This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Using google to hack, crack, and just plain find what you need

Before we begin, I strongly recommend reading through http://www-db.stanford.edu/~backrub/google.html
#This article will help you understand the inner workings of a search engine (if you're not already ereet)
#I added a copy of this article to the end of this text, so just scroll down a little ways :)


What is this tutorial about?

-It's about using google to get the information you need, fast

Why should I read it?

-Because at the end of this tutorial, you'll be able to use google to find WHATEVER you need!

Why are you writing it?

-Because all of the ereet programmers at irc.smart-dev.com/irc.zoite.net are tired of people asking us questions,
when they could just ask lord google

Do I need to gather any tools for this tutorial?

-A web browser (i.e. lynx, mozilla), and confidence in the fact that you aren't inept



Now the 'tutorial'

Google is the shit. You can find virtually ANYTHING you want with it. "©2003 Google - Searching 3,083,324,652 web
pages" as of Sunday, February 16, 2003! I use google for pretty much anything. Any question you have can be answered
90% of the time in the first 20 results, if you search properly. In the next few sections I will be going over some
basic/advanced/UBER COOL techniques for searching.


I.Getting started

-Open your web browser, and goto www.google.com (if it isn't your homepage, which it should be!)
-Now, click on preferences- Most of this should be fine preset, but make sure you fill in the "do not filter my
search results," and select 100 results per page from the drop down menu, then fill in the last bubble (if thats
your thing). Click save preferences (note: they will only be saved if you have cookies enabled).

-Now that you have everything set up, let's see everything google has to offer (because google has a slew of useful
tools). First theres the web search, which is the topic of this article. After that theres the image search, which
is pretty useful if you want to find a picture of someone you know (I will go into detail later on), or if you just
wannt to find some free porn! Sicko. Next up: Groups. I LOVE this feature! You can search year, and years, and years,
of posts on USENET discussion boards. I have gotten SO much valuable information (mostly stuff to help me crack my
target) just by using this feature. I will also go indepth on this feature as well. Next to last: Directory searching.
This is pretty useful if you want to find information on a TOPIC. For instance if you wanted to do a biology project
on genetic disorders you would use this. Last up: News. This is a fairly new feature, added a few months ago. It
tells you how recent articles are (by the hour, pretty cool!). You can look at world news on World, U.S., buisness,
Science/Tech, Sports, Entertainment, and Health.

II.Google for Web searches
(BASIC)
-Well, you've got a broad sense of what google does, so lets get right into the specifics! I can hardly wait!

A. Deciding on keywords
-Try specific keywords first (i.e. search for elephant as opposed to animals)
-Make searches as specific as you can.
-Keep searches as specific as you can!
+Note: The more specific you want your search to be, the more words you need, and you'll get less results
(this can be a bad or good thing)

B. How it works
-When you search for hacker tutorials, google interprets it as hacker AND tutorials, so it returns only pages
with all of the keywords you entered by default
-When you search for tutorials for hackers, the word for is omitted, as are all other words like if, a, who,
what, when, where, and how. If you need to include a common word in your search phrase use a '+' before the
common word. Your search is now tutorials +for hackers.
+note: google is not case sensitive
+note: google does not use wildcards (searching for googl* will not return google)
(ADVANCED)

A. ""'s
-Using quotations is probably the most important part of an advanced search. You can really control the
results of your search using quotes. When you use quotes, all of your results will contain the exact phrase.
So if you were to search "Tutorial for hacking" Google would search 3,083,324,652 web sites for that exact
phrase.
-You can put part of your search in quotes, and the other a regular search. For instance, if I wanted to find
out what pages my friend that just happens to be a girl is on the internet, I would search "Firstname
Lastname" Thomas Dale. This would search for the exact phrase "her name" and then it would search for any
pages that contained the words Thomas Dale(Thomas Dale is my highschool).

+Find me! My name is alejandro(alex), and i'm part of the smart-dev community ;)
B. "-"'s

-Using '-' to omit results. Perhaps you're searching for a new type of password file, for a new webserver.
The password file is called passwerd.db, but when you do a simple in title search(just keep reading, you'll
understand later) all you get is a bunch of results that turn out to be a config file that has syntax
referring to passwerd.db. Lets say this config file is named config(go figure). Omit this from your search
simply by searching searchstring -config and viola you get a list of sites that display passwerd.db to the
public! You can also use the boolean term NOT.
(HACKING/CRACKING)

Yay! This is why I wrote this article!

