Pages

Thursday, January 26, 2012

How to Change IP address



How to change your IP address in less than a minute? The following trick gives you a step-by-step procedure to change your IP address.




1. Click on “Start” in the bottom left hand corner of screen.

2. Click on “Run”.

3. Type in “command” and hit ok.You should now be at an MSDOS prompt screen.

4. Type “ipconfig /release” just like that, and hit “enter”.

5. Type “exit” and leave the prompt.

6. Right-click on “Network Places” or “My Network Places” on your desktop.

7. Click on “properties”.

You should now be on a screen with something titled “Local Area Connection”, or something close to that.

8. Right click on “Local Area Connection” and click “properties”.

9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the “General” tab.

10. Click on “Use the following IP address” under the “General” tab.

11. Create an IP address (It doesn’t matter what it is. I just type 1 and 2 until i fill the area up).

12. Press “Tab” and it should automatically fill in the “Subnet Mask” section with default numbers.

13. Hit the “Ok” button here.

14. Hit the “Ok” button again. You should now be back to the “Local Area Connection” screen.

15. Right-click back on “Local Area Connection” and go to properties again.

16. Go back to the “TCP/IP” settings.

17. This time, select “Obtain an IP address automatically”.

18. Hit “Ok”.

19. Hit “Ok” again.

20. Now You have a new IP address.




Some ISPs do not support this type of procedure and hence there are chances of getting back the same old IP address even after trying this hack. In this case you need to switch off the modem and then switch it on to get the new IP address.

NOTE: All these tricks works only if you have a dynamic IP address. But if you have a static IP address you have no option to change your IP.

Enjoy....!!

15 Best Password Cracking Tools Collection



Here is a collection of 15 best Password Crackers for cracking PDF Password, Windows 7, Vista and XP Admin Passwords, Zip File Password, MSN Messanger and Yahoo Messanger Passwords, etc. All of the tools come with serial numbers

This collection includes:

1. PDF Password Remover


PDF Password recovers lost passwords to password-protected PDF files (*.pdf). PDF Password recovers user and permission passwords only. PDF Password does not allow to break DRM (Digital Right Management) system. If user password (also known as password to open) is either not set or known, it is possible to remove permission password instantly.

2. Asterisk Logger
Many applications, like CuteFTP, CoffeeCup Free FTP, VNC, IncrediMail, Outlook Express, and others, allows you to type a password for using it in the application. The typed password is not displayed on the screen, and instead of the real password, you see a sequence of asterisk ('****') characters. This utility can reveal the passwords stored behind the asterisks in standard password text-boxes.
Asterisk Logger is a successor of AsterWin utility. It reveals the asterisk passwords in the same way as AsterWin utility, but it has some advantages over the previous utility:
You don't have to press a button in order to reveal the asterisk passwords. Whenever a new window containing a password box is opened, Asterisk Logger automatically reveals the password inside the password-box, and add a record to passwords list in the main window of Asterisk Logger.
Asterisk Logger displays additional information about the revealed password: The date/time that the password was revealed, the name of the application that contains the revealed password box, and the executable file of the application.
Asterisk Logger allows you the save the passwords to HTML file and to 3 types of text files.

3. Password Changer



Active Password Changer Professional is a DOS-based solution designed for resetting local user passwords in case of administrator's password is forgotten or lost. Forgotten password recovery software is useful if you lost the administrator password and cannot access the operation system. Other Windows login security restrictions like 'Account is disabled', 'Password never expires', 'Account is locked out', 'User Must Change Password at Next Logon' and 'Logon Hours' can be changed or reset. Supported platforms: Windows XP, 2000, NT, Windows Server 2003 and Windows Vista.

4. Microsoft Office Password Remover



This software helps recover or delete forgotten Microsoft Office document passwords. The software restores passwords of certain types instantly, plus the latest version of the software allows finding lost hard-cracked passwords seven times faster!


5. EXE File Password Recovery



EXE Password Protector is a powerful yet easy to use system utility that allows you to password-protect any Windows executable file in a few steps. This incredible program is intended for those people who share the same computer with others and want to protect sensitive applications from an unauthorized usage. If you are looking for an efficient and fast application that allows you to password-protect any Windows executable file, EXE Password Protector is perfect for you.

