Pages

Saturday, 11 June 2011

Hidden Operating System


If your system partition or system drive is encrypted using TrueCrypt, you need to enter your pre-boot authentication password in the TrueCrypt Boot Loader screen after you turn on or restart your computer. It may happen that you are forced by somebody to decrypt the operating system or to reveal the pre-boot authentication password. There are many situations where you cannot refuse to do so (for example, due to extortion). TrueCrypt allows you to create a hidden operating system whose existence should be impossible to prove (provided that certain guidelines are followed — see below). Thus, you will not have to decrypt or reveal the password for the hidden operating system.

TrueCrypt

Thursday, 26 May 2011

Google Search Tricks and Tips


A large number of people use google to search content which they like.Google is surely leading search engine so it will be good that i share with my readers on how to search more exactly and easily what they want.All i got this by experience and a bit surfing and i will try to sum up all thins here.

1.Find specific URL:
Inorder to find specific url containing something like /portals/0 or anything like call/index.php. Then we shall use a google dork like
inurl:'term to search'   e-g  inurl:'/portals/0'  and you will get results in no time.
2.Limit searches to a particular site:
I use this one all the time, and it’s particularly handy because many site’s built-in search tools don’t return the results you’re looking for (and some sites don’t even have a search feature). If i am looking for movies songs in site songs.pk then i will try:
movie name site:songs.pk    or simple i may say      content type site: any.com
3.Use of OR:
Putiing capital OR in between terms will search both the terms, either that term or the other.
Like:
ipod OR mp3 player
4.Use of related:
Including related: and the  URL searches for the results that are somehow related to that URL.like
related:google.com
5.Use of ~ :
Putting text a~ infront of a word searches for a word but also for its synonyms. e-g searching for cat~nutrition will give you result of nutrition and food,protein etc, so we can use:
text~function
6.Use Google as a calculator:
Google has a built-in calculator — try entering a calculation like 110 * (654/8 + 3). Yes, your computer also has a calculator, but if you spend most of your day inside a browser, typing your calculation into the browser’s search box is quicker than firing up your calculator app.

7.Get quick currency conversions:
Google can also do currency conversion, for example: 100 pounds in dollars.
(Note: there are many online sites for doing this in more authentic way.)

8.Search for specific document types:
Google can search the web for specific types of files using the “filetype:” operator. If you’re looking for PowerPoint files about hackersthirst, for example, you could try:
hackersthirst filetype:ppt
9.Search within numerical ranges using the .. operator:
Say, for example, you want to look for information about Olympic events that took place in the 1950′s, you could use this search:
 Olympics 1950..1960
10.Area code lookup:
Need to know where a phone number is located? Google will let you know where it is, and show you a map of the area, too. For example type this and search:
415
11.Phone Listing:
Let’s say someone calls you on your mobile number and you don’t know how it is.  If all you have is a phone number, you can look it up on Google using the phonebook feature thats so simple but the number must be in :P.
Example:
phonebook:617-555-1212 (note:  the provided number does not work – you’ll have to use a real number to get any results).
12.Word Definitions:
If you need to quickly look up the definition of a word or phrase, simply use the "define:" command.
Example: define:hacking
So, guys which one is your favourite search type.

Wednesday, 25 May 2011

Useful Links















For Online Virus Scanner...
  1. NoVirus Thanks
  2. Jotti's Malware Scan
  3. VirusTotal
  4. Kaspersky
Hosting for Pictures links are here....
  1. Imageshack
  2. Photobucket
  3. Fotopic
  4. Tinypic
Files Hosting use this Links...
  1. Easy-share
  2. Zshare
  3. Megaupload
  4. Netload
  5. 4shared
  6. Rapidshare
  7. 2shared
  8. Multiupload
  9. Megaupper
For the missing .dll or .ocx files go here...
  1. dlldump
  2. ocxdump
  3. afreeocx
  4. ascentive