INTRO TO HACKING/CRACKIGN WITH GOOGLE
-Many of you probably already know this, but you can hack/crack with google. I use it in 100% of the
hacks/cracks I perform. You can use google to help you hack/crack in a few different ways. I will discuss
these in the sections below ("no shit!")

A. intitle:
-This is a built in function in google that searches for your phrase in the title of a web page. The
title of a webpage is in the upper left of your current window. (you should see google.txt if someone
hasnt changed the name). This is useful if you want to find something VERY specific.
-examples: intitle:"billing" intitle:"payments" intitle:"passwd"
B. Directory Indexing

-One GREAT trick is to find sites that allow directory indexing. This can be done by searching
intitle:"index of" phrase. Your mind should now be about to explode with the possibilities this could
hold. If it doesn't, that's ok, because if you look at the end of this article you'll see i've
provided you with an uber cool list! Here are some basic phrases you can use: intitle:"index of"
"passwd" OR "passwd.txt" OR "AutismIsSoCool!". This searches for files named passwd or if that isnt
found, searches for passwd.txt or if that isnt found searches for AutismIsCool! Think original, and
you can come up with the coolest stuff! I'm not just talking about passwords... I'm talking about
warez, passwords, and even credit card numbers!!! (although to be honest it's not easy ;))

C. allinurl:
-Guess what this does! Basically I use this when I want to find a piece of software. When i'm at school we
have some stupid web site filter, that doesn't allow me to download AIM (AOL instant messenger uhhh tm) so
basically I just do a search for allinurl:"aim.exe" and I get to take my pick! This can also be used for
passwd, passwd.txt, and so on

D. Cache
-Perhaps you have been searching for intitle:"index of" etc/shadow, and you see what looks like a valid
shadow file in your results list, but you cant access it, because you arent root, or whatever. Well thanks to
google cache, it may be possible for you to view this file. Just click the little chached link under the
result!
+note: this doesnt work 100% of the time

E. Collecting info on your target

-You can use google to find all sorts of juicy information about your target. For instance, if you wanted to
know what @target.com addresses were on the site, just search "@target.com" site:www.target.com. You should
get a nice list of email addresses. (these can double as usernames for other things besides emails)
-GOOGLE GROUPS is a great way to get info on a target. Just click the groups tab and search for @target.com,
and you will see everything anyone from your target has EVER posted on a usenet board! This is a real good
one!

THATS IT! THAT'S THE WHOLE TUTORIAL!

Summary: Well I hope you learned something from this article. Wether you were a complete noob, an advanced internet user,
or an ereet hacker, I tried to teach you all something. Remember- don't ever give up after only a few minutes of
searching... You'll get the right combination of keywords sooner or later. Just try to imagine what words you would use
for the item you are trying to find ;). Now GO! I officialy deem you "Google lord!"

(APPENDIX A)

-This is a list of all the cool searches I've found over the years
-PLEASE add to it! add your searches, and put the date you added it next to the search, then upload it somewhere

allinurl: winnt/system32/ (get cmd.exe)
intitle:"Index of" .sh_history
intitle:"Index of" .bash_history
intitle:"index of" passwd
intitle:"index of" people.lst
intitle:"index of" pwd.db
intitle:"index of" etc/shadow
intitle:"index of" spwd
intitle:"index of" master.passwd
intitle:"index of" htpasswd
intitle:"index of" members OR accounts
intitle:"index of" user_carts OR user_cart **GOOD ONE!

-and hey! wouldnt you know it! someone has already taken care of the rest of this appendix for me! Thanks Johnny!

