Monday, August 31, 2009

Turn your XP boot screen BLANK!

Author: Ahmed Ali Abbasi (

Are you one of those people who loathe Microsoft's monopoly but are being somehow forced to use Windows? Are you one of those people who just can't take the Xp boot up screen? Or are you just up for a mod?

In any case, doing this will eliminate your XP boot screen:

1>>Click "Start" and then click "run".

2>>Now, Type "msconfig" here which will take you to the "system configuration utility".

3>>Navigate to the 4th tab(starting from left),Click on "BOOT.INI".

4>>A new set of "Boot Options".Enable the second option(/NOGUIBOOT).

Now, your boot screen has changed to a completely blank one.

Change Your IP Address!

Okay, this tutorial is going to teach you how to change your IP address which is visible to the websites and servers you connect to on the internet.

Okay, so what you have to do is this. [EXACTLY].

1>>Go to Run and open command prompt by typing 'cmd' and pressing enter.

2>>Now type 'ipconfig/release' without quotes.

3>>Now type 'exit' and leave the command prompt.

4>>Now go to Start>>Connect to>>Show all connections. This will open network connections.

5>>Right click the network adapter you use to connect to the internet and click properties.

6>>Double click on Internet Options(TCP/IP)

7>>Select Use the following IP address and enter any random address in the IP field.

8>>Subnet mask will automatically appear. Leave the 'Default gateway' field empty.

9>>Now click Ok, save the settings and exit. Wait for 60 seconds.

10>>Now again go to properties of the same adapter.

11>>Double click the TCP/IP option again and this time select 'Obtain an IP address automatically'.

12>>Click OK and exit.

13>>You have a new IP address.

Note: The above given method does not sometimes work when you're connecting to Internet through a router specially in some asian countries.

In case you're using a router and this doesn't work, just restart your router and you'll have a new IP address.

Rename Tabs - Firefox Hacks!

So you really don't want anyone else to know what you're upto on the Internet? Not even someone sitting right beside you? Now you can really do it. You can rename the tabs in Firefox so that they get falsely labeled. Check this out:



This comes in very handy at times and is as simple as ABC to apply. You just have to have a simple Add-on which does it for you. It's called TabRenamizer and can be downloaded from HERE.

After installing it, you can rename Tabs by going to Tools>>Rename Tabs or Tools>>Rename Tabs(auto).
You can also give your tabs the name of your choice.

And if you don't get the time to go to tools, just press in "Ctrl+Shift+Z" and your tabs will get automatically renamed. See how close these keys are on the keyboard? :D

Have fun! ;)

Saturday, August 29, 2009

Increase Virtual Memory - Maximize Performance

Author: Ahmed Ali Abbasi

If your RAM isn't large enough to support some of the heavy graphical activity, there is a trick you can play to make up for this. Windows has an option which uses some space from your hardisk as your RAM and helps you in pushing the boundaries while working on your computer. Here's how you have to do it:

Increasing Virtual MEmory(To fasten up your 3d Applications).

1>>Right Click the My Computer icon.

2>>Click Properties.

3>>You'll see a few tabs on the top.Click "Advanced".

4>>Now, you have three labels each with a settings button below it. Click "Settings" under the Performance option.

5>>Now, you'll see "Virtual Memory" at the bottom of the page.Here is the "Change" option.Click it.

6>>You'll see "Paging File Size fo selected drive".Under it are two more options "INITIAL SIZE", "MAXIMUM SIZE".

7>>IMPORTANT: If you have 512 MB Ram, Then multiply it by 1.5.Whatever PHYSICAL MEMORY you have, multiply it by 1.5.

8>>Now, The result you get after the calculation(For 512 MB, Allocate 768 MB in both the spaces.

9>>Click "SET".

10>>Click OK.

You've increased your Virtual Memory!

Note: Windows doesn't delete the temporary files it creates while using the Virtual Memory. So it's advised to regularly clean up these files it creates using a good trash cleaning utility such as CCleaner.


If you have a standard limited account in XP and you want to gain access to the Administrator's account, there is a pretty easy way to do this.

You have to have access to command prompt for this trick to work.

1>>Go to Run and type 'cmd' and then press 'enter'.

2>>Now just type "net user administrator give-password" without quotes replacing 'give-password' with the password you want to give to the administrator account.

3>>Log off and login as the administrator using the password you just set.

4>>The account is yours.

Note: You can also boot in command prompt and play the same trick.