Online Encryption & Decryption











For online encryption and decryption of plain text or password go to CRYPO

  1. JavaScript / Encrypt or Decrypt source code
  2. Hide URL Link and email address
  3. Hash Generator
  4. One'Pass Generator
  5. PassPhrase Generator
  6. Mega-PassPhrase Generator
  7. ASCII Encode/Decode
  8. Encrypt online message
  9. Decrypt online message
  10. Encrypt or Decrypt message
  11. Multibit Encryption

Keep Your Passwords Safe


What is KeePass?
 Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your website's FTP password, online passwords (like website member account), etc. etc. etc. The list is endless. Also, you should use different passwords for each account. Because if you use only one password everywhere and someone gets this password you have a problem... A serious problem. The thief would have access to your e-mail account, website, etc. Unimaginable.

 KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish).

Features
  • Strong Security
  • Multiple User Keys
  • Portable and No Installation Required
  • Export To TXT, HTML, XML and CSV Files
  • Import From Many File Formats
  • Easy Database Transfer
  • Support of Password Groups
  • Time Fields and Entry Attachments
  • Auto-Type, Global Auto-Type Hot Key and Drag&Drop
  • Intuitive and Secure Clipboard Handling
  • Searching and Sorting
  • Multi-Language Support
  • Strong Random Password Generator
  • Plugin Architecture
  • Open Source!

For more information, see the features page.


Is it really free?
 Yes, KeePass is really free, and more than that: it is open source (OSI certified). You can have a look at its full source and check whether the encryption algorithms are implemented correctly.

Test Your Anti-Virus


You can also test your anti virus program for its effectiveness using a simple notepad trick. Follow the steps below to know more:
Open Notepad.
Copy the code give below in the notepad file:
X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Save it with an .exe extension like testvirus.exe
As soon as you save this file, your anti virus program will detect the file (virus) immediately and will attempt to delete it. If this happens then your Antivirus is working properly. If not, then its time to look for some other reliable program.

NOTE: The EICAR test file (#3) is a 16-bit application and cannot be run on 64-bit versions of Windows.

Make the Matrix


To make this, open notepad and type the following:
@echo off
 color 2
 :start
 echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
 goto start

Save this file as Matrix.bat
 Make sure the file type is kept as ALL FILES while saving it as a .bat file.

Open the saved file and see the magic.

Winpatrol


You don't have to be doing anything wrong on the Internet to become a casualty of malware. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge. WinPatrol was the pioneer in using a heuristic behavioral approach to detecting Zero-Day attacks and violations of your computing environment. WinPatrol continues to be  the most powerful system monitor for its small memory footprint.

 WinPatrol's easy tabbed interface allows you to explore deep inside your computer without having to be a computer expert. A one-time investment in WinPatrol PLUS provides a unique experience you won't find in any other software.

The Hacker’s Underground Handbook




The Hacker’s Underground Handbook starts off with the very basics with topics like programming and Linux. It then moves on to introduce and teach the topics of

* password cracking
 * phishing
 * network hacking
 * wireless hacking
 * malware
 * Windows hacking

You can get it from here

Cracking The Coding Interview (4 Edition)





Cracking the Coding Interview: 150 Programming Interview Questions and Solutions
 CareerCup, LLC | 2010 | ISBN: 145157827X | 310 pages | PDF | 3 Mb

 Product Description
 Now in the 4th edition, Cracking the Coding Interview gives you the interview preparation you need to get the top software developer jobs. This book provides:

 * 150 Programming Interview Questions and Solutions: From binary trees to binary search, this list of 150 questions includes the most common and most useful questions in data structures, algorithms, and knowledge based questions.

 * Ten Mistakes Candidates Make -- And How to Avoid Them: Don't lose your dream job by making these common mistakes. Learn what many candidates do wrong, and how to avoid these issues.