/*/*/*The following list was taken from johnny.ihackstuff.com*\*\*\
_vti_inf.html
service.pwd
users.pwd
authors.pwd
administrators.pwd
shtml.dll
shtml.exe
fpcount.exe
default.asp
showcode.asp
sendmail.cfm
getFile.cfm
imagemap.exe
test.bat
msadcs.dll
htimage.exe
counter.exe
browser.inc
hello.bat
default.asp\\
dvwssr.dll
cart32.exe
add.exe
index.jsp
SessionServlet
shtml.dll
index.cfm
page.cfm
shtml.exe
web_store.cgi
shop.cgi
upload.asp
default.asp
pbserver.dll
phf
test-cgi
finger
Count.cgi
jj
php.cgi
php
nph-test-cgi
handler
webdist.cgi
webgais
websendmail
faxsurvey
htmlscript
perl.exe
wwwboard.pl
www-sql
view-source
campas
aglimpse
glimpse
man.sh
AT-admin.cgi
AT-generate.cgi
filemail.pl
maillist.pl
info2www
files.pl
bnbform.cgi
survey.cgi
classifieds.cgi
wrap
cgiwrap
edit.pl
perl
names.nsf
webgais
dumpenv.pl
test.cgi
submit.cgi
guestbook.cgi
guestbook.pl
cachemgr.cgi
responder.cgi
perlshop.cgi
query
w3-msql
plusmail
htsearch
infosrch.cgi
publisher
ultraboard.cgi
db.cgi
formmail.cgi
allmanage.pl
ssi
adpassword.txt
redirect.cgi
cvsweb.cgi
login.jsp
dbconnect.inc
admin
htgrep
wais.pl
amadmin.pl
subscribe.pl
news.cgi
auctionweaver.pl
.htpasswd
acid_main.php
access.log
log.htm
log.html
log.txt
logfile
logfile.htm
logfile.html
logfile.txt
logger.html
stat.htm
stats.htm
stats.html
stats.txt
webaccess.htm
wwwstats.html
source.asp
perl
mailto.cgi
YaBB.pl
mailform.pl
cached_feed.cgi
global.cgi
Search.pl
build.cgi
common.php
show
global.inc
ad.cgi
WSFTP.LOG
index.html~
index.php~
index.html.bak
index.php.bak
print.cgi
register.cgi
webdriver
bbs_forum.cgi
mysql.class
sendmail.inc
CrazyWWWBoard.cgi
search.pl
way-board.cgi
webpage.cgi
pwd.dat
adcycle
post-query
help.cgi

New iPhone comes Only for 8k!

Apple on Monday unveiled a new version of its popular Apple iPhone, equipped with 3G Internet access and more business-related features.“It’s incredibly zippy,” chief executive Steve Jobs said as he demonstrated the new mobile device at the opening of Apple’s annual Worldwide Developers Conference in San Francisco.“We’ve taken what we’ve learned with the first iPhone, and created the iPhone 3G; and it’s beautiful,” he said.The crowd cheered when Jobs said the iPhone 3G will cost $199 (Rs 8,500 approx) with 8GB of memory. The 16GB model will sell for $299 (Rs 13,000 approx).The iPhone 3G – said to be two times faster than the firstgen iPhone – is designed for longer talk times, and takes advantage of the high-speed network to provide built-in GPS mapping, Jobs said.It also includes Wi-Fi support, and push email service like the one on Blackberry devices, letting business users send and receive Microsoft Exchange email.Apple announced it will begin rolling out new versions of the sleek smartphone devices on July 11, and make it available in 70 countries.Bharti Airtel and Vodafone, who had both announced tieups with Apple to release the iPhone in India, said they will be offering the Apple iPhones here. Details of pricing and availability will be announced at a later date. AGENCIES

How to Extract text from PDF, DOC, HTML, CHM, and RTF files

You can use Text-Mining-Tool to automatically extract text from a PDF file so that you can use it in any program freely. Or if you cannot open a PDF file because you do not have a PDF viewer installed, you can use this tool to extract the text and read the document.

Text Mining Tool is completely free and does not even require an installation, simply unzip it and run the program to use it.

text mining tool

Click the Open button and choose your file that you want to convert to text. Click ok and the large window below the buttons will eventually fill with all of the text extracted from the document.

extract text

Click Save to save the extracted text to your computer. You can also click Clipboard to copy the mined text to the Windows clipboard.

For convenience, the following hotkeys can be used to perform the operations:

* Open - F3 or O.
* Save - F2 or S.
* Clipboard - F5 or C.
* Exit - F10 or Escape.

