This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Access Orkut On Your Mobile Phone or PDA

Here is a Great Hack for all Orkut Users…


Have you ever tried to access orkut on your Mobile Browser. If you have tried, you must surely know what happens……….


Let me tell u for those who have not tried it..The login box does not appear…. As a result you cannot sign in and therefore, to say as a whole, ORKUT CANNOT BE ACCESSED ON MOBILE!!!!!


But here is a trick for all to ACCESS ORKUT ON YOUR MOBILE.. You need to do nothing, just follow the link:


https://www.google.com/accounts/Serv….aspx&hl=en-US


And you will see that only the login-box appears, just sign in and there you are…


The whole ORKUT at your hands!!!!


If you lose this link,, here is how to get it.. when you open www.orkut.com on your pc. The login box loads in a different frame.., In Firefox, right click on this frame and Select load this frame only, and the link you get for that frame is this link.Actualy what happens is that we load only this frame and not the others..

wÅnnÅ w®îtË lîkË thî§?

This is really cool trick. I am sure everybody will like it.


Just follow the steps:



  1. Write your Message/Scrap in community or scrapbook.

  2. Copy paste the code below in your browser and then press enter. Please be ensured that you write the code in one line in the address bar.

  3. javascript:vartxt=document.getElementsByTagName(’textarea’)[0];txt.v


  4. You will see change in the message you wrote.

  5. Press Submit and enjoy.


If you have any such cool tricks then Post it as a Comment to this Post. Your views about this post are welcome.

Ripping Flash Movies for Passwords

Ripping Flash Movies for Passwords Is easy Follow My Tutorial.


How to rip a flash movie from a website ?


Go to the website where the flashfile is located.

Open de sourcecode (rightmouse click…select view sourcecode) of the html,asp,php..etc file where the flash movie is played from.


“http://www.website.com” is the site where the flashfile is located.

“/flash/ ” is the subdir on that website.

“movie.swf” is the flash file itself.


but ofcourse this is only a example: the website, subdir and moviename wil be diffrent to this one.


Look for something like this: (can be diffrent)


<object classid=”clsid:D27CDB6E-AE6D-11cf-96B8-444553540000″ codebase=”http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,0,0,0″ width=”550″ height=”400″>

<param name=movie value=”http://www.website.com/flash/movie.swf”>

<param name=quality value=high>

<embed src=”http://www.website.com/flash/movie.swf” quality=high pluginspage=”http://www.macromedia.com/shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash” type=”application/x-shockwave-flash” width=”550″ height=”400″>

</embed>

</object>


Now the movie it self, it’s highlighted in green.


<object classid=”clsid:D27CDB6E-AE6D-11cf-96B8-444553540000″ codebase=”http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,0,0,0″ width=”550″ height=”400″>

<param name=movie value=”http://www.website.com/flash/movie.swf”>

<param name=quality value=high>

<embed src=”http://www.website.com/flash/movie.swf” quality=high pluginspage=”http://www.macromedia.com/shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash” type=”application/x-shockwave-flash” width=”550″ height=”400″>

</embed>

</object>


Now the ripping it self.

Open notepad or a webeditor and create a sourcecode like this:


<html>

<a href=”http://www.website.com/flash/movie.swf”>Flash movie</a>

</html>


Save the file with: “Save as” and name it “flash.html”.

Open it in your webbrowser and rightclick on the link “Flash movie” select “save target as” and save it to your HDD.


Finally: open it in Macromedia Flash v*.* and lookup the password.

WEP Cracking, FBI Style( In Just 3 Minutes ) !

Okay, before we begin, I give you Hungry Hacker´s fun facts on WEP.


FUN FACTS:


-WEP stands for Wired Equivalent Privacy

-WEP is used to secure wireless networks from eavesdroppers

-WEP usually takes hours to crack


WEP has always been a long and tedious job, untill recently, when two FBI agents demonstrated how it´s possible to crack WEP in under 4 minutes (3 to be exact).


Here is how they did it:


1. Run Kismet to find your target network. Get the SSID and the channel.

2. Run Airodump and start capturing data.

3. With Aireplay, start replaying a packet on the target network. (You can find a ‘good packet’ by looking at the BSSID MAC on Kismet and comparing it to the captured packet’s BSSID MAC).

4. Watch as Airodump goes crazy with new IVs. Thanks to Aireplay.

5. Stop Airodump when you have about 1,000 IVs.

6. Run Aircrack on the captured file.

7. You should see the WEP key infront of you now.


PROGRAMS USED:


-Kismet


Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system.

