Ever wondered how all those spam reached your inbox despite you not submitting your id to any webform ever? Chances are that you have a web page of your own in which you have openly disclosed your email address and was preyed on by all those spam bots. So how to avoid it? Simple answer would be not to have a web page at all. Since that is not feasible (ok.. sorry!) the next best thing would be not to have your email id on your site. But that would mean nobody would be able to effectively contact you. So here are some techniques that would allows your email to be human readable, but not spammable.
I suppose you know how to embed Javascript in HTML. If not then just enclose any code given below between whereever you want the text to be displayed.
Method 0 : Plain English
This one's not really a method, it is more common sense. Instead of the symbols '@' and '.' expand them in english. That is instead of 'foo@yafoo.com' use 'foo at yafoo dot com'. The problem is that you cannot make your email address clickable and it is really simple for the spam bots to track it down anyway. But this could be the only solution if you want to post your id in a forum or somewhere that does not allow you to use the script tags. (Like this article page for example Surprised Atleast something is better than nothing.
Method 1 : The String Splitter
The easiest method would be to split your email into substrings. i.e if your email is foo@yafoo.com, have it split into 'foo', '@', 'yafoo','.com'. and then join them together. eg:
x1 = 'foo';
x2 = '@';
x3 = 'yafoo';
x4 = '.com';
document.write ('mailto:' + x1 + x2 + x3 + x4);
Good! But the problem with this is that it is too commonly used nowadays and the spam bots MIGHT be smart enough to parse a bit of basic JavaScript.
Method 2 : ASCII - 47
Method two involves writing ASCII codes. Each letter can be written using its ASCII value in the format charcode; For example 'A' can be rendered by using the entity A You'll have to find out the ASCII code for each letter of your email address. The values for A-Z are 65 to 91, for a-z are 97 to 122. '@' has the value of 64 and '.' has the value of 46. Therefore the email 'foo@yafoo.com' can be written as...
x1 = 'foo';
x2 = '@';
x3 = 'yafoo';
x4 = '.com';';
document.write ('mailto:' + x1 + x2 + x3 + x4);
For your aid, here's a simple script to find all ASCII codes:
for (i=32;i<=255;i++) { document.write (i + ' : ' + '&#' + i + ';
' ); }
This method is a bit more trickier than the first. But again the problem is that it is common and can be parsed though it needs some effort.
Method 3 : XOR Encryptor
So the next stop is encryption. Why not encrypt your email id using the humble powers of Javascript? Here I will explain the simplest of them all... XORing. The principle is that when you XOR a string with a key you get an encrypted string, and when you XOR the encrypted string with the same key, you get back the orginal string. Now you might wonder what XOR is. It is a logical operation done on bits and stands for eXclusive OR. Try Google to find out what the hell that means, if you care.
Now the plan is to first get your string encrpyted, then post the encrypted string on to your website and decrypt it there using Javascript. First of all to the encryption. Run this code on your browser, the purpose is to get the encrypted string. The key I have used here is the number '5'. The '^' is the XOR operator in JavaScript.
y = "";
for(i=0;i
document.write(String.fromCharCode(5^y.charCodeAt(i)));
}
You'll have the encrypted string displayed on the browser. Copy this string and replace 'y = ""' by 'y = "the encrypted string"; '. In the above example the encrypted string was "9d%mw`c8hdliqj?cjjE|dcjj+fjh;cjjE|dcjj+fjh9*d;". So the code has to be modified to
y = "9d%mw`c8hdliqj?cjjE|dcjj+fjh;cjjE|dcjj+fjh9*d;";
for(i=0;i
document.write(String.fromCharCode(5^y.charCodeAt(i)));
}
Now the reverse process takes place and the encrypted string is reXORed to the orginal string and the hyper link will be visible without ever mentioning the orginal string anywhere in the HTML. If you get unprintable charachters then change the key to something different, till you get a good encryption.