You can also use the minetext console tool to create a batch script for extracting text from multiple files. This can be useful if you have a directory with a large number of files that need to have text extracted.


-

If you’re a web designer, this program can be very useful to grab the text from a Word document without getting all of the extra Microsoft Office styling code included with the text.

This is a very simple program that is very simple to use! It has one basic purpose and it does a good job! Enjoy!

Boot Block Recovery For Free

You don’t need to pay a measly sum of dollars just to recover from a boot block mode. Here it is folks:


AWARD Bootblock recovery:


That shorting trick should work if the boot block code is not corrupted, and it should not be if /sb switch is used when flashing the bios (instead of /wb switch).


The 2 pins to short to force a checksum error varies from chip to chip. But these are usually the highest-numbered address pins (A10 and above).


These are the pins used by the system to read the System BIOS (original.bin for award v6), calculate the ROM checksum and see if it’s valid before decompressing it into memory, and subsequently allow Bootblock POST to pass control over to the System BIOS.


You just have to fool the system into believing that the System BIOS is corrupt. This you do by giving your system a hard time reading the System BIOS by shorting the 2 high address pins. And when it could not read the System BIOS properly, ROM Checksum Error is detected “so to speak” and Bootblock recovery is activated.


Sometimes, any combination of the high address pins won’t work to force a checksum error in some chips, like my Winbond W49F002U. But shorting the #WE pin with the highest-numbered address pin (A17) worked for this chip. You just have to be experimentative if you’re not comfortable with “hot flashing” or “replacement BIOS”.


But to avoid further damage to your chip if you’re not sure which are the correct pins to short, measure the potential between the 2 pins by a voltmeter while the system is on. If the voltage reading is zero (or no potential at all), it is safe to short these pins.


But do not short the pins while the system is on. Instead, power down then do the short, then power up while still shorting. And as soon as you hear 3 beeps (1 long, 2 short), remove the short at once so that automatic reflashing from Drive A can proceed without errors (assuming you had autoexec.bat in it).


About how to do the shorting, the tip of a screwdriver would do. But with such minute pins on the PLCC chip, I’m pretty comfortable doing it with the tip of my multi-tester or voltmeter probe. Short the pins at the point where they come out of the chip.


AMIBIOS Recovery bootblock:


1. Copy a known working BIOS image for your board to a floppy and rename it to AMIBOOT.ROM.

2. Insert the floppy in your system’s floppydrive.

3. Power on the system while holding CTRL+Home keys. Release the keys when you hear a beep and/or see the floppy light coming on.

4 . Just wait until you hear 4 beeps. When 4 beeps are heard the reprogramming of the System Block BIOS went succesfull, so then you may restart your system.


Some alternative keys that can be used to force BIOS update (only the System Block will be updated so it’s quite safe):

CTRL+Home= restore missing code into system block and clear CMOS when programming went ok.

CTRL+Page Up= restore missing code into system block and clear CMOS or DMI when programming went ok.

CTRL+Page Down= restore missing code into system block and do not clear CMOS and DMI area when programming went ok

Btw: the alternative keys work only with AMIBIOS 7 or higher (so for example an AMI 6.26 BIOS can be only recovered by using CTRL+Home keys).


BLACKOUT Flashing


Recovering a Corrupt AMI BIOS chip


With motherboards that use BOOT BLOCK BIOS it is possible to recover a corrupted BIOS because the BOOT BLOCK section of the BIOS, which is responsible for booting the computer remains unmodified. When an AMI BIOS becomes corrupt the system will appear to start, but nothing will appear on the screen, the floppy drive light will come on and the system will access the floppy drive repeatedly. If your motherboard has an ISA slot and you have an old ISA video card lying around, put the ISA video card in your system and connect the monitor. The BOOT BLOCK section of the BIOS only supports ISA video cards, so if you do not have an ISA video card or your motherboard does not have ISA slots, you will have to restore your BIOS blind, with no monitor to show you what’s going on.