Thursday, August 27, 2009

3D Analyze - Play Latest Games on the SAME OLD MACHINE!!

Author: Ahmed Ali Abbasi (

So you want to play the latest games but can't because you're VGA card is not really up to task. That's where utilities such as 3D Analyze come into play. 3D Analyze is a utility that tweaks certain features of a GPU to increase the performance by as much as 50%!

Solving the notorious "Pixel Shader Problems"

Beginning the Procedure

1>>Download 3D Analyze from (
2>>IMPORTANT: Be sure to extract it in your WINDOWS folder.
3>>To begin browse to the folder where you extracted the 3D Analyze. Double click the icon.
4>>Now a new screen pops up.
IMPORTANT:You may want to experiment with the settings.The settings provided below are the settings that will adjust to most of the games.

Enable the:
1>>"emulate HW Tnl caps".
2>>"emulate other DX8.1 caps".
3>>"emulate pixel shader caps".
4>>"force high percision pixel shader".
5>>Now click "RUN".
6>>Run the game!!

It would be highly appreciated if all of you keep on modifying the settings and provide positive feedback.

Wednesday, August 26, 2009


Did you know that by editing some hidden Firefox settings you can customize it to your liking and make it work A LOT FASTER? Here's how!

1>>Just go to the address bar and type "about:config" without quotes.

2>>A page will appear warning you about the consequences of what might happen to your application if you do this. Click on "I'll be careful, I promise!"

3>>Now you have all the hidden settings of Firefox infront of you.



Now we are going to tweak these settings to get more out of Firefox! Again, be very careful with everything.


Okay, so now once you have the settings infront of you, go to the top where a bar is present with the label "Filter:".

 1>>In this bar type 'network'. The very long list of options will get shortlisted to the only containing the word 'network'.

2>>Search for the option 'network.http.max-connections-per-server' and double click on it and set the integer value to '50'.

3>>Now search for the option 'network.http.pipelining' and double click on it to set the boolean value to 'True'.

4>>Now locate the option 'network.http.pipelining.maxrequests' and set the integer value to '10'. Don't make it larger than 10 because you might get banned from some website!

5>>Browse the Internet and feel the DIFFERENCE! :D

Cooling a particular component - Hardware Hacking!

Author: Ahmed Ali Abbasi (

In order to gather information about your computer's temperature and other heating issues which may be caused by overclocking, we need to download this simple but immensely useful utility Everest. You can download it here >> (


(a) Run Everest

(b) Click on the "sensor" option in main menu.

(c) Here you will get to know your temeperatures.

(d) Note: GPU temperatures are considered NORMAL in the range from 30-60 degrees at Idle and around 70-85 degrees while using heavy graphics applications.

Good Old Methods

(a) Remove the casing or the sides of your PC by just loosening a few easy bolts.This reduces the temperatures by an approximate 15Degrees.Keep your PC Clean And WELL VENTILATED.

(b) Better air flow by re arranging the wires and renovating the jumbled ones.

(c) Try to avoid keeping your pc in cornering areas.

(d) Make sure that the PC is ATLEAST 3 feet away from any type of a wall.

(e) Clean your PC gently and regularly with a brush.

Okay, so now let us talk about software which can be used to cool down your CPU components. There are two good applications which can do it for you. They are:


I prefer SpeedFan because it uses lesser resources and doesn't make your system very noisy. Just download it from ( and run it. It is very user friendly and you can easily manipulate and control the fan speed according to the temperature of your components. :)

Learn how to get MORE from the same old VGA Card!

Get MORE From Your VGA Card - Hardware Hacking!

Author: Ahmed Ali Abbasi (

Overclocking is a complex procedure tailor made for computer enthusiasts who want more for less. It is a technique used to increase the speed of a particular component (VGA, RAM, Processors) beyond stock. Stock is the bunch of default settings that are programmed into the device at the time manufacturing. Overclocking is the alteration of the "stock" to achieve better performance.


If carried out properly, overclocking is a completely harmless procedure but overdoing may lead to permanent failure of the component due to excessive heating.

Overclocking may also void the warranty of your particular component.

Now after you've considered the pros and cons, let the game begin!

In this tutorial we'll only be overclocking your VGA card so that you can enjoy your favorite game with better graphics at a faster speed!

How to overclock your VGA?

There is plenty of software out there which can overclock your components for you. But I'll use be using Riva Tuner(2.24 c) for it can overclock both ATI and Nvidia cards.