6. Zip File Password Cracker


Atomic Zip Password Cracker is created to recover the lost or forgotten passwords for ZIP archives. It can quickly restore the password in several ways: the direct search and the dictionary attack. It has easy-to-work and friendly user interface. There are two modes of password recovering: automatic and user-defined mode. If the automatic mode is set the program makes a password search basing on most frequently used settings (such as capital and small letters, 0-9 figures; maximum 5 symbols length password). If you have the information about the components and length of the password you can try to start the user-defined mode.

7. Windows Vista Admin Password Recovery


Windows Password Unlocker is a pioneer Windows password recovery with intuitive Windows graphical user interface, but not DOS-like black screen, so that it is much easier to reset Windows login passwords rapidly and conveniently in case an administrator password is forgotten or lost in Windows 2000/2003/NT/XP/Vista/2008. No need to re-install the operating system any more. Just boot from the program CD, choose the account you wish to reset. Then you can log in as a particular user with a blank password. Even with the on-screen step-by-step instructions, the program is so simple to use without any technique.


 8. RAR File Password Cracker


RAR Password Recovery proved to be an effective way to uncover lost or forgotten passwords, but--as its name implies--it only works with one file type. Its straightforward, tabbed interface clearly represents the three main password recovery options: Brute-Force, Booost-Up, and Dictionary. Each approach proved successful in our tests, although the demo limits passwords to three characters. Conveniently, you can save password recovery settings in projects for future use. While it can only handle one file format, users who need to unlock their RAR files will find this application up to the task.

 9. Distributed Password Recovery



If every system administrator's nightmare is forgotten passwords, then this application is every admin's dream. Installation of Elcomsoft Distributed Password Recovery is quick and simple. The clean tab-and-button interface is well-organized. This application cracks Word 97 and Word 2000 passwords, plus the weaker PGP, PDF, and Windows passwords. It takes just a couple of steps to crack most files. The software can unleash agents that harness the power of multiple client machines to improve password-recovery time. Connecting over the network is through a user-specified port, to forestall interference with other applications. Your firewall may have to be set to allow information through the port. The help file is sparse, but the program operates cleanly with little user supervision. E-mail alerts are easy to implement, making this a start-it-and-forget-it piece of software.


10. SQL Password Remover


Kernel SQL Password Recovery is a MDF (Master Data File) password recovery software widely used to recover the lost or forgotten passwords from SQL Server 2000 password-protected database files (*.mdf). The software recovers all the passwords instantly despite the length and complexity of the password. The .mdf files stores the password using strong encryption algorithms. This strong encryption can not be easily decrypted. Kernel SQL Password Recovery will recursively scan the password protected sql database file and will automatically generate the password. The generated password is an alternate password (NOT the Original Password) to unprotect the MDF file.

11. MSN Password Recovery



MessenPass is a password recovery tool that reveals the passwords of all instant messenger applications. MessenPass can only be used to recover the passwords for the current logged-on user on your local computer, and it only works if you chose the remember your password in one of the above programs. You cannot use this utility for grabbing the passwords of other users.



12. Password Memory


The Password Memory 2010 application was designed to be the perfect password manager for you. Your passwords are encrypted using multiple algorithms to keep them secure. Your login details (username, password, etc.) can be searched and sorted fast easily. Login details associated with a website can also be copied into the webpage with the click of a button. Generating random secure passwords in an instant. You can even install the program on a USB stick and bring your password database securely with you wherever you go.

13. Mozilla Firefox Password Cracker


PasswordFox enables you to review and export the list of saved logins and passwords that are stored in your Firefox browser. The list can be saved to a text file or exported to HTML format. PasswordFox will let you view passwords from any Firefox profile, not only the current one. A useful tool to backup your login information, keep in mind though that the exported text file in not encrypted and should be stored securely.

14. Windows 7 Password Cracker




The Ophcrack Windows password cracker is by far the best free Windows password recovery tool available. It's fast and easy enough for a first time password cracker with a basic knowledge of Windows. With Ophcrack, you don't need any access to Windows to be able to recover your lost passwords. Simply visit the site, download the free ISO image, burn it to a CD and boot from the CD. The Ophcrack program starts, locates the Windows user accounts, and proceeds to recover (crack) the passwords - all automatically. In a test on a Windows 7 PC, Ophcrack recovered the 10-character password to my administrator account in 40 seconds. Ophcrack supports Windows 7, Windows Vista, and Windows XP.