AMI has integrated a recovery routine into the BOOT BLOCK of the BIOS, which in the event the BIOS becomes corrupt can be used to restore the BIOS to a working state. The routine is called when the SYSTEM BLOCK of the BIOS is empty. The restore routine will access the floppy drive looking for a BIOS file names AMIBOOT.ROM, this is why the floppy drive light comes on and the drive spins. If the file is found it is loaded into the SYSTEM BLOCK of the BIOS to replace the missing information. To restore your BIOS simply copy a working BIOS file to a floppy diskette and rename it AMIBOOT.ROM, then insert it into the computer while the power is on. The diskette does not need to be bootable or contain a flash utility. After about four minutes the system will beep four times. Remove the floppy diskette from the drive and reboot the computer. The BIOS should now be restored.



Recovering a Corrupt AWARD BIOS


With AWARD BIOS the process is similar but still a bit different. To recover an AWARD BIOS you will need to create a floppy diskette with a working BIOS file in .BIN format, an AWARD flash utility and an AUTOEXEC.BAT file. AWARD BIOS will not automatically restore the BIOS information to the SYSTEM BLOCK for this reason you will need to add the commands necessary to flash the BIOS in the AUTOEXEC.BAT file. The system will run the AUTOEXE.BAT file, which will in turn flash the BIOS. This is fairly easy. Here are the steps you need to take.


· Create a bootable floppy diskette

· Copy the BIOS file and flash utility to the diskette

· Create an text file with any standard text editor and add the following lines


@ECHO OFF

FLASH763 BIOSFILE.BIN /py



Note:
In the above example I am assuming that you are using the FLASH763.EXE flash utility. You will need to replace the FLASH763 with the name of whatever flash utility you are using, and replace the BIOSFILE.BIN with the name of the BIOS file you are using. You will also need to change the ‘/py’ to whatever the command is for your flash utility to automatically program the BIOS without user intervention. If you do not know the command to automatically flash your BIOS type the name of the flash utility with a space and then /? to display the utility’s help screen. The help screen should pecify the command switch to automatically flash your BIOS. If you are using the FLASH763.EXE utility then the switch to automatically flash your BIOS is ‘/py’.

BIOS Update Procedure

All latest Motherboards today, 486/ Pentium / Pentium Pro etc.,ensure that upgrades are easily obtained by incorporating the system BIOS in a FLASH Memory component. With FLASH BIOS, there is no need to replace an EPROM component. Once downloaded, the upgrade utility fits on a floppy disc allowing the user to save, verify and update the system BIOS. A hard drive or a network drive can also be used to run the newer upgrade utilities. However, memory managers can not be installed while upgrading.


Most pre-Pentium motherboards do not have a Flash BIOS. The following instructions therefore do not apply to these boards. If your motherboard does not have a Flash BIOS (EEPROM) you will need to use an EPROM programmer to re-program the BIOS chip. See your dealer for more information about this.


Please read the following instructions in full before starting a Flash BIOS upgrade:

A. Create a Bootable Floppy (in DOS)


•With a non-formatted disk, type the following:


format a:/s


•If using a formatted disk, type:


sys a:


This procedure will ensure a clean boot when you are flashing the new BIOS.


B. Download the BIOS file


•Download the correct BIOS file by clicking on the file name of the BIOS file you wish to download.


•Save the BIOS file and the Flash Utility file in the boot disk you have created. Unzip the BIOS file and the flash utility file. If you don’t have an “unzip” utility, download the WinZip for Windows 95 shareware/ evaluation copy for that one time use from _www.winzip.com or _www.pkware.com. Most CD ROMs found in computer magazines, have a shareware version of WinZip on them.


•You should have extracted two files:


Flash BIOS utility eg: flash7265.exe (for example)


BIOS eg: 6152J900.bin (example)


Use the latest flash utility available unless otherwise specified (either on the BIOS update page or in the archive file). This information is usually provided.


C. Upgrade the System BIOS


During boot up, write down the old BIOS version because you will need to use it for the BIOS backup file name.


Place the bootable floppy disk containing the BIOS file and the Flash Utility in drive a, and reboot the system in MS-DOS, preferably Version 6.22


•At the A:> prompt, type the corresponding Flash BIOS utility and the BIOS file with its extension.


For example:


flash625 615j900.bin


•From the Flash Memory Writer menu, select “Y” to “Do you want to save BIOS?” if you want to save (back up) your current BIOS (strongly recommended), then type the name of your current BIOS and its extension after FILE NAME TO SAVE: eg: a:\613J900.bin


Alternatively select “N” if you don’t want to save your current BIOS. Beware, though, that you won’t be able to recover from a possible failure.