1>>Download the software at (

2.>>Extract it. Install it. After you have installed the software, you can chose whether to enable the first option(The virtual memory one) or not.

3>>Be patient as it generates a registry database.

4>>Down to business!

(a) Run Rivatuner.

(b) You will be greeted by a page composed of two sub-headings, Target Adapter(you will see the name of your vga along with other information),Driver settings.

(c) Scroll to driver settings. Her you will see a small,square tab with a right angle triangle on it(Customize).Click the tab. Six pop ups ought to appear.Click the First starting from the left(System Settings). A page will open in a different window.

(d) At the top of the page you'll see a check box followed by an Enable Driver level-hardware overclocking. Check It. A new window will pop up. Asking you to reboot,detect now or.....Click 'Detect Now' and another option to the right of the "enable driver level hardware clocking" will appear. It is currently at "Performance 2D" or whatever. Open the Drop menu and choose "performance 3d".


When you start using demanding 3d applications (e.g.: games). Make sure that the "Apply overclocking at windows startup..." is checked.

(e) You can overclock it by sliding the sliders(both of them) to the right.

(f) Slide the first core clock slider to the extreme right(IF YOU REALLY WANT A BIG BOOST). IMPORTANT: Do not Do THE SAME With the memory clock, whatever the situation may be.

(g) When you start using demanding 3d applications (e.g.: games). Make sure that the "Apply overclocking at windows startup..." is checked.

(h) Check the "apply settings at startup".

(i)  Now click Apply and then OK at the bottom of the screen.

You're done. Enjoy! But be careful! 


Monday, August 24, 2009

Cain and Abel - Basic Terminogy Explained

Here are the terms and the options you'd stumble upon while using Cain. Each has been explained for you which will help you better understand the functionality of this application.

Sniffer Tab

Allows the user to specify the Ethernet interface and the start up options for the sniffer and ARP features of the application.


Allows the user to in effect to fool the network and tell all hosts that you are actually a more important host on the network like a server or router. This feature is useful in that you can impersonate the other device and have all traffic for that device “routed” to you workstation. If the device that you are operating from can not keep up with traffic generated by this configuration, the target network will slow down and even come to a halt. This will surly lead to your detection and eventual demise as a hacker as the event is easily detected and tracked with the right equipment.

Filters and Ports

Most standard services on a network operate on predefined ports. These ports are defined under this tab. If you right click on one of the services you will be able to change both the TCP and UDP ports. But this will not be necessary for this tutorial, but will be useful future tutorials.

HTTP Fields

Several features of the application such as the LSA Secrets dumper, HTTP Sniffer and ARP-HTTPS will parse the sniffed or stored information from web pages viewed. Simply put, the more fields that you add to the HTTP and passwords field, the more likely you are to capture a relevant string from an HTTP or HTTPS transaction.


Trace route or the ability to determine the path that your data will take from point A to point B. Cain adds some functionality to the GUI by allowing for hostname resolution, Net mask resolution, and Whois information gathering. This feature is key in determining the proper or available devices to spoof or siphon on your LAN or internetwork.


This is the command prompt on the remote machine. Anything that you can do on your pc from the CMD prompt can be done from here. Examples include mapping a drive back to your pc and copying all the files from the target or adding local users to the local security groups or anything really. With windows, everything is possible from the command prompt.


Allows for the enumeration of user accounts and their associated hashes with further ability to send all harvested information to the cracker.

LSA Secrets

Windows NT and Windows 2000 support cached logon accounts. The operating system default is to cache (store locally), the last 10 passwords. There are registry settings to turn this feature off or restrict the number of accounts cached. RAS DUN account names and passwords are stored in the registry. Service account passwords are stored in the registry. The password for the computers secret account used to communicate in domain access is stored in the registry. FTP passwords are stored in the registry. All these secrets are stored in the following registry key: HKEY_LOCAL_MACHINE_SECURITY_PolicySecrets


From this object, you can determine all of the networks that this device is aware of. This can be powerful if the device is multihomed on two different networks.

TCP Table

A simple listing of all of the processes and ports that are running and their TCP session status.

UDP Table

A simple listing of all of the processes and ports that are running and their UDP session status.

For now, play around with Cain but be careful!

Cain can dangerous as it can bring the whole network down!

Still haven't configured Cain? Learn to do it now!