This one is a pretty neat method and it is not easy to decrypt all that crap and I don't think the spammers would go to that extent. I don't say that this method is the ultimate and is non-crackable but nothing is perfect. This one is quite useful and takes up only a few extra bytes. I have seen better (but longer) methods of hiding. One example is at Vishnu's site (Vysnu.com).
One nice follow up to this tutorial would be on how to implement real encryption in Javascript. Try if you can implement some cool methods like BlowFish in JavaScript. Have fun!
Source :-
Hiding Email Address from Spammers
Hexing Tutorial for Beginners
this little tutorial. I will try to explain how to hexedit your favourite Trojan in order to
make it undetected by certain antivirus programs. I will try to put this as simple as
possible so everyone understands it.
Content:
1. General info about hexediting .
2. What tools you need to get started.
3. How to hex.
-step 1
-step 2
__________________________________________________ ___________________
1. General info about hexediting?
If you want to make your server undetectable, you need to know how AVs work and
how they detect your files, right? There are a few ways that AVs use to detect your
server heuristics, sandboxing, etc., and one of them is using so called "definition files"
that carry information about strings inside your server. Well, that�s the way we�re
going again in this tutorial because hexing is pretty much useless for other methods of
detection. So when AVs scan your files it searches for specific stings on specific parts
in your server, and if strings match with strings in the AV database, your file is
detected.
Let�s say that detected strings are "XX" so we need to change that string to something
else (e.g. "XY","YY") that isn�t in the AV definition database so the file can�t be
matched with any of the AV definitions and that way the file will be undetectable.
There are going to be a few tagged strings in your server - not only one, depending on
what trojan you�re using and how popular is. Less popular trojans tend to have less
tagged parts, and with that they are easier to make it undetectable.
First of all, hexing is not the best method for undetecting files because AVs can
change old tagged parts, and once your AV is updated, new definition files are
downloaded and your once undetected server might become detected again. Also not
all AVs use the same tagged parts - this way you need to hex your server against more
AVs to make it fully undetected. This can be annoying because you need to download
wanted AVs then hex it your server, then download another etc., etc. Sometimes AVs
tag critical parts of the server, and if that part is altered will corrupt the server. Also,
heavily edited servers can become unstable, some functions might not work, or even
you can corrupt your server and make it useless.
That�s why you need to check your server if it�s still working after every single
change you made while hexing it.
Now how to find detected strings in your server?
There are few ways you can do this: Manually cut your server in half adding 00�s to
one half and scanning it until you find the detected string (which is slow and time
consuming); use file splitters like UKSplitter that are going to split your server into
bytes, and after that scan all split files and find out what byte is detected then alter it
in original exe, or you can use an offset finder like AV Devil.
2. What tools we need.
- Unpacked trojan server.
(your favorite trojan server)
- Hex editor.
(I will use Hex WorkShop, you can find it at http://www.hexworkshop.com/)
- Offset finder
(AVDevil, you can find it at www.trojanfrance.com)
3. How to hex:
-Step 1.
Turn your AV real-time protection �OFF� . Make your Trojan server and
make sure that is not packed.
Open AV Devil and select your server. After selecting, the server msg will pop up
click OK, and the next msg will popup asking you to turn your AV real-time
protection back �ON�. After you do that just click "OK" and lets AV Devil
search for detected offsets.
During the search your AV will pop up a couple of times. Just click on "Skip" and let
AV Devil finish.
After its done you will see something like this:
As you can see this Trojan server has only two detected offsets.
That means that first detected offset begins at 53F7 and ends at 5476.
Also you can see where the second offset starts and ends. That�s the part that the AV
is checking in this definition database. If the part in the server matches with part in
AV database your server is detected. You can hex beginning and ending offset or in
between.
Step 2.
