHacker.1.1.7 (1)
* Super Scan - port scanner (1)
* SynAttack - DoS tool (1)
* System Hacking (1)
* T3RR0R-Inc's availability (1)
* telenet hacking tool.... (1)
* Theef All Versions (1)
* Themida All Versions [Cryptor] (1)
* This program will create a phisher for ANY website for a log (1)
* Tools to Crack xXx sites. (1)
* Top 15 SQL Injection Scanners (1)
* Turbo Zip Cracker 1.4 (2)
* Turkojen 4 UD new (1)
* Two Powerful Defacers (1)
* ULTIMATE PACK-must seee (1)
* Ultimate Wifi Hack Aio (1)
* Ultra Hackers 155in1-(AIO) (1)
* Ultra Page Spammer (1)
* Underground Crypter (1)
* Underground Hacking Tools - 2007 - AIO (1)
* Undetected KeyLogger (1)
* USB Steals Pc Passwords (2)
* USB Switchblade-Tool For SstealingWindows Passwords (1)
* Useful Tools (1)
* Uzzy's Keylogger (1)
* Verifier Credit Card Number (1)
* VH Hacker Tools(Beta) New Ver. + Tutorials (1)
* Vietnam CVV Hack tools (1)
* Virus Maker Professional 2008 (1)
* Virus Maker Proffessional 2008 (1)
* Vista Automated Activation Crack v3.0 - paradox (1)
* VNC 4.11 Scanner and connector (1)
* Vulnerability Scanner Pack (1)
* WatchFire Vulnerability Scanner Full Version (1)
* Web Application Security Testing Suite (1)
* Web Dos attack tools 2007 (Final) (1)
* Web Hacks (1)
* Web Shells Collections (1)
* Web Site Bandwith Killer (1)
* Windows Admin Hack - Offline NT Password Registry Edit (1)
* Windows Admin Password Hack (1)
* Windows Password Recovery - Enterprise Edition 7.5 (1)
* Windows WIFI Collection (4 in 1) (1)
* Windows XP Pro Black Edition 2007 With SP3 (1)
* Wireless Hacking Live-CD (FBI version) (1)
* Wireless WEP Key Password Spy (1)
* Wireshark (Formely Ethereal) (2)
* word list (1)
* Wordlist (28gb compressed to 70mb) (1)
* working links (1)
* xCode Keylogger new ver. (1)
* xHacker Pro 3.0 LEAKED (2)
* Xroot RFI Scanner (1)
* XVI32 Hex Editor (1)
* XXX Site Cracking Toolkit Suite 2006 AIO (1)
* Yahoo Annoying Tool (1)
* Yahoo Booter Room Destroy 5.9 (1)
* Yahoo Online Checker (1)
* Yersinia (1)
* Your Own Undetected Partition Deleter Virus.. ( Dont Try At Your Self) (1)
* ZeldaCrypt (1)
* Zero Hack Tools (1)
http://www.toolbase.blogspot.com
How to search for Megaupload and Rapidshare files
Most downloads on the internet are being made from two file sharing sites Rapidshare and Megaupload. But these files can be downloaded only if you have the links. To get these links you have to search a number of forums and sites and it wastes a lot of time. So for all you people who like it the easy way here is an option to search for them in Google. All you have to do is type as said below in the google search and thats it..!! You will have your links.
For MegaUpload, put the following in google
Video files:avi|mpg|mpeg|wmv|rmvb site:megaupload.com
Music files:
mp3|ogg|wma site:megaupload.com
Programs/Applications files:
zip|rar|exe site:megaupload.com
eBooks files:
pdf|rar|zip|doc|lit site:megaupload.com
________________________________________________________________________________________________
For Rapidshare, put the following in google
Video files:
avi|mpg|mpeg|wmv|rmvb site:rapidshare.de
Music files:
mp3|ogg|wma site:rapidshare.de
Programs/Applications files:
zip|rar|exe site:rapidshare.de
eBooks files:
pdf|rar|zip|doc|lit site:rapidshare.de
You can narrow down you search for what you looking for in the first part of your code. Like if you want to search for some XYZ which is a music file in rapidshare then simply type ” XYZ mp3|ogg|wma site:rapidshare.de“ and you can find your files links.