15. Windows XP Admin Password Remover


Windows Password Cracker can easily extract unencrypted password hashes from systems that use Microsoft's SYSKEY protection. It supports international language input locales, allowing it to work with operating systems and passwords based on single byte character sets including those for European, Cyrillic, Greek, Hebrew, Arabic, and other languages. Windows Password Cracker now includes a 53,000 word English dictionary for comprehensive English dictionary audits. It's is an easy-to-use and fast password recovery software.

========================================================================

Download.....


=================================================================================

Wednesday, January 25, 2012

HACK WebSites RTE Webwiz Vulnerability -File Upload Vulnerability


Hi Guyz In this Tutorial i will tell you how to hack web sites with Rte Remote file upload Vulnerability


» 1. use these google dorks for find Sites


inurl:rte/my_documents/my_files
inurl:/my_documents/my_files/

The Exploit is

site.com/rte/RTE_popup_file_atch.asp

site.com/admin/RTE_popup_file_atch.asp

For Example i Got a Web Site.
Site:- http://www.billkonigsberg.com
Vulnerability http://www.billkonigsberg.com/RTE_popup_file_atch.asp

it will look like Screenshot Below


You can upload your html defacepage here and in left site after upload your page will show

You can also upload shell there asp or jpg shell

Sunday, January 22, 2012

How to Find Sql Vulnerable web sites with Injections point with Real Sql Tool




what is does is search through Google, using Google Dorks and tries each website for an SQL Injection Vulnerability and if it is successful it will return the vulnerable link to you!


Here is the search function and you can see it is returning a vulnerable URL


The search is complete and there were 3 vulnerable URLs found!


This is the save button making a .txt file of all the working links


Showing the contextual menu in the results box


Filename: REAL Sql - V0.3.rar
File description: REAL Sql - V0.3
File size: 1.00 MB

Download Real sql Tool From Here

Hope you like this Post and it will help to you...

Monday, January 16, 2012

Google Hacking Codes



Application security vendor Fortify reported in 2006 that 20 percent to 30 percent of the attacks it recorded as part of a six-month study came as a result of some form of search engine hacking.


Google is not particularly enamored by the efforts of some of its users to use its index for malicious gain.


"As part of Google's efforts to index all of the information online we find that on occasion malicious executable files become available to users through Google Web search," Megan Quinn, a Google spokeswoman, told internetnews.com. "We deplore these malicious efforts to violate our users' security.


"When possible, we endeavor to shield our users from these executable files," Quinn added. "However we always encourage users to keep their security software up-to-date to ensure the safest Web surfing experience."


But what kind of Codes are available I hear you all ask;


Well here's just a few of them I've found out about. . .





Interesting Searches…
* Source http://www.i-hacked.com/content/view/23/42/
* intitle:"Index of" passwords modified
* allinurl:auth_user_file.txt
* "access denied for user" "using password“
* "A syntax error has occurred" filetype:ihtml
* allinurl: admin mdb
* "ORA-00921: unexpected end of SQL command“
* inurl:passlist.txt
* "Index of /backup“
* "Chatologica MetaSearch" "stack tracking:"
* inurl:passwd.txt
…and this one is just priceless…
* “login: *” “password= *” filetype:xls


Listings of what you want
* change the word after the parent directory to what you want
* "parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
* "parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
* "parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
* "parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
* "parent directory " Name of Singer or album” -xxx -html -htm -php -shtml -opendivx -md5 -md5sums


Music (*this is already posted in another thread)
* You only need add the name of the song/artist/singer.
* Example: intitle:index.of mp3 jackson


CD Images
* inurl:microsoft filetype:iso
* You can change the string to whatever you want, ex. Microsoft to Adobe, .iso to .zip etc…


Passwords
* "# -FrontPage-" inurl:service.pwd FrontPage passwords.. very nice clean search results listing !!


* "AutoCreate=TRUE password=*" This searches the password for "Website Access Analyzer", a Japanese software that creates webstatistics. For those who can read Japanese, check out the author's site at: http://www.coara.or.jp/~passy/


Passwords in the URL
* "http://*:*@www" domainname This is a query to get inline passwords from search engines (not just Google), you must type in the query followed with the domain name without the .com or .net
* "http://*:*@www" gamespy or http://*:*@www”gamespy
* Another way is by just typing "http://bob:bob@www"


IRC Passwords
* "sets mode: +k" This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.
* eggdrop filetype:user user These are eggdrop config files. Avoiding a full-blown discussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users.


Access Database Passwords
* allinurl: admin mdb Not all of these pages are administrator's access databases containing usernames, passwords and other sensitive information, but many are!