Now when we have detected offsets, we open our server in Hex WorkShop. Type
"Ctrl+G" and this will come up:
Type the first offset in, select from �Beginning of File,� and make sure that you
selected "hex," because offsets in AV Devil are displayed in that manner. Unless you
save via AV Devil, then they are converted into a decimal. Click �Go� and you will
be sent to that offset location. Now we need to change that �31� to something else, so
we will change it to �32�.
Select �31� right click to it and select fill.
You will see the window below. In �Fill with the following hex byte� we are going to
fill in �32� and hit OK.
After clicking �OK,� the changed hex byte going to be shown in red.
[slika]http://img377.imageshack.us/img377/876/slika6gy9.jpg[/img]
__________________________________________________ __________________
Now repeat this for every offset that you found in AV Devil.
__________________________________________________ ___________________
Going to change it �FE� to �EE� and so on for all other detected offsets.
Once you�ve completed editing all offsets, save your server and scan if it�s UD, and
then you�re done. If the AV still detecting it, repeat steps 1 and 2.
Here�s a little tip on how to change detected bytes: Try to make minor changes like
32 =>31, 22, 42, 33, 34, or FE =>EE ,FF etc., etc. Basically, one character up/down
for each - that�s the best way and will minimize chances to corrupt your server. If that
doesn�t work for some reason, you can try and change it to something completely
different, but always check your server after editing bytes. That way you can see if the
server works or if it�s corrupted (you can keep track of what change caused the
corruption and you can try and edit that byte with some other character).
Another thing in some Trojans servers is that AV Devil can�t find the beginning of the
first offset and will mark it with �0.� Let�s say you�ve hexed all other found offsets
but your server is still detected. Split the file into half and run AV Devil on the first
half. That way you will be able to find the first offset that is missing and finish your
hexing. If some tagged part is a letter, e.g. �Y� change it to �y� or just PlAy wItH
ThE CaPs.
Ex:
So there you have it! Now you know how to hex your server and make it undetected
from wanted AVs.
(I TAKE NO CREDIT FOR THIS TUTORIAL JUST POSTING!)
free access 2 websites without registering
>>Free Access To Websites Without रेगीस्तेरिंग
Go to-http://bugmenot।com/and type the URL of the website you want to log into।
Examples:-
http://www।nytimes।com/, -http://www।winnetmag।com/etcetera।Another (and better) way is changing the user agent of your browser to:
Googlebot/2।1+-http://www।googlebot।com/bot।htmlThis is very easy in Mozilla's Firefox।
Download and install the User Agent Switcher from-http://www।chrispederick।com/work/firefox/useragentswitcher/and add the Googlebot user agent।
Have fun,
-]Edit[- Now this kicks ass, was just browsing entire forum without even needing to login तो
view restricted areas, and it works on other sitesAnd no, you cant access the hidden forums either, already tried
थातेंजोय
Hack into a Windows PC - no password needed
A security consultant based in New Zealand has released a tool that can unlock Windows computers in seconds without the need for a password.
Adam Boileau first demonstrated the hack, which affects Windows XP computers but has not yet been tested with Windows Vista, at a security conference in Sydney in 2006, but Microsoft has yet to develop a fix.
Interviewed in ITRadio's Risky Business podcast, Boileau said the tool, released to the public today, could "unlock locked Windows machines or login without a password ... merely by plugging in your Firewire cable and running a command".
Boileau, a consultant with Immunity Inc., said he did not release the tool publicly in 2006 because "Microsoft was a little cagey about exactly whether Firewire memory access was a real security issue or not and we didn't want to cause any real trouble".
But now that a couple of years have passed and the issue has not resolved, Boileau decided to release the tool on his website.
To use the tool, hackers must connect a Linux-based computer to a Firewire port on the target machine. The machine is then tricked into allowing the attacking computer to have read and write access to its memory.
With full access to the memory, the tool can then modify Windows' password protection code, which is stored there, and render it ineffective.
Older desktop computers do not come equipped with Firewire ports, which are needed for the hack to work, but many recent models do. Most laptops made in the last few years include Firewire ports.