Happy Downloading..!!
*update: Here is a search engine dedicated for megaupload www.4megaupload.com. You can easily search for links of meaupload there.
Use Google talk to chat with Yahoo and MSN buddies.
With loads of buddies all over the planet, all of us have been forced to use either multiple messengers or unified clients like Pidgin to keep in touch with everyone. However, with the introduction of Google Talk, and its subsequent jump in popularity. you can chat using Google Talk right from your browser, when you access your GMail account.
Now google Talk users can chat with their yahoo and MSN and icq buddies by using a simple software. It is called as PSI. It can be downloaded from http://psi-im.org , and GoogleTalk, which can be downloaded from http://talk.google.com. Install these two chat clients and proceed to the next step.
Launch Psi and in the “Add Account” window (which will launch if you are using Psi for the first time), enter Google Talk as the Name and do not check the box next to Register new account. Click Add. Alternatively if you have already been using Psi, you can right-click on
the Psi icon in the System Tray, go to Psi and select Account Setup. The Account Properties window will show up and here you should enter your full Gmail address including “@gmail.com” into the Jabber ID field. Tick the “Automatically connect on Startup” and “Automatically reconnect if disconnected” boxes.
Click on the Connection tab. Check Use SSL encryption (to server). The Port field will automatically change to 5223, which is normal. Check the “Ignore SSL warnings”, “Allow Plaintext Login”, “Send Keep-alive packets (for NAT timeouts)” and “Manually Specify Server Host/Port:” boxes. Enter “talk.google.com” in the Host field and leave the port as 5223. If you have trouble connecting, use port 443 instead.
To get online, just right-click on your account name in the main window, go to status Online.Now right click on the account name again and click Service Discovery.
You now need to find a Jabber transport server that will help communicate between Google Talk and non-Google Talk chat applications. A good place to start this search is The XMPP Federation at https://www.xmpp.net/ servers and Open Jabber Servers at http://www.jabber.org/user/publicservers. shtml. We used the server jwchat.org (or you can use talkonaut.com), since it had transport servers for AIM, ICQ, Yahoo as well as MSN. Enter this name into the Address field (initially containing the name gmail.com) and click on Browse.
You will see a list of transport services being populated in the box below. To set up your IM account, right-click on one of these servers and select Register. Enter your user name and password for the service selected and click Register. Psi will ask you to confirm all of
your newly transported contacts in your Google Talk account. After this is done, they’ll all be automatically available through your Google Talk account. You will even be able to add buddies from that service, right from your Google Talk client. To confirm this, open Google Talk and you will find all the contacts from the other service inside Google Talk buddies list. To add a friend from another service, just make sure that you follow the format screenname@transport_ server_name.dns_name—if the Yahoo ID of your buddy is testacc@ yahoo.com, and jwchat.org is the transport server, you should add the contact from within GoogleTalk as testacc@yahoo.jwchat.org. There have been reported cases of
unreliability of quite a few transport servers, but we found that two mentioned above are quite stable. You should also know that when you use a transport client, you trust your information to a third party server, which you may not like if you are very particular
about your privacy.
DeepMonitor - Detect Hidden Process and Rootkit
Rootkits is a computer security threat that is designed to modify the core software components of the system, inserting code which attempts to hide the “infection” and provides some additional feature or service to the attacker.
