Sunday, September 13, 2009

Get Victim's IP Address in 3 steps!

This is a really small method of finding someone's IP address.

1.Go to :
2.Fill in the username and you email address.
3.Click Submit.

Now you will be given a link. Just give that link to the victim somehow. When the victim will click the link, you will receive his/her IP address in your email and he/she will be led to an error page like 404 error. Don't worry, they won't find out that you're trying to get their IP address.

Note:You will not receive any spam from this website. But it's still better to have a separate account for such adventures.

Thursday, September 10, 2009

Metasploit Basics - Hack Windows XP

Metasploit is a tool which uses certain bugs in Windows and other platforms to carve and develop exploits and lets you apply them using simple commands. Thus, Metasploit is a script kiddie's dream! :D. Well, maybe not.

In this tutorial, I'll teach you:
1>>The basics of metasploit,
2>>How to choose and apply an exploit on a target machine,
3>>Gain control of the victim's computer.

We'll be hacking Windows XP with no firewall installed or enabled.

Here's what we will be doing:

1)Install Metasploit Framework
2)Choose a target machine
3)Choose an exploit
4)Apply the exploit

Now here are the steps you are going to take:

1>>Download and install Metasploit framework by clicking HERE.

2>>Now after installing the framework run the Framework by going to    Start>>Programs>>Metasploit3>>Metasploit 3 GUI.

3>>Now go to Window on the top and click on Console. You can also just press 'Ctrl + O'.

4>>Now you have the console infront of you.

5>>Here's where it all starts and you start typing the commands. Now first of all we'll see which exploits are available for our use. For that click infront of msf> and type: show exploits

6>>You will get the list of exploits available infront of you. It'll be a long list so don't worry if it takes a second to load.

7>>Now you have to choose the exploit which you want to apply. Keep in mind that not every exploit you apply will work and that what might work for each victim may not work for another. For this tutorial I will use the windows/smb/ms08_067_netapi exploit.

8>>Find  windows/smb/ms08_067_netapi in the list of exploits you have infront of you and copy it. You can also copy it from here if you want to.

9>>Now type 'use windows/smb/ms08_067_netapi' in the console where you can replace this exploit by any other exploit you later use for hacking. It should look like this:

10>>Now type 'show payloads' in the console and press enter. You have a list of payloads to use infront of you.

11>>Payload is actually shellcode written in assembly or machine language. If you want to know what shellcode is click HERE.

12>>Now you have to choose a payload to attack the victim. For this tutorial I'm going to use 'windows/shell/bind_tcp' payload.

13>>So you have to type 'set payload windows/shell/bind_tcp' and press enter.

14>>Now you have selected the payload and you just have to set the victim's ip address.

15>>After this type 'set rhost [ip]' and press enter.

16>>Now you're ready to exploit! Just type 'exploit' and press enter! And here you have access to victims's system32 as the promt now shows C:\WINDOWS\System32. Like this:

Use different exploits and play around! See you in the next tutorial!

Note: You can also set the port to attack using different commands. Ask in the comments if you want me to explain anything else.

Sunday, September 6, 2009

Change Your IP Address & HIDE Your Identity! - TOR

Tired of waiting for Rapidshare downloads? Want to skip the 'Orkut/Facebook' ban? Want to be anonymous? Or just don't want anyone to have a clue about your whereabouts? Changing your IP can solve all these problems for you. Need I say more?

Okay, this tutorial is going to teach you how to change your IP address using simple third part software. There are many programs out there which change your external IP address but today I'm going to review the one I find most useful, i.e TOR.


Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships.

Here's what you have to do:

1>>Go to

2>>Now there are two options that you have here. Either you can download the complete TOR bundle for Windows which saves you from manually configuring everything for each browser or IM client that you use OR download a simple installer which you will have to configure yourself after you install it.

3>>I recommend that if you have good bandwidth available, just download the bundle and make your life easy.

4>>Okay, so you haven't downloaded the bundle and want to stick to the simple installer.

5>>Start installing it and you'll be asked whether you want to install the TOR plugin for Firefox which you should if you use Firefox otherwise, don't.

6>>Once you're done with it just Run the 'Vidalia' client by going to Start Menu>>All Programs>>Vidalia Bundle>>Vidalia.

7>>Now you have to first configure Vidalia to make TOR run for your internet connection.

8>>If you're connecting to internet by using a proxy provided by an organization or an ISP, just click on settings. A dialogue box will appear. Now click on Network on the top and select the option 'I use a proxy to access the Internet'. No you can enter the proxy settings here. If you have a port restriction or a firewall installed you can also enter the allowed ports by clicking on the option right below this one.

9>> Now after you're done with this click on the Advanced Tab on the top and look at the port TOR is using to connect you to the Internet. Note down these settings as these are the ones you're going to enter everywhere to connect to the Internet via TOR.

10>>Once you've noted down the settings click OK and come back to the Vidalia Control Panel.

11>>Now open the browser you want to use and enter the proxy settings for it.

12>>For Firefox, go to Tools>>Options>>Advanced and click on the Network tab and then click on the settings button against 'Configure how Firfox connects to Internet'. Here select Manual Proxy Setting and enter the settings you noted down.

13>>For IE go to Tools>>Internet Options>>Connections>>LAN Settings and select 'Use a proxy server' option and then enter the settings.

 Now go back to the Vidalia Control Panel and click on the button 'Start TOR'. You're done once TOR is connected to the internet. Now to check your IP address and location go to and you'll see that your IP is being wrongly traced.

Each time you want a new IP address just go to the Vidalia control panel and click on 'Use a New Identity'. Make your life a lot easier by skipping rapidshare and other bandwidth and time based bans! :D

Have fun! With complete privacy! ;)

Note: TOR doesn't change your IP address, it actually hides it behind a proxy.

Friday, September 4, 2009

Cain and Abel - Using the sniffer to get passwords in 15 STEPS!

Okay, so now when you've learnt all the basics of Cain and Abel and the cracker, let's get to the real business. You are now ready to use the sniffer to get the passwords of the people who are on the same network as you. This is unbelievably simple and also warns us of the dangers we are prone to while we are on a network.

Make sure that you've configured Cain before moving on to read this article. If you still haven't configured it, look at the links at the bottom of this article.

So here is what you have to do:

1>>Open Cain and first of all click on the 'Start sniffer' button in the right top corner of your screen beside the radioactivity sign button. Don't worry you're just activating the sniffer.

2>>Now click on the sniffer tab. It should be blank if you're using it for the first time.

3>>Right click and select 'Scan for MAC addresses' and without touching anything click OK.

4>>Now you have a list of IP addresses and MAC addresses on your network.

5>>Now click on 'APR' tab at the bottom beside the 'hosts' tab.

6>>The function of APR is to Hijack the network traffic and pass it through your computer.

7>>Now single click in the upper segment of the empty form-like space on the right side of the window.

8>>Click on the blue PLUS sign (+) on the top which is meant to add new addresses to poison and sniff.

9>>Here, on the left side you have a list of available addresses. I prefer selecting the address of the router so select the address of the router and then on the right side select the addresses of the computers you want to sniff. You can choose as many computers as you like.

10>>Now just click okay and you'll see that address listed in the upper segment of your screen.