Paul Ducklin, head of technology for security firm Sophos, said the security hole found by Boileau was not a vulnerability or bug in the traditional sense, because the ability to use the Firewire port to access a computer's memory was actually a feature of Firewire.
"If you have a Firewire port, disable it when you aren't using it," Ducklin said.
"That way, if someone does plug into your port unexpectedly, your side of the Firewire link is dead, so they can't interact with your PC, legitimately or otherwise."
Ducklin also advised people to be careful when giving others physical access to their computer.
"I know people who'd think three times about asking passing strangers to take their photo in front of the Opera House in case they did a runner with the camera, yet who are much more casual with their laptop PC, as long as it's software-locked, even though the hardware alone is worth five times as much as the camera," he said.
Microsoft was unavailable for comment at the time of publication.
Gmail to generate unlimited email addresses
More real world examples:
Find out who is spamming you: Be sure to use plus-addressing for every form you fill out online and give each site a different plus address.
Example: You could use
pinkyrocks+nytimes@gmail.com for nytimes.compinkyrocks+freestuff@gmail.com for freestuff.comThen you can tell which site has given your e-mail address to spammers, and automatically send them to the trash.
Automatically label your incoming mail:
I’ve talked about that above.Archive your mail: If you receive periodic updates about your bank account balance or are subscribed to a lot of mailing lists that you don’t check often, then you can send that sort of mail to the archives and bypass your Inbox.
Example: For the mailing list, you could give
pinkyrocks+mailinglist1@gmail.com as your address, and assign a filter that will archive mail to that address automatically. Then you can just check in once in a while on the archive if you want to catch up.
Update (9/7) :
Several commentors have indicated that this is not a Gmail specific trick. kl says Fastmail has enabled this feature as well. caliban10 reports that a lot of sites reject addresses with a plus sign. You might use other services like Mailinator for disposable addresses instead. pbinder recommends using services like SpamGourmet, which redirects mail to your real address.
Cheat in games without cheatcodes!!!
ArtMoney is a cheating program you can use for all games. ArtMoney can make a troublesome game easier to win by helping you find the memory address where a desired quantity (like amount of money) is located so you can change that quantity. In spite of its title, ArtMoney actually allows you to change any quantity specified in a game, whether it be dollars, bullets, swords, or health points. The program finds a hex address based on the input parameters you set and prints these addresses with their corresponding values. For example, if your character has 1,431 dollars, ArtMoney searches and displays all memory addresses containing the value of 1431. Of course, as there can be hundreds of memory addresses displayed after a simple search, you will need to filter this addresses.
Homepage :http://artmoney.ru/
For free Pro version : http://www.divshare.com/download/2108242-c82
G talk SECRITS TRIX
Play Music in G talk !!
It's possible to broadcast music, MP3, etc.. through Google Talk.Unplug your microphone. Double click on the speaker icon in the lower right corner. This will open up "Volume Control". Select "Options" and then "Properties". Then check the button next to "Recording" then click OK. You may also have to change your setting under Mixer Device. Now the Recording Control screen should be up. On my computer I selected "Wave Out Mix". Click on the green phone in Google Talk and call your friend.
Wednesday, October 24, 2007
G talk secret Parameters
There are a few secret parameters you can add to Google Talk and make it function differently. Following is the list of parameters/nomutex: This allows you to open more than one instance of Google Talk
/autostart: Starts on it's own.
/forcestart: It forces it to start no matter what option was set.
/factoryreset: set settings back to default.
/S upgrade: Used when upgrading Google Talk
/register: This registers Google Talk in the registry, includig GMail Compose method.
/checkupdate: This keeps on checking for newer versions
/plaintextauth: It makes use of plain authentication mechanism instead then Google's GAIA mechanism.
/nogaiaauth: This disables GAIA authentication method. The same as above.