 * Steps to Prepare for Behavioral and Technical Questions: Stop meandering through an endless set of questions, while missing some of the most important preparation techniques. Follow these steps to more thoroughly prepare in less time.

 * Interview War Stories: A View from the Interviewer's Side: Humorous but instructive stories from our interviewers show you how some candidates really flopped on the most important question - and how you can avoid doing the same.

Download Here

Ultimate Guide To Protect Youself



Here is an in-detail thread about self-protection from all the intrusions, hack attempts, rats, keylogging, stealing etc.

 The basic idea is to have a good army of ANTI's to protect yourself. You will need the following tools:-
1) Anti-Virus :- Run an Anti-Virus no matter how powerful your system is. Even free ones would do. Below is the list of free topline Anti-Virus.

Hackers Terminology



White Hat - These are people who write Anti Virus programs, and spend their time fighting malware. They do not get involved in the use of viruses/trojans, but instead spend their time disinfecting computers.
Black Hat - These are people with casual disregard for morals. They infect other computers, and some commit serious fraud and other crimes. These people give "Hacking" a bad name.

Grey Hat - These people are in between white and black hat.

Skid - This is someone who is not very good at hacking, and does not really know what they are talking about. They C&P programs, instead of learning how to code one themselves. If you are called this, don't bother flaming back as this will just encourage the person. Some people also use the term noob.

A Newbies Guide


Q: What is hacking?
A: The terms "hack" are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term "hacking" is often incorrectly used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime

Penetration Testing Bookmarks



The Open Penetration Testing Bookmarks Collection

...is just that, a collection of handy bookmarks I initially collected that aid me in my day to day work or I find in the course of research. They are not all inclusive and some sections need to be parsed but they are all good reference materials. I find having this Hackery folder in Firefox an easy way to reference syntax, tricks, methods, and generally facilitate and organize research.

Tuesday, 24 May 2011

Setting up Tor


Windows:

Go download Tor here

 After downloading Tor:
  1. Run the .exe
  2. Extract to your PC.
  3. You will now have extracted TOR into the selected folder. You should have a button called “Start Tor” with an onion on it, click this to start (if you want you can make a shortcut by right-clicking create shortcut and drag it to your desktop, make sure the original stays in the same folder though).
  4. You are good to go, if your ISP blocks connections to TOR and you need help setting up a bridge.

Hackers



Who is a hacker, and what does he do?
A hacker is a computer enthusiast, someone good at what he does, and all-around intrigued by technology. He'll spend all night trying to solve a particular problem, to make a patch to make a program function properly, just to do it. Not because he personally benefits from it, or he's getting paid to do so. Hackers are the ones who built many of the things we use today, and did a damned good job doing it.

What is a cracker, and what does he do?
A cracker is someone with some of the knowledge a hacker has, sometimes an equal amount. The difference between them is the Hacker builds things while the Cracker breaks(into) them. A cracker is one who searches for vulnerabilities only to exploit them, commonly without intent to even inform the admin of them. Crackers are the ones you see on the news stealing credit card numbers, all that type of thing.

Credit goes to BluexXxKalishnikov 

How To Spread Bots. 600 bots in 3 days!!!!!!


Friday, 20 May 2011

RFI = Remote File Inclusion

 Basically RFI is a method of getting your cleverly coded PHP shell onto a server. First off we will take a look at the code that allows us to use this vulnerability.
<?php
 $page = $_GET['page'];
 include($page);
 ?>

Tuesday, 17 May 2011

Recovering Google Account Password Using Google Password Decryptor



Description: This video is on GooglePasswordDecryptor

It shows how to use GooglePasswordDecryptor to instantly recover the Google Password from popular web browsers & messengers using both GUI & Command-Line interface.

This video is created by Preetam - one of the main contributor & forum moderator on SecurityXploded.com

How to protect yourself against phishing

1. What is phishing?
  • Phishing is the method of stealing login info(usernames and passwords) by directing the slave to a clone(fake) login page, that logs the login info without the knowledge of the slave.
  • Such clone website is known as a phisher.