Sunday, August 23, 2009

Configuring Cain and Abel - Tutorial 1

This is the beginner's tutorial to Cain and Abel. In this tutorial I will teach you the basics of Cain and Abel and tell you how to configure this tool. To start off, let us talk about how to start configuring your Cain application. So here it is:

1>>Open the command prompt by typing 'cmd' in Run and pressing enter.
2>>Now type this "ipconfig /all" and press enter.
3>>All the Network Adapters you have installed on your machine will be displayed along with their MAC addresses. Locate the one you will be using for hacking and copy it's MAC address in the notepad.
4>>Now open Cain and click on the Configure option at the top. A dialog box will open which will be listing your Network Adapters.
5>>Locate the Network Adapter by matching the MAC address you noted down and select it. Click OK.

Now you've configured Cain to work wonders for you. 

View Flv, Mp4, 3gp and Mov thumbnails in Windows Explorer!

It's really irritating sometimes when you can't view the thumbnails for your Flv files. So now here's this little trick you can play with your registry which will enable you to view thumbnails for all the media files you want.

Okay, so now what you have to do is that you have to make REG files to edit the registry automatically. Here's what you have to do:

Open the notepad and paste the following editing keys for each file type:

For Flv






For mp4



Okay, after pasting any of these in the notepad, save the file with any name with a .reg extension. A registry file will be created. Double click the registry file and you will be asked whether you want to add new information to the registry. Click yes and here you go. Now you can view the thumbnails for your selected file type. :):)

Note: Before playing with the registry, it is always recommended to create a system restore point.

Remote Shutdown a Computer!

It's a fun trick you can play on your friends on the same network and is really easy to apply. You can shutdown the computer of your friend while sitting in the comfort of your very own chair. Okay, here's what you have to do.

1>>Get the IP address of your friend. If you don't know how to do this follow this link.

2>>Go to Start>>Run and type 'cmd' and press enter.

3>>Now type this in the command prompt and press enter.

"shutdown -i" without quotes.

4>> A dialogue box will appear on your screen. On the right top there will be a button named "Add". Click on this button.

5>>Now enter the IP address of your friend or victim and press OK. You will be returned to previous box.

6>>Type some comment in the comment box and press OK again.

You just did it! :D

Well, if you couldn't, I'll follow this up with another article very soon.

Note: For this trick to work, the target machine must be open to all remote connections and you must be logged in as the combined admnistrator.

Friday, August 21, 2009

Javascript Injection and Cookie Editing - Web Hacking

JavaScript is a strong scripting language which can come in really handy while you're dealing with web based environments. Although the basic usage of Javascript is to spice up your web pages, it can play pretty tricks with web pages and web servers and can help in developing an exploit.

What is an Injection?

So, to start of, let us consider the ways in which Javascript can be deployed as a tool here. Applying JavaScript is as easy as ABC. A Javascript Injection is used by pasting the script in the URL bar after clearing it of the website address. Pressing the enter key results in the execution of the script. This is what is called a Javascript Injection.

What can you do by using Javascript Injections?

There is a lot of stuff you can do with Javascript if you know how to use it properly. I'll cover two basic tricks you can play by the use of Javascript scripts.

a)Cookie Editing
b)Form Editing

In this tutorial we will only be covering Cookie Editing!

Cookie Editing

I shall not bear the responsibility of any misuse of the following information. It is being shared just for the sake of imparting knowledge.

By using Javascript, you can edit the information contained in the cookies, edit the existing ones or add completely new entries. Before you begin with cookie editing, your first step should be to get to know whether the site you are visiting has set any cookies by using this script:


Just paste this in the address bar followed by pressing enter. This will pop up the information stored in the site cookies. Now if you want to edit the information contained in the cookies you have to make use of the following command:

javascript:void(document.cookie=”Field = myValue”);

This command can either alter existing information or create entirely new values. Replace “Field” with either an existing field found using the alert(document.cookie); command, or insert your very own value. Then replace “myValue” with whatever you want the field to be. For example:


This is just an example and the field name you have here depends on the site you're injecting in.

Retrieving Streamed Videos

You just watched your video on Youtube or some other tube site and want to retrieve it somehow. How do you do that? Let's take it with two different browsers. Internet Explorer and Firefox.

Internet Explorer

Okay, you have to click on Tools and then select Internet Options. Under the 'Browsing History' section, click on Settings. You'll see another dialog box. In this one, just click on 'View Files'. Now you have the Internet Cache infront of you. Just right click and arrange icons by size. The files with the greatest sizes are your video files and their names read like this: AB81HS7SD8H.