/gaiaserver servername.com: uses a different GAIA server to connect to Google Talk. Used for debug purposes only, there are no other known GAIA servers.
/mailto email@host.com: send an email with Gmail
/diag: start Google Talk in diagnostic mode
Most of them can be ued in the following way
Rifgt- click on the desktop.
Select "New " >>>"Shortcut"
Now browse through "My COMPUTER">>>"C:/">>>>"Program Files">>>>"Google">>"Google Talk">>>"Gtalk.exe"
Now add the extention that you want.
eg:- "......../gtalk.exe"/log.
Emotions!!
Following is the list of emoticons supported by gtalk.All these emotions appears in color in a conversation:- :-O :-x :-P :-D :O :x :P :D
:) :( :) ;) ;( :'( : ;-) :-( :-)
B- B-O B-x B-P B-D B-) B-( B’( BO Bx BD
& some more
Gmail & talk supports animated emotions and they are
:- :=P :-D ;-) :-( :P :D :) :( ;-) ;) B-)
Chat Bots
A chatbot is a computer program designed to simulate conversation through a variety of methods.They converse as much like people as their programming allows. If you want to add a chatbot to your Google Talk,
just add the account name as a friend.
Examples
indeedjobs@gmail.com (sends you fresh job postings matching your search query)
Conference Bot
Conference Bot is a bot that links together Google Talk users into one public conference room. This bot has been used as the basis of many bots for Google Talk. You can find a list of the active bots below.
If you want to create your own bot?
visit here
WM_COMMAND codes
Chat Window:8001 - Start Call
40081 - Start muting microphone
8007 - Stop muting microphone
8008 - Stop Call
8015 - Show Send File dialog
8003 - Email
8013 - Start Voicemail
8008 - Stop Voicemail
8010 - Go off the record (both on and off)
8017 - View past chats
8011 - Block/unblock
Main Window:
40011 - Add Friend
40080 - Enable/Disable all notifications
40065 - Connection Monitor
40080 - Save all settings
40087 - Check for Updates Now
40088 - Inbox
40023 - About
40089 - Check Mail Now
40003 - Settings
40020 - Help
40088 - Email
40002 - Sign out
1404 - Voicemail
Add items to tray menu
Open Google Talk in Resource Hacker.Go to menu -> 110 -> Click on 0. It will open as text.
Play with the menu items, for example you can add the item
MENUITEM "Settings", 40003, MFT_STRING, MFS_ENABLED
Click 'compile script'.
Close all instances of Google Talk!
Click File -> Save.
User Interface Editing
Open googletalk.exe in Resource Hacker.Expand the Bitmap tree.
Save bitmaps 139, 5001-5104.
Edit the bitmaps in your image editor of choice to make them the color(s) you like.
Replace the original bitmaps with your edited bitmaps in Resource Hacker (Action > Replace Bitmap).
Save and try it out!.
Change Language
To change the language of Google Talk you will need to:1.Open resource hacker.
2.Choose the menu: file, open.
3.Open the file c:\program files\google\google talk\googletalk.exe.
4.Now you will see a treeview on the left.
5.Double click on dialog.
6.Double click on 130.
7.Click on 0.
8.You will see a window and a bunch of text like 'CONTROL "Password:", 1003, STATIC'...
9.Change the text to another language, for example: 'CONTROL "Wachtwoord:", 1003, STATIC'...
10.Click 'Compile Script'.
11.Do this for all the dialogs.
12.Double click on 'String Table' in the treeview.
13.Click on 36.
14.Click on 0.
15.You will see a bunch of text like '567, "encountered an internal error'...
16.Change the text to another language, for example: '567, "er is een interne fout voorgekomen'...
17.Click 'Compile Script'.
18.Do this for all the string tables.
19.Make sure Google Talk is closed!!! and then click file, save.
20.When you reopen Google Talk it should now be in another language.