Some advanced trojan also has the capability to hide itself using rootkits techniques. One example is Bifrost which is able to unhook kernel mode hooks to allow bypassing more firewalls. Nowadays many security suite software such as Kaspersky Internet Security and Norton Internet Security is able to detect and defend against rootkits. If you are like me who doesn’t like to install and use bloated security suites, you can try this very small and simple yet powerful hidden process detector. It claims to detect most of rootkits technologies! DeepMonitor is an hidden process detector, for Window Xp2 only, defeating most of rootkits technologies. It can also detect some hidden injected modules techniques. Although it is very good in detecting hidden process, this tool can’t tell you if a normal running process that can be seen at Windows Task Manager is dangerous or not. Let’s take svch0st.exe for an example. By looking at the filename, it is obviously a virus or spyware because the letter O has been replaced by the number zero (0). If you run DeepMonitor, it will also show scvh0st.exe but it will not warn you because it is not a hidden process. One technique that many trojan authors will use to defeat traditional security measures is to co-opt other applications to do their dirty work. For example, an application can take control of privileged applications, such as Internet Explorer or Firefox, to carry out all of its malicious activity. This will cause all of the attacks to come from Internet Explorer or Firefox, not the actual trojan. One of the trojan that does this is Bifrost. This trojan injects code into the explorer.exe process, which then spawns a non visible Internet Explorer (iexplorer.exe) or Firefox (firefox.exe) process. The trojan then injects extra code into iexplore.exe (not as an extra dll, it just writes the malicious code directly into the memory space of iexplore.exe). This extra code then causes iexplore.exe to act as a backdoor into the computer from which an attacker has complete visibility of the file system and registry. I tried infecting my own computer with Bifrost with DeepMonitor monitoring my system. DeepMonitor detects a hidden process and shows a warning through tray balloon notification. When I launched DeepMonitor from Windows tray bar, it shows firefox.exe in red which is a hidden process. The blue ones are legitimate processes. I can double click on the process for more information or kill the process. When I check Windows Task Manager, firefox.exe also appears in the list but I wouldn’t know whether it has been tampered or not.
Download: DeepMonitor
Breaking Captcha Images
-- Breaking Captcha Images --
By Chuckie_Ice from HTS
I'll start by saying that this overview isn't for everyone. It's intended for those who have a good programming background and hopefully have worked with imaging a bit. Even if you haven't worked with images and pixel manipulation, this may be the answer to some prayers out there when people are asking themselves, "How in the world do I even start to break this thing?!?!". It is important to realize though that many times when advanced warping techniques are used it becomes almost impossible to break, all that means though is that it's -almost- impossible, not impossible ;)
So, what's the purpose of breaking a captcha image? The reasons may vary, but most of the time it's to be able to use a bot to automate some process (what captcha images are meant to prevent). For example, say in HTS, Real 1 there was a way to register at "Uncle Arnold's Local Band Review" that used a captcha image. Well we know by the challenge that we have to get the band "Raging Inferno" up to the top. In a real world situation that didn't have the same type of security flaws as the Real 1 challenge, we could register hundreds of bots that simply vote the band up to the top, and to do this we'd have to break the captcha image at registration.
Remember though, Captcha images are never universal, every different site has their own specialized captcha, so there's no simple "global" fix for all of them. With that said, however, it's easy to take code once you've written it and transfer it into another captcha breaking project.
This overview is meant to establish the groundwork so that you can break captcha images easier in the future. You can use virtually any language, however, I recommend C/C++ or C# just for speed reasons. One of these examples I've done in PHP and it works quite well, though it goes slower than most.
Now lets begin our overview of captcha breaking!
[Step 1: Analyze and Prepare]
This is more of a step that you would take after you have read this entire overview, however, I'll fill you in on it now. When starting to break a captcha, look it over, refresh it several times, and find all aspects of the captcha. Does it use different fonts? Does the background change? Is there a background image? Does the text change from bold to italics? Does the text move around on the image? Is the text a completely different color than the image? What characters/charset does it use? Is it case sensitive? These questions and more are all things you must ask yourself and analyze while looking at the different variations of the captcha image.
Now that we've got a good idea of what's what, we need to be able to start the breaking process. This just depends on what language you want to use, but make sure you have a way to open the image into your language and read all the bits into an array. Whether you do this by looping through all the pixels and putting them into an RGB array, or by using some function like LockBits or GetDIBits. This part is essential to being able to work with the image. Never try to manipulate the image using single pixel functions, like functions that get or set the color of an individual pixel. These functions usually take an extreme amount of time to perform simple tasks. The only time you'd ever use those functions is when you're reading the pixels into an array. Okay, now that you've got the general idea, on to Step 2!
[Step 2: Get rid of the crap!]
A lot of people who write captcha images like to think that they are very crafty and cunning with the garbage they put in to throw you off. Here's a big morale booster... 99% of the time it's just that, crap. You can easily write image filters to go through and wipe out the junk.