So cut these files and paste them in some other folder. Rename them to .flv and here you go. You have your streamed videos.

Mozilla Firefox

Before going ahead, just make sure you have enabled your explorer to show hidden files.

1>>Go to the partition where you have installed Windows.
2>>Open Documents and Settings>>USERNAME>>Local Settings>>Application Data>>Mozilla.
3>>Now open the Firefox folder and then open the "profiles" folder. There will a folder named like this "ua3amy0i.default" inside. Open this folder.
4>>Now double click on the "Cache" folder and here you go.
5>>Arrange the files with respect to size and copy the files you want as stated before.
6>>Rename the files to .flv and BINGO! :D

Tuesday, August 18, 2009


So after all these years, I've recognized these seven tools which are extremely significant in learning to hack and developing an exploit. I've listed them down for you. So if you really are upto it, start off with these:


Nmap is a free security scanner which is used to discover computers and services on a computer network, thus creating a "map" of the network. Plus, there is a lot more Nmap can discover about your remote targets. The excellent capabilities of this software has earned it the top slot in this rating.

2>>Cain & Abel

An excellent password recovery tool. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols.


Wireshark is the world's foremost network protocol analyzer, and is the de facto standard across many industries and educational institutions. Wireshark is software that "understands" the structure of different networking protocols. Thus, it is able to display the encapsulation and the fields along with their meanings of different packets specified by different networking protocols. Wireshark uses pcap to capture packets, so it can only capture the packets on the networks supported by pcap. This software has come a long way and truly deserves a place here.


PuTTY is a terminal emulator application which can act as a client for the SSH, Telnet, rlogin, and raw TCP computing protocols. If used as a Telnet and SSH client, it can produce very desireable results without much heck. PuTTY was originally written for Microsoft Windows, but it has been ported to various other operating systems.


Nessus is a proprietary comprehensive vulnerability scanning software. Its goal is to detect potential vulnerabilities on the tested systems. For example:

1>>Vulnerabilities that allow a remote cracker to control or access sensitive data on a system.
2>>Misconfiguration (e.g. open mail relay, missing patches, etc).
3>>Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an external tool) to launch a dictionary attack.
4>>Denials of service against the TCP/IP stack by using mangled packets


Superscan is a free connect-based port scanning software designed to detect open TCP and UDP ports on a target computer, determine which services are running on those ports, and run queries such as whois, ping, ICMP traceroute, and Hostname lookups.

Superscan is a tool used by both system administrators, crackers and script kiddies to evaluate a computer's security. System administrators can use it to test for possible unauthorized open ports on their computer networks, whereas crackers use it to scan for a potentially insecure port in order to gain illegal access to a system.


Metasploit Framework is a tool for developing and executing exploit code against a remote target machine. The basic steps for exploiting a system using the Framework include:

1>> Choosing and configuring an exploit (code that enters a target system by taking advantage of one of its bugs; about 300 different exploits for Windows, Unix/Linux and Mac OS X systems are included);
2>> Checking whether the intended target system is susceptible to the chosen exploit (optional);
3>> Choosing and configuring a payload (code that will be executed on the target system upon successful entry, for instance a remote shell or a VNC server);
4>> Choosing the encoding technique to encode the payload so that the Intrusion-prevention system will not catch the encoded payload;
5>> Executing the exploit.

Note:You can start to learn Cain and Abel and Metasploit by reading the basic tutorials available on this blog. Look in the categories to find them.

Universal BIOS Passwords!

Using Standard Backdoor Passwords

There are backdoor passwords for most of the BIOS manufacturers which can be used to unlock the BIOS password. Take a look:

AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256, j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER, SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA, ZAAADA, ZJAAADC, djonet.

AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder Other passwords you may try (for AMI/AWARD or other BIOSes) LKWPETER, lkwpeter, BIOSTAR, biostar, BIOSSTAR, biosstar, ALFAROME, Syxz, Wodj,phonix,toshiba.

Please keep in mind that the passwords are case sensitive.

Sunday, August 16, 2009

Mechanically resetting BIOS password in 30 seconds!

You've turned this computer on and there it is! The irritating BIOS password! Or probably, you were being cautious and put a password on but now now you've forgotten it. Bad bad. But what to do now?

Okay, so the thirty seconds start now. Open the sheet covering the motherboard and search for a small round battery located on it. It is the BIOS/CMOS battery. Remove it for like five seconds and place it back in.