Registry Tweaks
You can edit most settings by opening regedit (start -> regedit),and navigating to the key HKEY_CURRENT_USER\Software\Google\Google Talk
The "Google/Google Talk" key has several sub-keys that hold different option values:
Accounts: This one has subkeys for each different account that has logged in on the client. These keys have different values that store the username, password and connection options.
Autoupdate: Stores the current version information. When the client checks for updates it compares Google's response with these values. If an update is needed, it will download and update the new version.
Options: This is the most interesting part, where most of the current hacks should be used
Process: Stores the process ID. Probably used by Google Talk to detect if it's already running or not.
HKEY_CURRENT_USER\Software\Google\Google Talk\Options\api
The Google Talk API UID (unique ID).
HKEY_CURRENT_USER\Software\Google\Google Talk\Options\chat_rect
Stores chat windows size/position.
HKEY_CURRENT_USER\Software\Google\Google Talk\Options\filter_online
Only show online contacts.
HKEY_CURRENT_USER\Software\Google\Google Talk\Options\font_charset
Stores what charset the font is in.
HKEY_CURRENT_USER\Software\Google\Google Talk\Options\has_checked_orkut_picture
?
HKEY_CURRENT_USER\Software\Google\Google Talk\Options\logged_in_once
Stores if you've ever signed in.
HKEY_CURRENT_USER\Software\Google\Google Talk\Options\mailto_backup_handler
Path to default mail application (if not GMail).
HKEY_CURRENT_USER\Software\Google\Google Talk\Options\mailto_backup_icon
Path to the default mail application's icon, index is separated with comma.
HKEY_CURRENT_USER\Software\Google\Google Talk\Options\mailto_backup_registred
If the mail application is registred.
HKEY_CURRENT_USER\Software\Google\Google Talk\Options\presence_note
?
HKEY_CURRENT_USER\Software\Google\Google Talk\Options\theme
Specifys what theme you're using.
HKEY_CURRENT_USER\Software\Google\Google Talk\Options\welcome_shown
If the welcome messages are shown or not.
HKEY_CURRENT_USER\Software\Google\Google Talk\Options\window_rect
Stores main windows size/position.
Google Talk Tips and Tricks
Shortcuts* CTRL + Mousewheel up/down over input textbox: Change the font size of the textbox.
* F9: Open Gmail to send an email to your friend
* F11: Start a call with your friend
* F12: Stop the current call
* ESC: Close the current window
* ALT + ESC: Minimize the current window
* TAB: Switch between multiple chat windows
* CTRL + I: Same as TAB
* SHIFT + TAB: Same as TAB but in reverse order
* CTRL + TAB: Same as SHIFT + TAB
* Windows + ESC: Open Google Talk (if it's minimized, or in the tray)
Conversation Text
* A message can be 32767 characters long.
* Certain smileys are recognized by Google Talk and will be shown in blue.
:-| :-O :-x :-P :-D ;-) :-( :| :O :x :P :D :) :( ;-| ;-O ;-x ;-P ;-D ;-) ;-( ;| ;O ;x ;P ;D ;) ;( B-| B-O B-x B-P B-D B-) B-( B'( BO Bx BD B) B( B) And you can put a ' between the characters to get another one shown in blue.
* To write text in bold, put it between *asteriks*
* To write text in italic, put it between _underscores_
* You can insert special characters like ♥♫☺ with 'Start / Programs / Accessories / System Tools / Character Maps'.
Conversation Window
* Drag a conversation window on top of another and they will dock together.
* Drag a file onto the chat history and you'll send the file to the selected contact.
* When you see a message notification, you can right click it to close it without focusing the conversation window.
Conference Calls
* What you need to do to have conference calls: Open up a copy of Google Talk on all computers with which you wish to conference. After one copy is opened make a new shortcut for Google Talk but at the end of it add /nomutex. If you installed it to the default folder then your shortcut should read "C:\Program Files\Google\Google Talk\googletalk.exe" /nomutex. Open 2 instances of the software on every user's computer. After this start a chain: User 1 should connect on one instance to user 2. User 2 will connect on his second instance to user 3. User 3 will connect using his second instance back to user 1. With this chain everyone is connected to everyone.