Looking for ways to get rid of garbage often times includes looking for patterns in the image. You have to really think hard about what you can and cannot use against them. For example, you come across a captcha image that has black text, but unfortunately it has an image in the background. How do we filter out the text from the image? Simple, write a filter to include only back and colors close to it (when saving in JPG, not all colors will be perfect so you have to account for some variation in color). By filtering out all pixels that aren't close to black, we're left with just the text. One way of thinking is to ask yourself, "How is it possible that I can read this? How come I can distinguish the text from the garbage and noise?". A lot of times these questions will bring you to the answer. Lets look at some examples.
Now, start by asking yourself what you notice in this image. Is it the dark text that jumps out at you? How about the light background? Both of those we can use to our advantage. Now what about those lines? For now, we'll deal with those after we get rid of the background. So we think we have an idea of how to break it... but what happens if they throw something like this at us?
The text is barely visible! Not to mention the amount of noise is cluttering up the screen. Lets think about this, how is it possible that we can read this? Simple, the text is still slightly darker than the background. So, for our filter we'll write it to turn all pixels that are darker than a certain amount to black, and all pixels that are lighter than that certain amount to white. I find that when working with captcha images, it's really nice to be able to convert them to monochrome for working with, since monochrome is just black and white. You can then use a simple 2 dimensional array for the width and height, and just use 0 and 1 for black and white. Here's our result:
Wow, now the text sure stands out! But what about that annoying background noise? Notice how it looks like there are very distinct lines going horizontally. If you look at both the original images very closely, you'll notice they aren't lines, but rows of dots! Getting rid of this is simple, all we have to do is scan the image for a pixel that's white, then a pixel that's black, then another pixel that's white again. By scanning the image for that pattern, we will be able to find and isolate the dots. Since if we look at it, it's actually both columns and rows of dots, we'll do a 2 way filter. One that looks for dots going up and down, and the other left and right. Pseudo code for left-right would look like this:
if (Pixel[x,y] == 0 && Pixel[x + 1] == 1 && Pixel[x + 2, y] == 0)
Then we have a dot in the middle! We could also do another if that flips the black with the white to scan for white dots, but we don't need to now. The same can be done for scanning up and down, just by adding 1 and 2 to the y instead of the x. The last part of our code here is to set the middle dot to white. Here's what we've got now:
Much better, we've eliminated the majority of the background and some parts of those random black lines. A big hint here now on what to do is that you can actually use the same and or close to the same filter that we just wrote above to remove these black lines. If we write something that looks for individual pixels that are not touching more than 3 other black pixels (there are 9 pixels around any single pixel that is not on the border of the image), then we can eliminate almost all of the noise.
Now that's looking really good. Unfortunately here this is the point where the above filter probably ends, since if we go any further and, lets say, try to eliminate pixels that aren't touching more than 5 or 6 black pixels, we'll start eating away too much of the text. Keeping the text close to it's original look is key for cracking captcha images. What we're going to do now is a method that I've come up with which uses Flood-Filling to eliminate random garbage. If you're going to top performance, you can always write your own FloodFill function, or you can find GD libraries that include FloodFill functions. PHP for example has the function "imagefilltoborder" which is exactly what I want. I also decided to write a performance version of this same application in C#, which I wrote my own FloodFill function. So you might ask, how are we going to use FloodFill to eliminate garbage? If we look at the image we have now, we notice that all the garbage is in really small parts, while the text is very thick and large. This gives us an advantage to breaking it, because we can simply go through every black pixel, run a FloodFill on it, count the amount of pixels that got filled, then if it's less than a certain amount... throw it out. The smaller pieces of garbage will only have a pixel count of usually 20 pixels or less, so we write our function to get rid of anything that fits our needs. You may or may not even need this step, however, if you do use it the pixel count will have to be adjusted based off of your image and how much garbage you have. After we run this new filter, our image looks like this:
Alright! Now just to let you know, depending on the captcha, not all the junk needs to be filtered out. This will also depend on the method you choose in Step 3.
[Step 3: Define our letters]
The third step is usually easier than the second. Whereas before we were just cleaning the image up, now we're going to actually define where our letters are on the image. Lucky for us, the letters are still there and pretty thick, so how should we do this? Here are our options:
Method 1: Break the letters into individual cells
OR
Method 2: Create a bounding box around our letters that will be used as a scanning area.