Guess what.

The password is no more there! :D

Password still there? Take a look at STANDARD BIOS PASSWORDS!

Saturday, August 15, 2009

Hack the XP Administrator Password - Windows Hacking!

Did you know that by the use of a simple trick you can change the administrator's password without the need of knowing the current password? Here's what you have to do.

1>>Login as the Administrator.
2>>Open the command prompt by going to Start>>Run and typing cmd.
3>>While you're logged in as the administrator open the command prompt and type this command replacing the parameters,


You have to write the username of the administrator account in place of username and the password you want to give it in place of password.

The only difficulty which you might face is the fact that on some PCs and computers, there is only one administrator and it's not that easy to get hold of their account while it has been logged in. But if you somehow manage to do it, the account is yours. :)

Traceroute Explained - Introduction!

Gathering more information about a particular IP address or a domain name can be of great use to network security analysts. It can give you tons of information about a particular address such as the physical address of the computer/server, location, name of a particular firm and even phone/fax numbers.

So, where to begin from? Let's go back to the old faithful Telnet commands. There are two commands which really help you in gathering information about IP addresses and Domain names. They are again Traceroute and Whois.

Now, if you're a Windows user, you can't easily use the 'cmd' to run UNIX based Telnet commands. Both of these commands are UNIX based though Traceroute has a Windows variant which is:


The syntax of command is "tracert" OR "tracert xxxx:xxx:xx:x".

eg. let us trace Google using the command prompt. Here is what you will get.


Tracing route to []
over a maximum of 30 hops:


But if you want to skip the painstaking task of using the command prompt, there is an awesome website which opens a whole new world of information. To visit the website CLICK HERE.

Thursday, August 13, 2009

How to get someone's IP address?

An IP address is a unique address assigned to each machine connected to the Internet. This signifies the that if you have the address of any machine, you are in a better position to commence the use of any feasible exploit, gain control over the machine and then use it to your advantage.

First of all, you have to identify a particular target. It should be a person you happen to know personally. If the person is not in your close social circle, you will have to impersonate as one of the victim's friend.

Now here is how the simple way stands:

1>>Add the victim on an Instant Messenger such as MSN or Yahoo messenger.

2>>Tell them that you have this very important file eg. a picture of their's which you want to send using IM. If you say it the right way, there's no reason why the person would turn this down.

3>>Now before sending the file, open the command prompt in the background and type "netstat". It shows you all the open connections on your PC.

4>>Send the file and wait for the victim to accept it.

5>>As soon as the person accepts it and the file transfer begins, go to the command prompt and type "netstat" again without quotes. You will again see something like this:

Active Connections

TCP digital-venom:4046 SYN_SENT

TCP digital-venom:4047 SYN_SENT
TCP digital-venom:4048 SYN_SENT
TCP digital-venom:4049 SYN_SENT
TCP digital-venom:4050 SYN_SENT

Now compare this reading with the one you got before. The IP address newly added to the list is the IP address of your victim.

Note: Some third party software eg. Limewire is known to interfere with the connections established through an IM, specially MSN Messenger. Keep this in mind. :):)

Related Posts

Use an IP address to HACK - Click Here And Learn Telnet

Wednesday, August 12, 2009

Telnet - Part 2

After giving you a basic insight into what Telnet is and why is it used, I'll introduce you to a few of the many more commands which are useful in gathering information about a network and its users. These commands need to be handled carefully and I shall not bear the responsibility of misuse of it. And before I mention the commands and their uses, let us switch to a better Telnet client. There are many of them available for free but I prefer to use Putty for the purpose of simplicity and resourcefulness.

Here are the commands:

This command will list all of the files and directories within the current directory.

This command will change your current directory to the directory you specify. An example would be that "cd public_html" would take you into your public_html directory.

This command will move a file from its current location within the current directory to the directory you specify. For example, let's say you are in your public_html directory and you want to move the file "links.cgi" into your "cgi-local" directory. At the prompt type "mv links.cgi cgi-local.

chmod XXX
This command will set the permissions on a file or directory to whatever you specify. The "XXX" would be replaced by actual numbers, such as 644. For example, if we wanted to set the permissions on our links.cgi file in our cgi-local directory, we would first go into that directory then type "chmod 755 links.cgi" at the prompt.

This command will delete the filename or directory you specify in the current directory. If we wanted to remove the directory named "user", we would type "rm user" at the prompt.