Monday, 16 May 2011

Backtrack 5


Hide Like a Hacker


 i- Protection
 ii- Encryption
 iii- Anonymity
 iv- Links

Protection
  Basically what I am trying to say in this section is, before you go out hacking other people and other things, just check for a second and make sure it's not as easy to hack your device. There are some pretty simple steps for this though.

Tuesday, 10 May 2011

Beginners Guide to Crypters

 * What is a crypter?
 * What constitute a crypter?
 * Are all crypters same?Confused
 * How many types of crypters are there?
 * FUD/UD, What the hell is that?
 * Stub?Omg What is it use?
 * Will my Crypter remain FUD forever?
 * How to make sure my crypter remain FUD for the longest time?

Monday, 9 May 2011

The Absolute Basics of Hacking

The Absolute Basics of Hacking
 A writeup by InfamousBytes

 Intro
 Hello and welcome to this tutorial. If you see all the text on this page, and are afraid, you're not meant to be a hacker, quit now. Also, please know now that unlike in the movies, not everything is hackable. I will be writing about the basics of hacking servers; I will cover how to scan and/or exploit vulnerable daemons (services) running on the target server, and how to discover and/or exploit web-script

Thursday, 5 May 2011

How To Encrypt Files And Folders In Windows 7

Encryption is a method to protect your files from unauthorized access.Windows 7 has inbuilt Encryption capabilities so that you don’t have spend extra money on these type of softwares.File encryption is becoming more and more important these days.If you fear that somebody may transfer your important data from your computer then go for windows encryption.The person is still able to transfer your data but they will never be able to read/open that data because it is encrypted and it cannot be opened without private encryption key.Encryption is the safest Protection for files and folders that windows 7 provides to its users.

Now,lets start the step by step tutorial with screen shots on how to encrypt files and folders in windows 7.


1.Right click on the folder you want to encrypt and then click on properties.



2.In the properties dialog click on Advanced under the general tab.



3.After clicking on advanced you will see a prompt,check the box in the prompt which says Encrypt Contents To Secure Data



4.If your trying to encrypt a folder you will see another prompt asking you whether you would like to encrypt subfolder also.Click on OK.



5.Now your files will be encrypted.


Note:If you are performing the encryption for the first time then you should backup your encryprtion key certiface because without this encryption key certificate you wont be able to open your files or folders on other computers.

6.Your Encrypted files and folders names will turn into green colour which indicates that the these files have been encrypted.

Sunday, 1 May 2011

How to decrypt GILA7>>HAZZ-15>>AER-256>>ATOM-128

Many  times i saw people asking 'How to decrypt GILA7>HAZZ-15>AER-256>ATOM-128' ?

The process is simple but a little tricky, up-loaders encrypt their plain text passwords so that only l33t people can access and use there stuff!. In order to decrypt a password or any plain text you need a decrypt-er (online or offline that's up to you)

How to remove navbar from blogger blogs

To hide the Blogger Navbar :

1- Log in to blogger

2- On your Dashboard, select Layout. This will take you to the Template tab. Click Edit HTML. Under the Edit Template section you will see you blog's HTML.

3- paste the CSS definition in the top of the template code:

...
<b:skin><![CDATA[/*
-----------------------------------------------
Blogger Template Style
Name: Rounders
Designer: Douglas Bowman
URL: www.stopdesign.com
Date: 27 Feb 2004
Updated by: Blogger Team
----------------------------------------------- */

#navbar-iframe {
display: none !important;
}

/* Variable definitions
====================
<Variable name="mainBgColor" description="Main Background Color"
type="color" default="#fff" value="#ffffff">
<Variable name="mainTextColor" description="Text Color" type="color"
default="#333" value="#333333">
...

Remove the code to show it again.