•Select “Y” to “Are you sure to program?”


•Wait until it displays “Message: Power Off or Reset the system”


Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system. If you write to BIOS but cannot complete the procedure, do not switch off, because the computer will not be able to boo, and you will not be given another chance to flash. In this case leave your system on until you resolve the problem (flashing BIOS with old file is a possible solution, provided you’ve made a backup before)


Make sure the new BIOS version has been loaded properly by taking note of the BIOS identifier as the system is rebooting.


For AMI BIOS

Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system holding the “END” key prior to power on until you enter CMOS setup. If you do not do this the first time booting up after upgrading the BIOS, the system will hang.


BIOS Update Tips

note:

1.Make sure never to turn off or reset your computer during the flash process. This will corrupt the BIOS data. We also recommend that you make a copy of your current BIOS on the bootable floppy so you can reflash it if you need to. (This option is not available when flashing an AMI BIOS).


2. If you have problems installing your new BIOS please check the following:


Have you done a clean boot?

In other words, did you follow the above procedure for making a bootable floppy? This ensures that when booting from “A” there are no device drivers on the diskette. Failing to do a clean boot is the most common cause for getting a “Memory Insufficient” error message when attempting to flash a BIOS.


If you have not used a bootable floppy, insure a clean boot either by


a) pressing F5 during bootup


b) by removing all device drivers on the CONFIG.SYS including the HIMEM.SYS. Do this by using the EDIT command.


Have you booted up under DOS?

Booting in Windows is another common cause for getting a “Memory Insufficient” error message when attempting to flash a BIOS. Make sure to boot up to DOS with a minimum set of drivers. Important: Booting in DOS does not mean selecting “Restart computer in MS-DOS Mode” from Windows98/95 shutdown menu or going to Prompt mode in WindowsNT, but rather following the above procedure (format a: /s and rebooting from a:\).


Have you entered the full file name of the flash utility and the BIOS plus its extension?

Do not forget that often you will need to add a drive letter (a:\) before flashing the BIOS. Example: when asked for file name of new BIOS file which is on your floppy disk, in case you’re working from c:\ your will need to type a:\615j900.bin, rather than 615j900.bin only.

Cracking Password Protected Zip Files |

What is FZC?


FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you’re gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as google.com.


FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a “wordlist”, which is a text file that contains possible passwords. You can get lots of wordlists at www.theargon.com.).


FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you’re not supposed to have. So like every tool, this one can be used for good and for evil.


The first thing I want to say is that reading this tutorial… is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase “check name.txt” often in this text. These files should be in FZC’s directory. They contain more information about FZC.


FZC is a good password recovery tool, because it’s very fast and also support resuming so you don’t have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything - a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn’t really matter, because in order to bruteforce a password with 32 chars you’ll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.


FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don’t require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.


Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait… and wait… and wait…and have good thoughts like “In wordlist mode I’m gonna get the password in minutes” or something like this… you start doing all this and remember “Hey this guy started with all this bullshit and didn’t say how I can start a wordlist attack!…” So please wait just a little more, read this tutorial ’till the end and you can do all this “bullshit”.


We need to keep in mind that are some people might choose some really weird passwords (for example: ‘e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won’t help you anymore. Instead, you’ll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won’t get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB’s list and start using the Brute Force attack.


If you have some sort of a really fast and new computer and you’re afraid that you won’t be able to use your computer’s power to the fullest because the zip cracker doesn’t support this kind of technology, it’s your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.


Now that we’ve gone through all the theoretical stuff, let’s get to the actual commands.