It is designed for Linux.


You can download it at www.kismetwireless.net

A windows version can be downloaded at http://www.renderlab.net/projects/wrt54g/kiswin.html


-Aircrack (Includes Airodump, Aireplay, Aircrack and optional Airdecap for decrypting WEP/WPA capture files)


Aircrack is the 802.11 WEP and WPA-PSK keys cracking program that can recover this keys once enough encrypted packets have been captured with airodump.


Airdecap is used to decrypt WEP/WPA capture files.


Airmon can be used to configure the wireless card.


Aireplay is used to inject frames.


Airodump is used for packet capturing of raw 802.11 frames and is particularly suitable for collecting WEP IVs (initialization vectors) for the intent of using them with aircrack-ng.


Download the whole suit at www.aircrack-ng.org


Av fun and enjoy,

-Hungry Hacker

Mobile can be a Life Saver

There are a few things that can be done in times of grave emergencies. Your mobile phone can actually be a life saver or an emergency tool for survival. Check out the things that you can do with it: -


(1) EMERGENCY : The Emergency Number worldwide for **Mobile** is 112. If you find yourself out of coverage area of your mobile network and there is an emergency, Dial 112 And the mobile will search any existing network to establish the emergency number for you, And interestingly this number 112 can be dialed even if the keypad is locked. ** Try it out .**


(2) Have you locked your keys in the car? Does you car have remote keys? : This may come in handy someday. Good reason to own a cell phone: If you lock your keys in the car and the spare keys are at home, call Someone at home on their cell phone from your cell phone. Hold your cell phone about afoot from your car door and have the person at your home press the unlock button, holding it near the mobile phone on their end. Your car will unlock. Saves someone fro having to drive your keys to you. Distance is no object. You could be hundreds of miles away, And if you can reach someone who has the other “remote” for your car, you can unlock the doors (or the trunk).


(3) Hidden battery Power : Imagine your cell battery is very low, you are expecting an important call and you don’t have a charger. Nokia instrument comes with are serve battery. To activate, press the keys *3370# Your cell will restart with this reserve and the instrument will show a 50% ncrease in battery. This reserve will get charged when you charge your cell next time


(4) How to disable a STOLEN mobile phone? : To check your Mobile phone’s serial number, key in the following digits on your phone: * # 0 6 # A 15 digit code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe. When your phone get stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless. You probably won’t get your phone back, but at least you know that

whoever stole it can’t use/sell it either.


(5) Be careful while using your mobile phone : When you try to call someone through mobile phone, don’t put your mobile closer to your ears until the recipient answers. Because directly after dialing, the mobile phone would use it’s maximum signaling power, which is: 2 watts = 33 dbi, Please Be Careful, Message as received (Save your brain) Please use left ear while using cell (mobile), because if you use the right one it will affect brain directly. This is a true fact from Apollo medical team.

Remote Operating System Detection

Now a days we invite the so called victim to a webpage/blog and with the help of a free web traker servive get all his details as in browser/operating system and other details but still i would like to share the traditional method as well.


Detecting OS (operating system) is another most important step towards hacking into a system. We can even say that after tracing the IP of the system it is the most prior thing that should be done to get the root on a system cause without having knowledge about the OS running by the target system you cannot execute any system commands on the target system and thus your mission wont be accomplished. In here I have figure out the basics of detecting OS remotely without having physical access to the system. There are various method of detecting OS like by trace routing the victim’s IP , by pinging the IP , by using telnet and also by using a terminal. But from my research I have concluded that detecting OS through ping or tracerout is the most simplest but effective way of determining the operating system running in the remote computer without having physical access to the system. Since my aim of writing articles is to make things clear for beginners and intermediate so I will explain remote os detecting through ping method which is very easy to understand even for peoples totally new to computers.. yeah yeah.. I know you call them newbies..right ?


REMOTE OS DETECTION USING PING METHOD


What is PING and what is its utility ?


Ping is an MSDOS utility provided for windows version of DOS and for Unix and operating systems having UNIX as the core kernel. It runs in dos box in windows and directly in UNIX platform. In this manual I will give more stress on the MSDOS version of ping.


Ping is an utility used for sending and receiving packets of data to a target system using its IP and thus from the outputs you can figure out many information about the target system.

In remote os detection we are mainly concerned with the TTL values of the received data packets.


Note: When you send or receive a file over the internet it is not send at once. Instead it is broken down at the source system and these broken fragments of data know as data packets are send through the internet and these data packets are gathered together by the target system according to an algorithm constructed by the source system.