Saturday, 30 April 2011

Hackers & Crackers

Who is a hacker, and what does he do?
A hacker is a computer enthusiast, someone good at what he does, and all-around intrigued by technology. He'll spend all night trying to solve a particular problem, to make a patch to make a program function properly, just to do it. Not because he personally benefits from it, or he's getting paid to do so. Hackers are the ones who built many of the things we use today, and did a damned good job doing it.

What is a cracker, and what does he do?
A cracker is someone with some of the knowledge a hacker has, sometimes an equal amount. The difference between them is the Hacker builds things while the Cracker breaks(into) them. A cracker is one who searches for vulnerabilities only to exploit them, commonly without intent to even inform the admin of them. Crackers are the ones you see on the news stealing credit card numbers, all that type of thing.

Credit goes to BluexXxKalishnikov 

Free 50 GB of Online Storage


Go to ADRIVE and sign up. Have 50 gigs of online storage free:)

The Basic Plan comes with this...and basic plan is FREE

Basic Plan Features:

Universal Access
50GB Storage Capacity (per account)
File Sharing
Folder/Directory Upload
File Download
Easy Search Tool
Remote File Transfer
International Character Support
Zoho® Editor

How to hack email



How to Hack Gmail or Yahoo or Hotmail or Any Other)


First of all you need to create an account in a form handling service. In the registration form enter your email address in the field "Where to send Data" and in redirect enter the URL of the site whose account is to be hacked( For Yahoo it will be http://mail.yahoo.com and for google it is mail.google.com/mail). After registering you will get an email from the web form designer with your form id.

Botnets

A botnet is a collection of infected computers or bots that have been taken over by Hackers (also known as bot herders) and are used to perform malicious tasks or functions. A computer becomes a bot when it downloads a file (e.g., an email attachment) that has bot software embedded in it. A botnet is considered a botnet if it is taking action on the client itself via IRC channels without the hackers having to log in to the client's computer. A botnet consists of many threats contained in one. The typical botnet consists of a bot server (usually an IRC server) and one or more botclients.

Yahoo Booters

It's a tool or a program that disconnect the person from their messenger or disturbs him. Yahoo booters are easily available on the internet, beware of some site may give a booter with a virus or a Trojan.

Friday, 29 April 2011

Sqlmap 0.9 Released – SQL Injection Tool


sqlmap 0.9 Released – SQL Injection Tool

After a year of hardcore development, sqlmap 0.9 is out!

Introduction:
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

How to search properly


In order to answer a question or find a program etc. you would use Google, Yahoo, Bing or the search here right? Well if you don't use search correctly you will often not be able to find what you are looking for. Follow these steps to maximize your chances of finding what you want.

Live Hacking DVD v1.3 Beta - Download !







Live Hacking DVD is a new Linux distribution packed with tools and utilities for ethical hacking, penetration testing and countermeasure verification. Based on Ubuntu this ‘Live CD” runs directly from the DVD and doesn’t require installation on your hard-drive. Once booted you can use the included tools to test, check, ethically hack and perform penetration tests on your own network to make sure that it is secure from outside intruders.

As well as the standard Linux networking tools like ping, wget, curl, telnet and ssh, the Live Hacking DVD has tools for DNS enumeration and reconnaissance as well as utilities for foot-printing, password cracking and network sniffing. It also has programs for spoofing and a set of wireless networking utilities.

The Live Hacking DVD is designed for ethical computer hacking, meaning that it contains the tools and utilities you need to test and hack your own network but using the tools and techniques that more malicious hackers would use.The Live Hacking DVD is based on open source technology and uses the popular Ubuntu Linux distribution as its base. All the tools included can be freely found in either the Ubuntu repositories on from the Internet. The DVD is designed to be a platform to help IT security professionals (as well as those with a general interest in information security) to start, understand and conduct penetration tests and ethical hacking.

Download Live Hacking DVD v1.3 Beta

Source: www.thehackernews.com