11>>Select the addresses with your mouse and click on the 'Start APR' button which appears like a radioactivity sign.

12>>Bingo! You just started sniffing and poisoning the network.

13>>Now click on the 'Passwords' tab at the bottom and here you have a list of all the activity going on and you can sneak the passwords from here.

14>>For web passwords see the HTTP tab and if you want the login information just click on 'SMB' on the left side of your screen where there is a list of the type of passwords available.

15>>From here, select the password you want to crack, right click it and send it to the cracker.

If you still don't know how to use the cracker, refer to the links below.

Related Posts

Still haven't configured Cain? Learn how to configure it!

Learn how to use the Cain's cracker for a Dictionary Attack to crack passwords!

Learn to use Rainbow Tables to crack passwords!

Want to watch the above tutorial as a video? Click HERE.

Wednesday, September 2, 2009

Cain and Abel - PocketPC Tutorial

This is a quick video tutorial to teach you how to crack passwords using your PocketPC and Cain and Abel Mobile Version.

Keep in mind that this only works for the Dictionary Attacks.

Courtesy Go4the101.

Related Posts

Still haven't configured Cain? Learn how to configure it!

Learn how to use the Cain's cracker for a Dictionary Attack to crack passwords!

Learn to use Rainbow Tables to crack passwords!

Cain and Abel - Cracking (Rainbow Tables Explained)

Rainbow Tables are a compact representation of related plaintext password sequences. In other words, they are huge lists of passwords that meet certain criteria.

Rainbow tables are used to return a plaintext password from a hash. They can be fastest method amongst all but creating them requires a lot of hardwork.

So to generate a rainbow table, you have to follow these steps:

1>>To generate a rainbow table, we will use a free program called Wintrgen. (

2>>When we'll click 'Add Table' a dialogue box will appear where we'll lbe able to specify the criteria for the Rainbow Table.

3>>The options marked 'Hash' and 'Charset' are the ones we need to change.

4>>The 'Hash' option allows you to choose the type of hash you'll be cracking and the 'Charset' allows you to specify the character set for the hash you'll be cracking. A character set is actually the list of all possible characters in your hash. Greater the number of characters, larger the amount of time it will take to crack and vice versa.

5>>Now let us start by trying to crack an MD5 hash of max length '8' and numbers-only charset.

6>>The Key Space option shows that these specifications will create a table with 111,111,110 keys and will take a total space of around 631 MB on your hard drive.

7>>Finally hit Ok and then 'Start' to begin creating the table.

8>>Keep in mind that table generation can be very long and tedious.

9>>Once you've created the table, you're ready to proceed to the next tutorial.

Related Posts

Still haven't configured Cain? Learn how to configure it!

Learn how to use the Cain's cracker for a Dictionary Attack to crack passwords!

Use your PocketPC to crack passwords on the go!

Cain and Abel - Dictionary vs Bruteforce attacks!

Courtesy Go4the101.

In this tutorial we'll be drawing a line between Dictionary Attacks and Bruteforce Attacks.

1>>Bruteforce attacks basically involve trying all possible keys to crack a password. On the other hand, Dictionary attack only tries the most probable passwords which are derived from a given Wordlist such as Aragon Wordlist.

2>>Dictionary attacks are much faster than the Bruteforce attacks but they donot always gurantee that the password will be cracked because there is no guarantee that the password is in your dictionary. Bruteforce attacks, however, always end up cracking the password once given the time to do so.

3>>Thus, a dictionary attack will never be able to crack a password like 'aCe#33&9' whereas Bruteforce will.

4>>Dictionary attack should always be your first choice but Bruteforce should be the last.

Related Posts

Still haven't configured Cain? Learn how to configure it!

Learn how to use the Cain's cracker for a Dictionary Attack to crack passwords!

Learn to use Rainbow Tables to crack passwords!

Use your PocketPC to crack passwords on the go!  

Tuesday, September 1, 2009

Cain and Abel - Cracker Tutorial (Dictionary Attack)

Courtesy Go4the101.

In this tutorial we'll focus on how to use Cain's cracker to crack and recover passwords.

1>>Open Cain and click on the 'Cracker' tab.

2>>Now to your left is the list of all the various types of hashes that Cain and Abel is capable of dealing with.

3>>Across the top are buttons to crack less secure hashes that simply go through the same algorithm everytime.

4>>Also on the top is a button that looks like a calculator. This is a hash generator that you can use for test purposes.

5>>Clicking on the hash calculator will bring up a pop up with two text boxes with labels 'Text to Hash' and 'Bytes to Hash'. Typing something in the 'Text to hash' text box and clicking 'Calculate' will create many different types of hashes.

6>>The hashes it created are actually encrypted versions of whatever you typed.

7>>Imagine you have typed the word 'anything' in the box and it is a password or something. Going in the reverse direction, I will crack one of the hashes it has created to reveal the password behind it. I will be using the MD5 hash and then will be converting it back to the word 'anything'.

8>>At this point, it is necessary to know that Cain and Abel is capable of a few different decryption methods namely Bruteforce, Dictionary and Rainbow Table.

9>>As we know what is actually behind the hash, let us use the quickest method of cracking i.e Dictionary Attack.

10>>Copy the MD5 hash from the window where you calculated the hashes for the word 'anything' and then close the window.

11>>Now again you have Cain infront of you with the 'Cracker' tab open. Click on MD5 Hashes in the sidepane on your left.

12>>Now right click in the empty space on its right and click 'Add to list'.

13>>A small dialog box will open with a text box where you are going to paste the MD5 hash you copied.

14>>After this click ok. Now you should be able to see the hash you entered at the top.

15>>Right click the hash and select 'Dictionary Attack'.

16>>You will be seeing a screen with the available wordlists on the top and the buttons 'start' and 'exit' at the bottom. If you still haven't added the wordlists, right click in the empty space at the top and choose 'Add to list' and browse for the wordlist you have. (Aragon worldist is a good wordlist)

17>>Now press the 'Start' button at the bottom and Cain will crack the password for you in a matter of minutes depending on the speed of your computer.

In the next tutorial, we'll see how to crack complex passwords using the Rainbow Table and the Bruteforce attack. :):)

Till then, have fun.

Related Posts

Still haven't configured Cain? Learn how to configure it!

Learn to use Rainbow Tables to crack passwords!

Use your PocketPC to crack passwords on the go!  

Lightweight Linux Distros

Learning to use Linux is a leap towards becoming a good hacker. Linux unlike Windows is more secure and is a lot faster.

Linux has a lot of free distributions available. So once you decide to get your first taste of Linux, it is important to decide which Linux distro to use. If you're ready to completely convert to Linux and banish Windows from your PC forever, you should probably go for fully featured distros like Fedora, Debian and Ubuntu. But if you're a novice and you haven't got any experience of using Linux before, you should better turn towards one of the very lightweight Linux distros available.

I've tested many Linux distros on my machine and have managed to shortlist these five:

1>>Damn Small Linux
3>>Feather Linux

Damn Small Linux (

Damn Small Linux or DSL (some people find the word 'damn' offensive) is an extremely small distro which is also immensely popular because of its very small size. It can be run off a Live CD and can completely run in RAM without consuming a chunk of Hard Drive. You can also boot with a USB and use it. It can run extremely fast with RAM as little as 128 MB! And the good part is, if you start liking the Linux interface, you can transform it into Debian which is a fully featured OS.