The advantages of the first method is that it's quick and fairly painless to break up a captcha when you have a nice thick font. It's also much faster in Step 4 (You'll see why). The disadvantage of breaking them up is when the captcha uses thin and small fonts that could get broken by the previous filters, or we could end up connecting two letters if the previous filters weren't good enough to destroy all lines between the letters.
The advantages of the second method are that it doesn't require us to do extra compensation and image checks for connected letters or broken up letters, and it allows us to easily work with small and thin fonts. The disadvantages are that it takes much more processing power, and takes a much longer time.
Lets look at the How-To: We can break the letters up in this captcha by using the same FloodFill method that we used above to eliminate noise... but instead, make it look for blocks of black that have more than 80 pixels or so (based off how thick the letters are). One thing you might ask is "Why did we have to eliminate the garbage then with that last FloodFill filter if we're just going to use it again to grab the text?" The answer is that you don't have to, since none of the small garbage which we eliminated in that last filter would have been touching the text. Now just to summarize what we're doing here, the letters get filled in by our function, then because so much of it was filled in, the program identifies that it is a character, puts it into it's own image cell, then moves on to the next ones until all 4 are in individual cells.
For our second method, we'll again use something similar to the FloodFill, however, this time we would have needed to eliminate most if not all of the garbage. We do a simple FloodFill scan to find out where the majority of the black pixels are (should be where the text is), then we find the left most, right most, upper most, and lower most borders. This should create a box around our text. It's always a good thing to expand this box a few pixels, say maybe 4 just in case one of our garbage filters took off a thin layer of the text. Now that we've got our region identified or characters into cells, onto Step 4!
[Step 4: LERN TO REED!]
The title of Step 4 may sound condescending, but for this part you actually have to make your program "read" the text. There are a few methods of doing this. The simplest is to build up a character set and scan the letters you have against the charset. Whether you do this by comparing black pixels, overall pixels, or what have you, it's your choice. The other options are to build a point profile for each letter and compare them against a pre-made set of point profiles for an the entire character set. For now, I'm going to stick with comparing the two using pixels.
If you wondered why we said Method 2 would be a lot more intensive on your computer, the simple answer is this: In order to read this captcha, you have to loop through every letter in your charset. On top of that, you'd have to loop through the entire region that we setup earlier, and lastly on top of that you'd have to do the individual scan that compares the character with the image. So there's a scan which is however man pixels the character is, then loop through every position in our region that it could possibly be, then lastly loop through every character, now you understand why it takes a long time. Method 2 works when after all the scanning is complete, the top 4 (or however many letters your captcha image is) matches are chosen and their corresponding letters are outputted as a string/text.
With Method 1, the only loop you have to do is looping through the characters in the charset, then scanning the character with the cell image to see if it's a match. Once you get the characters that match, you simply output their corresponding letters.
Unfortunately since there's no real "Imagery" done at this point, I have nothing to show you, but be assured it works very well!
[Step 5: Complications with Step 4]
This last step is only for the really hard to break captchas. Say we have letters that are rotated or distorted in some way. Rotated letters can be fixed by finding a way to "un-rotate" them. As you'll see in an example below, I "un-rotated" the letters by finding the rotation with the least width. Distorted letters are another case, since it's hard to undo a distortion. I've personally never attempted, but with some of the more simpler distortions, such as ones that use a sine wave or ones that simply stretch the text as it gets further to the end seems that it could be reversed with the right tweaks.
Now that we've established the ground rules for breaking captchas, take a look at a few more examples and see what you can think of:
The captcha from above in the process of breaking:
A captcha from Rapidshare:
http://chuckie-ice.com/CaptchaArticle/Rapidshare1.bmp
Breaking down the Rapidshare Captcha:
Our after filters and identifying the character cells:
Finally!