DCForum Passwords
* allinurl:auth_user_file.txt DCForum's password file. This file gives a list of (crackable) passwords, usernames and email addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun, and all belong to googledorks.


MySQL Passwords
* intitle:"Index of" config.php
* This search brings up sites with "config.php" files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database.


The ETC Directory
* intitle:index.of.etc
* This search gets you access to the etc directory, where many, many, many types of password files can be found. This link is not as reliable, but crawling etc directories can be really fun!


Passwords in backup files
*filetype:bak inurl:"htaccess|passwd|shadow|htusers
* " This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version). Every attacker knows that changing the extension of a file on a web server can have ugly consequences.


Serial Numbers
* Let's pretend you need a serial number for Windows XP Pro.
* In the Google search bar type in just like this - "Windows XP Professional" 94FBR
* the key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of 'fake' sites (usually pornography) that trick you.
* or if you want to find the serial for WinZip 8.1 - "WinZip 8.1" 94FBR


These are only a sample of some of the fun things you can do with the wrong kind of Google search. Such strings return very random results, and are of very little use for targeted attacks. But for random hacking of peoples Frontpage password's, it's priceless.


* inurl:(service | authors | administrators | users) ext:pwd "# -FrontPage-"

Wednesday, January 11, 2012

World’s Top 10 rich people(men and women)



1.CARLOS SLIM HELU & FAMILY

Net Worth:$74 B
Age: 71
Title: Chairman
Organization: Telmex
Source: telecom, self-made
Residence: Mexico City, Mexico
Country of citizenship: Mexico
Education: BA/BS, Universidad Nacional Autonoma de Mexico
Marital Status: Widow
Children: 6

2.BILL GATES

Net Worth:$56 B
Age: 55
Title: Co-Chair
Organization: Bill & Melinda Gates Foundation
Source: Microsoft, self-made
Residence: Medina, WA
Country of citizenship: United States
Education: Dropout, Harvard University
Marital Status: Married
Children: 3

3.WARREN BUFFETT
Net Worth:$50 B
Age: 80
Title: CEO
Organization: Berkshire Hathaway
Source: Berkshire Hathaway, self-made
Residence: Omaha, NE
Country of citizenship: United States
Education: MS, Columbia University; BA/BS, University of Nebraska Lincoln
Marital Status: Widowed, Remarried
Children: 3

4.BERNARD ARNAULT
Net Worth:$41 B
Age: 62
Title: Chairman
Organization: Louis Vuitton Moet Hennessy (LVMH)
Source: LVMH, inherited and growing
Residence: Paris, France
Country of citizenship: France
Education: BA/BS, Ecole Polytechnique de Lausanne; BA/BS, Ecole Polytechnique de Paris
Marital Status: Married
Children: 5

5.LARRY ELLISON
Net Worth:$39.5 B
Age: 66
Source: Oracle, self-made
Residence: Woodside, CA
Country of citizenship: United States
Education: Dropout, University of Chicago; Dropout, University of Illinois at Urbana
Marital Status: Divorced
Children: 2

6.LAKSHMI MITTAL
Net Worth:$31.1 B
Age: 60
Title: Chairman
Organization: ArcelorMittal ADS
Source: Steel, inherited and growing
Residence: London, United Kingdom
Country of citizenship: India
Education: BA/BS, St Xavier’s College Calcutta
Marital Status: Married
Children: 2

7.AMANCIO ORTEGA
Net Worth:$31 B
Age: 75
Source: Zara, self-made
Residence: La Coruna, Spain
Country of citizenship: Spain
Marital Status: Married
Children: 3

8.EIKE BATISTA
Net Worth:$30 B
Age: 54
Title: CEO
Organization: EBX Group
Source: mining, oil, self-made
Residence: Rio de Janeiro, Brazil
Country of citizenship: Brazil
Education: Dropout, RWTH Aachen University
Marital Status: Divorced
Children: 2

9.MUKESH AMBANI
Net Worth:$27 B
Age: 54
Title: Chairman
Organization: Reliance Industries
Source: petrochemicals, oil & gas, inherited and growing
Residence: Mumbai, India
Country of citizenship: India
Education: Dropout, Stanford University; BA/BS, University of Bombay
Marital Status: Married
Children: 3

10.CHRISTY WALTON & FAMILY
Net Worth:$26.5 B
Age: 56
Source: Walmart, inherited
Residence: Jackson, WY
Country of citizenship: United States
Marital Status: Widow
Children: 1




Watch this video.....