DSL can be downloaded as a 50 mb file from its website. Although it is extremely small in size, it has a couple of disadvantages aswell. First of all, the installation is not very user friendly, and secondly it doesnot have a great driver library though the drivers can be downloaded and installed once you're on with it.

PuppyLinux (

Another great lightweight Linux distro is PuppyLinux. It should run on any Pentium with at least 32 MB and boot under 60 seconds. It aims to be as easy to use as possible and assumes no technical expertise. PuppyLinux is a well featured distro which is very fast but also provides you with all the necessary tools to keep you moving. The installation is a piece of cake and the boot up is pretty fast too.

Feather Linux (

It is a Linux distribution which runs completely off a CD. It takes up under 128Mb of space. It is based on Debian and includes software which most people use every day. Feather can be installed on a USB stick but as far as I know, it cannot be installed on a Hard drive.

Xubuntu (

Xubuntu, or Jaunty Jackalope, is the little sister of the fully featured Linux OS, Ubuntu. It is the heaviest of all the distros listed here, but also the most well featured and best suited if you want to run Linux as the only OS on an old machine. The boot time and the installation is significantly greater than the rest of the distros here. But this is the OS which can best convince you to completely switch to Linux, at least on your Laptop.


From all of these, the one I like the most is Puppy for the ease of use and the briskness it provides to you. But after all, people are different, and you can't decide until you really get to experience stuff. So go ahead, play around. But be on the safe side!

Don't be afraid of the penguins, people! :-)

Happy Linuxing!

Edit FLV Videos in seconds! - RichFLV

Okay, this isn't really a hack but this thing caught me so much I had to let you guys know about it. Now you can edit your favorite FLV Videos in seconds, cropping or cutting or doing almost everything with them at will. There's this extremely light utility which happens to do it for you.

The utility is RichFLV and can be downloaded by clicking HERE.

The basic environment of the program is explained as follows:

File Menu

Use the Open menu item in the File menu to open and play FLV files and use the Save menu item in the File menu to save your edited FLV files.

Window Menu

You can use “Show Video Player Only” menu item in the Window menu while playing a FLV file, but it will be a good idea to show the Info Panel and Control Panel, both through the Window menu, when editing the FLV file.

Info Panel

This shows all available info about the FLV file, and you can add or delete data.

In the Metadata tab you may see some name, value pairs. You could add more metadata from here.

The Cue Points tab allows you to add or delete cue points of navigation and event types, and add or delete parameters about each of the cue points. These cue points will be useful if you are creating a SWF from the FLV file. 

The Keyframes tab lists all the key frames based on timestamp and file position. You can set Inpoint and Outpoint to the frames of your choice in this tab. The Inpoint is where your edited clip starts and Outpoint is where it ends.

Cue points are used for creating a SWF from the FLV file. 

The inpoint and outpoint, on the other hand, are used for cutting or cropping clips. Inpoint is where the clip you want to cut starts and Outpoint is where it ends.

Control Panel

You can navigate across the FLV, move your previously created cue points (the white and red downward arrows), and set your Inpoint and Outpoint (by moving the black markers on either side of the red tape).

Export Menu

After you select your Inpoint and Outpoint you can export the clip as either FLV or FLV (no sound) or FLV (sound only) or MP3 or SWF or XML (exports only the Cue points).

Import Menu

You can import a FLV file into another already opened one to stitch them together end to end, or import a MP3 file into the opened FLV file to add soundtrack to it.

Enjoy! :D

Monday, August 31, 2009

Turn your XP boot screen BLANK!

Author: Ahmed Ali Abbasi (

Are you one of those people who loathe Microsoft's monopoly but are being somehow forced to use Windows? Are you one of those people who just can't take the Xp boot up screen? Or are you just up for a mod?

In any case, doing this will eliminate your XP boot screen:

1>>Click "Start" and then click "run".

2>>Now, Type "msconfig" here which will take you to the "system configuration utility".

3>>Navigate to the 4th tab(starting from left),Click on "BOOT.INI".

4>>A new set of "Boot Options".Enable the second option(/NOGUIBOOT).

Now, your boot screen has changed to a completely blank one.

Change Your IP Address!

Okay, this tutorial is going to teach you how to change your IP address which is visible to the websites and servers you connect to on the internet.

Okay, so what you have to do is this. [EXACTLY].

1>>Go to Run and open command prompt by typing 'cmd' and pressing enter.

2>>Now type 'ipconfig/release' without quotes.

3>>Now type 'exit' and leave the command prompt.

4>>Now go to Start>>Connect to>>Show all connections. This will open network connections.

5>>Right click the network adapter you use to connect to the internet and click properties.

6>>Double click on Internet Options(TCP/IP)

7>>Select Use the following IP address and enter any random address in the IP field.

8>>Subnet mask will automatically appear. Leave the 'Default gateway' field empty.

9>>Now click Ok, save the settings and exit. Wait for 60 seconds.

10>>Now again go to properties of the same adapter.

11>>Double click the TCP/IP option again and this time select 'Obtain an IP address automatically'.

12>>Click OK and exit.

13>>You have a new IP address.

Note: The above given method does not sometimes work when you're connecting to Internet through a router specially in some asian countries.

In case you're using a router and this doesn't work, just restart your router and you'll have a new IP address.

Rename Tabs - Firefox Hacks!

So you really don't want anyone else to know what you're upto on the Internet? Not even someone sitting right beside you? Now you can really do it. You can rename the tabs in Firefox so that they get falsely labeled. Check this out:



This comes in very handy at times and is as simple as ABC to apply. You just have to have a simple Add-on which does it for you. It's called TabRenamizer and can be downloaded from HERE.

After installing it, you can rename Tabs by going to Tools>>Rename Tabs or Tools>>Rename Tabs(auto).
You can also give your tabs the name of your choice.

And if you don't get the time to go to tools, just press in "Ctrl+Shift+Z" and your tabs will get automatically renamed. See how close these keys are on the keyboard? :D

Have fun! ;)

Saturday, August 29, 2009

Increase Virtual Memory - Maximize Performance

Author: Ahmed Ali Abbasi

If your RAM isn't large enough to support some of the heavy graphical activity, there is a trick you can play to make up for this. Windows has an option which uses some space from your hardisk as your RAM and helps you in pushing the boundaries while working on your computer. Here's how you have to do it:

Increasing Virtual MEmory(To fasten up your 3d Applications).

1>>Right Click the My Computer icon.

2>>Click Properties.

3>>You'll see a few tabs on the top.Click "Advanced".

4>>Now, you have three labels each with a settings button below it. Click "Settings" under the Performance option.

5>>Now, you'll see "Virtual Memory" at the bottom of the page.Here is the "Change" option.Click it.

6>>You'll see "Paging File Size fo selected drive".Under it are two more options "INITIAL SIZE", "MAXIMUM SIZE".

7>>IMPORTANT: If you have 512 MB Ram, Then multiply it by 1.5.Whatever PHYSICAL MEMORY you have, multiply it by 1.5.