Bruteforce


The command line you’ll need to use for using brute force is:


fzc -mb -nzFile.zip -lChr Lenght -cType of chars


Now if you read the bforce.txt that comes with fzc you’ll find the description of how works Chr Lenght and the Type of chars, but hey, I’m gonna explain this too. Why not, right?… (but remember look at the bforce.txt too)


For Chr Lenght you can use 4 kind of switches…


-> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords

-> You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars

-> You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght 32, even if you are crazy i don’t think that you would do this…. if you are thinking in doing this get a live…

-> You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3 to passwords with 32 chars of lenght, almost like the last option…


For the Type of chars we have 5 switches they are:


-> a for using lowercase letters

-> A for using uppercase letters

-> ! for using simbols (check the Bforce.txt if you want to see what simbols)

-> s for using space

-> 1 for using numbers


Example:

If you want to find a password with lowercase and numbers by brute force you would just do something like:


fzc -mb -nzTest.zip -l4-7 -ca1


This would try all combinations from passwords with 4 chars of lenght till 7 chars, but just using numbers and lowercase.


*****

hint

*****


You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn’t work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers.


Wordlist


Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I’m not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I’m going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too.

To start a wordlist attak you’ll do something like.


fzc -mwMode number -nzFile.zip -nwWordlist


Where:


Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.

File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn’t in the same directory of FZC you’ll need to give the all path.


You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, the switche works like in bruteforce mode.

So if you something like


fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+


FZC would just start reading at line 50 and would just read with length >= to 9.


Example:


If you want to crack a file called myfile.zip using the “theargonlistserver1.txt” wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do:


fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50


Resuming


Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too).

To resume the bruteforce attack you just need to do:


fzc -mr


And the bruteforce attack will start from the place where it stopped when you pressed the ESC key.

But if you want to resume a wordlist attack you’ll need to start a new wordlist attack, saying where it’s gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you’ll type


fzc -mw3 -nzfile.zip -nwwordlist.txt -f100


Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.


Well, it looks like I covered most of what you need to know. I certainly hope it helped you… don’t forget to read the files that come with the program

Premium Accounts…!! { 16 Download Sites }

Following are the list of usernames and passwords of the premium accounts for Best downloads sites.

…!! ENJOY !!…

!!…100% Working Accounts…!!


1.) www.divxcrawler.com {download movies fastly}


Username : divx273

Password : 8342729


2.) www.butterflydownloadnetwork.com {movies, music, Pc Games, Tv shows}


Username : cinemanetwork20

Password : butterfly20


3.) www.downloadprofessional.com {movies,Pc softwares, Pc Games, Tv shows}


Username : lo886Ees

Password : zAgt88er


4.) www.sharingzone.net {movies, Pc softwares, Pc Games}


Username : LODMQYHX

Password : 375021402

Receipt : 4T5W89RD


5.) www.unlimitedgamedownloads.com {movies, Pc Games, psp softwares}


Username : ga20me

Password : ke01feb


6.) www.watchdirect.tv {movies, music, Pc Games, online Tv}


Username : cinemanetwork20

Password : butterfly20


7.) www.fullreleasez.com {Greatly Every thing}


Username : Af872HskL

Password : XjsdH28N


8.) www.fulldownloads.us {Greatly Every thing}


Username : Af872HskL

Password : XjsdH28N


9.) www.pirateaccess.com {Every thing}


Username : yourfrienddalat@gmail.com

Password : CHh5LKPI


Username : xxx_heel_xxx@yahoo.com

Password : MJY0BUY


Username : i_l0ve_u_786@yahoo.com

Password : rYvLgPrt


Username : mubashar_siddique@yahoo.com

Password : F9Gzgwb5


10.) www.warezquality.com {Every thing}


Username : ageg2020

Password : z8fsDfg3


11.) wwww.warezreleases.com {All Stuff}


Username : HnRPxKQz

Password : a59KBV7


Username : a25bipZP

Password : 1TeVnoJb


Username : SHYyJfWU

Password : P4K20uO


12.) www.fulldownloadaccess.com {All Stuff}


Username : mpuv3y

Password : umvpy3x


13.) www.alphaload.com {All Stuff}


Username : AL3429352

Password : ykbcKTNS


Username : AL3429355

Password : RCHAbhKM


Username : AL3429350

Password : gMZNFcyS


Username : AL3429351

Password : cTAkWAxc


Username : AL3429352

Password : ykbcKTNS


14) www.gamedownloadnow.com {All Stuff}


Username : ga20me

Password : ke01feb


15.) www.unlimiteddownloadcenter.com {All Stuff}


Username : cu20me

Password : ke01feb


16.) www.tvadvanced.com {online Tv}


Username : mv03dl

Password : frmvdl