Hope you like this and do not forget to comment....

Top 5 Security Tips To Protect Your Computer From USB Viruses




With increasing anti-virus security in place against email-aware viruses and malware, hackers are turning their attention to less well-defended routes such as USB drives. This is the latest method that’s used by hackers to torment innocent users. However, there are ways you can protect your computer from USB and Pen drive viruses.

1.Block USB Viruses


Invest in an excellent anti-virus program that has built in USB virus scan and remover. These anti-USB virus scan programs not only protect your computer from USB Autorun viruses but can also clean worms, Trojans and viruses in your USB memory sticks.You can try anti-virus programs for USB virus such as USB Virus Scan, USB Drive Antivirus and so on.

2.Disable Your Computer’s Autorun Feature

When you plug in a USB drive stick into your system, the Autorun feature initiates automatically. If your USB contains any virus programs, it’ll use the Autorun feature to infect your computer. To protect your computer, disable the Autorun feature.You can disable the Autorun feature via the Control Panel.
Alternatively, you can use antivirus software to disable and enable the Autorun feature whenever you want. Additionally, these USB blocking softwares allow system administrators to specify which removable storage drives users can access.

3.Update Your Device Driver

Keeping your USB device driver updated is a good way to ensure greater stability for your USB drives. While this won’t help eradicate USB viruses, USB device drivers are constantly updated to block viruses and deliver timely warnings. You can update your USB device drive from your Windows Computer Management feature in the Control Panel.

4.Use USB Firewall Software

USB firewalls prevent Windows OS from processing malicious programs when a virus infected portable USB device is opened. USB firewalls monitor only your USB devices, and not your CD and DVD drives. By using USB firewalls, you’ll be enabling a basic level of protection from the autorun.inf viruses that spread from portable USB devices.

5.Always Safely Remove USB Devices

Viruses are sometimes created via damaged documents. If you are transferring a set of files to your USB drive, make sure the transfer is complete before you eject the device. Always use the Safely Remove Hardware feature of Windows OS. This is because partially transferred or damaged files can in turn corrupt other files on your USB drive.

Hope you Like disssss.......

Saturday, January 7, 2012

SQL Injection Tutorial With Havij Tool


According to a survey the most common technique of hacking a website is SQL Injection. SQL Injection is a technique in which hacker insert SQL codes into web Forum to get Sensitive information like (User Name , Passwords) to access the site and Deface it. The traditional SQL injection method is quite difficult, but now a days there are many tools available online through which any script kiddie can use SQL Injection to deface a webite, because of these tools websites have became more vulnerable to these types of attacks.


One of the popular tools is Havij, Havij is an advanced SQL injection tool which makes SQL Injection very easy for you, Along with SQL injection it has a built in admin page finder which makes it very effective.


Warning - This article is only for education purposes, By reading this article you agree that My   
                  Blog is not responsible in any way for any kind of damage caused by the information provided in this article.

Supported Databases With Havij

  • MsSQL 2000/2005 with error.
  • MsSQL 2000/2005 no error union based
  • MySQL union based
  • MySQL Blind
  • MySQL error based
  • MySQL time based
  • Oracle union based
  • MsAccess union based
  • Sybase (ASE)
Demonstration

Now i will Show you step by step the process of SQL injection.

Step1: To Find SQL injection Vulnerability in site and insert the ' or ''
           After the url of website like http://www.target.com/index.asp?id=123'

Step2: Now if the site give any Error in webpage than this site is valnerable for SQL injection.Than just       
            copy this Site Url from address bar of your browser and put it in a Havij as show below.(Without '      
            or ''  like http://www.target.com/index.asp?id=123).



Step3: Now click on the Analyse button as shown below.


Now if the your Server is Vulnerable the information about the target will appear and the columns will appear like shown in picture below:


Step4: Now click on the Tables button and then click Get Tables button from below column as shown 
            below:


Step5: Now select the Tables with sensitive information and click Get Columns button.After that select the 
            Username and Password Column to get the Username and Password and click on the Get Table  
            button.

Step6: Now select the Tables name that you want to show and click on Getdata Button and wait some 
            time... it Display Data of that Table..


Download Link For Havij:-----Download Havij from Here

Warning - This article is only for education purposes, By reading this article you agree that My 
                  Blog is not responsible in any way for any kind of damage caused by the information provided in this article.