8>>Now, The result you get after the calculation(For 512 MB, Allocate 768 MB in both the spaces.

9>>Click "SET".

10>>Click OK.

You've increased your Virtual Memory!

Note: Windows doesn't delete the temporary files it creates while using the Virtual Memory. So it's advised to regularly clean up these files it creates using a good trash cleaning utility such as CCleaner.


If you have a standard limited account in XP and you want to gain access to the Administrator's account, there is a pretty easy way to do this.

You have to have access to command prompt for this trick to work.

1>>Go to Run and type 'cmd' and then press 'enter'.

2>>Now just type "net user administrator give-password" without quotes replacing 'give-password' with the password you want to give to the administrator account.

3>>Log off and login as the administrator using the password you just set.

4>>The account is yours.

Note: You can also boot in command prompt and play the same trick.

Thursday, August 27, 2009

3D Analyze - Play Latest Games on the SAME OLD MACHINE!!

Author: Ahmed Ali Abbasi (

So you want to play the latest games but can't because you're VGA card is not really up to task. That's where utilities such as 3D Analyze come into play. 3D Analyze is a utility that tweaks certain features of a GPU to increase the performance by as much as 50%!

Solving the notorious "Pixel Shader Problems"

Beginning the Procedure

1>>Download 3D Analyze from (
2>>IMPORTANT: Be sure to extract it in your WINDOWS folder.
3>>To begin browse to the folder where you extracted the 3D Analyze. Double click the icon.
4>>Now a new screen pops up.
IMPORTANT:You may want to experiment with the settings.The settings provided below are the settings that will adjust to most of the games.

Enable the:
1>>"emulate HW Tnl caps".
2>>"emulate other DX8.1 caps".
3>>"emulate pixel shader caps".
4>>"force high percision pixel shader".
5>>Now click "RUN".
6>>Run the game!!

It would be highly appreciated if all of you keep on modifying the settings and provide positive feedback.

Wednesday, August 26, 2009


Did you know that by editing some hidden Firefox settings you can customize it to your liking and make it work A LOT FASTER? Here's how!

1>>Just go to the address bar and type "about:config" without quotes.

2>>A page will appear warning you about the consequences of what might happen to your application if you do this. Click on "I'll be careful, I promise!"

3>>Now you have all the hidden settings of Firefox infront of you.



Now we are going to tweak these settings to get more out of Firefox! Again, be very careful with everything.


Okay, so now once you have the settings infront of you, go to the top where a bar is present with the label "Filter:".

 1>>In this bar type 'network'. The very long list of options will get shortlisted to the only containing the word 'network'.

2>>Search for the option 'network.http.max-connections-per-server' and double click on it and set the integer value to '50'.

3>>Now search for the option 'network.http.pipelining' and double click on it to set the boolean value to 'True'.

4>>Now locate the option 'network.http.pipelining.maxrequests' and set the integer value to '10'. Don't make it larger than 10 because you might get banned from some website!

5>>Browse the Internet and feel the DIFFERENCE! :D

Cooling a particular component - Hardware Hacking!

Author: Ahmed Ali Abbasi (

In order to gather information about your computer's temperature and other heating issues which may be caused by overclocking, we need to download this simple but immensely useful utility Everest. You can download it here >> (


(a) Run Everest

(b) Click on the "sensor" option in main menu.

(c) Here you will get to know your temeperatures.

(d) Note: GPU temperatures are considered NORMAL in the range from 30-60 degrees at Idle and around 70-85 degrees while using heavy graphics applications.

Good Old Methods

(a) Remove the casing or the sides of your PC by just loosening a few easy bolts.This reduces the temperatures by an approximate 15Degrees.Keep your PC Clean And WELL VENTILATED.

(b) Better air flow by re arranging the wires and renovating the jumbled ones.

(c) Try to avoid keeping your pc in cornering areas.

(d) Make sure that the PC is ATLEAST 3 feet away from any type of a wall.

(e) Clean your PC gently and regularly with a brush.

Okay, so now let us talk about software which can be used to cool down your CPU components. There are two good applications which can do it for you. They are:


I prefer SpeedFan because it uses lesser resources and doesn't make your system very noisy. Just download it from ( and run it. It is very user friendly and you can easily manipulate and control the fan speed according to the temperature of your components. :)

Learn how to get MORE from the same old VGA Card!

Get MORE From Your VGA Card - Hardware Hacking!

Author: Ahmed Ali Abbasi (

Overclocking is a complex procedure tailor made for computer enthusiasts who want more for less. It is a technique used to increase the speed of a particular component (VGA, RAM, Processors) beyond stock. Stock is the bunch of default settings that are programmed into the device at the time manufacturing. Overclocking is the alteration of the "stock" to achieve better performance.


If carried out properly, overclocking is a completely harmless procedure but overdoing may lead to permanent failure of the component due to excessive heating.

Overclocking may also void the warranty of your particular component.

Now after you've considered the pros and cons, let the game begin!

In this tutorial we'll only be overclocking your VGA card so that you can enjoy your favorite game with better graphics at a faster speed!

How to overclock your VGA?

There is plenty of software out there which can overclock your components for you. But I'll use be using Riva Tuner(2.24 c) for it can overclock both ATI and Nvidia cards.

1>>Download the software at (

2.>>Extract it. Install it. After you have installed the software, you can chose whether to enable the first option(The virtual memory one) or not.

3>>Be patient as it generates a registry database.

4>>Down to business!

(a) Run Rivatuner.

(b) You will be greeted by a page composed of two sub-headings, Target Adapter(you will see the name of your vga along with other information),Driver settings.

(c) Scroll to driver settings. Her you will see a small,square tab with a right angle triangle on it(Customize).Click the tab. Six pop ups ought to appear.Click the First starting from the left(System Settings). A page will open in a different window.

(d) At the top of the page you'll see a check box followed by an Enable Driver level-hardware overclocking. Check It. A new window will pop up. Asking you to reboot,detect now or.....Click 'Detect Now' and another option to the right of the "enable driver level hardware clocking" will appear. It is currently at "Performance 2D" or whatever. Open the Drop menu and choose "performance 3d".


When you start using demanding 3d applications (e.g.: games). Make sure that the "Apply overclocking at windows startup..." is checked.

(e) You can overclock it by sliding the sliders(both of them) to the right.

(f) Slide the first core clock slider to the extreme right(IF YOU REALLY WANT A BIG BOOST). IMPORTANT: Do not Do THE SAME With the memory clock, whatever the situation may be.

(g) When you start using demanding 3d applications (e.g.: games). Make sure that the "Apply overclocking at windows startup..." is checked.

(h) Check the "apply settings at startup".

(i)  Now click Apply and then OK at the bottom of the screen.

You're done. Enjoy! But be careful! 


Monday, August 24, 2009

Cain and Abel - Basic Terminogy Explained

Here are the terms and the options you'd stumble upon while using Cain. Each has been explained for you which will help you better understand the functionality of this application.

Sniffer Tab

Allows the user to specify the Ethernet interface and the start up options for the sniffer and ARP features of the application.