This is one of the most helpful commands for new users. It allows you to see all of the different options for a particular command. For example, if were were to type "man ls", we would then see all of the different options available for the list (ls) command.

Traceroute is infact a UNIX/LINUX based command. This command will perform a traceroute on a particular virtual domain to see how many hops it takes to get from your location to the domain specified. An example would be "traceroute", which would show us how long it takes for packets to get to and how they get there.

The Windows variant for the command is tracert and is used like this:

"tracert". Analysing the addresses will tell you where the servers of a particular website are located.

This is a UNIX/LINUX based command. This command will display the current InterNIC record including administrative, technical, and billing contact for a particular domain if it is already owned.

The wicked usage of these commands will be explained in the next tutorial. Till that time, just play around with these commands and discover more! :D

Related Posts

Telnet Tutorial - Part 1

Hex Editing - Part 2

Okay, so by now, I assume, that you are well versed with the Basic Hex Editing. If you are still to know what Hex Editing is, go HERE.

We'll go one step further in this part and show you what Hex Edit can do which no other program can do for you.

Okay, so if you have an executable application which shows some text in a dialogue box when you run it and you want to replace the text with something else, how can you do it? There is no way that you can do it except by hex editing it. Okay, so imagine the file looks something like this:

Now you want to change it from SALMAN to something else. For this, open the file in your Hex Editor i.e XVI32 and search for 'SALMAN' on the right side panel on your screen, each letter in a separate block. When you find it, just replace it with the text you want to be displayed. Don't make unnecessary white space in between or else it'll corrupt the application! Now save the application and whoa! It's done! Play around with more simple applications. But always backup your file before hex editing! ALWAYS!

Related Posts

Hex Editing Tutorial - Part 1

Hex Editing - Part 1

Sometimes when you're thinking like a hacker, you need to go to the very core of the structure of different programs and files and edit them to your purpose. This isn't always a very easy task. Imagine you want to modify your favorite map in Yuri's Revenge or perhaps modify the Pinball game to your liking. What will you do? There are tools like Resource Hacker which help you in manipulating the basic structure of the executable files but they're not always very successful due to their platform dependency and other limitations. In such cases, we use 'Hex Editing' to edit the contents of the file. This sounds like a very tedious and a difficult task, but believe me, it is as easy as installing Windows. Or perhaps, even more.

So what to begin with? Okay, first of all you need to select which Hex Editor to use. There is a built in Hex Editor in Windows which can be opened by typing "EDIT" in Run and pressing enter. This isn't really the best out there though. There are better, free Hex Editors which make your job easier and are fun to use. I'll recommend you to download XVI32 because of the fact that it is both free and powerful.

1>>Open the C drive on your computer and make a new Text Document.
2>> Write your name in the document and save it.
3>> After this, open the editor and locate the file.
4>>You will see the binary form of your name written on the left side and your name on the right side of the screen. Each letter in your name would be matching a binary component on the left. Just as shown in the picture.

5>>Now, if you change the binary value, the change would effect the content of your text file. Save it and that's all!

For now write all the letters from A to Z in the a notepad file and try to know the binary notation for each. Also try the numbers from 1 to 9. These will be your baby steps in Hex Editing. Keep up for the second part! Happy 'Hexing'!

Related Posts

Hex Editing Tutorial - Part 2

Sunday, August 9, 2009

Telnet - Part 1

Although the networking technologies have immensely evolved over the years, some things have remained the same. Telnet is one of them. The use of Telnet is pivotal in understanding the functioning of any network and helps us to develop an exploit. It can also point out the vulnerabilities of a particular network. So let's start with getting to know what exactly is telnet.

Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive communications facility. Telnet can be used to connect to a remote machine through any open port. So virtually, it stands like this. Telnet can intrude any machine with an open port. This is what mesmerizes the black hat hackers about Telnet. The most common use of Telnet stands to enable remote authentication and access.

Some of the common Telnet ports are these:

Port 21 - File Transfer Protocol
Port 22 - SSH Remote Login Protocol
Port 23 - Telnet Server
Port 25 - Simple Mail Transfer Protocol (SMTP)
Port 53 - Domain Name Server (DNS)
Port 69 - Trivial File Transfer Protocol (TFTP)
Port 70 - Gopher
Port 80 - Hyper Text Transfer Protocol (HTTP)

Once you get connected to a remote machine, you need to issue some simple Unix based commands which help you in interacting with the remote service. This can be used to check which services are running on a particular machine. This process is known as daemon tracking.