And lastly the compact version:
Now go back and look at the original Rapidshare captcha before it was broken, and think to yourself how you would go about breaking it. For this, I simply noticed that the background noise text was thinner than that of the main text. So I wrote a filter to thin down the walls of all the text about 8 times until it completely eliminated the background text. Once that was done, I was left with a very thin text, so I built it back up again putting 8 layers on top it, and only filling in those 8 layers where there was black on the original image. Then I separated the letters into cells, rotated them each with a 45 degree range both CW and CCW (to avoid going upside-down) and found the rotation with the minimum width. After that, I built a character set based off of the letters that were left and that was all it needed.
Lets look at some more examples and try and think what you see as a vulnerability, then read the list of what I noticed and compare:
1. Only black and white, no need to write filters to differentiate
2. Dots are easily removed
3. The text is thicker than the dots, thus it can be filtered out easily.
4. They only use numbers!
5. The text is centered in the middle, and the letters are from a monospaced font meaning that every letter will be in the same place.
*coughs*
http://www.hackthissite.org/pages/operations/createimage
What can you find wrong with this one
*coughs*
With all that said, here is our final example:
[img]http://chuckie-ice.com/CaptchaArticle/Badongo.jpg' style='border:0px' />
1. All the letters are the same color, makes it easy to pull the text from the background.
That's about the only thing this person did wrong with their captcha. The letters are spaced unevenly apart from each other, though you could call that a vulnerability because it makes it easy to distinguish which letter is which (no connecting letters). The letters are rotated, and on top of that a different font is used per letter, as well as bolding! This is an example of an extremely well made captcha image, but as well made as it is, through much programming it is still breakable.
[Step 6: From a hacking standpoint]
One last final thing about captcha images. There's always a chance that you can exploit the server along with your captcha breaking program. For example, right here on HTS they use the captcha generating script:
http://www.hackthissite.org/pages/operations/createimage.php
If you notice, this script seems to generate the same captcha text with every refresh. The only time it chooses a new set of letters is when the register page is refreshed and the session variable holding the captcha text is updated. This in itself is a vulnerability, because you could write a program to say break 5 of those, and if your program had any trouble breaking one of them, it could check against 4 others to find the best guess answer.
There is also the possibility, though slim, that you can use the session ID or captcha ID for a captcha that's already been submitted. Say for example you enter in the text for the captcha and it validates, and you notice that a session ID is attached along with the html form you just submitted. By modifying future session IDs to match that same one, there is a chance that you could trick the server into thinking that you're entering the text from the new captcha, but in fact it was a captcha that was already shown.
Cross Site Scripting (XSS)
Cross Site Scripting, or know as XSS, is the most common basic web hacking tehnique… and harmless, as many would say… but on this mather I don’t realy agree, that’s why I wrote this article.
About
XSS as I knew it is a very abstract definition for javascript injection, or at least this is what I have thought until reading RSnake’s website [speak about it a bit later]…
In fact XSS is more than javascript injection, because we can modify a page entire structure through XSS, not only create some actions…
In a small definition: XSS=javascript+html
The Call Of Javascript
Even if XSS is more than just javascript, you will have to basicaly have some javascript knowlege before you can feel the real taste of cross site scripting. For the ones who don’t know javascript I recomend them http://www.javascript.com… After learning the basics of this wonderful scripting language, you will be ready to go…
Info: did I mention that Javascript was developed by Netscape, and at the beginigs had the name LiteScript?
Posibilities
With XSS you can do “extreme” stuff.. let me explain you in a small amount of words what you can do…. the most simple thing is to redirect the curent page to one you like… an ilustrative example:
Also you could do something like poping up the cookie:
And if you know a little php you could create a page that save’s data received via get and stores them in a file/database…
Also there are more posibilities with XSS, you just need some creativity…
More XSS
I have found a website where I have learned much about XSS… there is also a little script which encodes the normal text to ASCII, hex, decimal and Base64… also the different types of attacks are shown on which browsers there are available… check out Rsnake’s page on XSS: ha.ckers.org/xss.html
-
rapidshare.com/ users /xxxxx where a collection of files can be seen. But the question is that how to find such links? Well google will help...
-
http://www.trainsignaltraining.com/free-video-training/tcpip-fundamentals-training-videos/ check the video if u like them plzz leave a comme...
-
You can use Text-Mining-Tool to automatically extract text from a PDF file so that you can use it in any program freely. Or if you cannot op...