Allows the user to in effect to fool the network and tell all hosts that you are actually a more important host on the network like a server or router. This feature is useful in that you can impersonate the other device and have all traffic for that device “routed” to you workstation. If the device that you are operating from can not keep up with traffic generated by this configuration, the target network will slow down and even come to a halt. This will surly lead to your detection and eventual demise as a hacker as the event is easily detected and tracked with the right equipment.

Filters and Ports

Most standard services on a network operate on predefined ports. These ports are defined under this tab. If you right click on one of the services you will be able to change both the TCP and UDP ports. But this will not be necessary for this tutorial, but will be useful future tutorials.

HTTP Fields

Several features of the application such as the LSA Secrets dumper, HTTP Sniffer and ARP-HTTPS will parse the sniffed or stored information from web pages viewed. Simply put, the more fields that you add to the HTTP and passwords field, the more likely you are to capture a relevant string from an HTTP or HTTPS transaction.


Trace route or the ability to determine the path that your data will take from point A to point B. Cain adds some functionality to the GUI by allowing for hostname resolution, Net mask resolution, and Whois information gathering. This feature is key in determining the proper or available devices to spoof or siphon on your LAN or internetwork.


This is the command prompt on the remote machine. Anything that you can do on your pc from the CMD prompt can be done from here. Examples include mapping a drive back to your pc and copying all the files from the target or adding local users to the local security groups or anything really. With windows, everything is possible from the command prompt.


Allows for the enumeration of user accounts and their associated hashes with further ability to send all harvested information to the cracker.

LSA Secrets

Windows NT and Windows 2000 support cached logon accounts. The operating system default is to cache (store locally), the last 10 passwords. There are registry settings to turn this feature off or restrict the number of accounts cached. RAS DUN account names and passwords are stored in the registry. Service account passwords are stored in the registry. The password for the computers secret account used to communicate in domain access is stored in the registry. FTP passwords are stored in the registry. All these secrets are stored in the following registry key: HKEY_LOCAL_MACHINE_SECURITY_PolicySecrets


From this object, you can determine all of the networks that this device is aware of. This can be powerful if the device is multihomed on two different networks.

TCP Table

A simple listing of all of the processes and ports that are running and their TCP session status.

UDP Table

A simple listing of all of the processes and ports that are running and their UDP session status.

For now, play around with Cain but be careful!

Cain can dangerous as it can bring the whole network down!

Still haven't configured Cain? Learn to do it now!

Sunday, August 23, 2009

Configuring Cain and Abel - Tutorial 1

This is the beginner's tutorial to Cain and Abel. In this tutorial I will teach you the basics of Cain and Abel and tell you how to configure this tool. To start off, let us talk about how to start configuring your Cain application. So here it is:

1>>Open the command prompt by typing 'cmd' in Run and pressing enter.
2>>Now type this "ipconfig /all" and press enter.
3>>All the Network Adapters you have installed on your machine will be displayed along with their MAC addresses. Locate the one you will be using for hacking and copy it's MAC address in the notepad.
4>>Now open Cain and click on the Configure option at the top. A dialog box will open which will be listing your Network Adapters.
5>>Locate the Network Adapter by matching the MAC address you noted down and select it. Click OK.

Now you've configured Cain to work wonders for you. 

View Flv, Mp4, 3gp and Mov thumbnails in Windows Explorer!

It's really irritating sometimes when you can't view the thumbnails for your Flv files. So now here's this little trick you can play with your registry which will enable you to view thumbnails for all the media files you want.

Okay, so now what you have to do is that you have to make REG files to edit the registry automatically. Here's what you have to do:

Open the notepad and paste the following editing keys for each file type:

For Flv






For mp4



Okay, after pasting any of these in the notepad, save the file with any name with a .reg extension. A registry file will be created. Double click the registry file and you will be asked whether you want to add new information to the registry. Click yes and here you go. Now you can view the thumbnails for your selected file type. :):)

Note: Before playing with the registry, it is always recommended to create a system restore point.

Remote Shutdown a Computer!

It's a fun trick you can play on your friends on the same network and is really easy to apply. You can shutdown the computer of your friend while sitting in the comfort of your very own chair. Okay, here's what you have to do.

1>>Get the IP address of your friend. If you don't know how to do this follow this link.

2>>Go to Start>>Run and type 'cmd' and press enter.

3>>Now type this in the command prompt and press enter.

"shutdown -i" without quotes.

4>> A dialogue box will appear on your screen. On the right top there will be a button named "Add". Click on this button.

5>>Now enter the IP address of your friend or victim and press OK. You will be returned to previous box.

6>>Type some comment in the comment box and press OK again.

You just did it! :D

Well, if you couldn't, I'll follow this up with another article very soon.

Note: For this trick to work, the target machine must be open to all remote connections and you must be logged in as the combined admnistrator.

Friday, August 21, 2009

Javascript Injection and Cookie Editing - Web Hacking

JavaScript is a strong scripting language which can come in really handy while you're dealing with web based environments. Although the basic usage of Javascript is to spice up your web pages, it can play pretty tricks with web pages and web servers and can help in developing an exploit.

What is an Injection?

So, to start of, let us consider the ways in which Javascript can be deployed as a tool here. Applying JavaScript is as easy as ABC. A Javascript Injection is used by pasting the script in the URL bar after clearing it of the website address. Pressing the enter key results in the execution of the script. This is what is called a Javascript Injection.

What can you do by using Javascript Injections?

There is a lot of stuff you can do with Javascript if you know how to use it properly. I'll cover two basic tricks you can play by the use of Javascript scripts.

a)Cookie Editing
b)Form Editing

In this tutorial we will only be covering Cookie Editing!

Cookie Editing

I shall not bear the responsibility of any misuse of the following information. It is being shared just for the sake of imparting knowledge.

By using Javascript, you can edit the information contained in the cookies, edit the existing ones or add completely new entries. Before you begin with cookie editing, your first step should be to get to know whether the site you are visiting has set any cookies by using this script:


Just paste this in the address bar followed by pressing enter. This will pop up the information stored in the site cookies. Now if you want to edit the information contained in the cookies you have to make use of the following command:

javascript:void(document.cookie=”Field = myValue”);

This command can either alter existing information or create entirely new values. Replace “Field” with either an existing field found using the alert(document.cookie); command, or insert your very own value. Then replace “myValue” with whatever you want the field to be. For example:


This is just an example and the field name you have here depends on the site you're injecting in.

Retrieving Streamed Videos

You just watched your video on Youtube or some other tube site and want to retrieve it somehow. How do you do that? Let's take it with two different browsers. Internet Explorer and Firefox.

Internet Explorer

Okay, you have to click on Tools and then select Internet Options. Under the 'Browsing History' section, click on Settings. You'll see another dialog box. In this one, just click on 'View Files'. Now you have the Internet Cache infront of you. Just right click and arrange icons by size. The files with the greatest sizes are your video files and their names read like this: AB81HS7SD8H.

So cut these files and paste them in some other folder. Rename them to .flv and here you go. You have your streamed videos.

Mozilla Firefox

Before going ahead, just make sure you have enabled your explorer to show hidden files.