Nickname & Status Message
* You can change your name in the Google Account page.
or To change the nickname need to go to your Gmail account and change the name there. Choose Settings, Accounts, and then Edit info. Click on the second radio button, and enter your custom name.
As a result all of your emails will have that nick as well, there is no way to seperate the two.
* You can add a website in your custom message, it will be clickable when someone opens a conversation window with you.
Contacts
* You don’t need to say Yes or No when someone wants to add you as a friend; you can simply ignore it, the request will go away. (On the other hand, someone with whom you chat often will automatically turn to be your friend, unless you disable this).
* The Gmail account 'user@gmail.com' can't be invited as your friend.
Sound & Video
* It's possible to broadcast music, MP3, etc.. through Google Talk.
Unplug your microphone. Double click on the speaker icon in the lower right corner. This will open
up "Volume Control". Select "Options" and then "Properties". Then check the button
next to "Recording" then click OK. You may also have to change your setting under
Mixer Device. Now the Recording Control screen should be up. On my computer I selected "Wave Out Mix". Click on the green phone in Google Talk and call your friend.
Secret Startup Parameters
* /nomutex: allows you to open more than one instance of Google Talk
* /autostart: when Google Talk is run with this parameter, it will check the registry settings to see if it needs to be started or not. If the "Start automatically with Windows" option is unchecked, it won't start.
* /forcestart: same as /autostart, but forces it to start no matter what option was set.
* /S upgrade: Used when upgrading Google Talk
* /register: registers Google Talk in the registry, includig the GMail Compose method.
* /checkupdate: check for newer versions
* /plaintextauth: uses plain authentication mechanism instead then Google's GAIA mechanism. Used for testing the plain method on Google's servers.
* /nogaiaauth: disables GAIA authentication method. The same as above.
* /factoryreset: set settings back to default.
* /gaiaserver servername.com: uses a different GAIA server to connect to Google Talk. Used for debug purposes only, there are no other known GAIA servers.
* /mailto email@host.com: send an email with Gmail
* /diag: start Google Talk in diagnostic mode
* /log: probably has something to do with the diagnostic logging
* /unregister: ?
* /embedding: ?
Others
* If there’s something you think is missing in Google Talk, send off a message to Google.
* There was a hidden game in Google Talk. In the about screen you could see 'play 23 21 13 16 21 19 . 7 1 13 5'. Each number represented a letter. a=1, b=2, c=3 .... When you translated this message it said: 'play wumpus.game'. To play this game you had to invite wumpus.game@gmail.com as a friend. wumpus.game@gmail.com is always offline now. You can still play Hunt the Wumpus here.
* Google Talk can dock into the Google Desktop Sidebar. Doubleclick on the titlebar in the Google Talk main window and it docks as a panel into the GDS and slides out when you click the top of the docked panel..
Google Hacks
Well, the Google’s query syntaxes discussed above can really help people to precise their search and get what they are exactly looking for.Now Google being so intelligent search engine, hackers don’t mind exploiting its ability to dig much confidential and secret information from the net which they are not supposed to know. Now I shall discuss those techniques in details how hackers dig information from the net using Google and how that information can be used to break into remote servers.
Index Of
Using “Index of ” syntax to find sites enabled with Index browsing.
A webserver with Index browsing enabled means anyone can browse the webserver directories like ordinary local directories. The use of “index of” syntax to get a list links to webserver which has got directory browsing enabled will be discussd below. This becomes an easy source for information gathering for a hacker. Imagine if the get hold of password files or others sensitive files which are not normally visible to the internet. Below given are few examples using which one can get access to many sensitive information much easily.