For example if I send a picture of size 400 KB to my girl friend (hey girls out there remember I don’t yet have a gf in reality) then what actually happens is that my system breaks the data into data packets, say the file of 400 KB has been broken down into 4 data packets each having a size of 100 KB and having a name. These data packets are assigned a code known as the TTL value of the data packets by my operating system. Then these data packets are gathered and the original file is formed from these data packets at the target system.


Example:


C:\windows>ping/?


Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]

[-r count] [-s count] [[-j host-list] | [-k host-list]]

[-w timeout] target_name


Options:

-t Ping the specified host until stopped.

To see statistics and continue - type Control-Break;

-a Resolve addresses to hostnames.

-n count Number of echo requests to send.

-l size Send buffer size.

-f Set Don’t Fragment flag in packet.

-i TTL Time To Live.

-v TOS Type Of Service.

-r count Record route for count hops.

-s count Timestamp for count hops.

-j host-list Loose source route along host-list.

-k host-list Strict source route along host-list.

-w timeout Timeout in milliseconds to wait for each reply.

Breaking the Restrictions of the Administrator

Hello Friends many of you have come with this problem of hacking the Administrator in Windows XP. So her is the Solution to your problem. This works on Win 2000 & Win XP.


This can be used to gain access to the website you want to for free, and how you can gain access to ‘control panel’, and the various other tools of Windows that may have been blocked from your grasp like ‘regedit’ by the administrator. IT can be used in schools & colleges..


When u are at the log on screen, type in your username and password. Now When you hit enter, and it comes up with the next screen, the rectangle one, immediatly pull out the network cable i.e. the cable wire.


Now you can log on without any restrictions because when the cable is pulled off then it does not download any settings from the server. Now you have access to control panel, & all the other features which had been blocked BUT there will be no network access. But that’s cool because now we can access ‘Internet options’,

click in the ‘connections’ tab click the LAN settings, click the proxy settings, and in the little white box at the bottom we can specify websites that bypass the proxy server (eg www.yahoo.com) Now once you have changed the settings to what you wish, apply them and restart the computer. Now get someone else to log onto it because if you log in it will load the cached settings from your previous log in, then after the other person logs in, everyone that logs in after them included themselves will have the internet settings you specified.


Its only an ‘Unplugging technique’ to gain access to a comp. locked by the administrator.


Now you can gain access to msconfig, regedit, command etc disable the virus scanner, or to install a trojan or a virus according to u’re will..


XP HOME ADVANCED FILE PERMISSIONS.!!


Access *Advance file Permissions* on NTFS file systems for XP Home simply by booting into *Safe Mode*, rt-clicking any file or folder, and navigating to the *Security tab*. This gives the user the ability to allow or deny read, write, execute, read & write, display contents, full-control, iheritance, and take ownership permissions, with many more options available to apply to different users and groups stored on the computer. Well, you don’t have to do this in *Safe Mode* (XP Home). Although it is a little less intuitive, you can simply go to your command prompt - Start>All Programs>Accessories>Command Prompt. Now type “cacls” in the window (without the quotes). This gives you the ability to add, remove or modify file permissions on files and folders through the command prompt. Type “cacls /?” for help on different options and variables. You do not need to be in safe mode to use this so it makes it a little quicker than using the safe mode security tab GUI. Remember - this only applies to NTFS. Here also is a very useful link to find a lot of extras and tweaks straight from the horse’s mouth - the Microsoft Resource Center. You will find a lot of very useful web-based extra’s here, most of them left unknowing to the general public - such as, “Online Crash Analysis” - a site that looks like Windows Update but you can upload your crash “dump logs” (when you get those system or application crash error reports). Microsoft will then analyze the log file and tell you some more info about WHY the system crashed (ie. faulty hardware/software/conflicts, etc).


Now lets c how to open restricted site on college servers

Hungry Hacker recommends : http://unblockall.net/



  • Bypass any filters from work or school and access your favorite community and entertainment sites

  • Enjoy a fast and reliable connection. Our dedicated machines have 1Gbps connection and 2 quad processors

  • Chat with your friends from work

  • Watch videos on Youtube

  • Login into Myspace, Facebook and all the popular community sites without losing the proxy

  • No traffic redirection

  • No PopUp and Annoying Ads!


To use our service, simply type the address of the web site which you want to open in the field above and hit GO. This will automatically lead you to the destination page. With our service you are guaranteed to be able to login and operatate normally.


PLEASE DROP IN YOUR COMMENTS BELOW