1>>Go to the partition where you have installed Windows.
2>>Open Documents and Settings>>USERNAME>>Local Settings>>Application Data>>Mozilla.
3>>Now open the Firefox folder and then open the "profiles" folder. There will a folder named like this "ua3amy0i.default" inside. Open this folder.
4>>Now double click on the "Cache" folder and here you go.
5>>Arrange the files with respect to size and copy the files you want as stated before.
6>>Rename the files to .flv and BINGO! :D

Tuesday, August 18, 2009


So after all these years, I've recognized these seven tools which are extremely significant in learning to hack and developing an exploit. I've listed them down for you. So if you really are upto it, start off with these:


Nmap is a free security scanner which is used to discover computers and services on a computer network, thus creating a "map" of the network. Plus, there is a lot more Nmap can discover about your remote targets. The excellent capabilities of this software has earned it the top slot in this rating.

2>>Cain & Abel

An excellent password recovery tool. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols.


Wireshark is the world's foremost network protocol analyzer, and is the de facto standard across many industries and educational institutions. Wireshark is software that "understands" the structure of different networking protocols. Thus, it is able to display the encapsulation and the fields along with their meanings of different packets specified by different networking protocols. Wireshark uses pcap to capture packets, so it can only capture the packets on the networks supported by pcap. This software has come a long way and truly deserves a place here.


PuTTY is a terminal emulator application which can act as a client for the SSH, Telnet, rlogin, and raw TCP computing protocols. If used as a Telnet and SSH client, it can produce very desireable results without much heck. PuTTY was originally written for Microsoft Windows, but it has been ported to various other operating systems.


Nessus is a proprietary comprehensive vulnerability scanning software. Its goal is to detect potential vulnerabilities on the tested systems. For example:

1>>Vulnerabilities that allow a remote cracker to control or access sensitive data on a system.
2>>Misconfiguration (e.g. open mail relay, missing patches, etc).
3>>Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an external tool) to launch a dictionary attack.
4>>Denials of service against the TCP/IP stack by using mangled packets


Superscan is a free connect-based port scanning software designed to detect open TCP and UDP ports on a target computer, determine which services are running on those ports, and run queries such as whois, ping, ICMP traceroute, and Hostname lookups.

Superscan is a tool used by both system administrators, crackers and script kiddies to evaluate a computer's security. System administrators can use it to test for possible unauthorized open ports on their computer networks, whereas crackers use it to scan for a potentially insecure port in order to gain illegal access to a system.


Metasploit Framework is a tool for developing and executing exploit code against a remote target machine. The basic steps for exploiting a system using the Framework include:

1>> Choosing and configuring an exploit (code that enters a target system by taking advantage of one of its bugs; about 300 different exploits for Windows, Unix/Linux and Mac OS X systems are included);
2>> Checking whether the intended target system is susceptible to the chosen exploit (optional);
3>> Choosing and configuring a payload (code that will be executed on the target system upon successful entry, for instance a remote shell or a VNC server);
4>> Choosing the encoding technique to encode the payload so that the Intrusion-prevention system will not catch the encoded payload;
5>> Executing the exploit.

Note:You can start to learn Cain and Abel and Metasploit by reading the basic tutorials available on this blog. Look in the categories to find them.

Universal BIOS Passwords!

Using Standard Backdoor Passwords

There are backdoor passwords for most of the BIOS manufacturers which can be used to unlock the BIOS password. Take a look:

AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256, j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER, SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA, ZAAADA, ZJAAADC, djonet.

AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder Other passwords you may try (for AMI/AWARD or other BIOSes) LKWPETER, lkwpeter, BIOSTAR, biostar, BIOSSTAR, biosstar, ALFAROME, Syxz, Wodj,phonix,toshiba.

Please keep in mind that the passwords are case sensitive.

Sunday, August 16, 2009

Mechanically resetting BIOS password in 30 seconds!

You've turned this computer on and there it is! The irritating BIOS password! Or probably, you were being cautious and put a password on but now now you've forgotten it. Bad bad. But what to do now?

Okay, so the thirty seconds start now. Open the sheet covering the motherboard and search for a small round battery located on it. It is the BIOS/CMOS battery. Remove it for like five seconds and place it back in.

Guess what.

The password is no more there! :D

Password still there? Take a look at STANDARD BIOS PASSWORDS!

Saturday, August 15, 2009

Hack the XP Administrator Password - Windows Hacking!

Did you know that by the use of a simple trick you can change the administrator's password without the need of knowing the current password? Here's what you have to do.

1>>Login as the Administrator.
2>>Open the command prompt by going to Start>>Run and typing cmd.
3>>While you're logged in as the administrator open the command prompt and type this command replacing the parameters,


You have to write the username of the administrator account in place of username and the password you want to give it in place of password.

The only difficulty which you might face is the fact that on some PCs and computers, there is only one administrator and it's not that easy to get hold of their account while it has been logged in. But if you somehow manage to do it, the account is yours. :)

Traceroute Explained - Introduction!

Gathering more information about a particular IP address or a domain name can be of great use to network security analysts. It can give you tons of information about a particular address such as the physical address of the computer/server, location, name of a particular firm and even phone/fax numbers.

So, where to begin from? Let's go back to the old faithful Telnet commands. There are two commands which really help you in gathering information about IP addresses and Domain names. They are again Traceroute and Whois.

Now, if you're a Windows user, you can't easily use the 'cmd' to run UNIX based Telnet commands. Both of these commands are UNIX based though Traceroute has a Windows variant which is:


The syntax of command is "tracert" OR "tracert xxxx:xxx:xx:x".

eg. let us trace Google using the command prompt. Here is what you will get.


Tracing route to []
over a maximum of 30 hops:


But if you want to skip the painstaking task of using the command prompt, there is an awesome website which opens a whole new world of information. To visit the website CLICK HERE.

Thursday, August 13, 2009

How to get someone's IP address?

An IP address is a unique address assigned to each machine connected to the Internet. This signifies the that if you have the address of any machine, you are in a better position to commence the use of any feasible exploit, gain control over the machine and then use it to your advantage.

First of all, you have to identify a particular target. It should be a person you happen to know personally. If the person is not in your close social circle, you will have to impersonate as one of the victim's friend.

Now here is how the simple way stands:

1>>Add the victim on an Instant Messenger such as MSN or Yahoo messenger.

2>>Tell them that you have this very important file eg. a picture of their's which you want to send using IM. If you say it the right way, there's no reason why the person would turn this down.

3>>Now before sending the file, open the command prompt in the background and type "netstat". It shows you all the open connections on your PC.

4>>Send the file and wait for the victim to accept it.

5>>As soon as the person accepts it and the file transfer begins, go to the command prompt and type "netstat" again without quotes. You will again see something like this:

Active Connections

TCP digital-venom:4046 SYN_SENT

TCP digital-venom:4047 SYN_SENT
TCP digital-venom:4048 SYN_SENT
TCP digital-venom:4049 SYN_SENT
TCP digital-venom:4050 SYN_SENT

Now compare this reading with the one you got before. The IP address newly added to the list is the IP address of your victim.

Note: Some third party software eg. Limewire is known to interfere with the connections established through an IM, specially MSN Messenger. Keep this in mind. :):)

Related Posts

Use an IP address to HACK - Click Here And Learn Telnet

Wednesday, August 12, 2009

Telnet - Part 2

After giving you a basic insight into what Telnet is and why is it used, I'll introduce you to a few of the many more commands which are useful in gathering information about a network and its users. These commands need to be handled carefully and I shall not bear the responsibility of misuse of it. And before I mention the commands and their uses, let us switch to a better Telnet client. There are many of them available for free but I prefer to use Putty for the purpose of simplicity and resourcefulness.