Index of /admin
Index of /passwd
Index of /password
Index of /mail
"Index of /" +passwd
"Index of /" +password.txt
"Index of /" +.htaccess
"Index of /secret"
"Index of /confidential"
"Index of /root"
"Index of /cgi-bin"
"Index of /credit-card"
"Index of /logs"
"Index of /config"
Looking for vulnerable sites or servers using “inurl:” or “allinurl:”.
a. Using “allinurl:winnt/system32/” (without quotes) will list down all the links to the server which gives access to restricted directories like “system32” through web. If you are lucky enough then you might get access to the cmd.exe in the “system32” directory. Once you have the access to “cmd.exe” and is able to execute it.
b. Using “allinurl:wwwboard/passwd.txt”(without quotes) in the Google search will list down all the links to the server which are vulnerable to “WWWBoard Password vulnerability”. To know more about this vulnerability you can have a look at the following link:
http://www.securiteam.com/exploits/2BUQ4S0SAW.html
c. Using “inurl:.bash_history” (without quotes) will list down all the links to the server which gives access to “.bash_history” file through web. This is a command history file. This file includes the list of command executed by the administrator, and sometimes includes sensitive information such as password typed in by the administrator. If this file is compromised and if contains the encrypted unix (or *nix) password then it can be easily cracked using “John The Ripper”.
d. Using “inurl:config.txt” (without quotes) will list down all the links to the servers which gives access to “config.txt” file through web. This file contains sensitive information, including the hash value of the administrative password and database authentication credentials.
For Example: Ingenium Learning Management System is a Web-based application for Windows based systems developed by Click2learn, Inc. Ingenium Learning Management System versions 5.1 and 6.1 stores sensitive information insecurely in the config.txt file. For more information refer the following
links: http://www.securiteam.com/securitynews/6M00H2K5PG.html
Other similar search using “inurl:” or “allinurl:” combined with other syntax
inurl:admin filetype:txt
inurl:admin filetype:db
inurl:admin filetype:cfg
inurl:mysql filetype:cfg
inurl:passwd filetype:txt
inurl:iisadmin
inurl:auth_user_file.txt
inurl:orders.txt
inurl:"wwwroot/*."
inurl:adpassword.txt
inurl:webeditor.php
inurl:file_upload.php
inurl:gov filetype:xls "restricted"
index of ftp +.mdb allinurl:/cgi-bin/ +mailto
Looking for vulnerable sites or servers using “intitle:” or “allintitle:”
a. Using [allintitle: "index of /root”] (without brackets) will list down the links to the web server which gives access to restricted directories like “root” through web. This directory sometimes contains sensitive information which can be easily retrieved through simple web requests.
b. Using [allintitle: "index of /admin”] (without brackets) will list down the links to the websites which has got index browsing enabled for restricted directories like “admin” through web. Most of the web application sometimes uses names like “admin” to store admin credentials in it. This directory sometimes contains sensitive information which can be easily retrieved through simple web requests.
Other similar search using “intitle:” or “allintitle:” combined with other syntax
intitle:"Index of" .sh_history
intitle:"Index of" .bash_history
intitle:"index of" passwd
intitle:"index of" people.lst
intitle:"index of" pwd.db
intitle:"index of" etc/shadow
intitle:"index of" spwd
intitle:"index of" master.passwd
intitle:"index of" htpasswd
intitle:"index of" members OR accounts
intitle:"index of" user_carts OR user_cart
allintitle: sensitive filetype:doc
allintitle: restricted filetype :mail
allintitle: restricted filetype:doc site:gov
Other interesting Search Queries
To search for sites vulnerable to Cross-Sites Scripting (XSS) attacks:
allinurl:/scripts/cart32.exe
allinurl:/CuteNews/show_archives.php
allinurl:/phpinfo.php
To search for sites vulnerable to SQL Injection attacks:
allinurl:/privmsg.php
allinurl:/privmsg.php