Black hat hackers can also use telnet to sniff network packets which might contain sensitive information such as usernames and passwords. This is achieved by using telnet and network utilities such as tcpdump and wireshark.

Now let's start by learning how to connect to some remote machine using telnet.

1>>Go to Run and type "cmd"
2>>In the command line type "telnet 80".

You just got connected to Google server on port 80.

Note: The web address or URL can be replaced by any valid IP address.
Now try this. Get the IP address of some friend and use a port scanner to search for open ports on their system. Telnet the ports and play around!

Telnet till next time! :D

Related Posts

Telnet Tutorial - Part 2

Folder Changing Magic! - Windows Hacking

If you have some data which you want to be safe and invisible to other people, I've got a real nice trick for you. You can use this simple trick to convert the required folder into Control Panel, Recylce Bin or My Computer. Only the use of command line will be able to give you your folder back.

Now to start, let the name of the folder you want to hide as MYFOLDER.

Now, you just have to rename your folder:

To convert it into control panel rename it like this.

To convert it into My Computer rename it like this.

To convert it into Recycle Bin rename it like this.

Consider that you've converted your folder into Control Panel. Now to make your folder accessible again, go to command line. Now change the path to the directory which has your folder. For eg. if the folder is located like this C:\Data\MYFOLDER, type "cd C:\Data".

Now it will show this:


Now type this:

ren MYFOLDER.{21EC2020-3AEA-1069-A2DD-08002B30309D} MYFOLDER

Notice that the key is same as the one you used to convert the folder into Control Panel. You will get your folder back.

Note: This method is not for the average PC user. It's meant for the advanced users who know and understand the consequences of playing with the registry.

Hiding a partition - Windows Hacking!

Do you know that with the help of a few simple command line commands you can hide the partition of your choice with ease without the fear of losing your data? Here's how!

1>>Go to Run and type "diskpart" without quotes and press enter.
2>>You should get a command line like this:
3>>Now type "list volume" without quotes which will enable you to look at the drive information on your computer. It would look like this:

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
Volume 0 G DVD-ROM 0 B
Volume 1 C NTFS Partition 9 GB Healthy System
Volume 2 D NTFS Partition 9 GB Healthy
Volume 3 E NTFS Partition 9 GB Healthy
Volume 4 F NTFS Partition 9 GB Healthy

4>>For example, if you want to hide drive F, just type "select volume 4". The following message will be shown:

Volume 4 is the selected volume.

5>>Now type "remove letter F" or whatever letter which has been assigned to the selected volume. It will show a message telling that the drive letter has been removed.
6>>Reboot the computer.

Now you've successfully hidden the partition as Windows XP cannot identify unknown volumes. Your data will be safe. To get your data back do this:

After selecting the volume as in step 4, type "assign letter F". That is, just replace "remove" with "assign" in the 5th step. You will get back your data volume.

It should be kept in mind that this method cannot hide the primary volume which has your operating system and neither should you try to attempt anything of this sort.

Monday, August 3, 2009

Making a Hidden Folder (NEW) - Windows Hacking!

Okay, enough of those chippy programs that hide your files for you and are either costing you something or get easily caught. Now there's a better way of hiding your files out there. By doing this, you'd not only be hiding your files but also you would be able to lock them in a password protected folder. You just have to follow a few simple steps and it's all yours.

title My private folder
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
echo Are you sure you want to lock the folder?(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid Choice.
ren Hidden "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder Locked!
goto End
echo Please enter the password to unlock:
set/p "pass=>"
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Hidden
echo Unlocked Successfully
goto End
echo You've entered an invalid password!
goto end
md Hidden
echo Success!!
goto End

1>>Copy the text in italics given above and paste it in the notepad.
2>>Write the password you want to give to the folder in the place of 'YOUR PASSWORD HERE'.
3>>Save the file with a '.bat' extension. You can name the file as you want.
4>>Double click the bat file you have created.
5>>A folder will be created named Hidden.
6>>Put your private files in that folder.
7>>Double click the bat file again. It will ask you whether you want to lock the folder. Press Y.
8>>Double click the bat file when you want to unhide your folder and enter your password.

Note: Hide the bat file deep somewhere so that nobody can find and edit it to get your password. Also make sure that the bat file does not get deleted, otherwise you are prone to losing your data.

Enjoy!! :)