Here are the commands:

This command will list all of the files and directories within the current directory.

This command will change your current directory to the directory you specify. An example would be that "cd public_html" would take you into your public_html directory.

This command will move a file from its current location within the current directory to the directory you specify. For example, let's say you are in your public_html directory and you want to move the file "links.cgi" into your "cgi-local" directory. At the prompt type "mv links.cgi cgi-local.

chmod XXX
This command will set the permissions on a file or directory to whatever you specify. The "XXX" would be replaced by actual numbers, such as 644. For example, if we wanted to set the permissions on our links.cgi file in our cgi-local directory, we would first go into that directory then type "chmod 755 links.cgi" at the prompt.

This command will delete the filename or directory you specify in the current directory. If we wanted to remove the directory named "user", we would type "rm user" at the prompt.

This is one of the most helpful commands for new users. It allows you to see all of the different options for a particular command. For example, if were were to type "man ls", we would then see all of the different options available for the list (ls) command.

Traceroute is infact a UNIX/LINUX based command. This command will perform a traceroute on a particular virtual domain to see how many hops it takes to get from your location to the domain specified. An example would be "traceroute", which would show us how long it takes for packets to get to and how they get there.

The Windows variant for the command is tracert and is used like this:

"tracert". Analysing the addresses will tell you where the servers of a particular website are located.

This is a UNIX/LINUX based command. This command will display the current InterNIC record including administrative, technical, and billing contact for a particular domain if it is already owned.

The wicked usage of these commands will be explained in the next tutorial. Till that time, just play around with these commands and discover more! :D

Related Posts

Telnet Tutorial - Part 1

Hex Editing - Part 2

Okay, so by now, I assume, that you are well versed with the Basic Hex Editing. If you are still to know what Hex Editing is, go HERE.

We'll go one step further in this part and show you what Hex Edit can do which no other program can do for you.

Okay, so if you have an executable application which shows some text in a dialogue box when you run it and you want to replace the text with something else, how can you do it? There is no way that you can do it except by hex editing it. Okay, so imagine the file looks something like this:

Now you want to change it from SALMAN to something else. For this, open the file in your Hex Editor i.e XVI32 and search for 'SALMAN' on the right side panel on your screen, each letter in a separate block. When you find it, just replace it with the text you want to be displayed. Don't make unnecessary white space in between or else it'll corrupt the application! Now save the application and whoa! It's done! Play around with more simple applications. But always backup your file before hex editing! ALWAYS!

Related Posts

Hex Editing Tutorial - Part 1

Hex Editing - Part 1

Sometimes when you're thinking like a hacker, you need to go to the very core of the structure of different programs and files and edit them to your purpose. This isn't always a very easy task. Imagine you want to modify your favorite map in Yuri's Revenge or perhaps modify the Pinball game to your liking. What will you do? There are tools like Resource Hacker which help you in manipulating the basic structure of the executable files but they're not always very successful due to their platform dependency and other limitations. In such cases, we use 'Hex Editing' to edit the contents of the file. This sounds like a very tedious and a difficult task, but believe me, it is as easy as installing Windows. Or perhaps, even more.

So what to begin with? Okay, first of all you need to select which Hex Editor to use. There is a built in Hex Editor in Windows which can be opened by typing "EDIT" in Run and pressing enter. This isn't really the best out there though. There are better, free Hex Editors which make your job easier and are fun to use. I'll recommend you to download XVI32 because of the fact that it is both free and powerful.

1>>Open the C drive on your computer and make a new Text Document.
2>> Write your name in the document and save it.
3>> After this, open the editor and locate the file.
4>>You will see the binary form of your name written on the left side and your name on the right side of the screen. Each letter in your name would be matching a binary component on the left. Just as shown in the picture.

5>>Now, if you change the binary value, the change would effect the content of your text file. Save it and that's all!

For now write all the letters from A to Z in the a notepad file and try to know the binary notation for each. Also try the numbers from 1 to 9. These will be your baby steps in Hex Editing. Keep up for the second part! Happy 'Hexing'!

Related Posts

Hex Editing Tutorial - Part 2

Sunday, August 9, 2009

Telnet - Part 1

Although the networking technologies have immensely evolved over the years, some things have remained the same. Telnet is one of them. The use of Telnet is pivotal in understanding the functioning of any network and helps us to develop an exploit. It can also point out the vulnerabilities of a particular network. So let's start with getting to know what exactly is telnet.

Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive communications facility. Telnet can be used to connect to a remote machine through any open port. So virtually, it stands like this. Telnet can intrude any machine with an open port. This is what mesmerizes the black hat hackers about Telnet. The most common use of Telnet stands to enable remote authentication and access.

Some of the common Telnet ports are these:

Port 21 - File Transfer Protocol
Port 22 - SSH Remote Login Protocol
Port 23 - Telnet Server
Port 25 - Simple Mail Transfer Protocol (SMTP)
Port 53 - Domain Name Server (DNS)
Port 69 - Trivial File Transfer Protocol (TFTP)
Port 70 - Gopher
Port 80 - Hyper Text Transfer Protocol (HTTP)

Once you get connected to a remote machine, you need to issue some simple Unix based commands which help you in interacting with the remote service. This can be used to check which services are running on a particular machine. This process is known as daemon tracking.

Black hat hackers can also use telnet to sniff network packets which might contain sensitive information such as usernames and passwords. This is achieved by using telnet and network utilities such as tcpdump and wireshark.

Now let's start by learning how to connect to some remote machine using telnet.

1>>Go to Run and type "cmd"
2>>In the command line type "telnet 80".

You just got connected to Google server on port 80.

Note: The web address or URL can be replaced by any valid IP address.
Now try this. Get the IP address of some friend and use a port scanner to search for open ports on their system. Telnet the ports and play around!

Telnet till next time! :D

Related Posts

Telnet Tutorial - Part 2

Folder Changing Magic! - Windows Hacking

If you have some data which you want to be safe and invisible to other people, I've got a real nice trick for you. You can use this simple trick to convert the required folder into Control Panel, Recylce Bin or My Computer. Only the use of command line will be able to give you your folder back.

Now to start, let the name of the folder you want to hide as MYFOLDER.

Now, you just have to rename your folder:

To convert it into control panel rename it like this.

To convert it into My Computer rename it like this.

To convert it into Recycle Bin rename it like this.

Consider that you've converted your folder into Control Panel. Now to make your folder accessible again, go to command line. Now change the path to the directory which has your folder. For eg. if the folder is located like this C:\Data\MYFOLDER, type "cd C:\Data".

Now it will show this:


Now type this:

ren MYFOLDER.{21EC2020-3AEA-1069-A2DD-08002B30309D} MYFOLDER

Notice that the key is same as the one you used to convert the folder into Control Panel. You will get your folder back.

Note: This method is not for the average PC user. It's meant for the advanced users who know and understand the consequences of playing with the registry.

Hiding a partition - Windows Hacking!

Do you know that with the help of a few simple command line commands you can hide the partition of your choice with ease without the fear of losing your data? Here's how!

1>>Go to Run and type "diskpart" without quotes and press enter.
2>>You should get a command line like this:
3>>Now type "list volume" without quotes which will enable you to look at the drive information on your computer. It would look like this:

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
Volume 0 G DVD-ROM 0 B
Volume 1 C NTFS Partition 9 GB Healthy System
Volume 2 D NTFS Partition 9 GB Healthy
Volume 3 E NTFS Partition 9 GB Healthy
Volume 4 F NTFS Partition 9 GB Healthy

4>>For example, if you want to hide drive F, just type "select volume 4". The following message will be shown:

Volume 4 is the selected volume.

5>>Now type "remove letter F" or whatever letter which has been assigned to the selected volume. It will show a message telling that the drive letter has been removed.
6>>Reboot the computer.

Now you've successfully hidden the partition as Windows XP cannot identify unknown volumes. Your data will be safe. To get your data back do this:

After selecting the volume as in step 4, type "assign letter F". That is, just replace "remove" with "assign" in the 5th step. You will get back your data volume.

It should be kept in mind that this method cannot hide the primary volume which has your operating system and neither should you try to attempt anything of this sort.

Monday, August 3, 2009

Making a Hidden Folder (NEW) - Windows Hacking!

Okay, enough of those chippy programs that hide your files for you and are either costing you something or get easily caught. Now there's a better way of hiding your files out there. By doing this, you'd not only be hiding your files but also you would be able to lock them in a password protected folder. You just have to follow a few simple steps and it's all yours.

title My private folder
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
echo Are you sure you want to lock the folder?(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid Choice.
ren Hidden "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder Locked!
goto End
echo Please enter the password to unlock:
set/p "pass=>"
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Hidden
echo Unlocked Successfully
goto End
echo You've entered an invalid password!
goto end
md Hidden
echo Success!!
goto End

1>>Copy the text in italics given above and paste it in the notepad.
2>>Write the password you want to give to the folder in the place of 'YOUR PASSWORD HERE'.
3>>Save the file with a '.bat' extension. You can name the file as you want.
4>>Double click the bat file you have created.
5>>A folder will be created named Hidden.
6>>Put your private files in that folder.
7>>Double click the bat file again. It will ask you whether you want to lock the folder. Press Y.
8>>Double click the bat file when you want to unhide your folder and enter your password.

Note: Hide the bat file deep somewhere so that nobody can find and edit it to get your password. Also make sure that the bat file does not get deleted, otherwise you are prone to losing your data.

Enjoy!! :)

Friday, July 31, 2009

Email Hacking!

"Hotmail hacking" is perhaps one of the most searched terms on the internet. It is something that you see everyone talking about, from novices and script kiddies to pros and security analysts. Today we are going to discuss what Hotmail Hacking is all about.

Though it would be kind of technically wrong to use the term 'hacking' here, but to skip the explanatory part about the line distinguishing hacking from cracking for later, I'll go by the term 'hacking'.

Disclaimer: The following information is just for the sake of knowledge and I shall not be held responsible for the misuse of any of this information.

Okay, so let's start with the question: Can you really hack hotmail accounts?

If you think you can, think again. Hacking hotmail accounts is not as cheesy as it sounds. Some of the best security professionals from around the world share the responsibility of making hotmail more secure and safe. So unless you have an extraordinary trick up your sleeve, literally cracking an account is not an option.

What you can do is apply different methods to guess the password which is called brute forcing in more technical terms, or to impersonate hotmail or msn and trick the user into you tell his password. This technique is called Social Engineering.

There are certain other ways which are also discussed below though their effectiveness depends on the expertise of the user more than the sharpness of the method.

Brute Forcing
- Brute forcing in simple terms is using all sorts of possible words in place of a password. Though once useful, this method has low credibility now due to increased user awareness level. But still, sometimes it can come in very handy. Do as follows:

1>>Connect the hotmail server on port 110 using telnet.
2>>Type USER and enter the username of the account you want to crack.
3>>Type PASS and then guess the password.
4>>Keep repeating until you are able to guess the password.

This can be done in a quicker and less hectic manner by the use of 'Brute Forcers'. A good brute forcer is Munga Bunga's HTTP Brute Forcer.

Using a Fake Login Screen
- The victim can be fooled into typing his password into a fake login screen which looks similar to that of a hotmail login screen. Such methods are wisely deceitful if used sensibly. Once the user types in his login details, they are mailed to a specific email address.

1>>Go to
2>>Right click and select 'View Source'.
3>>Copy the source code and paste it in the notepad.

You can play with the source code to make a fake login page.

Javascripting and Cookies
- One thing should be very clear in your mind. If you want to learn how to hack, you have to learn basics of atleast a few programming languages which include Java and Javascript. Other mandatory stuff is of course HTML and VBScript. Learning C++ is always a starting point anyways. So the key is the fact that web programmers tend to use relatively easy web based languages at the expense of security sometimes. So if you know how to write wickedly in Javascript, you're on. Stealing somebody else's cookies can reveal their passwords at times. And yes, Google is your best friend. ;-)

Key-loggers and Trojans
- This is an old trick and due to increased amount of Antivirus Sofware in use these days, it's prone to getting caught. But if you're good with programming, you can write your own little keyloggers and Trojans and send them to the victim. They'll record all the keystrokes or the passwords of the victim and send them to you. You can also install a good key logger on your computer and trick the user to use his account using your computer. The key logger will record the password which you can later steal from the logs.

Social Engineering
- Ever got a mail telling you that your security is being compromised and you need to send your password to a 'BOT' to check it for strength? Or ever came across a 'hacking method' which asks you to send your own password along with a given script to 'hotmail server' to crack it? This is all trickery and is a direct consequence of the application of Social Engineering.

Have a look at this.

Hello Hotmail users. There have been many attempts to hack Unfortunately all of them have failed, EXCEPT this one. I though have found out a revolutionary way to hack hotmail. And might I add it's as easy as ABC. After 8 months of research we have found the broken link. VerificationAutoBot to be exact. is a bot, an auto bot. You send it a letter and within a week it will send you one back. The ULTIMATE hack for hotmail is as follows:
First send a letter to, second within the Subject heading place the word "Password" (not in quotes but has to have a capital P) this way the automated bot recognizes what you are after. Then in the text field place the name of the person at hotmail that you want to hack (Do not put after their name). No capital letters are to be put in this place. Then skip three (3) lines and place your own hotmail account information such as: "My login:My password" (a semicolon makes it easier for the bot to recognize). This way the bot can verify that your account actually exists. And then supplies you with the password for the person's account that you want it for. Here is an example:


Subject: Password
login of the person you want to hack
This IS the only way to hack hotmail. Use it with care.
Thank You Hackers attackers

This is a trick to get you to reveal your passwords!

Though sounds a little naive, but a lot of people fall for this trick. Remember!
Never ever follow any method which requires your own password to be sent to a third party; let it be a bot or Hotmail Security Server or whatever. But if you turn the tables, this trick can come in pretty handy at times. ;-)

Keep looking for more! Happy Hacking! :D

Related Posts

Want to learn more about Telnet? Click here for a tutorial!